Certificate 1994 - IBM Crypto for C
intCertNum 1994
strVendorName IBM Corporation
strURL http://www.ibm.com
strAddress1 12 - 14 Marine Parade
strAddress2 Seabank Centre
strAddress3
strCity Southport
strStateProv QLD
strPostalCode 4215
strCountry 4215
strContact Alex Hennekam
strEmail alexhenn@au1.ibm.com
strPhone +61 7-5552-4045
strFax +61 7 5571 0420
strContact2 Peter Waltenburg
strEmail2 pwalten@au1.ibm.com
strFax2 +61 7 5571 0420
strPhone2 +61 - 5552-4016
intCertNum 1994
strModuleName IBM Crypto for C
strPartNumber Software Version: 8.2.2.0
memModuleNotes When operated in FIPS mode
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf]
strPURL
strModuleType Software
strValidationDate 08/27/2013
intOverallLevel 1
memIndividualLevelNotes ;;-Operational Environment: Tested as meeting Level 1 with Microsoft Windows Server 2008 64-bit running on an ALTECH SH67H3 Intel Core i7-2600 with PAA; Microsoft Windows Server 2008 64-bit running on an ALTECH SH67H3 Intel Core i7-2600 without PAA; Microsoft Windows Server 2008 32-bit running on an IBM 8835 52X AMD Opteron 246; AIX 6.1 64-bit running on an IBM RS6000 7037-A50 PowerPC 5 64; Solaris 10 64-bit running on an SunFire T1000 UltraSPARC T1; Red Hat Linux Enterprise Server 5 32-bit running on an IBM 8835 52X AMD Opteron 246; Red Hat Linux Enterprise Server 5 64-bit running on an ALTECH SH67H3 Intel Core i7-2600 with PAA; Red Hat Linux Enterprise Server 5 64-bit running on an ALTECH SH67H3 Intel Core i7-2600 without PAA; Red Hat Linux Enterprise Server 5 64-bit running on an IBM System p5 185 7037-A50 IBM PowerPC 970; Red Hat Linux Enterprise Server 5 64-bit running on an IBM zSeries z196 type 2817 model M32 IBM zSeries z196 with CPACF; Red Hat Linux Enterprise Server 5 64-bit running on an IBM zSeries z196 type 2817 model M32 IBM zSeries z196 without CPACF (single user mode)
strFIPSAlgorithms AES (Certs. #2155, #2156, #2157, #2158, #2159, #2160, #2161, #2162, #2163, #2164, #2165, #2166, #2167, #2169, #2170, #2171, #2172, #2179, #2213, #2214, #2421, #2422, #2423, #2424, #2425, #2426, #2427, #2428, #2429, #2430, #2431, #2432, #2433, #2434, #2435, #2436, #2437, #2438, #2439, #2440, #2441 and #2443);
Triple-DES (Certs. #1365, #1366, #1367, #1368, #1369, #1370, #1371, #1372, #1373, #1374, #1375, #1376, #1377 and #1379);
DSA (Certs. #670, #671, #672, #673, #674, #675, #676, #677, #678, #679, #680, #681, #682, #683, #756 and #757);
RSA (Certs. #1109, #1110, #1111, #1112, #1113, #1114, #1115, #1116, #1117, #1118, #1119, #1120, #1121, #1123, #1253 and #1254);
ECDSA (Certs. #325, #326, #327, #328, #329, #330, #331, #332, #333, #334, #335, #336, #337, #338, #398 and #399);
SHS (Certs. #1874, #1875, #1876, #1877, #1878, #1879, #1880, #1881, #1882, #1883, #1884, #1885, #1886, #1889, #1904 and #1905);
DRBG (Certs. #240, #241, #242, #243, #244, #245, #246, #247, #248, #249, #250, #251, #252, #253, #326, #327, #328, #329, #330 and #331);
HMAC (Certs. #1319, #1320, #1321, #1322, #1323, #1324, #1325, #1326, #1327, #1328, #1329, #1330, #1331, #1333, #1506 and #1507)
strOtherAlgorithms RSA (key wrapping;
key establishment methodology provides between 112 and 150 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 150 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
EC Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
MD2;
MD4;
MD5;
MDC2;
RIPEMD;
HMAC MD5;
DES;
CAST;
Camellia;
Blowfish;
RC4;
RC2;
KBKDF (non-compliant)
strConfiguration Multi-chip standalone
memModuleDescription The IBM Crypto for C v8.2.2.0 (ICC) cryptographic module is implemented in the C programming language. It is packaged as dynamic (shared) libraries usable by applications written in a language that supports C language linking conventions (e.g. C,
C++, Java, Assembler, etc.) for use on commercially available operating systems. The ICC allows these applications to access cryptographic functions using an Application Programming Interface (API) provided through an ICC import library and based on the API defined by the OpenSSL group.
intModuleCount 1
memAdditionalNotes
strFirstValidtionDate 08/27/13 00:00:00
strLabName atsec
strValidationYear 2013