Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cryptographic Module Validation Program CMVP

Certificate #1933

Details

Module Name
Red Hat Enterprise Linux 6.2 dm-crypt Cryptographic Module
Standard
FIPS 140-2
Status
Historical
 Historical Reason
RNG SP800-131A Revision 1 Transition
Overall Level
1
Caveat
When operated in FIPS mode with Red Hat Enterprise Linux 6.2 OpenSSL Cryptographic Module validated to FIPS 140-2 under Cert. #1758, Red Hat Enterprise Linux 6.2 Kernel Crypto API Cryptographic Module validated to FIPS 140-2 under Cert. #1901, Red Hat Enterprise Linux 6.2 Libgcrypt Cryptographic Module validated to FIPS 140-2 under Cert. #1757 and NSS Cryptographic Module validated to FIPS 140-2 under Cert. #1837, each module shall be obtained, installed, and initialized as specified in Section 9.1 of the provided Security Policy. Section 1 of the provided Security Policies specifies the precise RPM file containing each module. The integrity of the RPM is automatically verified during the installation and the Crypto officer shall not install the RPM file if the RPM tool indicates an integrity error. Any deviation from the specified verification, installation and initialization procedures will result in a non FIPS 140-2 compliant module
Module Type
Software
Embodiment
Multi-chip standalone
Description
Device-mapper is an infrastructure in the Linux kernel that provides a generic way to create virtual layers of block devices on top of real block devices. dm-crypt is a device-mapper target that provides transparent encryption of block devices using the Kernel Crypto API shipped with RHEL 6.2. The user can specify one of the symmetric ciphers, a key (of any allowed size), an IV generation mode which allows the user to create a new block device in /dev. Writes to this device will be encrypted and reads decrypted transparent to the user.
Tested Configuration(s)
  • Red Hat Enterprise Linux 6.2 with PAA running on IBM HS22
  • Red Hat Enterprise Linux 6.2 without PAA running on HP ProLiant DL585
  • Red Hat Enterprise Linux 6.2 without PAA running on IBM HS22 (single-user mode)
Approved Algorithms
AES Certs. #1968, #1969, #1970, #1971 and #1972
DSA Certs. #628, #629, #634 and #635
HMAC Certs. #1128, #1129, #1130, #1131, #1132, #1133, #1134, #1135, #1199 and #1200
PBKDF vendor affirmed
RNG Certs. #988, #991, #992 and #993
SHS Certs. #1657, #1658, #1659, #1660, #1661, #1662, #1663, #1664, #1725, #1726, #1741 and #1742
Triple-DES Certs. #1278 and #1279
Other Algorithms
DES; AES-CTR (non-compliant); AES-XTS (non-compliant); AES-CBC (non-compliant)
Software Versions
2.0

Vendor

Red Hat®, Inc.
314 Littleton Road
Westford, MA 01886
USA

Ann-Marie Rubin
arubin@redhat.com
Phone: 978-392-1000
Fax: 978-392-1001

Validation History

Date Type Lab
4/15/2013 Initial ATSEC INFORMATION SECURITY CORP