Historical Reason
SP 800-56Arev3 transition
Security Level Exceptions
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The ACM is designed to manage several BOTsinks in a centralized manner. ACMs cannot be managed by other ACMs, and each BOTsink can be programmed to use one and only one ACM.
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #941 with CVL Certs. #1228 and #1229, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength)