Module Name
Proofpoint Cryptographic Module for Java
Validation Dates
02/12/2019
Caveat
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys. This validation entry is a non-security relevant modification to Cert. #3080.
Security Level Exceptions
Embodiment
Multi-Chip Stand Alone
Description
The module is a cryptographic component to be used by the various Proofpoint security products. The module is designed to meet Level 1 requirements of FIPS 140-2 standard. The module is a cryptographic library that provides a variety of cryptographic services including SSH, HTTPs etc.
.
Tested Configuration(s)
- CentOS 6 and OpenJDK 1.7 running on HP ProLiant DL360 G7 Server using an intel Xeon X5670 (single-user mode)
FIPS Algorithms
AES |
Cert. #4702 |
CKG |
vendor affirmed |
CVL |
Certs. #1342, #1343, #1344 and #1345 |
DRBG |
Cert. #1600 |
DSA |
Cert. #1244 |
ECDSA |
Cert. #1160 |
HMAC |
Cert. #3114 |
KAS |
Cert. #130 |
KAS |
SP 800-56Arev2, vendor affirmed |
KBKDF |
Cert. #145 |
KTS |
AES Cert. #4702; key establishment methodology provides between 128 and 256 bits of encryption strength |
KTS |
SP800-56B, vendor affirmed |
KTS |
Triple-DES Cert. #2494; key establishment methodology provides 112 bits of encryption strength |
PBKDF |
vendor affirmed |
RSA |
Cert. #2562 |
SHA-3 |
Cert. #24 |
SHS |
Cert. #3849 |
Triple-DES |
Cert. #2494 |
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); MD5; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)