Oracle StorageTek T10000D Manual page 32

Non-proprietary security policy
Table of Contents

Advertisement

The following non-Approved methods are allowed for use, as described, in the
Encryption Disabled and Mixed Modes:
 EC Diffie-Hellman (key agreement; key establishment methodology
provides 128 bits of encryption strength)
 Diffie-Hellman (key agreement; key establishment methodology provides
112 bits of encryption strength)
 The module provides a Non-Deterministic Random Number Generator
(NDRNG) as the entropy source to the FIPS-Approved SP 800-90A CTR
DRBG. The NDRNG provides a minimum of 384-bits to the DRBG for
use in key generation.
 The module provides MD5 for use with TLS 1.0 protocol.
© Copyright 2017 Oracle Corporation
This document may be freely reproduced and distributed whole and intact including this Copyright notice.
Page 32 of 51

Advertisement

Table of Contents
loading

Table of Contents