VE 07KeyMgmt: Difference between revisions

Line 33: Line 33:
=Key Establishment Techniques=
=Key Establishment Techniques=


The NSS cryptographic module uses the following Approved key establishment techniques listed in Annex D to FIPS PUB 140-2:
The NSS cryptographic module uses the following asymmetric key establishment techniques listed in FIPS 140-2 Implementation Guidance Section 7.1, which FIPS 140-2 Annex D says are allowed in a FIPS Approved mode of operation:
* Diffie-Hellman (key agreement, key establishment methodology provides between 80 bits and 112 bits of encryption strength)
* Diffie-Hellman (key agreement, key establishment methodology provides between 80 bits and 112 bits of encryption strength)
* EC Diffie-Hellman (key agreement, key establishment methodology provides between 80 bits and 256 bits of encryption strength)
* Key Wrapping using RSA keys (PKCS #1, key wrapping, key establishment methodology provides between 80 bits and 192 bits of encryption strength)
* Key Wrapping using RSA keys (PKCS #1, key wrapping, key establishment methodology provides between 80 bits and 192 bits of encryption strength)


canmove, Confirmed users
937

edits