Module Name
Mojo Access Point
Historical Reason
SP 800-56Arev3 transition
Transitional Note
Pending SP 800-56Arev3 transition revalidation
Caveat
When operated in FIPS mode and the tamper evident seals installed as indicated in the security policy
Security Level Exceptions
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The module performs wireless access point (AP) function. It facilitates client devices to access network resources over secure wireless links conforming to IEEE 802.11 protocol, also referred to as WiFi.
Approved Algorithms
AES |
Certs. #5158, #5412, #5449 and #5473 |
CKG |
vendor affirmed |
CVL |
Certs. #1672 and #1673 |
DRBG |
Cert. #1936 |
HMAC |
Cert. #3419 |
KBKDF |
Certs. #174, #219 and #220 |
KTS |
AES Cert. #5158 and HMAC Cert. #3419; key establishment methodology provides 128 bits of encryption strength |
KTS |
AES Cert. #5473; key establishment methodology provides 128 bits of encryption strength |
RSA |
Cert. #2774 |
SHS |
Cert. #4165 |
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #1673, key agreement; key establishment methodology provides 128 bits of encryption strength); MD5; NDRNG
Hardware Versions
C-120 and C-130 with Tamper Evident Seal Kit: C-TPL-A