Module Name
totemo Cryptographic Module (TCM)
Validation Dates
07/31/2019
Caveat
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Security Level Exceptions
- Physical Security: N/A
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The totemo Cryptographic Module (TCM) supplies the cryptographic services required by the totemo Security Platform (TSP) and the totemo products which provides secure email, file transfer, and mobile messaging solutions. These solutions secure all types of communication without any infrastructure prerequisites.
Tested Configuration(s)
- totemo Appliance OS 2.3 with JRE 8.0 running on a Pyramid M8110 with an Intel Xeon E3-1225v3 (single-user mode)
FIPS Algorithms
AES |
Cert. #5901 |
CKG |
vendor affirmed |
CVL |
Cert. #2125 |
DRBG |
Cert. #2463 |
DSA |
Cert. #1496 |
ECDSA |
Cert. #1572 |
HMAC |
Cert. #3881 |
KAS |
Cert. #202 |
KTS |
AES Cert. #5901; key establishment methodology provides between 128 and 256 bits of encryption strength |
RSA |
Cert. #3089 |
SHA-3 |
Cert. #61 |
SHS |
Cert. #4657 |
Triple-DES |
Cert. #2870 |
Allowed Algorithms
AES (Cert. #5901, key unwrapping; key establishment methodology provides between 112 and 256 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); ECMQV (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); RSA (CVL Cert. #2125, key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength); Triple-DES (Cert. #2870, key unwrapping)