Module Name
Trusted Key PKI Cryptographic Module
Caveat
When installed, initialized, and configured as specified in the Security Policy Section 2.12. The module generates cryptographic keys whose strengths are modified by available entropy.
Security Level Exceptions
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
Our versatile Trusted Key PKI USB tokens are USB-interfaced device that offer a variety of security measures, including certificate-based public key infrastructure (PKI) authentication, digital signing, encrypting/decrypting files such as emails and documents, VPN client authentication and more.
Approved Algorithms
AES |
Cert. #C1061 |
CKG |
vendor affirmed |
CVL |
Cert, #C1061 |
DRBG |
Cert. #C1061 |
ECDSA |
Cert. #C1061 |
KBKDF |
Cert. #C1061 |
KTS |
AES Cert. #C1061; key establishment methodology provides 128 bits of encryption strength |
RSA |
Certs. #C1061 and #C1062 |
SHS |
Cert. #C1061 |
Triple-DES |
Cert. #C1061 |
Hardware Versions
Trusted-Key-PKI-X15