SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
Bloombase Cryptographic Module
National Institute of Standards and
Technology (NIST) Federal Information
Processing Standards (FIPS) 140-2
Certification
This Technical White Paper provides background information of NIST FIPS 140-2
certification, and how Bloombase Cryptographic Module has achieved FIPS 140-2
validation, which powers the foundation of Bloombase defense-in-depth security
products and what it means to customers.
This document is for informational purposes only and may contain typographical errors and technical inaccuracies.
The content is provided as is, without express or implied warranties of any kind.
Information in this document, including URL and other Internet Web site references, is subject to change without
notice. Unless otherwise noted, the example companies, organizations, products, people and events depicted
herein are fictitious and no association with any real company, organization, product, person or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise),
or for any purpose, without the express written permission of Bloombase.
Bloombase may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Bloombase, the furnishing of this document does not give you any license to these patents, trademarks, copyrights,
or other intellectual property.
This document is the property of Bloombase. No exploitation or transfer of any information contained herein is
permitted in the absence of an agreement with Bloombase, and neither the document nor any such information may
be released without the written consent of Bloombase.
© 2010 Bloombase, Inc. All rights reserved. Bloombase and its affiliates cannot be responsible for errors or
omissions in typography or photography. Bloombase, Spitfire, StoreSafe are either registered trademarks or
trademarks of Bloombase, Inc. in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Document No.: BLBS-TN-Bloombase-Cryptographic-Module-NIST-FIPS-140-2-Certification-USLET-EN-R2
Table of Contents
Table of Contents 3
Executive Summary 4
Validation Testing and Requirements 4
Cryptographic Module Validation Program (CMVP) 4
Bloombase CMVP Validated Cryptographic Module 5
Cryptographic Algorithm Validation Program (CAVP) 6
Bloombase CAVP Validated Cryptographic Cipher Algorithms 6
Conclusion 8
To Learn More 9
Bloombase Cryptographic Module NIST FIPS 140-2 Certification
4
Executive Summary
NIST FIPS 140-2 is one of many cryptographic standards maintained by the Computer Security division of NIST, the
US National Institute for Standards and Technology.
NIST of the United States of America, in conjunction with the Canadian Communications Security Establishment
(CSE) operates the Crypto Module Validation Program (CMVP), through which security products are validated.
In addition, the Cryptographic Algorithm Validation Program (CAVP) encompasses validation testing for FIPS
approved and NIST recommended cryptographic algorithms and components of algorithms. Cryptographic algorithm
validation is a prerequisite to the Cryptographic Module Validation Program (CMVP). Again, the CAVP was
established by NIST and the Communications Security Establishment (CSE).
Validation Testing and Requirements
NVLAP accredited Cryptographic and Security Testing (CST) laboratories perform validation testing of cryptographic
modules. Cryptographic modules are tested against requirements found in FIPS 140-2, Security Requirements for
Cryptographic Modules. Cryptographic module validation testing is performed using the Derived Test Requirements
for FIPS PUB 140-2 document. The document lists all of the vendor and tester requirements for validating a
cryptographic module, and provides the basis of testing performed by the CST accredited laboratories.
Leidos, Inc., formerly Science Applications International Corporation (SAIC), was appointed by Bloombase to perform
testing and validation for both CMVP and CAVP.
Cryptographic Module Validation Program (CMVP)
Prior to May 25, 2002, commercial cryptographic modules were validated for conformance to the FIPS 140-1, Security
Requirements for Cryptographic Modules. Effective May 26, 2002, this standard was superseded by the FIPS 140-2,
Security Requirements for Cryptographic Modules. However, Agencies may continue to purchase, retain and use FIPS
140-1 validated products after May 25, 2002.
The FIPS 140-2 specifies the security requirements that will be satisfied by a cryptographic module utilized within a
security system protecting protected information.
The standard provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3 and Level 4. These
levels are intended to cover the wide range of potential applications and environments in which cryptographic
modules may be employed.
The security requirements cover 11 areas related to the secure design and implementation of a cryptographic
module. These areas include:
Bloombase Cryptographic Module NIST FIPS 140-2 Certification
5
 Cryptographic module specification
 Module ports and interfaces
 Roles, services and authentication
 Finite state model
 Physical security
 Cryptographic key management
 Electromagnetic interference/electromagnetic compatibility (EMI/EMC)
 Self-tests
 Design assurance
 Mitigation of other attacks
 Operational environment
A FIPS 140-2 validation certificate is issued for each validated module.
An overall rating is issued for the cryptographic module, which indicates (1) the minimum of the independent ratings
received in the areas with levels, and (2) fulfillment of all the requirements in the other areas.
It is important for vendors and users of cryptographic modules to realize that the overall rating of a cryptographic
module is not necessarily the most important rating. The rating of an individual area may be more important than the
overall rating, depending on the environment in which the cryptographic module will be implemented (this includes
understanding what risks the cryptographic module is intended to address).
Bloombase CMVP Validated Cryptographic Module
Bloombase develops cryptographic products and subsystems which conform to the FIPS 140-2 standard. The
following have been validated under the CVMP as meeting the FIPS 140-2 version of the standard:
 Cryptographic module specification: Level 1
 Module ports and interfaces: Level 1
 Roles, services and authentication: Level 1
 Finite state model: Level 1
Bloombase Cryptographic Module NIST FIPS 140-2 Certification
6
 Physical security: N/A
 Cryptographic key management: Level 1
 Electromagnetic interference/electromagnetic compatibility (EMI/EMC): Level 1
 Self-tests: Level 1
 Design assurance: Level 1
 Mitigation of other attacks: N/A
 Operational environment: Level 1
Bloombase Cryptographic Module has been tested and validated with built-in security hardened Bloombase OS
(formerly Spitfire OS) operating system. Overall, Bloombase Cryptographic Module achieved Level 1 for FIPS 140-2
certification.
Cryptographic Algorithm Validation Program (CAVP)
NIST certifies a list of industry standard cryptographic algorithms in its Cryptographic Algorithm Validation Program
(CAVP) including:
 RSA/Digital Signature Standard (DSS): FIPS 186-2 and 186-3
 Advanced Encryption Standard (AES): FIPS 197
 Keyed-Hash Message Authentication Code (HMAC): FIPS 198
 Secure Hash Algorithm Validation System (SHAVS): FIPS 180-3
 Random Number Generator Validation System (RNGVS): FIPS 186-2
Bloombase CAVP Validated Cryptographic Cipher
Algorithms
Bloombase Cryptographic Module supports a wide range of encryption cipher algorithms to support the diverse
information security needs with organizational customers in their day-to-day business:
 RSA
 AES
Bloombase Cryptographic Module NIST FIPS 140-2 Certification
7
 XTS-AES
 3DES
 DES
 Blowfish
 Twofish
 RC2
 RC4
 RC5
 RC6
 CAST5
 CAST6
 IDEA
 Serpent
 Skipjack
 Camellia
 SEED
 ARIA
 SM1
along with a number of one-way hash/digest algorithms
 SHA-1
 SHA-2
 MD5
 SM3
Bloombase Cryptographic Module NIST FIPS 140-2 Certification
8
Bloombase Cryptographic Module supports and has achieved the following CAVP certifications for its FIPS supported
cipher algorithms:
 RSA:
o ANSI X9.31 (MOD: 2048, 3072, 4096)
o RSASSA-PKCS1_V1_5: (SIG: 2048, 3072, 4096 withSHS: SHA-256, SHA-384, SHA-512; SIG: 1024,
1536, 2048, 3072, 4096 with SHS: SHA-1, SHA-256, SHA-384, SHA-512)
 AES:
o ECB (e/d; 128, 192, 256)
o CBC (e/d; 128, 192, 256)
o CFB8 (e/d; 128, 192, 256)
 HMAC:
o HMAC-SHA1
o HMAC-SHA256
o HMAC-SHA384
o HMAC-SHA512
 SHAVS:
o SHA-1
o SHA-256
o SHA-384
o SHA-512
 RNGVS:
o ANSI X9.31 (AES-128Key, AES-192Key, AES-256Key)
Conclusion
Bloombase Cryptographic Module NIST FIPS 140-2 Certification
9
Protection of a cryptographic module within a security system is necessary to maintain the confidentiality and
integrity of the information protected by the module. NIST FIPS 140-2 specifies the security requirements that will be
satisfied by a cryptographic module. FIPS 140-2 defines the baseline requirements and assessment of an encryption
product which provides support to customers when selecting a product to fulfill their security needs. In specific,
federal government agencies and departments require a product to be FIPS 140-2 certified as a basic requirement for
procurement.
Bloombase Cryptographic Module is the core building block of Bloombase information security products delivering
unprecedented strong security encryption services at turnkey application-transparent operation. The CMVP-certified
Bloombase Cryptographic Module with purpose-built CAVP-certified cryptographic algorithms enables
organizational customers to meet stringent security regulatory compliance requirements easily and cost-effectively.
Finally, Bloombase products currently undergoing FIPS 140-2 validation, if any, can be viewed at
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140InProcess.pdf.
To Learn More
1. Computer Security division of NIST, http://csrc.nist.gov/index.html
2. Cryptographic Module Validation Program (CMVP), http://csrc.nist.gov/cryptval/
3. Cryptographic Algorithm Validation Program (CAVP), http://csrc.nist.gov/groups/STM/cavp/
4. Leidos, Inc., https://www.leidos.com/
5. SAIC, http://www.saic.com/
6. FIPS 186-2, 186-3, http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf
7. FIPS 197, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
8. FIPS 198, http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf
9. SHAVS, http://csrc.nist.gov/groups/STM/cavp/documents/shs/SHAVS.pdf
10. RNGVS, http://csrc.nist.gov/groups/STM/cavp/documents/rng/RNGVS.pdf
11. Bloombase Cryptographic Module CMVP FIPS 140-2 validation,
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#1241
12. Bloombase Cryptographic Module FIPS 140-2 certificate,
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140crt/140crt1241.pdf
Bloombase Cryptographic Module NIST FIPS 140-2 Certification
10
13. Bloombase Cryptographic Module FIPS 140-2 validation security policy,
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1241.pdf
14. Bloombase Cryptographic Module CAVP for RSA,
http://csrc.nist.gov/groups/STM/cavp/documents/dss/rsanewval.html#496
15. Bloombase Cryptographic Module CAVP for AES,
http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html#1041
16. Bloombase Cryptographic Module CAVP for HMAC,
http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html#583
17. Bloombase Cryptographic Module CAVP for SHA,
http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.htm#991
18. Bloombase Cryptographic Module CAVP for RNG,
http://csrc.nist.gov/groups/STM/cavp/documents/rng/rngval.html#591

Mais conteúdo relacionado

Destaque

Hitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeHitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeBloombase
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewBloombase
 
Thales bloombase store_safe_sb
Thales bloombase store_safe_sbThales bloombase store_safe_sb
Thales bloombase store_safe_sbBloombase
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeDs 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeBloombase
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase
 
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...Bloombase
 

Destaque (7)

Hitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeHitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafe
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
Thales bloombase store_safe_sb
Thales bloombase store_safe_sbThales bloombase store_safe_sb
Thales bloombase store_safe_sb
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeDs 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15
 
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...
 

Semelhante a Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2

Bank World 2008 Kamens 04 29 08
Bank World 2008 Kamens 04 29 08Bank World 2008 Kamens 04 29 08
Bank World 2008 Kamens 04 29 08kamensm02
 
Aws cloud hms service
Aws cloud hms serviceAws cloud hms service
Aws cloud hms serviceMmik Huang
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationFIDO Alliance
 
ControlCase CMMC Basics Deck Final.pdf
ControlCase CMMC Basics Deck Final.pdfControlCase CMMC Basics Deck Final.pdf
ControlCase CMMC Basics Deck Final.pdfAmyPoblete3
 
Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2Cybera Inc
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesNRB
 
Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server SpecificationsBloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server SpecificationsBloombase
 
CA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application SecurityCA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application SecurityCA Technologies
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking PointMUK Extreme
 
GGM8000-FIPs-Certification
GGM8000-FIPs-CertificationGGM8000-FIPs-Certification
GGM8000-FIPs-CertificationDavid Kiefer
 
PCI DSS Requirements & Security Assessment Procedures | Prep4audit
PCI DSS Requirements &  Security Assessment Procedures | Prep4auditPCI DSS Requirements &  Security Assessment Procedures | Prep4audit
PCI DSS Requirements & Security Assessment Procedures | Prep4auditPrep4Audit
 
Ww1.microchip.com downloads en_device_doc_39662b
Ww1.microchip.com downloads en_device_doc_39662bWw1.microchip.com downloads en_device_doc_39662b
Ww1.microchip.com downloads en_device_doc_39662bOai Vu Quoc
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security CertificationVskills
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 

Semelhante a Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2 (20)

Samsung FIPS
Samsung FIPSSamsung FIPS
Samsung FIPS
 
Bank World 2008 Kamens 04 29 08
Bank World 2008 Kamens 04 29 08Bank World 2008 Kamens 04 29 08
Bank World 2008 Kamens 04 29 08
 
Aws cloud hms service
Aws cloud hms serviceAws cloud hms service
Aws cloud hms service
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO Authentication
 
ControlCase CMMC Basics Deck Final.pdf
ControlCase CMMC Basics Deck Final.pdfControlCase CMMC Basics Deck Final.pdf
ControlCase CMMC Basics Deck Final.pdf
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
 
Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 
How Secure is Azure?
How Secure is Azure?How Secure is Azure?
How Secure is Azure?
 
Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server SpecificationsBloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
 
Standards for protection of data on storage device are emerging from both the...
Standards for protection of data on storage device are emerging from both the...Standards for protection of data on storage device are emerging from both the...
Standards for protection of data on storage device are emerging from both the...
 
CA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application SecurityCA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application Security
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking Point
 
GGM8000-FIPs-Certification
GGM8000-FIPs-CertificationGGM8000-FIPs-Certification
GGM8000-FIPs-Certification
 
PCI DSS Requirements & Security Assessment Procedures | Prep4audit
PCI DSS Requirements &  Security Assessment Procedures | Prep4auditPCI DSS Requirements &  Security Assessment Procedures | Prep4audit
PCI DSS Requirements & Security Assessment Procedures | Prep4audit
 
Fips 197
Fips 197Fips 197
Fips 197
 
Ww1.microchip.com downloads en_device_doc_39662b
Ww1.microchip.com downloads en_device_doc_39662bWw1.microchip.com downloads en_device_doc_39662b
Ww1.microchip.com downloads en_device_doc_39662b
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security Certification
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 

Mais de Bloombase

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 

Mais de Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 

Último

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 

Último (20)

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 

Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2

  • 1. Bloombase Cryptographic Module National Institute of Standards and Technology (NIST) Federal Information Processing Standards (FIPS) 140-2 Certification This Technical White Paper provides background information of NIST FIPS 140-2 certification, and how Bloombase Cryptographic Module has achieved FIPS 140-2 validation, which powers the foundation of Bloombase defense-in-depth security products and what it means to customers.
  • 2. This document is for informational purposes only and may contain typographical errors and technical inaccuracies. The content is provided as is, without express or implied warranties of any kind. Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, people and events depicted herein are fictitious and no association with any real company, organization, product, person or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Bloombase. Bloombase may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Bloombase, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. This document is the property of Bloombase. No exploitation or transfer of any information contained herein is permitted in the absence of an agreement with Bloombase, and neither the document nor any such information may be released without the written consent of Bloombase. © 2010 Bloombase, Inc. All rights reserved. Bloombase and its affiliates cannot be responsible for errors or omissions in typography or photography. Bloombase, Spitfire, StoreSafe are either registered trademarks or trademarks of Bloombase, Inc. in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Document No.: BLBS-TN-Bloombase-Cryptographic-Module-NIST-FIPS-140-2-Certification-USLET-EN-R2
  • 3. Table of Contents Table of Contents 3 Executive Summary 4 Validation Testing and Requirements 4 Cryptographic Module Validation Program (CMVP) 4 Bloombase CMVP Validated Cryptographic Module 5 Cryptographic Algorithm Validation Program (CAVP) 6 Bloombase CAVP Validated Cryptographic Cipher Algorithms 6 Conclusion 8 To Learn More 9
  • 4. Bloombase Cryptographic Module NIST FIPS 140-2 Certification 4 Executive Summary NIST FIPS 140-2 is one of many cryptographic standards maintained by the Computer Security division of NIST, the US National Institute for Standards and Technology. NIST of the United States of America, in conjunction with the Canadian Communications Security Establishment (CSE) operates the Crypto Module Validation Program (CMVP), through which security products are validated. In addition, the Cryptographic Algorithm Validation Program (CAVP) encompasses validation testing for FIPS approved and NIST recommended cryptographic algorithms and components of algorithms. Cryptographic algorithm validation is a prerequisite to the Cryptographic Module Validation Program (CMVP). Again, the CAVP was established by NIST and the Communications Security Establishment (CSE). Validation Testing and Requirements NVLAP accredited Cryptographic and Security Testing (CST) laboratories perform validation testing of cryptographic modules. Cryptographic modules are tested against requirements found in FIPS 140-2, Security Requirements for Cryptographic Modules. Cryptographic module validation testing is performed using the Derived Test Requirements for FIPS PUB 140-2 document. The document lists all of the vendor and tester requirements for validating a cryptographic module, and provides the basis of testing performed by the CST accredited laboratories. Leidos, Inc., formerly Science Applications International Corporation (SAIC), was appointed by Bloombase to perform testing and validation for both CMVP and CAVP. Cryptographic Module Validation Program (CMVP) Prior to May 25, 2002, commercial cryptographic modules were validated for conformance to the FIPS 140-1, Security Requirements for Cryptographic Modules. Effective May 26, 2002, this standard was superseded by the FIPS 140-2, Security Requirements for Cryptographic Modules. However, Agencies may continue to purchase, retain and use FIPS 140-1 validated products after May 25, 2002. The FIPS 140-2 specifies the security requirements that will be satisfied by a cryptographic module utilized within a security system protecting protected information. The standard provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3 and Level 4. These levels are intended to cover the wide range of potential applications and environments in which cryptographic modules may be employed. The security requirements cover 11 areas related to the secure design and implementation of a cryptographic module. These areas include:
  • 5. Bloombase Cryptographic Module NIST FIPS 140-2 Certification 5  Cryptographic module specification  Module ports and interfaces  Roles, services and authentication  Finite state model  Physical security  Cryptographic key management  Electromagnetic interference/electromagnetic compatibility (EMI/EMC)  Self-tests  Design assurance  Mitigation of other attacks  Operational environment A FIPS 140-2 validation certificate is issued for each validated module. An overall rating is issued for the cryptographic module, which indicates (1) the minimum of the independent ratings received in the areas with levels, and (2) fulfillment of all the requirements in the other areas. It is important for vendors and users of cryptographic modules to realize that the overall rating of a cryptographic module is not necessarily the most important rating. The rating of an individual area may be more important than the overall rating, depending on the environment in which the cryptographic module will be implemented (this includes understanding what risks the cryptographic module is intended to address). Bloombase CMVP Validated Cryptographic Module Bloombase develops cryptographic products and subsystems which conform to the FIPS 140-2 standard. The following have been validated under the CVMP as meeting the FIPS 140-2 version of the standard:  Cryptographic module specification: Level 1  Module ports and interfaces: Level 1  Roles, services and authentication: Level 1  Finite state model: Level 1
  • 6. Bloombase Cryptographic Module NIST FIPS 140-2 Certification 6  Physical security: N/A  Cryptographic key management: Level 1  Electromagnetic interference/electromagnetic compatibility (EMI/EMC): Level 1  Self-tests: Level 1  Design assurance: Level 1  Mitigation of other attacks: N/A  Operational environment: Level 1 Bloombase Cryptographic Module has been tested and validated with built-in security hardened Bloombase OS (formerly Spitfire OS) operating system. Overall, Bloombase Cryptographic Module achieved Level 1 for FIPS 140-2 certification. Cryptographic Algorithm Validation Program (CAVP) NIST certifies a list of industry standard cryptographic algorithms in its Cryptographic Algorithm Validation Program (CAVP) including:  RSA/Digital Signature Standard (DSS): FIPS 186-2 and 186-3  Advanced Encryption Standard (AES): FIPS 197  Keyed-Hash Message Authentication Code (HMAC): FIPS 198  Secure Hash Algorithm Validation System (SHAVS): FIPS 180-3  Random Number Generator Validation System (RNGVS): FIPS 186-2 Bloombase CAVP Validated Cryptographic Cipher Algorithms Bloombase Cryptographic Module supports a wide range of encryption cipher algorithms to support the diverse information security needs with organizational customers in their day-to-day business:  RSA  AES
  • 7. Bloombase Cryptographic Module NIST FIPS 140-2 Certification 7  XTS-AES  3DES  DES  Blowfish  Twofish  RC2  RC4  RC5  RC6  CAST5  CAST6  IDEA  Serpent  Skipjack  Camellia  SEED  ARIA  SM1 along with a number of one-way hash/digest algorithms  SHA-1  SHA-2  MD5  SM3
  • 8. Bloombase Cryptographic Module NIST FIPS 140-2 Certification 8 Bloombase Cryptographic Module supports and has achieved the following CAVP certifications for its FIPS supported cipher algorithms:  RSA: o ANSI X9.31 (MOD: 2048, 3072, 4096) o RSASSA-PKCS1_V1_5: (SIG: 2048, 3072, 4096 withSHS: SHA-256, SHA-384, SHA-512; SIG: 1024, 1536, 2048, 3072, 4096 with SHS: SHA-1, SHA-256, SHA-384, SHA-512)  AES: o ECB (e/d; 128, 192, 256) o CBC (e/d; 128, 192, 256) o CFB8 (e/d; 128, 192, 256)  HMAC: o HMAC-SHA1 o HMAC-SHA256 o HMAC-SHA384 o HMAC-SHA512  SHAVS: o SHA-1 o SHA-256 o SHA-384 o SHA-512  RNGVS: o ANSI X9.31 (AES-128Key, AES-192Key, AES-256Key) Conclusion
  • 9. Bloombase Cryptographic Module NIST FIPS 140-2 Certification 9 Protection of a cryptographic module within a security system is necessary to maintain the confidentiality and integrity of the information protected by the module. NIST FIPS 140-2 specifies the security requirements that will be satisfied by a cryptographic module. FIPS 140-2 defines the baseline requirements and assessment of an encryption product which provides support to customers when selecting a product to fulfill their security needs. In specific, federal government agencies and departments require a product to be FIPS 140-2 certified as a basic requirement for procurement. Bloombase Cryptographic Module is the core building block of Bloombase information security products delivering unprecedented strong security encryption services at turnkey application-transparent operation. The CMVP-certified Bloombase Cryptographic Module with purpose-built CAVP-certified cryptographic algorithms enables organizational customers to meet stringent security regulatory compliance requirements easily and cost-effectively. Finally, Bloombase products currently undergoing FIPS 140-2 validation, if any, can be viewed at http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140InProcess.pdf. To Learn More 1. Computer Security division of NIST, http://csrc.nist.gov/index.html 2. Cryptographic Module Validation Program (CMVP), http://csrc.nist.gov/cryptval/ 3. Cryptographic Algorithm Validation Program (CAVP), http://csrc.nist.gov/groups/STM/cavp/ 4. Leidos, Inc., https://www.leidos.com/ 5. SAIC, http://www.saic.com/ 6. FIPS 186-2, 186-3, http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf 7. FIPS 197, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf 8. FIPS 198, http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf 9. SHAVS, http://csrc.nist.gov/groups/STM/cavp/documents/shs/SHAVS.pdf 10. RNGVS, http://csrc.nist.gov/groups/STM/cavp/documents/rng/RNGVS.pdf 11. Bloombase Cryptographic Module CMVP FIPS 140-2 validation, http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#1241 12. Bloombase Cryptographic Module FIPS 140-2 certificate, http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140crt/140crt1241.pdf
  • 10. Bloombase Cryptographic Module NIST FIPS 140-2 Certification 10 13. Bloombase Cryptographic Module FIPS 140-2 validation security policy, http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1241.pdf 14. Bloombase Cryptographic Module CAVP for RSA, http://csrc.nist.gov/groups/STM/cavp/documents/dss/rsanewval.html#496 15. Bloombase Cryptographic Module CAVP for AES, http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html#1041 16. Bloombase Cryptographic Module CAVP for HMAC, http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html#583 17. Bloombase Cryptographic Module CAVP for SHA, http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.htm#991 18. Bloombase Cryptographic Module CAVP for RNG, http://csrc.nist.gov/groups/STM/cavp/documents/rng/rngval.html#591