Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Module Validation Program

Certificate #1837

Details

Module Name
NSS Cryptographic Module
Standard
FIPS 140-2
Status
Historical
 Historical Reason
Moved to historical list due to sunsetting
Validation Dates
11/8/2012
Overall Level
1
Caveat
When operated in FIPS mode and when obtained, installed, and initialized as specified in Section 5 of the provided Security Policy. Section 5 also specifies the precise RPM file containing this module. The integrity of the RPM is automatically verified during the installation and the Crypto officer shall not install the RPM file if the RPM tool indicates an integrity error. Any deviation from the specified verification, installation and initialization procedures will result in a non FIPS 140-2 compliant module. The module generates cryptographic keys whose strengths are modified by available entropy.
Security Level Exceptions
  • Design Assurance: Level 2
Module Type
Software
Embodiment
Multi-chip standalone
Description
Network Security Services (NSS) is a set of open source C libraries designed to support cross-platform development of security-enabled applications. NSS implements major Internet security standards. NSS is available free of charge under a variety of open source compatible licenses. See http://www.mozilla.org/projects/security/pki/nss/ .
Tested Configuration(s)
  • Red Hat Enterprise Linux v6.2 32-bit running on an Intel Core i7 system
  • Red Hat Enterprise Linux v6.2 64-bit running on an Intel Core i7 system
  • Red Hat Enterprise Linux v6.2 64-bit running on an Intel Core i7 system with PAA (single-user mode)
FIPS Algorithms
AES Cert. #1908
DRBG Cert. #165
DSA Cert. #602
HMAC Cert. #1145
RSA Cert. #979
SHS Cert. #1675
Triple-DES Cert. #1240
Other Algorithms
AES (Cert. #1908, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); Camellia; DES; Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HKDF; J-PAKE; MD2; MD5; RC2; RC4; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); SEED; Triple-DES (Cert. #1240, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
Software Versions
3.12.9.1

Vendor

Red Hat®, Inc.
100 East Davie Street
Raleigh, NC 27601
USA

Robert Relyea
rrelyea@redhat.com
Phone: 650-254-4236

Lab

SAIC
NVLAP Code: 200427-0