Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Module Validation Program

Certificate #1387

Details

Module Name
Red Hat Enterprise Linux 5 Kernel Crypto API Cryptographic Module
Standard
FIPS 140-2
Status
Historical
 Historical Reason
RNG SP800-131A Revision 1 Transition
Validation Dates
8/12/2010
Overall Level
1
Caveat
When operated in FIPS mode. When obtained, installed, and initialized as assumed by the Crypto Officer role and specified in Section 9.1 of the provided Security Policy. This module contains the embedded module Network Security Services (NSS) Cryptographic Module validated to FIPS 140-2 under Cert. #815 (Approved algorithms retested on listed operating environment) operating in FIPS mode. Section 1 of the provided Security Policy specifies the precise RPM files containing this module. The integrity of the RPMs is automatically verified during the installation and the Crypto officer shall not install the RPM files if the RPM tool indicates an integrity error. Any deviation from the specified verification, installation and initialization procedures will result in a non FIPS 140-2 compliant module.
Module Type
Software
Embodiment
Multi-chip standalone
Description
The Linux kernel Crypto API implemented in Red Hat Enterprise Linux 5 provides services operating inside the Linux kernel with various ciphers, message digests and an approved random number generator.
Tested Configuration(s)
  • Red Hat Enterprise Linux 5.4 (single-user mode)
FIPS Algorithms
AES Cert. #1224
DSA Certs. #406 and #449
HMAC Certs. #715 and #812
RNG Cert. #679
SHS Cert. #1125
Triple-DES Cert. #882
Other Algorithms
DES, Triple-DES (CTR mode; non-compliant)
Software Versions
1.0

Vendor

Red Hat®, Inc.
314 Littleton Road
Westford, MA 01886
USA

Irina Boverman
iboverma@redhat.com
Phone: 978-392-1000
Fax: 978-392-1001

Phone: 919-754-3700
Fax: 919-754-3701

Lab

atsec
NVLAP Code: 200658-0