5 - alld n Certificate The National Institute of Standards The Communications Security and Technology of the United Slates Establishment of the Government of America of Ganada Certificate No. 977 The National Institute of Standards and Technology, as the United States FIPS 140-2 Cryptographic Module Validation Authority; and the Communications Security Establishment, as the Canadian FIPS 140-2 Cryptographic Module Validation Authority; hereby validate the FIPS 140-2 testing results of the Cryptographic Module identified as: nShield F2 4000. nShiel' 2000 and nShield F2 500 by nCipher Corporatio td. (When operated in FtPS mode) in accordance with the Derived Test Requirements for FIPS 140-2, Security Requirements for Cryptographic Modules. FIPS 140-2 specifies the security requirements that are to be satisfied by a cryptographic module utilized within a security system protecting Sensitive Information (United States) or Protected Information (Canada) within computer and telecommunications systems (including voice systems). Products which use the above identified cryptographic module may be labeled as complying with the requirements of FIPS 140-2 so long as the product, throughout its life cycle, continues to use the validated version of the cryptographic module as specified in this certificate. The validation report contains additional details concerning test results. No reliability test has been performed and no warranty of the products by both agencies is either expressed or implied. This certificate includes details on the scope of conformance and validation authority signatures on the reverse. TM A Certrtrcalion Mark Of NISi. wtllCtl does nOllmply product endorsement b~ US, or CanadIan Governments -.-~ FIPS 140-2 provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3, and Level 4. These levels are intended to cover the wide range and potential applications and environments in which cryptographic modules may be employed. The security requirements cover eleven areas related to the secure design and implementation of a cryptographic module. The scope of conformance achieved by the cryptographic modules as tested in the product identified as: IlShield F2 4000. "Shield F2 2000 and nShield F2 500 by IIlCipher Corporation Ltd. (Hardware Versions: nC3023P-4KO, nC3023P.2KO and nC3123P.500; Build Standard N; Firmware Version: 2.33-60-2; Hardw3rG) DOMUS fT Security Laboratory. NVLAP Lab Code 200017-0 and tested by the Cryptographic Module Testing accredited laboratory: CRYPTJK Versicn7. 0 is as follows: Cryptographic Module Specification: Level 2 Cryptographic Module Ports and Interfaces: Level 2 Roles, Services, and Authentication: Level 3 Finite State Model: Level 2 Physical Security: Level 3 Cryptographic Key Management: Level 3 (Multi-Chip Embedded) EMlfEMC: Level 2 Self- Tests: Level 2 Design Assurance: Level 3 Mitigation of Other Attacks: Level NJA Operational Environment: Level N!A tested in the following configuration(s): N/A The following FIPS approved Cryptographic Algorithms are used: AES (Cert. #599); AES GeM (Cert. #599, vendor affirmed); TripleˇOES (Ce #510); Triple-DES MAC (Triple~DES Cert.#570 endor affirmed); DSA (Cert. #233}~ ECD5A J ..... (Cen. #64); SHS (Cen. #648); HMAC {Cert. #309); RSA {Cert #274}; RNG (Cert. #340) The cryptographic module also contains the following non-FIPS approved algorithms: ARC FOUR; Aria; Gam9lia; CAST 6; DES; MD5: SEED; HMAC~MD5; HMAC-Tiger; HMAC-RIPEMD160; RIPEMO 160; Tiger; EI.Garnal; KCDSA; HAS 160; Diffie-Hellman (kay agr&Qment; key establishment methodology provides between 80 and 256 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishmoot methodQlogy provides 192 oils of encryption strength); RSA (key wrapping; key establishment methodology provides between 80 and 256 bits of encryption strength); ECMQV (key agreement; key establishment methodology provides between 80 and 256 bits of encryption strength) Overall Level Achieved: 2 Signed on behalf of the Government of the United States Signed on behalf of the Government of Canada ~ ~ Q .~v.:.~-~~ Signature: YJ'~ ~-('cl.:v- Signature: ~ _ ~_ ~ =::. Dated: --4,10.,/ ?>\ l 200\l Dated :.Ti.J "'" :l,! ') ˘-I.- 'l:, Chief, Computer Security Division Director, Industry Program Group National Institute of Standards and Technology Communications Security Establishment Canada