Module Name
WildFire WF-500
Validation Dates
12/05/2016;02/13/2018;02/21/2020
Caveat
When operated in FIPS mode and with the tamper evident seals and opacity shields installed as indicated in the Security Policy
Security Level Exceptions
- Cryptographic Module Specification: Level 3
- Roles, Services, and Authentication: Level 3
- Design Assurance: Level 3
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
WildFire WF-500 identifies unknown malware, zero-day exploits, and Advanced Persistent Threats (APTs) through dynamic analysis, and automatically disseminates protection in near real-time to help security teams meet the challenge of advanced cyber-attacks
FIPS Algorithms
AES |
Cert. #4020 |
CVL |
Certs. #848, #849, #873 and #874 |
DRBG |
Cert. #1198 |
ECDSA |
Cert. #896 |
HMAC |
Cert. #2622 |
KAS |
SP 800-56Arev2 with CVL Certs. #848 and #849, vendor affirmed |
RSA |
Cert. #2064 |
SHS |
Cert. #3316 |
Other Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); ARCFOUR; Blowfish; Camellia; CAST; DSA (non-compliant); EC Diffie-Hellman (non-compliant); HMAC-MD5; HMAC-RIPEMD; RC2; RC4; RIPEMD; SEED; Triple-DES (non-compliant); UMAC
Hardware Versions
P/N: 910-000097-00G Rev G; FIPS Kit P/N: 920-000145 Version Rev 00A