FIPS 140-2 Validation Certificate The NatIonal Institute of Standards and Technology of the United States of America · The Communications Security Establishment of the Government of Canada Certificate No. 1100 The National Institute of Standards and Technology, as the United States FIPS 140-2 Cryptographic Module Validation Authority; and the Communications Security Establishment, as the Canadian FIPS 140-2 Cryptographic Module Validation Authority; hereby validate the FIPS 140-2 testing results qUh~ Cryptograp1hic-Module ideJ:ltified as: Check Point C r in accordance with the Derived Te~R~quirements !p'(~IPS 40-2[, seduritYiReq'Uii'emer.ts f~r CrYptographic Modules. FIPS 140-2 specifies the security requirements that are {o be Jatisfird b~ a crYPtog~aph\c m9dWIe u~ilized wit~in a security system protecting Sensitive Information (United States) or Pro,tected Inforflafiqn (C~nad~) witpin cp~put~r anq tel~communications systems (including voice systems). Products which use the above identifieCJ cryptographic rpodule ma~\be labeled ?S ccDmplyin9 wit~ the requirements of FIPS 140-2 so long as the product, throughout its lire cyple, continuys toluse the\validatedl.versiJ~ of the cryptographic module as specified in this certificate. The validation report contains additionaLdetJils concerlJ.ir!.gJest result&!~ellability test has been performed and no warranty of the products by both agencies is either expressed or implied. This certificate includes details on the scope of conformance and validation authority signatures on the reverse. TM: A CertfflcaLion Mark of NIST. which does n01lmply produCl endorsement by NIST. \he U.S., or Canadian Governments. FIPS 140-2 provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3, and Level 4. These levels are intended to cover the wide range and potential applications and environments in which cryptographic modules may be employed. The security requirements cover eleven areas related to the secure design and implementation of a cryptographic module. The scope of conformance achieved by the cryptographic modules as tested in the product identified as: Check Point Crypto Core by Check Point Software Technologies Ltd. (Software Version: 1.3; Software) Atlan Laboratories, NVLAP Lab Code 200492-0 and tested by the Cryptographic Module Testing accredited laboratory: CRYPTIK Version 7.0 is as follows: Cryptographic Module Specification: Level 1 Cryptographic Module Ports and Interfaces: Level 1 Roles, Services, and Authentication: Level 1 Finite State Model: Level 1 Physical Security: Level N/A Cryptographic Key Management: Level 1 (Multi-Chip Standalone) EM/fEMC: Level 1 Self-Tests: Level 1 Design Assurance: Level 1 Mitigation of Other Attacks: Level N/A Operational Environment: Level tested in the following configuration(s): Microsoft Mobile 6.0 (single-user mode) The following FIPS approved Cryptographic Algorithms are used: AES (Cert. #430); Triple-DES (Cert. #459); SHS (Cert. #499); RSA (Cert. #162); HMAC (Cert. #202); RNG (Cert. #222); Triple-DES MAC (Triple-DES Cert. #459; vendor affirmed) The cryptographic module also contains the following non-FIPS approved algorithms: Blowfish; CAST-128; CAST-256; DES; MD5; RSA (key wrapping; key establishment methodology provides between 80 and 150 bits of encryption strength) Overall Level Achieved: 1 Signed on behalf of the Government of the United States Signed on behalf of the Government of Canada S· Igna t ure: CW ('3-v'--- r=-'~ --l - ~ b'a~ +.lJ0B:M.-~ Signature: ~~ ~ Dated: .A--pAA 12 '3 I 200 1 Dated: fl o~~ L·h ·s i ,d,DJ6c; Chief, Computer Security Division Director, Industry Program Group National Institute of Standards and Technology Communications Security Establishment Canada