Cryptographic Key Management - Enterasys X-Pedition XSR-1805 Owner's Manual

X-pedition security router
Hide thumbs Also See for X-Pedition XSR-1805:
Table of Contents

Advertisement

Cryptographic Key Management

The modules implement the following FIPS-approved algorithms:
Type
Symmetric
Asymmetric
Hash function
MAC
PRNG
Note: DES should be used for legacy purposes only.
The modules implement the following non-FIPS-approved algorithms:
• HMAC MD5
• MD5
• MD4
• 40-bit and 128-bit RC4
• CAST
• Blowfish
• Twofish
• ARCfour
• Diffie-Hellman (permitted for use in a FIPS-approved mode of
Cryptographic algorithms are implemented in software and in hardware by
Enterasys Networks
© Copyright 2003
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
Algorithm
AES (CBC)
Triple-DES (CBC and
ECB)
DES (CBC)
DSA
RSA Digital Signature
SHA-1
HMAC SHA-1
Appendix 3.1 (Algorithm
1) for computing DSA
keys
Appendix 3.1 for
general purpose
Table 7 – FIPS-Approved Algorithm supported by the Module
operation)
Page 16 of 25
Standard
FIPS 197
FIPS 46-3
FIPS 46-3
FIPS 186-2 Change
Notice 1
PKCS #1
FIPS 180-1
FIPS 198
FIPS 186-2 Change
Notice 1
Certificate Number
Cert. #48, #106, #107
Cert. #158, #218, #219,
#220
Cert. #204, #238, #239,
#240
Cert. #97
Vendor affirmed
Cert. #143, #197, #198,
#199
Cert. #143, #197, #198,
#199; vendor affirmed
N/A

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

X-pedition xsr-1850X-pedition xsr-3250

Table of Contents