Module Name
V2VNet Common Crypto Module
Historical Reason
Moved to historical list due to sunsetting
Validation Dates
02/22/2014;09/18/2015;02/26/2016
Caveat
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Security Level Exceptions
- Physical Security: N/A
- Mitigation of Other Attacks: N/A
Embodiment
Multi-chip standalone
Description
V2VNet Common Crypto Module provides cryptographic functions for Dispersive Solutions V2VNet Server Edition, a scalable solution allowing clients to communicate directly with other clients, and securely route voice, video and data communications.
Tested Configuration(s)
- CentOS 6.3 on a Dell OptiPlex 755
- Mac OS X 10.8 on a MacBook Air (single-user mode)
- Windows Server 2008 R2 on a Dell OptiPlex 755
Other Algorithms
RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RNG