REDCOM Encryption 140-2
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys
Security Level Exceptions
Multi-Chip Stand Alone
REDCOM Encryption 140-2 is a fully FIPS 140-2 validated cryptographic engine for Java and Android based environments. The module delivers core cryptographic functions to these platforms and features robust algorithm support, including Suite B algorithms. REDCOM Encryption 140-2 offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.
**Oracle and Java are registered trademarks of Oracle and/or its affiliates.
**Android is a trademark of Google Inc
- CentOS 6 and OpenJDK 1.7 running on HP ProLiant DL360 G7 Server using an Intel Xeon X5670 (single-user mode)
||Certs. #1342, #1343, #1344 and #1345
||SP 800-56Arev2, vendor affirmed
||AES Cert. #4702; key establishment methodology provides between 128 and 256 bits of encryption strength
||SP800-56B, vendor affirmed
||Triple-DES Cert. #2494; key establishment methodology provides 112 bits of encryption strength
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); MD5; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength)