canmove, Confirmed users
937
edits
| Line 33: | Line 33: | ||
=Key Establishment Techniques= | =Key Establishment Techniques= | ||
The NSS cryptographic module uses the following | The NSS cryptographic module uses the following asymmetric key establishment techniques listed in FIPS 140-2 Implementation Guidance Section 7.1, which FIPS 140-2 Annex D says are allowed in a FIPS Approved mode of operation: | ||
* Diffie-Hellman (key agreement, key establishment methodology provides between 80 bits and 112 bits of encryption strength) | * Diffie-Hellman (key agreement, key establishment methodology provides between 80 bits and 112 bits of encryption strength) | ||
* EC Diffie-Hellman (key agreement, key establishment methodology provides between 80 bits and 256 bits of encryption strength) | |||
* Key Wrapping using RSA keys (PKCS #1, key wrapping, key establishment methodology provides between 80 bits and 192 bits of encryption strength) | * Key Wrapping using RSA keys (PKCS #1, key wrapping, key establishment methodology provides between 80 bits and 192 bits of encryption strength) | ||