Module Name
Forcepoint Java Crypto Module
Validation Dates
01/26/2018
Caveat
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys
Security Level Exceptions
Embodiment
Multi-Chip Stand Alone
Description
The Forcepoint Java Crypto Module is a standards-based "Drop-in Compliance" cryptographic engine for native Java environments. The module delivers core cryptographic functions to mobile and server platforms and features robust algorithm support, including Suite B algorithms. The Forcepoint Java Crypto Module offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.
Tested Configuration(s)
- CentOS 6 and OpenJDK 1.7 running on HP ProLiant DL360 G7 Server using an Intel Xeon X5670 (single-user mode)
FIPS Algorithms
AES |
Cert. #4702 |
CKG |
vendor affirmed |
CVL |
Certs. #1342, #1343, #1344 and #1345 |
DRBG |
Cert. #1600 |
DSA |
Cert. #1244 |
ECDSA |
Cert. #1160 |
HMAC |
Cert. #3114 |
KAS |
Cert. #130 |
KAS |
SP 800-56Arev2, vendor affirmed |
KBKDF |
Cert. #145 |
KTS |
AES Cert. #4702; key establishment methodology provides between 128 and 256 bits of encryption strength |
KTS |
SP800-56B, vendor affirmed |
KTS |
Triple-DES Cert. #2494; key establishment methodology provides 112 bits of encryption strength |
PBKDF |
vendor affirmed |
RSA |
Cert. #2562 |
SHA-3 |
Cert. #24 |
SHS |
Cert. #3849 |
Triple-DES |
Cert. #2494 |
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); MD5; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength)