Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cryptographic Module Validation Program CMVP

Certificate #1470

Details

Module Name
IBM® z/OS® Version 1 Release 11 ICSF PKCS#11 Cryptographic Module
Standard
FIPS 140-2
Status
Historical
 Historical Reason
RNG SP800-131A Revision 1 Transition
Overall Level
1
Caveat
When operated in FIPS mode
Security Level Exceptions
  • Cryptographic Module Specification: Level 3
Module Type
Software-Hybrid
Embodiment
Multi-chip standalone
Description
The ICSF PKCS #11 module consists of software-based cryptographic algorithms, as well as symmetric and hashing algorithms provided by the CP Assist for Cryptographic Function (CPACF) and RSA Hardware clear key modular math cryptography provided through the Crypto Express3 card (CEX3A). The RSA hardware support is accessed through auxiliary module CSFINPVT which acts as a pipe between ICSF PKCS #11 and the cryptographic cards.
Tested Configuration(s)
  • (single-user mode)
  • IBM System z10® Enterprise Class (z10 EC) with CP Assist for Cryptographic Functions DES/TDES Enablement Feature 3863 [Base GPC, optional Crypto Express3 Card (Accelerator (CEX3A))] [IBM System z10® Enterprise Class (z10 EC) with CP Assist for Cryptographic Functions DES/TDES Enablement Feature 3863 (aka FC3863) includes FC3863 w/System Driver Level 77 and z/OS® V1R11]
Approved Algorithms
AES Certs. #1332 and #976
DSA Cert. #437
ECDSA Cert. #171
HMAC Cert. #780
RNG Cert. #734
RSA Certs. #644, #645 and #691
SHS Certs. #946 and #1218
Triple-DES Certs. #931 and #769
Other Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; Triple-DES (non-compliant); DSA (non-compliant); HMAC (non-compliant); RC4; BLOWFISH; MD5; MD2; RIPE-MD; EC Brainpool
Hardware Versions
CPACF (P/N COP) and optional 4765-001 (P/N 45D6048)
Software Versions
APAR OA32012 and APAR OA30951
Firmware Versions
CPACF (FC3863 w/ System Driver Level 77) and optional 4765-001 (e1ced7a0)

Vendor

IBM® Corporation
12 - 14 Marine Parade
Seabank Centre
Southport, QLD 4215
Australia

William F Penny
wpenny@us.ibm.com
Phone: 845-435-3010
Fax: 845-433-7510
James Sweeny
jsweeny@us.ibm.com
Phone: 845-435-7453
Fax: 845-435-8530

Validation History

Date Type Lab
12/28/2010 Initial ATSEC INFORMATION SECURITY CORP
6/1/2011 Update ATSEC INFORMATION SECURITY CORP
10/4/2011 Update ATSEC INFORMATION SECURITY CORP