Module Name
Veritas Cryptographic Module
Validation Dates
04/25/2016;05/10/2016;06/24/2020;06/29/2020;07/07/2020
Caveat
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy.
Security Level Exceptions
- Physical Security: N/A
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The Veritas Cryptographic Module from Veritas provides cryptographic services which are used to encrypt the data at rest and in the secure communication with a trusted third party.
Tested Configuration(s)
- CentOS 6.3 on a Dell OptiPlex 755
- Red Hat Enterprise Linux 6.3 on a Dell OptiPlex 755 (single-user mode)
- SUSE Linux Enterprise 11 SP2 on a Dell OptiPlex 755
Other Algorithms
RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RNG; Dual EC DRBG