Veritas Cryptographic Module
Moved to historical list due to sunsetting
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy.
Security Level Exceptions
- Physical Security: N/A
- Mitigation of Other Attacks: N/A
Multi-Chip Stand Alone
The Veritas Cryptographic Module from Veritas provides cryptographic services which are used to encrypt the data at rest and in the secure communication with a trusted third party.
- CentOS 6.3 on a Dell OptiPlex 755
- Red Hat Enterprise Linux 6.3 on a Dell OptiPlex 755 (single-user mode)
- SUSE Linux Enterprise 11 SP2 on a Dell OptiPlex 755
RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RNG; Dual EC DRBG