beautypg.com

Cryptographic key management, Ryptographic, Anagement – Enterasys Networks XSR-1805 User Manual

Page 16

background image

Cryptographic Key Management

The modules implement the following FIPS-approved algorithms:

Type

Algorithm

Standard

Certificate Number

AES (CBC)

FIPS 197

Cert. #48, #106, #107

Triple-DES (CBC and
ECB)

FIPS 46-3

Cert. #158, #218, #219,
#220

Symmetric

DES (CBC)

FIPS 46-3

Cert. #204, #238, #239,
#240

DSA

FIPS 186-2 Change
Notice 1

Cert. #97

Asymmetric

RSA Digital Signature

PKCS #1

Vendor affirmed

Hash function

SHA-1

FIPS 180-1

Cert. #143, #197, #198,
#199

MAC

HMAC SHA-1

FIPS 198

Cert. #143, #197, #198,
#199; vendor affirmed

PRNG Appendix

3.1

(Algorithm

1) for computing DSA
keys
Appendix 3.1 for
general purpose

FIPS 186-2 Change
Notice 1

N/A

Table 7 – FIPS-Approved Algorithm supported by the Module

Note: DES should be used for legacy purposes only.


The modules implement the following non-FIPS-approved algorithms:

• HMAC MD5

• MD5

• MD4

• 40-bit and 128-bit RC4

• CAST

• Blowfish

• Twofish

• ARCfour

• Diffie-Hellman (permitted for use in a FIPS-approved mode of

operation)


Cryptographic algorithms are implemented in software and in hardware by

© Copyright 2003

Enterasys Networks

Page 16 of 25

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

This manual is related to the following products: