I 1---.... I en ifi " ....,...n. The Nationallnstitule of Standards The Communications Security and Technology of the United States Establishment of the Government of America of Canada Certificate No. o The National Institute of Standards and Technology, as the United States FIPS 140-2 Cryptographic Module Validation Authority; and the Communications Security Establishment, as the Canadian FIPS 140-2 Cryptographic Module Validation Authority; hereby validate the FIPS 140-2 testing results of the Cryptographic Module identified as: icrosoft Windows Vis terface (ksecdd.sys) (When operated in FIPS m S 140-2 under Cert. # 979 in acc?rdance with,the De~ived Test Requirements f~ri ~IP~ 149-21. Security~ Re'1uir,emer~s fM ~~ptographi? Modules. FIPS : 40-2 specifies the secunty reqUIrements that are to be ~atlsfled by a Cryptograph~c module utIlized wlthm a security system protecting Sensitive Information (United States) or ProJected Information (Cal;lada) w~thin Gon1puteT and tel~communications systems (including voice systems). ProdUcts which use the above identifieCl cryptographic-modul'e may be" Ia-eeled as complyiAgwith the requirements of FIPS 140-2 so long as the product, throughout its life cycle, continues to use the validated version of the cryptographic module as specified in this certificate. The validation report contains additional details concerning test results. No reliability test has been performed and no warranty of the products by both agencies is either expressed or implied. This certificate includes details on the scope of conformance and validation authority signatures on the reverse. TM A Certiflcat\on Mar~ 01 NISr, whICh does nOllmply product endorsemenl by NIST. the US. or Canadl.an GOlJernmeots. FIPS 140-2 provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3, and Level 4. These levels are intended to cover the wide range and potential applications and environments in which cryptographic modules may be employed. The security requirements cover eleven areas related to the secure design and implementation of a cryptographic module. The scope of conformance achieved by the cryptographic modules as tested in the product identified as: Microsoft Windows Vista Kernel Mode Security Support Provider Interface (ksecdd.sys) by Microsoft Corporation 'SoftwBre Version: 6.0.6001.22202; Software' Atlan Laboratories, NVLAP Lab Code 200492-0 and tested by the Cryptographic Module Testing accredited laboratory: CRYPT1K Verslorl 7.0 is as follows: Cryptographic Module Specification: Level 1 Cryptographic Module Ports and Interfaces: Level 1 Roles, Services, and Authentication: Level 1 Finite State Model: Level 1 Physical Security: Level N/A Cryptographic Key Management: Level 1 (Multi-Chip Standalone) EMlfEMC: Level 1 Self- Tests: Level 1 Design Assurance: Level 1 Mitigation of Other Attacks: Level N/A Operational Environment: Level 1 tested in the following configuration(s): Microsoft Windows Vista Ultimate Edition SP1 (x86 Version); Microsoft Windows Vista Ultimate Edition SP1 {x64 version) (single-user mode) The following FIPS approved Cryptographic Algorithms are used: AES (CeltS. #739 and #756); ECOSA (Cert. #82); HMAC (Certo #412); RNG {Cert. #435 and SP 800-90 AES-CTR. lIendor-affirmod); RSA (Certs. #353 andtl-357); SHS (Cart. #753); Triple-DES (Cen. #656) The cryptographic module also contains the following non-FIPS approved algorithms: AES (GeM and GMAC; non-compliant:); DES; Diffie-Hellman (key agreement; key establishment methodology provides between 80 and 150 bits of encryption strength; non-compliant less than 80 bits of encryption strength); EC Diffie-Hollman (key agre-ement; key establishment methodology provides between 128 and 256 bits of encryption strength); MD2; MD4; IVID5; H'MAC MD5j RC2; RC4; RNG (SP 800·90 Oual-EC; /lon-compliant); RSA (key wrapping; key establishment methodology provides between 80 and 150 bits of encryption strength; flon-compliant less than 80 bits of encryptron strength) Overall Le vel cnieved: C" . S Ignature: -f!-0,' // / , · 1 ( . .(/f~_"J _'b ' I .'"l (~ () /r;" Signed on b~;?lf of t.~~e overn~~~nt of tre United States ~" ~ l. I)'. 0 .. _ 0 Signed on behalf of the Government of Canada Signature: U~-:l =-=------ ~5 Dated : "CI 01:) jt>v(.,. t f;+"C/'l- ') cr--, () U !j Dated: I\v~,)~~+ ~l', ·,2.e(0~ ,j I Chief, Computer Security Division Director, Industry Program Group National Institute of Standards and Technology Communications Security Establishment Canada