Nokia IP265 Security Guide - Page 6

functions are allowed in the approved mode of operation. The modules are - specifications

Page 6 highlights

accelerator chips. See Section 2.8 for a list of algorithms implemented. See Appendix B for a list of the Approved algorithm validation certificate numbers. The modules operate in both a non-Approved and Approved FIPS 140-2 mode of operation. Only approved cryptographic algorithms and security functions are allowed in the approved mode of operation. The modules are intended to meet overall FIPS 140-2 Level 2 requirements. The following table presents the individual FIPS 140-2 compliance areas and the Security Levels to which the modules were tested: FIPS 140-2 DTR Section 1 2 3 4 5 6 7 8 9 10 11 Requirements Section Title Cryptographic Module Specification Cryptographic Module Ports and Interfaces Roles, Services, and Authentication Finite State Model Physical Security Operational Environment Cryptographic Key Management EMI/EMC Self-tests Design Assurance Mitigation of Other Attacks Table 1 - Intended Level Per FIPS 140-2 Level Tested 2 2 2 2 2 N/A 2 2 2 2 N/A © Copyright 2005, 2006, 2007 Nokia Page 6 of 43 This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43

accelerator chips.
See Section 2.8 for a list of algorithms implemented.
See Appendix B for a list of the Approved algorithm validation certificate
numbers.
The modules operate in both a non-Approved and Approved FIPS 140-2
mode of operation. Only approved cryptographic algorithms and security
functions are allowed in the approved mode of operation. The modules are
intended to meet overall FIPS 140-2 Level 2 requirements. The following
table presents the individual FIPS 140-2 compliance areas and the
Security Levels to which the modules were tested:
FIPS 140-2
DTR
Section
Requirements Section Title
Level
Tested
1
Cryptographic Module Specification
2
2
Cryptographic Module Ports and Interfaces
2
3
Roles, Services, and Authentication
2
4
Finite State Model
2
5
Physical Security
2
6
Operational Environment
N/A
7
Cryptographic Key Management
2
8
EMI/EMC
2
9
Self-tests
2
10
Design Assurance
2
11
Mitigation of Other Attacks
N/A
Table 1 – Intended Level Per FIPS 140-2
© Copyright 2005, 2006, 2007
Nokia
Page 6 of 43
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.