Nokia IP265 Security Guide - Page 6
functions are allowed in the approved mode of operation. The modules are - specifications
View all Nokia IP265 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 6 highlights
accelerator chips. See Section 2.8 for a list of algorithms implemented. See Appendix B for a list of the Approved algorithm validation certificate numbers. The modules operate in both a non-Approved and Approved FIPS 140-2 mode of operation. Only approved cryptographic algorithms and security functions are allowed in the approved mode of operation. The modules are intended to meet overall FIPS 140-2 Level 2 requirements. The following table presents the individual FIPS 140-2 compliance areas and the Security Levels to which the modules were tested: FIPS 140-2 DTR Section 1 2 3 4 5 6 7 8 9 10 11 Requirements Section Title Cryptographic Module Specification Cryptographic Module Ports and Interfaces Roles, Services, and Authentication Finite State Model Physical Security Operational Environment Cryptographic Key Management EMI/EMC Self-tests Design Assurance Mitigation of Other Attacks Table 1 - Intended Level Per FIPS 140-2 Level Tested 2 2 2 2 2 N/A 2 2 2 2 N/A © Copyright 2005, 2006, 2007 Nokia Page 6 of 43 This document may be freely reproduced and distributed whole and intact including this Copyright Notice.