beautypg.com

Enterasys Networks XSR-1805 User Manual

Page 17

background image

the encryption accelerators. The encryption accelerators implement the
following FIPS-approved algorithms:

• XSR-18xx – Triple-DES, DES, and HMAC SHA-1

• XSR-3250 – AES, Triple-DES, DES, and HMAC SHA-1

Cryptographic processing is performed during SSHv2, SNMPv3, IKE,
IPSec, and when accessing and storing database files.

The module supports the following critical and non-critical security
parameters:

CSPs and non-
critical SPs

CSPs and non-
critical SPs type

Generation

Storage

Use

Key encryption
key

168-bit TDES key

External

Hard-coded in
plaintext

Encrypts master
encryption key

Master encryption
key

168-bit TDES key

Internal – using
FIPS 186-2 PRNG
Or
External

Stored encrypted
in NVRAM of the
Dallas DS1687
real time clock
chip

Encrypts user data,
certificates, and
DSA host key, and
the load test HMAC
SHA-1 key

DSA host key pair

160-bit DSA
private key and
1024-bit DSA
public key

Internal – using
FIPS 186-2 PRNG

Stored encrypted
in Flash

Module
authentication
during SSHv2

IKE RSA key pair

1024-bit RSA
private/public key
pair

Internal – using
FIPS 186-2 PRNG

Stored encrypted
in Flash

Module
authentication
during IKE

IKE User RSA
public keys

1024-bit RSA
public key

External Stored

encrypted

in Flash

User authentication
during IKE

Pre-shared keys

≥ 6-character pre-
shared key

External Stored

encrypted

in Flash

User and module
authentication
during IKE

IKE Diffie-Hellman
key pair

768/1024/1536-bit
Diffie-Hellman
private/public key
pair

Internal – using
FIPS 186-2 PRNG

Stored in plaintext
in memory

Key agreement
during IKE

IKE User Diffie-
Hellman public key

768/1024/1536-bit
Diffie-Hellman
public key

External

Stored in plaintext
in memory

Key agreement
during IKE

SSHv2 Diffie-
Hellman key pair

768/1024/1536-bit
Diffie-Hellman
private/public key
pair

Internal – using
FIPS 186-2 PRNG

Stored in plaintext
in memory

Key agreement
during SSHv2

SSHv2 User Diffie-
Hellman public key

768/1024/1536-bit
Diffie-Hellman
public key

External

Stored in plaintext
in memory

Key agreement
during SSHv2

SSHv2 session
keys

168-bit TDES or
128/192/256-bit
AES keys; HMAC
SHA-1 keys

Established during
the SSH key
exchange using
the Diffie-Hellman
key agreement

Stored in plaintext
in memory

Secure SSH traffic

© Copyright 2003

Enterasys Networks

Page 17 of 25

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

This manual is related to the following products: