FIPS 140-2 Non-Proprietary Security Policy
Ubuntu 18.04 Kernel Crypto API Cryptographic Module version 2.0
FIPS 140-2 Non-Proprietary Security Policy
Version 2.5 Last update: 2021-09-15
? 2021 Canonical Ltd. / atsec information security This document can be reproduced and distributed only whole and intact, including this copyright notice.
Ubuntu 18.04 Kernel Crypto API Cryptographic Module
Prepared by: atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759
FIPS 140-2 Non-Proprietary Security Policy
? 2021 Canonical Ltd. / atsec information security This document can be reproduced and distributed only whole and intact, including this copyright notice.
2 of 43
Ubuntu 18.04 Kernel Crypto API Cryptographic Module
FIPS 140-2 Non-Proprietary Security Policy
Table of Contents
1. Cryptographic Module Specification .....................................................................................................6 1.1. Module Overview ................................................................................................................................... 6 1.2. Modes of Operation.............................................................................................................................. 10
2. Cryptographic Module Ports and Interfaces ........................................................................................11 3. Roles, Services and Authentication .....................................................................................................12
3.1. Roles...................................................................................................................................................... 12 3.2. Services ................................................................................................................................................. 12 3.3. Algorithms............................................................................................................................................. 14
3.3.1. Ubuntu 18.04 LTS 64-bit Running on Intel? Xeon? CPU E5-2620v3 Processor ........................... 14 3.3.2. Ubuntu 18.04 LTS 64-bit Running on z System ............................................................................ 19 3.3.3. Non-Approved Algorithms ........................................................................................................... 24 3.4. Operator Authentication ...................................................................................................................... 25 4. Physical Security ................................................................................................................................26 5. Operational Environment...................................................................................................................27 5.1. Applicability .......................................................................................................................................... 27 5.2. Policy ..................................................................................................................................................... 27 6. Cryptographic Key Management.........................................................................................................28 6.1. Random Number Generation ............................................................................................................... 29 6.2. Key Generation ..................................................................................................................................... 29 6.3. Key Agreement / Key Transport / Key Derivation ................................................................................ 29 6.4. Key Entry / Output ................................................................................................................................ 30 6.5. Key / CSP Storage.................................................................................................................................. 30 6.6. Key / CSP Zeroization ............................................................................................................................ 30 7. Electromagnetic Interference/Electromagnetic Compatibility (EMI/EMC) ............................................31 8. Self-Tests ...........................................................................................................................................32 8.1. Power-Up Tests ..................................................................................................................................... 32 8.1.1. Integrity Tests............................................................................................................................... 32 8.1.2. Cryptographic Algorithm Tests .................................................................................................... 32 8.2. On-Demand Self-Tests .......................................................................................................................... 35 8.3. Conditional Tests .................................................................................................................................. 35 9. Guidance ...........................................................................................................................................36 9.1. Crypto Officer Guidance ....................................................................................................................... 36
? 2021 Canonical Ltd. / atsec information security This document can be reproduced and distributed only whole and intact, including this copyright notice.
3 of 43
Ubuntu 18.04 Kernel Crypto API Cryptographic Module
FIPS 140-2 Non-Proprietary Security Policy
9.1.1. Module Installation ...................................................................................................................... 36 9.1.2. Operating Environment Configuration ........................................................................................ 36 9.2. User Guidance....................................................................................................................................... 37 9.2.1. AES-GCM IV .................................................................................................................................. 37 9.2.2. AES-XTS......................................................................................................................................... 37 9.2.3. Triple-DES encryption................................................................................................................... 38 9.2.4. Handling FIPS Related Errors........................................................................................................ 38 10. Mitigation of Other Attacks................................................................................................................39
? 2021 Canonical Ltd. / atsec information security This document can be reproduced and distributed only whole and intact, including this copyright notice.
4 of 43
Ubuntu 18.04 Kernel Crypto API Cryptographic Module
Copyrights and Trademarks
Ubuntu and Canonical are registered trademarks of Canonical Ltd. Linux is a registered trademark of Linus Torvalds.
FIPS 140-2 Non-Proprietary Security Policy
? 2021 Canonical Ltd. / atsec information security This document can be reproduced and distributed only whole and intact, including this copyright notice.
5 of 43
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- ubuntu guide ubuntu 20 04 and 18 04 guide pdf
- for linux cristie software
- fips 140 2 non proprietary security policy
- ubuntu
- certification report canonical ubuntu server 18 04 lts
- note self upgrade procedures note y n t630 servers 14
- ubuntu reference cheat sheets
- cis ubuntu linux 18 04 lts benchmark
- ubuntu server guide
- ubuntu linux setup guide lenovo
Related searches
- sample policy and procedure manual non profit
- proprietary and budgetary accounts
- fips 199 800 60
- fips 199
- application security policy examples
- free non profit policy templates
- proprietary vs budgetary accounting
- fips 199 sp 800 60
- fips 199 security categorization worksheet
- non profit investment policy template
- website security policy examples
- grievance policy for non profit