Module Name
Centrify Cryptographic Module
Validation Dates
08/30/2018
Caveat
When installed, initialized, and configured as specified in the Security Policy Section Secure Operation. The module generates cryptographic keys whose strengths are modified by available entropy
Security Level Exceptions
- Physical Security: N/A
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
Centrify Cryptographic Module is a general purpose cryptographic library. The Centrify Cryptographic Module provides the cryptographic services for all Centrify products.
Tested Configuration(s)
- AIX 7.2 (32-bit) running on a PowerPC Power7 Processor [1]
- AIX 7.2 (64-bit) running on a PowerPC Power7 Processor without PAA [1]
- Mac OS 10.11.5 running on a MacBook Pro Intel Core i7 without PAA [1]
- Red Hat Enterprise Linux 7.2 running on an Intel Xeon E5520 x86_64 without PAA [1]
- Red Hat Enterprise Linux 7.2 running on an Intel Xeon X5650 x86_64 with PAA [2]
Allowed Algorithms
EC Diffie-Hellman (CVL Certs. #903 and #1683; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)
Software Versions
2.0 [1], 2.1 [2]