Sign In
Upload
Manuals
Brands
PROMETHEUS Manuals
Control Unit
Talon FIPS 140-2
PROMETHEUS Talon FIPS 140-2 Manuals
Manuals and User Guides for PROMETHEUS Talon FIPS 140-2. We have
1
PROMETHEUS Talon FIPS 140-2 manual available for free PDF download: Manual
PROMETHEUS Talon FIPS 140-2 Manual (41 pages)
Cryptographic Module
Brand:
PROMETHEUS
| Category:
Control Unit
| Size: 2 MB
Table of Contents
Table 1 - Revision History
2
Table of Contents
3
Introduction
6
Table 2 - Cryptographic Module Hardware Configurations
6
Table 3 - Hardware Configuration Options
7
Table 4 - Security Level of Security Requirements
7
Hardware and Physical Cryptographic Boundary
9
Figure 1 - Talon Analog MFSA (Top-View)
9
Figure 2 - Talon Analog MFSA W/ FIPS Tamper Seals (Bottom-View)
10
Figure 3 - Talon Analog MFSA Fan, Rear Leds and Labeling (Rear-View)
11
Standard Definition (SD) MFSA Connectors Explained
12
Figure 4 - Talon Standard Definition (Analog) MFSA Connector Interface (Front-View)
12
High Definition (HD) MFSA Connectors Explained
13
Figure 5 - Talon High Definition (Digital) MFSA Connector Interface (Front-View)
13
Physical Ports & Interfaces
14
Table 5 - Physical Ports and Interfaces
14
Logical to Physical Interface Mapping & Function
15
Talon MFSA Visual Status Indicators (Leds)
15
Table 6 - Logical Interface to Physical Interface Mapping
15
Table 7 - Talon MFSA LED Indicators
16
Figure 6 - Talon MFSA LED Indicator for Tamper Response
16
Firmware and Cryptographic Functionality
17
Figure 7 - Talon MFSA Logical Block Diagram
17
Mode of Operation
18
Figure 8 - Talon MFSA Product Labeling with Model Field
18
Cryptographic Functionality
19
Non-Approved but Allowed Cryptographic Functions
20
Table 8 - Approved and CAVP Validated Cryptographic Functions
20
FIPS Mode Allowed Protocols
21
Critical Security Parameters
21
Table 9 - Non-Approved but Allowed Cryptographic Functions
21
Table 10 - Protocols Allowed in FIPS Mode
21
Public Keys
23
Table 11 - Critical Security Parameters (Csps)
23
Table 12 - Public Keys
23
Roles, Authentication and Services
24
Assumption of Roles
24
Table 13 - Roles Description
24
Authentication Methods
25
Services
25
Table 14 - Authentication Description & Strength
25
System Administration
26
Network Firewall
26
Table 15 - Authenticated Services (CO,U & F)
27
Unauthenticated Services
28
CSP Access Rights
28
Table 16 - Unauthenticated Services
28
Table 17 - CSP Access Rights Within Services
28
Self-Tests
30
Table 18 - Power up Self-Tests
30
Table 19 - Conditional Self-Tests
31
Table 20 - Critical Function Self-Tests
31
Physical Security Policy
32
Tamper Evident Seals Inspection
32
Figure 9 - Talon Tamper Evident Seal
32
Figure 10 - Talon Tamper Evident Seals Applied
32
Figure 11 - Tampered Product Seal #1
33
Figure 12 - Tampered Product Seal #2
33
Figure 13 - Tampered Product Seal #3
33
Cryptographic Engine Light Emitting Diode (LED) Inspection
34
Routine Inspection and Test
34
Battery
34
Figure 14 - Cryptography Engine LED Indicators
34
Components Quality
35
Table 20 - Physical Security Inspection Guidelines
35
Operational Environment
36
Mitigation of Other Attacks Policy
37
Security Rules and Guidance
38
This Section Documents the Security Rules Imposed by the Vendor
38
Configuration Requirements to Maintain Security of Module
39
Table 21 - Module Configuration Requirements
39
Decommissioning the Unit Via Procedural Zeroization
40
References and Definitions
41
Table 22 - References
41
Table 23 - Acronyms and Definitions
41
Advertisement
Advertisement
Related Products
PROMETHEUS Categories
Industrial Equipment
Fitness Equipment
Bicycle
Accessories
Flashlight
More PROMETHEUS Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL