Module Name
FIPS Crypto Module
Historical Reason
Moved to historical list due to sunsetting
Caveat
When operated in FIPS mode and installed, initialized and configured as specified in Section 3 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy
Security Level Exceptions
- Physical Security: N/A
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
Ionic Security’s Fusion Platform implements the FIPS Crypto Module for all cryptographic functions such as key pair generation, digital signature generation/ and verification, encryption and decryption, hashing functions, and message authentication.
Tested Configuration(s)
- CentOS 7.1 running on an Intel Server System R1304GZ4GC (single-user mode)
- Windows 7 SP1 running on a Hewlett-Packard (HP) Z230 desktop
Other Algorithms
RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength)