Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cryptographic Module Validation Program CMVP

Certificate #1940

Details

Module Name
IOS Common Cryptographic Module (IC2M)
Standard
FIPS 140-2
Status
Historical
 Historical Reason
Moved to historical list due to sunsetting
Overall Level
1
Caveat
When operated in FIPS mode
Security Level Exceptions
  • Tested: Cisco Catalyst 2960 with IOS 15.0SE
  • Cisco 3925 ISR with IOS 15.2
  • Cisco 2811 ISR with IOS 15.2
Module Type
Firmware
Embodiment
Multi-chip standalone
Description
The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.
Approved Algorithms
AES Certs. #2134 and #2136
CVL Cert. #30
DRBG Cert. #237
ECDSA Cert. #322
HMAC Cert. #1304
RSA Cert. #1100
SHS Certs. #1858 and #1859
Triple-DES Certs. #1358, #1359 and #1360
Other Algorithms
DES; HMAC-MD5; MD2; MD5; RC2; RC4; SEAL; Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
Firmware Versions
Rel 1(1.0.0), Rel 1(1.0.1) and Rel 1(1.0.2)

Vendor

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team
certteam@cisco.com

Validation History

Date Type Lab
4/30/2013 Initial LEIDOS CSTL