![]() ![]() ![]() After 2015, the use of the RNGs specified in FIPS 186-2, and the 1998 version of are disallowed. Therefore, all the RNG implementations that were previously validated are non-compliant, and any algorithms reliant on the output of these RNGs are also non-compliant. Modules that include an RNG as a FIPS Approved algorithm have been moved to this list. The modules on this list are not to be used for procurement by federal agencies. Please see CMVP Notice dated 11-24-2015 for more details. This does not mean that the overall FIPS-140 certificate has been revoked, rather it indicates that the certificate and the documentation posted with it do not accurately reflect how the module can be used in FIPS mode. Validated to FIPS 140-2 Consolidated Validation Certificate Security Policy Vendor Product Link (When operated in FIPS mode and when tamper evident labels are installed on the initially built configuration as indicated in the Security Policy) (Hardware Versions: with FIPS Kit P/N Brocade XBR-000195 Firmware Version: Fabric OS v7.3.0 (P/N 63-1001447-01)) Cert#īrocade VDX 6740, VDX 6740T and VDX 8770 SwitchesĪgencies may make a risk determination on whether to continue using the modules on this list based on their own assessment of where and when the RNG is used by the module. ![]() Other algorithms: EC Diffie-Hellman (CVL Certs. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |