Module Name
Zscaler Crypto Module
Historical Reason
Moved to historical list due to sunsetting
Validation Dates
03/26/2018
Caveat
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. This validation entry is a non-security relevant modification to Cert. #2038.
Security Level Exceptions
- Physical Security: N/A
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
Zscaler Crypto Module ™ offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.
Tested Configuration(s)
- Windows Server 2008 R2 on a Dell OptiPlex 755 And Red Hat Enterprise Linux 6.3 on a Dell OptiPlex 755 (single-user mode)
Allowed Algorithms
EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)