Module Name
RedCannon Cryptographic Module
Historical Reason
RNG SP800-131A Revision 1 Transition
Caveat
When operated in FIPS mode
Embodiment
Multi-chip standalone
Description
The RedCannon Crypto Module provides cryptographic support for the RedCannon line of products. The crypto module is used to create, manage and delete cryptographic keys as well as to perform cryptographic operations. The crypto module can be used for multiple functions within the RedCannon applications. It provides a structured set of APIs, which can be called to perform these functions. This provides flexibility for the module and the ability to add new applications for the crypto module functions in the future without changing the module itself.
Tested Configuration(s)
- Windows XP Professional with Service Pack 2 (single user mode)
Approved Algorithms
AES |
Cert. #249 |
HMAC |
Cert. #58 |
RNG |
Cert. #87 |
RSA |
Cert. #64 |
SHS |
Cert. #327 |
Triple-DES |
Cert. #334 |
Other Algorithms
DES (Cert. #312); TwoFish; BlowFish; Serpent; CAST; MD5; HMAC-MD5; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key generation; non-compliant); RSA (PKCS#1; key transport; key establishment methodology provides 80 bits of encryption strength; non-compliant)