Module Name
Ixia Cryptographic Module for Network Visibility
Validation Dates
10/23/2018;03/07/2019;05/29/2020
Caveat
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys. This validation entry is a non-security relevant modification to Cert. #3152.
Security Level Exceptions
Embodiment
Multi-Chip Stand Alone
Description
The Ixia, a Keysight business, Cryptographic Module for Network Visibility is integrated into Ixia's Vision portfolio of network packet brokers (NPBs) to provide FIPS 140-2 validated cryptography for the protection of sensitive information.
Tested Configuration(s)
- Ixia, a Keysight Business, Network Visibility - Linux 4.12.0 and OpenJDK v8 (1.8.0) running on IXIA Vision ONE using an Intel Core i7-3555LE (single-user mode)
FIPS Algorithms
AES |
Cert. #5940 |
CKG |
vendor affirmed |
CVL |
Certs. #2168, #2169, #2170, #2171 and #C421 |
DRBG |
Cert. #2493 |
DSA |
Cert. #1506 |
ECDSA |
Cert. #1590 |
HMAC |
Cert. #3915 |
KAS |
Cert. #210 |
KAS |
SP 800-56Arev2, vendor affirmed |
KBKDF |
Cert. #247 |
KTS |
AES Cert. #5940; key establishment methodology provides between 128 and 256 bits of encryption strength |
KTS |
SP800-56B, vendor affirmed |
KTS |
Triple-DES Cert. #2894; key establishment methodology provides 112 bits of encryption strength |
PBKDF |
vendor affirmed |
RSA |
Cert. #3118 |
SHA-3 |
Cert. #63 |
SHS |
Cert. #4693 |
Triple-DES |
Cert. #2894 |
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); MD5; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength)