Module Name
ASI-HSM AHX5 KNET Cryptographic Module
Validation Dates
02/04/2020
Caveat
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy.
Security Level Exceptions
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Embedded
Description
The module exists to provide cryptographic services to applications running on behalf of its users which communicate with it via a standard Ethernet interface using IP protocols. In order to provide these services, the module also requires a power supply.
The module is usually sold embedded within a stand-alone network appliance. That appliance is typically used in large-scale cloud infrastructures, where ease of remote configuration and operation is required.
FIPS Algorithms
| AES |
Cert. #C212 |
| CKG |
Vendor Affirmed |
| CVL |
Cert. #C212 |
| DRBG |
Cert. #349 |
| DSA |
Cert. #C212 |
| ECDSA |
Cert. #C212 |
| HMAC |
Cert. #C212 |
| KTS |
AES Cert. #C212; key establishment methodology provides between 128 and 256 bits of encryption strength |
| RSA |
Cert. #C212 |
| SHS |
Cert. #C212 |
| Triple-DES |
Cert. #C212 |
Allowed Algorithms
EC Diffie-Hellman (CVL Cert. #C212, Key agreement; key establishment methodology provides 128 bits of security strength); NDRNG; RSA (Key wrapping; key establishment methodology provides 112 bits of security strength)