Module Name
Cisco FIPS Object Module
Validation Dates
01/06/2021
Caveat
When installed, initialized and configured as specified in the Security Policy Section 3 and operated in FIPS mode. No assurance of the minimum strength of generated keys
Security Level Exceptions
- Design Assurance: Level 3
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco's networking and collaboration products. The module provides FIPS 140 validated cryptographic algorithms for services such as IPSEC, SRTP, SSH, TLS, 802.1x, etc. The module does not directly implement any of these protocols, instead it provides the cryptographic primitives and functions to allow a developer to implement the various protocols.
Tested Configuration(s)
- Cisco ASA 5555 with Linux 4.1 with Intel Xeon X3460 without PAA
- Cisco Catalyst 9200 with Linux 4.4 with ARM 8 Cortex-A53 AArch64 without PAA
- Cisco Catalyst 9300 with Linux 4.4 with Intel Xeon D-1526 with PAA
- Cisco Firepower 9300 with Linux 4.1 with Intel Xeon E5-2658 with PAA
- Cisco ISR 4351 with Linux 4.4 with Intel Atom C2758 with PAA
- Cisco ISR 4451 with Linux 4.4 with Intel Xeon E3-1105C with PAA
- Cisco Nexus 3172 with Linux 4.1 with Intel Pentium B 925C with PAA
- Cisco UCS M5 with Linux 4.18 with Intel Xeon Gold 6128 with PAA
- Evaluation board with Linux 2.6 with Cavium Octeon CN5230 without PAA
FIPS Algorithms
AES |
Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114 |
CKG |
vendor affirmed |
CVL |
Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114 |
DRBG |
Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114 |
DSA |
Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114 |
ECDSA |
Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114 |
HMAC |
Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114 |
KBKDF |
Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114 |
RSA |
Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114 |
SHA-3 |
Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114 |
SHS |
Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114 |
Triple-DES |
Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114 |
Allowed Algorithms
Diffie-Hellman (CVL Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114, key agreement; key establishment methodology provides between 112 and 219 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 132 bits of encryption strength)