FIPS 140-2 Validation Certificate ., The National Institute of Standards The Communications Security and Technology of the United States Establishment of the Government of America of Canada Certificate No. 1050 The National Institute of Standards and Technology, as the United States FIPS 140-2 Cryptographic Module Validation Authority; and the Communications Security Establishment, as the Canadian FIPS 140-2 Cryptographic Module Validation Authority; hereby validate the FIPS 140-2 testing results qf tl':JEp Cryptog~aphjc Module identified as: ms in ac:?rdance with.the De:ived T,st)Zequirrmenfs f~ri~IP~ 14Q-2,!Sed1rity. Requi~emer.~s f~r ~ryptographic Modules. FIPS :40-2 speCIfies the secunty requlrements""that are lto be ~satlsfled by a ([;ryptogra~hlc n\odwle utilized WitHin a secunty system protecting Sensitive Information (United States) or ProtectedJ Infdrmat(on (Cahadafwh,hin c~~put~r an~ tel~communications systems (including voice systems). I. l iii Products which use the above identifieCl cryetographic 'hLodulelnay be labe'led ~s cbmplY),D9 wit~ the requirements of FIPS 140-2 so long as the product, throughout its lire cyple, cOhtinues to u~e th':~ valtaE:tedlersi6~ of the cryptographic module as specified in this certificate. The validation report ccmtains additi~mal detar(s concerning ~st results........No r~J(abiJity test has been performed and no warranty of the products by both ag~s is eithe~~ssed or implieCJ This certificate includes details on the scope of conformance and validation authority signatures on the reverse. TM A GertlflcatlOn Mark or NIST, which does nol Imply pfoduCl endorsement by NIST, the US , Of Canadian Go'Vernments. FIPS 140-2 provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3, and Level 4. These levels are intended to cover the wide range and potential applications and environments in which cryptographic modules may be employed. The security requirements cover eleven areas related to the secure design and implementation of a cryptographic module. The scope of conformance achieved by the cryptographic modules as tested in the product identified as: Sun Crypto Accelerator 6000 by Sun Microsystems (Hardware Versions: 375-3424, Revisions -02 and -03; Firmware Versions: Bootstrap version 1.0.1 or 1.0.10, Operational firmware version 1.1.2; Hardware) Atlan Laboratories, NVLAP Lab Code 200492-0 and tested by the Cryptographic Module Testing accredited laboratory: CRYPTIK Version 7.0 is as follows: Cryptographic Module Specification: Level 3 Cryptographic Module Ports and Interfaces: Level 3 Roles, Services, and Authentication: Level 3 Finite State Model: Level 3 Physical Security: Level 3 Cryptographic Key Management: Level 3 (Multi-Chip Embedded) EMlfEMC: Level 3 Self- Tests: Level 3 Design Assurance: Level 3 Mitigation of Other Attacks: Level N/A Operational Environment: Level N/A tested in the follOWing configuration(s): N/A The following FIPS approved Cryptographic Algorithms are used: AES (Certs. #397 and #862); DSA (Cert. #319); ECDSA (Cert. #99); HMAC (Certs. #475 and #479); RNG (Cert. #493); RSA (Certs. #411 and #414); SHS (Certs. #853 and #857); Triple-DES (Cert, #435) The cryptographic module also contains the following non-FIPS approved algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 80 and 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 80 and 112 bits of encryption strength); DES; MD5; HMAC-MD5; RC2 Overall Level Achieved: 3 Signed on behalf of the Government of the United States Signed on behalf of the Government of Canada . Signature: /J /' -U·;;::J /:.,: 0ct-.- /?P,,! (~c!.1-fGG-"-- 1l\...---l. / Signature: C<""~ -:::1 ~ ~ ;'1 LL. 7?~'K :os ---.:s: Dated: IZ--v-r-tt...d?·ZL./[/-< 1......- - I / C [., ~ G-. Dated: Oc ±---hv 02~. '();/A{ ) Chief, Computer Security Division Director, Industry Program Group National Institute of Standards and Technology Communications Security Establishment Canada