Module Name
Gloo BoringCrypto
Caveat
When installed, initialized and configured as specified in Section 12.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Security Level Exceptions
- Physical Security: N/A
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Tested Configuration(s)
- Debian Linux 4.19.37 (Rodete) running on HPE Z620 with Intel Xeon E5-2680 with PAA
- Debian Linux 4.19.37 (Rodete) running on HPE Z620 with Intel Xeon E5-2680 without PAA
- Ubuntu Linux 18.04 running on Google Arcadia-Rome with AMD Rome with PAA
- Ubuntu Linux 18.04 running on Google Arcadia-Rome with AMD Rome without PAA
- Ubuntu Linux 18.04 running on Zaius P9 with POWER9 with PAA
- Ubuntu Linux 18.04 running on Zaius P9 with POWER9 without PAA (single-user mode)
Approved Algorithms
AES |
Cert. #C1063 |
CKG |
vendor affirmed |
CVL |
Certs. #C1063 |
DRBG |
Cert. #C1063 |
ECDSA |
Cert. #C1063 |
HMAC |
Cert. #C1063 |
KAS-SSC |
vendor affirmed |
KTS |
AES Cert. #C1063; key establishment methodology provides between 128 and 256 bits of encryption strength |
RSA |
Cert. #C1063 |
SHS |
Cert. #C1063 |
Triple-DES |
Cert. #C1063 |
Allowed Algorithms
NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)