Module Name
Red Hat Enterprise Linux GnuTLS Cryptographic Module
Historical Reason
SP 800-56Arev3 transition
Caveat
When operated in FIPS mode
Security Level Exceptions
Embodiment
Multi-Chip Stand Alone
Description
GnuTLS is a secure communications library implementing the TLS and DTLS protocols. It provides a simple C language application programming interface to access the secure communications protocols as well as APIs to parse and write X.509, PCKS#12, and other required structures which is shipped with Red Hat Enterprise Linux 7.6.
Tested Configuration(s)
- Red Hat Enterprise Linux 7 running on Dell PowerEdge R630 with an Intel(R) Xeon(R) E5 with PAA
- Red Hat Enterprise Linux 7 running on Dell PowerEdge R630 with an Intel(R) Xeon(R) E5 without PAA (single-user mode)
Approved Algorithms
AES |
Certs. #C136, #C137, #C259, #C269, #C272, #C276, #C281 and #C285 |
CVL |
Certs. #C259 and #C276 |
DRBG |
Certs. #C259 and #C276 |
DSA |
Certs. #C259 and #C276 |
ECDSA |
Certs. #C259 and #C276 |
HMAC |
Certs. #C259 and #C276 |
KTS |
AES Certs. #C259, #C269, #C272, #C276, #C281 and #C285; key establishment methodology provides between 128 and 256 bits of encryption strength |
KTS |
AES Certs. #C259, #C269, #C272, #C276, #C281 and #C285 and HMAC Certs. #C259 and #C276; key establishment methodology provides 128 or 256 bits of encryption strength |
KTS |
Triple-DES Certs. #C259 and #C276 and HMAC Certs. #C259 and #C276; key establishment methodology provides 112 bits of encryption strength |
RSA |
Certs. #C259 and #C276 |
SHS |
Certs. #C259, #C269, #C276 and #C285 |
Triple-DES |
Certs. #C259 and #C276 |
Allowed Algorithms
Diffie-Hellman (CVL Certs. #C259 and #C276 with CVL Certs. #C259 and #C276, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #C259 and #C276 with CVL Certs. #C259 and #C276, key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)