Module Name
Advanced Configurable Cryptographic Environment (ACCE) v3 HSM Crypto Module
Historical Reason
186-2 transition
Caveat
When operated in FIPS mode and when installed, initialized and configured as specified in the Security Policy in Appendices A and C
Security Level Exceptions
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Embedded
Description
The Advanced Configurable Cryptographic Environment (ACCE) v3 crypto module offers the next-generation security platform for managing cryptographic keys and protecting sensitive applications. It is used in the Keyper Plus hardware security module (HSM), which is designed for mission-critical applications that demand maximum security. It is ideally suited for companies that need secure key management for PKI certification authorities, registration authorities, OCSP responders, smart card issuers, web servers, DNSSEC and other applications.
Approved Algorithms
|
|
AES |
Cert. #2684 |
DRBG |
Certs. #434, #786, #1237, #1387, and #1501 |
DSA |
Cert. #813 |
ECDSA |
Cert. #470 |
HMAC |
Certs. #1671, #2138, #2686, #2884, and #3004 |
RSA |
Cert. #1384 |
SHS |
Certs. #2255, #2782, #3384, #3581, and #3728 |
Triple-DES |
Cert. #1610 |
Triple-DES MAC |
Triple-DES Cert. #1610, vendor affirmed |
Other Algorithms
EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); NDRNG
Hardware Versions
2870-G1, and 2870-G2
Firmware Versions
2r3, 2r4, 3r2, 3r3, and 3r4