Veritas Cryptographic Module for Java
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys. This validation entry is a non-security relevant modification to Cert. #3080.
Security Level Exceptions
Multi-Chip Stand Alone
Veritas Cryptographic Module delivers core cryptographic functions for use in various products from Veritas. It provides secure key management for Information Studio users and services, secure communications for clients that are making API calls to Information Studio, secure internal communication between the Information Studio components, secure at-rest encryption for confidential user data and secure communications for Information Studio services transmitting data to and from external services.
- CentOS 6 and OpenJDK 1.7 running on HP ProLiant DL360 G7 Server using an intel Xeon X5670 (single-user mode)
||Certs. #1342, #1343, #1344 and #1345
||SP 800-56Arev2, vendor affirmed
||AES Cert. #4702; key establishment methodology provides between 128 and 256 bits of encryption strength
||SP800-56B, vendor affirmed
||Triple-DES Cert. #2494; key establishment methodology provides 112 bits of encryption strength
Diffie-Hellman (shared secret computation); MD5; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)