Proofpoint Cryptographic Module for Java
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys. This validation entry is a non-security relevant modification to Cert. #3080.
Security Level Exceptions
Multi-Chip Stand Alone
The module is a cryptographic component to be used by the various Proofpoint security products. The module is designed to meet Level 1 requirements of FIPS 140-2 standard. The module is a cryptographic library that provides a variety of cryptographic services including SSH, HTTPs etc.
- CentOS 6 and OpenJDK 1.7 running on HP ProLiant DL360 G7 Server using an intel Xeon X5670 (single-user mode)
||Certs. #1342, #1343, #1344 and #1345
||SP 800-56Arev2, vendor affirmed
||AES Cert. #4702; key establishment methodology provides between 128 and 256 bits of encryption strength
||SP800-56B, vendor affirmed
||Triple-DES Cert. #2494; key establishment methodology provides 112 bits of encryption strength
Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); MD5; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)