Module Name
Poly Voice Common Cryptographic Module
Validation Dates
09/10/2019;09/18/2020;10/20/2020
Caveat
When built, installed, protected and initialized as assumed by the Crypto Officer role and as specified in the provided Security Policy and operated in FIPS mode. Appendix A of the provided Security Policy specifies the actual distribution tar file containing the source code of this module. There shall be no additions, deletions or alterations to the tar file contents as used during module build. The distribution tar file shall be verified as specified in Appendix A of the provided Security Policy. Installation and protection shall be completed as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from specified verification, protection, installation and initialization procedures will result in a non FIPS 140-2 compliant module. This validation entry is a non-security relevant modification to Cert. #3220
Security Level Exceptions
- Roles, Services, and Authentication: Level 2
- Physical Security: N/A
- Design Assurance: Level 3
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The Poly Voice Common Cryptographic Module is a general-purpose cryptographic module integrated in Poly Inc. products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.
Tested Configuration(s)
- Poly Linux 3.0 running on a Trio 8800 with a Broadcom Merlyn IP Communications Processor without PAA (gcc Compiler version 4.6.3)
- Poly Linux 3.10 running on a VVX 601 with a Broadcom Cygnus SoC with PAA (gcc Compiler version 4.6.3) (single-user mode)
- Poly Linux 3.10 running on a VVX 601 with a Broadcom Cygnus SoC without PAA (gcc Compiler version 4.6.3)
- Poly Linux 3.0 running on a Trio 8800 with a Broadcom Merlyn IP Communications Processor with PAA (gcc Compiler version 4.6.3)
Allowed Algorithms
EC Diffie-Hellman (CVL Cert. #C1023, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)