Module Name
XSOC Cryptosystem
Historical Reason
SP 800-56Arev3 transition
Caveat
When operated in FIPS mode. No assurance of the minimum strength of generated keys. This validation entry is a non-security relevant modification to Cert. #3080
Security Level Exceptions
Embodiment
Multi-Chip Stand Alone
Description
XSOC Cryptosystem ™ is a standards-based "Drop-in Compliance" cryptographic engine that enables the protection of data requiring absolute compliance with federal standards. The module delivers core cryptographic Suite-B functions to the layered architecture of XSOC's own proprietary security workflow and overall cryptosystem. Data that is enciphered or transformed by XSOC passes through XSOC Cryptosystem during every cycle of operation. XSOC Cryptosystem enables flexible modes of operation for encryption.
Tested Configuration(s)
- CentOS 6 and OpenJDK 1.7 running on HP ProLiant DL360 G7 Server using an Intel Xeon X5670 (single-user mode)
Approved Algorithms
AES |
Cert. #4702 |
CKG |
vendor affirmed |
CVL |
Certs. #1342, #1343, #1344 and #1345 |
DRBG |
Cert. #1600 |
DSA |
Cert. #1244 |
ECDSA |
Cert. #1160 |
HMAC |
Cert. #3114 |
KAS |
Cert. #130 |
KAS |
SP 800-56Arev2, vendor affirmed |
KBKDF |
Cert. #145 |
KTS |
AES Cert. #4702; key establishment methodology provides between 128 and 256 bits of encryption strength |
KTS |
SP800-56B, vendor affirmed |
KTS |
Triple-DES Cert. #2494; key establishment methodology provides 112 bits of encryption strength |
PBKDF |
vendor affirmed |
RSA |
Cert. #2562 |
SHA-3 |
Cert. #24 |
SHS |
Cert. #3849 |
Triple-DES |
Cert. #2494 |
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); MD5; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength)