contents

products
 
RedCannon receives certification for Cryptographic Module

RedCannon Security, a leader in mobile security for un-trusted endpoints, today announced that National Institute for Standards and Technology (NIST), has tested and approved the RedCannon Crypto Module to FIPS 140-2 Level 1 certification (certificate number 754). The RedCannon Crypto Module provides cryptographic support for the RedCannon line of products including Fireball KeyPoint Crypto Mobile Storage, KeyPoint for Citrix, and KeyPoint Secure Remote Access. FIPS certification is considered a high level benchmark for security products in the Government. It ensures that the certified product has passed rigorous testing under the CAVP (Cryptographic Algorithm Validation Program) and CMVP (Cryptographic Module Validation Program) by an accredited third-party laboratory, and thus it can be used to secure sensitive information. By law, U.S. government purchasing agents must purchase the product that is validated for FIPS 140-2 over one that is not. FIPS 140-2 is also required by federal agencies in Canada and recognized in Europe and Australia. Enterprises, particularly financial institutions, use FIPS 140-2 to measure the safety of products handling monetary transactions.

"This is a significant milestone for RedCannon since it enables our Government & Enterprise customers, who require highest standards of cryptographic products in their applications, to continue to rely on RedCannon products to fulfill their needs, " said Vimal Vaidya, CEO of RedCannon Security. "It also punctuates RedCannon's commitment to providing best of breed products for secure mobility and mobile storage." The RedCannon Crypto Module meets following FIPS specifications:
-- Operational Environment: Level 1 with Windows XP Professional with
Service Pack 2 (single user mode)
-- Conforms to FIPS-approved algorithms: AES (Cert. #249); DES
(transitional phase only -- valid until May 19, 2007; Cert. #312);
Triple-DES (Cert. #334); SHS (Cert. #327); HMAC (Cert. #58); RSA
(Cert. #64); RNG (Cert. #87)
-- Other algorithms: TwoFish; BlowFish; Serpent; CAST; MD5; HMAC-MD5;
Diffie-Hellman (key agreement; key establishment methodology provides
between 80-bits and 150-bits of encryption strength); RSA (key
generation; non-compliant); RSA (PKCS#1; key transport; key
establishment methodology provides 80-bits of encryption strength)

For more information on FIPS 140-2, visithttp://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdforhttp://www.itl.nist.gov/fipspubs/index.htm.



write your comments about the article :: © 2005 Networking News :: home page