IPS Va ticn Ce ,""u.e The National Institute of Standards The Communications Security and Technology of the United States Establishment of the Government of America of Canada Certificate No. 950 The National Institute of Standards and Technology, as the United States FIPS 140-2 Cryptographic Module Validation Authority; and the Communications Security Estaelishmen!, as the C~aAaE.liaA FIPS 1,40-2 Cryptographic Module Validation Authority; hereby validate the FIPS 140-2 testing resulfS of the Cryptographi,c Module identified as·: in accordance with the Derived Test Requirem~nts for FfF'S~ 140-2, Security Require'lTlentsJfor CrYptographic Modules. FIPS 140-2 specifies the security requirements that~are to lbe sati~sfied by a cryptbgrapnic nrodUI~ utilizpd wit~in a security system protecting Sensitive Information (United Statys_)~or Prote,cted IfJfOrmatfon'(Cancfda) with~nlCOmpL!ter and telpcommunications systems (including voice systems). Products which use the above identified~cryptographic module~may fje Ilabeled as complying with the requirements of FIPS 140-2 so long as the product, throughout its life cycle, continues to use the validated version of the cryptographic module as specified in this certificate. The validation report contains additional details concerning test results. No reliability test has been performed and no warranty of the products by both agencies is either expressed or implied. This certificate includes details on the scope of conformance and validation authority signatures on the reverse. TM. A Cert~lca\lon Mark 01 NIST. which does nOl Jmply product endorsemenl by NIST, Ihe U.S., or Canadian GovernmenlS. FIPS 140-2 provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3, and Level 4. These levels are intended to cover the wide range and potential applications and environments in which cryptographic modules may be employed. The security requirements cover eleven areas related to the secure design and implementation of a cryptographic module. The scope of conformance achieved by the cryptographic modules as tested in the product identified as: FortiClient Crypto Madure by Fortlnellnc. (Software Version: 3.0.470; Software)' DOMUS IT Security Laboratory. NVLAP Lab Code 200017..(} and tested by the Cryptographic Module Testing accredited laboratory: CRYPTIK Version 7.0 is as follows: Cryptographic Module Specification: Level 1 Cryptographic Module Ports and Interfaces: Level 1 Roles, Services, and Authentication: Level 2 Finite State Model: Level 1 Physical Security: Level N/A Cryptographic Key Management: Level 1 (Multi-Chip Embedded) EMI/EMC: Level 1 Self-Tests: Level 1 Design Assurance: Level 2 Mitigation of Other Attacks: Level N/A Operational Environment: Level 1 tested in the following configuration(s): Windows XP Professional, SP2 (sin gle-user mode) The following FIPS approved Cryptographic Algorithms are used: AES (Certs. #679 and #fiSO); Triple-DES (Certs. #621 and #622)i SHS (Certs. #109 and #7110); HM.AC (Certs. #360 and #361); RNG (Cen. #396); RSA (Cert. #317) The cryptographic module also contains the following non-FIPS approved algorithms: DES; M05; HMAC MD5; Diffie-Jiellman (key agreement; key estab'ishment methodology prOVides between 80 and 110 bits of encryption strength; non-eompl,lant less than 80 bUs of encrypUo n slren gth) Overall Level Achieved: 1 Signed on behalf of the Go States ~ Signature: 1""[>(- /ffilfl4:TC£4 Signature: ,~z..-;... ' - .... ? r W"·L"V'....' ..... "d ~ .... Dated: ~VLt0:t cJ. e-l; Dated: , ( ~J{ J t' ('(4('" ''-'' '"" "',o! .I Chief, Computer Security Division /1Jbirector, Industry Program Group National Institute of Standards and Technology Communications Security Establishment