Module Name
OpenPeak Cryptographic Security Module
Historical Reason
RNG SP800-131A Revision 1 Transition
Caveat
When installed, initialized and configured as specified in the Security Policy Section 3.1.1 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys
Security Level Exceptions
- Physical Security: N/A
- Mitigation of Other Attacks: N/A
Embodiment
Multi-chip standalone
Description
The OpenPeak Cryptographic Security Module (OCSM) 1.0 provides underlying cryptography primitives for OpenPeak’s ADAM platform, an advanced device and application management suite that provides comprehensive Mobile Enterprise Management as a cloud-hosted service. The OCSM provides a secure encrypted container for enterprise-managed applications, content and data to enable a highly secure mobile workspace that separates corporate information from personal information on the same mobile device.
Tested Configuration(s)
- Android v4.1 running on a Samsung Galaxy SIII (single-user mode)
- iOS v5 running on a iPad3
- iOS v6 running on a iPhone5
- Ubuntu 12.04 on ESXi 5.1 running on a Dell PowerEdge T110
- Ubuntu 12.04 on ESXi 5.1 running on a SuperMicro AS-1011S-mR2
- Ubuntu 12.04 running on a Dell PowerEdge T110
- Ubuntu 12.04 running on a SuperMicro AS-1011S-mR2
Other Algorithms
EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less then 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less then 112 bits of encryption strength)