Module Name
IOS Common Cryptographic Module (IC2M)
Historical Reason
Moved to historical list due to sunsetting
Caveat
When operated in FIPS mode
Security Level Exceptions
- Tested: Cisco Catalyst 2960 with IOS 15.0SE
- Cisco 3925 ISR with IOS 15.2
- Cisco 2811 ISR with IOS 15.2
Embodiment
Multi-chip standalone
Description
The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.
Other Algorithms
DES; HMAC-MD5; MD2; MD5; RC2; RC4; SEAL; Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
Firmware Versions
Rel 1(1.0.0), Rel 1(1.0.1) and Rel 1(1.0.2)