Module Name
WildFire WF-500
Historical Reason
Moved to historical list due to sunsetting
Caveat
When operated in FIPS mode and with the tamper evident seals and opacity shields installed as indicated in the Security Policy
Security Level Exceptions
- Cryptographic Module Specification: Level 3
- Roles, Services, and Authentication: Level 3
- Design Assurance: Level 3
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
WildFire WF-500 identifies unknown malware, zero-day exploits, and Advanced Persistent Threats (APTs) through dynamic analysis, and automatically disseminates protection in near real-time to help security teams meet the challenge of advanced cyber-attacks
Approved Algorithms
AES |
Cert. #4020 |
CVL |
Certs. #848, #849, #873 and #874 |
DRBG |
Cert. #1198 |
ECDSA |
Cert. #896 |
HMAC |
Cert. #2622 |
KAS |
SP 800-56Arev2 with CVL Certs. #848 and #849, vendor affirmed |
RSA |
Cert. #2064 |
SHS |
Cert. #3316 |
Other Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); ARCFOUR; Blowfish; Camellia; CAST; DSA (non-compliant); EC Diffie-Hellman (non-compliant); HMAC-MD5; HMAC-RIPEMD; RC2; RC4; RIPEMD; SEED; Triple-DES (non-compliant); UMAC
Hardware Versions
P/N: 910-000097-00G Rev G; FIPS Kit P/N: 920-000145 Version Rev 00A