Module Name
Trend Micro Java Crypto Module
Validation Dates
02/26/2018;09/24/2018
Caveat
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys
Security Level Exceptions
Embodiment
Multi-Chip Stand Alone
Description
The Trend Micro Java Crypto Module provides FIPS-approved cryptographic algorithms for Trend Micro products including Trend Micro Deep Security
Tested Configuration(s)
- CentOS 6 and OpenJDK 1.7 running on HP ProLiant DL360 G7 Server using an Intel Xeon X5670
- Red Hat Enterprise Linux 7 with Java SE 8 running on a Dell OptiPlex 755 with an Intel i7 (single-user mode)
- Windows Server 2012 R2 with Java SE 8 running on a Dell OptiPlex 755 with an Intel i7
FIPS Algorithms
AES |
Certs. #4702 and #5532 |
CKG |
vendor affirmed |
CVL |
Certs. #1342, #1343, #1344, #1345, #1972, #1973, #1974 and #1975 |
DRBG |
Certs. #1600 and #2190 |
DSA |
Certs. #1244 and #1417 |
ECDSA |
Certs. #1160 and #1487 |
HMAC |
Certs. #3114 and #3684 |
KAS |
Certs. #130 and #188 |
KAS |
SP 800-56Arev2, vendor affirmed |
KBKDF |
Certs. #145 and #233 |
KTS |
AES Certs. #4702 and #5532; key establishment methodology provides between 128 and 256 bits of encryption strength |
KTS |
SP800-56B, vendor affirmed |
KTS |
Triple-DES Certs. #2494 and #2785; key establishment methodology provides 112 bits of encryption strength |
PBKDF |
vendor affirmed |
RSA |
Certs. #2562 and #2966 |
SHA-3 |
Certs. #24 and #49 |
SHS |
Certs. #3849 and #4439 |
Triple-DES |
Certs. #2494 and #2785 |
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); MD5; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength)