ML16011A430
| ML16011A430 | |
| Person / Time | |
|---|---|
| Site: | Calvert Cliffs, Dresden, Peach Bottom, Nine Mile Point, Oyster Creek, Byron, Braidwood, Limerick, Ginna, Clinton, Quad Cities, LaSalle, Crane |
| Issue date: | 01/11/2016 |
| From: | Simpson P Exelon Generation Co |
| To: | Document Control Desk, Office of Nuclear Material Safety and Safeguards, Office of Nuclear Reactor Regulation |
| References | |
| Download: ML16011A430 (8) | |
Text
- x l n Generation RS-16-009 January 11, 2016 U.S. Nuclear Regulatory Commission ATIN: Document Control Desk Washington, DC 20555-0001 Braidwood Station, Units 1 and 2 Facility Operating License Nos. NPF-72 and NPF-77 NRC Docket Nos. STN 50-456. STN 50-457. and 72-73 Byron Station, Units 1 and 2 Renewed Facility Operating License Nos. NPF-37 and NPF-66 NRC Docket Nos. STN 50-454. STN 50-455, and 72-68 Calvert Cliffs Nuclear Power Plant, Units 1 and 2 Renewed Facility Operating License Nos. DPR-53 and DPR-69 NRC Docket Nos. 50-317. 50-318. 72-8 Clinton Power Station, Unit 1 Facility Operating License No. NPF-62 NRC Docket No. 50-461 Dresden Nuclear Power Station, Units 1, 2, and 3 Facility Operating License No. DPR-2 Renewed Facility Operating License Nos. DPR-19 and DPR-25 NRC Docket Nos. 50-10. 50-237. 50-249. and 72-37 LaSalle County Station, Units 1 and 2 Facility Operating License Nos. NPF-11 and NPF-18 NRC Docket Nos. 50-373, 50-37 4. and 72-70 Limerick Generating Station, Units 1 and 2 Renewed Facility Operating License Nos. NPF-39 and NPF-85 NRC Docket Nos. 50-352. 50-353. and 72-65 Nine Mile Point Nuclear Station, Units 1 and 2 Renewed Facility Operating License Nos. DPR-63 and NPF-69 NRC Docket Nos. 50-220. 50-410. and 72-1036 Oyster Creek Nuclear Generating Station Renewed Facility Operating License No. DPR-16 NRC Docket Nos. 50-219 and 72-15
U.S. Nuclear Regulatory Commission January 11, 2016 Page 2 Peach Bottom Atomic Power Station, Units 1, 2, and 3 Renewed Facility Operating License Nos. DPR-44 and DPR-56 Facility Operating [Possession Only] License No. DPR-12 NRC Docket Nos. 50-171, 50-277, 50-278, and 72-29 Quad Cities Nuclear Power Station, Units 1 and 2 Renewed Facility Operating License Nos. DPR-29 and DPR-30 NRC Docket Nos. 50-254, 50-265, and 72-53 R.E. Ginna Nuclear Power Plant Renewed Facility Operating License No. DPR-18 NRC Docket Nos. 50-244 and 72-67 Three Mile Island Nuclear Station, Unit 1 Renewed Facility Operating License No. DPR-50 NRC Docket No. 50-289
Subject:
Use of Encryption Software for Electronic Transmission of Safeguards Information
Reference:
NRC Regulatory Issue Summary 2002-15, Revision 1 11NRC Approval of Commercial Data Encryption Systems for the Electronic Transmission of Safeguards lnformation, 11 dated January 26, 2006 Pursuant to 10 CFR 73.22(f)(3) and the guidance provided in the Referencel Exelon Generation Company, LLC (EGC) requests NRC approval to use Symantec Desktop Email Version 10.3.2.
This version of encryption product was developed with PGP Software Developer's Kit (SOK)
Cryptographic Module Software Version 4.2.1 and complies with Federal Information Processing Standard (FIPS) 140-2 as validated by the National Institute of Standards and Technology (NIST) Consolidated Certificate No. 0014 (Attachment).
EGC has and continues to maintain an information protection system that meets the requirements of 10 CFR 73.21. Written procedures are in place which describe: access controls; where and when encrypted communications can be made; how encryption keys, codes and passwords are protected from compromise; actions to be taken if encryption keys, codes, or passwords are, or are suspected to have been, compromised; and how the identity and access authorization of the recipient is verified.
Processing Safeguards Information on electronic systems is performed in accordance the provisions of 10 CFR 73.22(g). Each EGC nuclear station and the Corporate Offices maintain a single (one) public key named with the following syntax:
LastName_FirstName_SiteName.asc.
U.S. Nuclear Regulatory Commission January 11, 2016 Page 3 This represents the organizational point of contact indicated as owning the key-pair. EGC controls each private key as Safeguards Information. EGC exchanges encrypted Safeguards Information only with the Nuclear Regulatory Commission, Nuclear Energy Institute (NE!), and other Safeguards Information holders that have received NRC approval to use PGP software.
Adam Janney, Security System Analyst, is responsible for the overall implementation of the Safeguards Information encryption program for EGC and is also responsible for collecting, safeguarding, and disseminating the software tools needed for encryption and decryption of Safeguards Information.
There are no new regulatory commitments contained in this letter. If there are any questions concerning this letter, please contact me at (630) 657-2823.
Re~K Patrick R. Simpson Licensing Manager Exelon Generation Company, LLC
Attachment:
Fl PS 140-2 Consolidated Certificate No. 0014 cc:
NRC Region I, Regional Administrator NRC Region Ill, Regional Administrator NRC Project Manager - Braidwood Station NRC Project Manager - Byron Station NRC Project Manager - Clinton Power Station NRC Project Manager - Dresden Nuclear Power Station, Unit 1 NRC Project Manager - Dresden Nuclear Power Station, Units 2 and 3 NRC Project Manager - LaSalle County Station NRC Project Manager - Limerick Generating Station NRC Project Manager - Oyster Creek Nuclear Generating Station NRC Project Manager - Peach Bottom Atomic Power Station, Unit 1 NRC Project Manager - Peach Bottom Atomic Power Station, Units 2 and 3 NRC Project Manager - Quad Cities Nuclear Power Station NRC Project Manager - Three Mile Island Nuclear Station, Unit 1 NRC Project Manager - Calvert Cliffs Nuclear Power Plant NRC Project Manager-R.E. Ginna Nuclear Power Plant NRC Project Manager - Nine Mile Point Nuclear Station
Attachment FIPS 140-2 Consolidated Certificate No. 0014
FIPS 140-2 Consolidated Validation Certificate The National Institute of Standards and Technology of the United States of America The Communications Security Establishment of the Government of Canada Consolidated Certificat.e No. 0014 The National Institute of Standards and Technology, as the United States FIPS 140-2 Cryptographic Module Validation Authority; and the Communications Security Establishment Canada, as the Canadian FIPS 140-2 Cryptographic Module Validation Authority: hereby validate the FIPS 140-2 testing results of the cryptographic modules listed below in accordance with the Derived Test Requirements for FIPS 140-2, Security Requirements for Cryptographic Modules. FIPS 140~2 specifies the security requirements that are to be satisfied by a cryptographic module utilized within a security system protecting Sensitive Information (United States) or Protected Information (Canada) within computer and telecommunicat1ons systems (including voice systems).
Products which use a cryptographic module identified below may be labeled as complying with the requirements of FIPS 140-2 so long as the product, throughout its life-cycle. continues to use the validated version of the cryptographic module as specified in this consolidated certificate The valtdation report contains additional details concerning test results. No reliability test has been performed and no warranty of the products by both agencies is either expressed or implied FIPS 140-2 provides four increasing, qualitative levels of security level 1, Level 2, Level 3, and Level 4. These levels are intended to cover the wide range and potential applications and environments in which cryptographic modules may be employed. The security requirements cover eleven areas related to the secure design and implementation of a cryptographic module.
The scope of conformance achieved by the cryptographic modules as tested are identified and listed on the Cryptographic Module Validation Program website. The website listing is the official 1.ist of validated cryptographic modules. Each validation entry corresponds to a uniquely assigned certificate number. Associated with each certificate number is the module name(s), module versioning information, applicable caveats, module type, date of initial validation and applicable revisions. Overall Level, individual Levels if different than the Overall Level. FIPS-approved and other algorithms. vendor contact information, a vendor provided description and the accredited Cryptographic Module Testing laboratory which performed the testing.
Signed on behalf of the
_/iVM
... // /
/
Signature:**-*-----
/ /
Dated:
--- -~-.,---*--* *----~U the United States Chief, Computer Security Division National Institute of Stapdards and Technology Page 1 of 4 Signed on.behalf of the.GQy_ernment of Canada
- / '")
i
/
.:;~/:::::...
S1gnahir-EL._
.......,. ~--.........
I
- ~*l '"'\\ /' --,
Dated:
./
,,1,,.-1,i.a *tc.. t'*L..
- *..;...,(ji L Director, Architecture and Technology Assurance Communications Security Establishment Canada ll.!- A f~;M~¥11on 2/29/2012
Certificate Number 1670 1671 1672 1673 Page 2 of 4 Validation I Posting Date 02/02/2012 02/06/2012 02/06/2012 02/06/2012 http://csrc.nist.gov/groups/STM/cmvp/documents/140-1 /140val-all. htm Module Name(s)
Vendor Name CAT862 Dolby JPEG 2000/MPEG-Dolby Laboratories, Inc.
2 Media Block I DC CryptoCore Module Sensage, Inc.
IBM z/OS Version 1 Release 13 IBM Corporation ICSF PKCS#11 Cryptographic Module Secure Router 2330 Avaya, Inc.
Version Information Hardware Versions: P/N CAT862Z, Revisions FIPS_ 1.0, FIPS_ 1.1, FIPS_ 1.2 and FIPS_ 1.3; Firmware Version: 4.4.0.37 Software Version: 1.0
-~-- ------~ ---~--**---
Hardware Version: CPACF (PIN COP) and optional 4765-001 (P/N 45D6048); Software Version: ICSF level HCR7780 w/ APAR OA36882 and RACF level HRF7780; Firmware Version: CPACF (FC3863 wt System Driver Level 86E) and optional 4765-001 (e1ced7a0)
Hardware Version: Chassis: 2330, Interface Cards: 2-port T1/E1 Small Card (Assembly Number: 333-70225-01 Rev 4); 2-port Serial Small Card (Assembly Number: 333-70240-01 Rev 02.0011 ); 1-port ADSL2+ Annex A Small Card (Assembly Number: 333-70260-01 Rev 01); Firmware Version:
10.3.0.100 2/29/2012
httb2://csrc. nistgov/grouQs/STM/cmvb2/documents/140-1 /140val-all. htm Certificate Validation I Module Name(s)
Vendor Name Version Information Number Posting Date 1674 02/06/2012 Secure Router 4134 Avaya, Inc.
Hardware Version: Chassis: 4134, Interface Cards: 2-port T1/E1 Small Card (Assembly Number: 333-70225-01 Rev 4); 2-port Serial Small Card (Assembly Number: 333-70240-01 Rev 02.0011 ); 1-port ADSL2+ Annex A Small Card (Assembly Number: 333-70260-01 Rev 01 ); 1-port HSSI Medium Card (Part Number: 333-70290-01 Rev 9); 1-port Channelized I Clear Channel T3 Medium Card (Part Number: 333-70280-01 Rev 8); 8-port T1/E1 Medium Card (Part Number: 333-70275-01 Rev 01.0012); 10-port Gigabit Ethernet (GbE) Medium Card (Part Number:
333-70330-01 Rev 01.0023); 24-port Fast Ethernet (FE) Medium Card (Part Number: 333-70325-01 Rev 15); 24-port Fast Ethernet/Power over Ethernet (FE/PoE) Medium Card (Part Number: 333-70325-02 Rev 01.0017); Firmware Version:
10.3.0.100 1675 02/06/2012 Uplogix 430 [1] and 3200 [2]
Uplogix, Inc.
Hardware Versions: ( 43-1002-50 and 43-1102-50) [1] and (37-0326-03 and 37-0326-04) [2]; Firmware Version: 4.3.5.19979 1677 02/09/2012 McAfee Endpoint Encryption Disk McAfee, Inc.
Software Version: 6.1.3 Driver Cryptographic Module 1.0 1678 02/09/2012 StarSign Crypto USB Token Giesecke & Devrient Hardware Version: P5CC081; powered by Sm@rtCafe Expert 6.0 Firmware Version: Sm@rtCafT Expert 6.0
-- ------~----
1679 02/14/2012 CN 1000 Fibre Channel Encryptor Sen etas Corporation Ltd.
Hardware Version: A5175B; Firmware Version: 1.9.3
--- --~- -- ----*
1680 02/14/2012 Absolute Encryption Engine Absolute Software Corporation Software Version: 1.2.0.46 Page 3 of 4 2/29/2012
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1 /140val-all. htm Certificate Validation I Module Name(s)
Vendor Name Version Information Number Posting Date 1681 02/28/2012 PGP Software Developer's Kit Symantec Corporation Software Version: 4.2.1 (SOK) Cryptographic Module 1682 02/14/2012 Voltage I BE Cryptographic Module Voltage Security, Inc.
Software Version: 4.0 1683 02/15/2012 Communication Server Lenel Systems International, Inc.
Software Versions: 5.12.110, 6.0.148, 6.1.22, 6.3.249 or 6.4.500 1684 02/24/2012 PGP Cryptographic Engine Symantec Corporation Software Version: 4.2.1 Page 4 of 4 2/29/2012
x l n Generation RS-16-009 January 11, 2016 U.S. Nuclear Regulatory Commission ATIN: Document Control Desk Washington, DC 20555-0001 Braidwood Station, Units 1 and 2 Facility Operating License Nos. NPF-72 and NPF-77 NRC Docket Nos. STN 50-456. STN 50-457. and 72-73 Byron Station, Units 1 and 2 Renewed Facility Operating License Nos. NPF-37 and NPF-66 NRC Docket Nos. STN 50-454. STN 50-455, and 72-68 Calvert Cliffs Nuclear Power Plant, Units 1 and 2 Renewed Facility Operating License Nos. DPR-53 and DPR-69 NRC Docket Nos. 50-317. 50-318. 72-8 Clinton Power Station, Unit 1 Facility Operating License No. NPF-62 NRC Docket No. 50-461 Dresden Nuclear Power Station, Units 1, 2, and 3 Facility Operating License No. DPR-2 Renewed Facility Operating License Nos. DPR-19 and DPR-25 NRC Docket Nos. 50-10. 50-237. 50-249. and 72-37 LaSalle County Station, Units 1 and 2 Facility Operating License Nos. NPF-11 and NPF-18 NRC Docket Nos. 50-373, 50-37 4. and 72-70 Limerick Generating Station, Units 1 and 2 Renewed Facility Operating License Nos. NPF-39 and NPF-85 NRC Docket Nos. 50-352. 50-353. and 72-65 Nine Mile Point Nuclear Station, Units 1 and 2 Renewed Facility Operating License Nos. DPR-63 and NPF-69 NRC Docket Nos. 50-220. 50-410. and 72-1036 Oyster Creek Nuclear Generating Station Renewed Facility Operating License No. DPR-16 NRC Docket Nos. 50-219 and 72-15
U.S. Nuclear Regulatory Commission January 11, 2016 Page 2 Peach Bottom Atomic Power Station, Units 1, 2, and 3 Renewed Facility Operating License Nos. DPR-44 and DPR-56 Facility Operating [Possession Only] License No. DPR-12 NRC Docket Nos. 50-171, 50-277, 50-278, and 72-29 Quad Cities Nuclear Power Station, Units 1 and 2 Renewed Facility Operating License Nos. DPR-29 and DPR-30 NRC Docket Nos. 50-254, 50-265, and 72-53 R.E. Ginna Nuclear Power Plant Renewed Facility Operating License No. DPR-18 NRC Docket Nos. 50-244 and 72-67 Three Mile Island Nuclear Station, Unit 1 Renewed Facility Operating License No. DPR-50 NRC Docket No. 50-289
Subject:
Use of Encryption Software for Electronic Transmission of Safeguards Information
Reference:
NRC Regulatory Issue Summary 2002-15, Revision 1 11NRC Approval of Commercial Data Encryption Systems for the Electronic Transmission of Safeguards lnformation, 11 dated January 26, 2006 Pursuant to 10 CFR 73.22(f)(3) and the guidance provided in the Referencel Exelon Generation Company, LLC (EGC) requests NRC approval to use Symantec Desktop Email Version 10.3.2.
This version of encryption product was developed with PGP Software Developer's Kit (SOK)
Cryptographic Module Software Version 4.2.1 and complies with Federal Information Processing Standard (FIPS) 140-2 as validated by the National Institute of Standards and Technology (NIST) Consolidated Certificate No. 0014 (Attachment).
EGC has and continues to maintain an information protection system that meets the requirements of 10 CFR 73.21. Written procedures are in place which describe: access controls; where and when encrypted communications can be made; how encryption keys, codes and passwords are protected from compromise; actions to be taken if encryption keys, codes, or passwords are, or are suspected to have been, compromised; and how the identity and access authorization of the recipient is verified.
Processing Safeguards Information on electronic systems is performed in accordance the provisions of 10 CFR 73.22(g). Each EGC nuclear station and the Corporate Offices maintain a single (one) public key named with the following syntax:
LastName_FirstName_SiteName.asc.
U.S. Nuclear Regulatory Commission January 11, 2016 Page 3 This represents the organizational point of contact indicated as owning the key-pair. EGC controls each private key as Safeguards Information. EGC exchanges encrypted Safeguards Information only with the Nuclear Regulatory Commission, Nuclear Energy Institute (NE!), and other Safeguards Information holders that have received NRC approval to use PGP software.
Adam Janney, Security System Analyst, is responsible for the overall implementation of the Safeguards Information encryption program for EGC and is also responsible for collecting, safeguarding, and disseminating the software tools needed for encryption and decryption of Safeguards Information.
There are no new regulatory commitments contained in this letter. If there are any questions concerning this letter, please contact me at (630) 657-2823.
Re~K Patrick R. Simpson Licensing Manager Exelon Generation Company, LLC
Attachment:
Fl PS 140-2 Consolidated Certificate No. 0014 cc:
NRC Region I, Regional Administrator NRC Region Ill, Regional Administrator NRC Project Manager - Braidwood Station NRC Project Manager - Byron Station NRC Project Manager - Clinton Power Station NRC Project Manager - Dresden Nuclear Power Station, Unit 1 NRC Project Manager - Dresden Nuclear Power Station, Units 2 and 3 NRC Project Manager - LaSalle County Station NRC Project Manager - Limerick Generating Station NRC Project Manager - Oyster Creek Nuclear Generating Station NRC Project Manager - Peach Bottom Atomic Power Station, Unit 1 NRC Project Manager - Peach Bottom Atomic Power Station, Units 2 and 3 NRC Project Manager - Quad Cities Nuclear Power Station NRC Project Manager - Three Mile Island Nuclear Station, Unit 1 NRC Project Manager - Calvert Cliffs Nuclear Power Plant NRC Project Manager-R.E. Ginna Nuclear Power Plant NRC Project Manager - Nine Mile Point Nuclear Station
Attachment FIPS 140-2 Consolidated Certificate No. 0014
FIPS 140-2 Consolidated Validation Certificate The National Institute of Standards and Technology of the United States of America The Communications Security Establishment of the Government of Canada Consolidated Certificat.e No. 0014 The National Institute of Standards and Technology, as the United States FIPS 140-2 Cryptographic Module Validation Authority; and the Communications Security Establishment Canada, as the Canadian FIPS 140-2 Cryptographic Module Validation Authority: hereby validate the FIPS 140-2 testing results of the cryptographic modules listed below in accordance with the Derived Test Requirements for FIPS 140-2, Security Requirements for Cryptographic Modules. FIPS 140~2 specifies the security requirements that are to be satisfied by a cryptographic module utilized within a security system protecting Sensitive Information (United States) or Protected Information (Canada) within computer and telecommunicat1ons systems (including voice systems).
Products which use a cryptographic module identified below may be labeled as complying with the requirements of FIPS 140-2 so long as the product, throughout its life-cycle. continues to use the validated version of the cryptographic module as specified in this consolidated certificate The valtdation report contains additional details concerning test results. No reliability test has been performed and no warranty of the products by both agencies is either expressed or implied FIPS 140-2 provides four increasing, qualitative levels of security level 1, Level 2, Level 3, and Level 4. These levels are intended to cover the wide range and potential applications and environments in which cryptographic modules may be employed. The security requirements cover eleven areas related to the secure design and implementation of a cryptographic module.
The scope of conformance achieved by the cryptographic modules as tested are identified and listed on the Cryptographic Module Validation Program website. The website listing is the official 1.ist of validated cryptographic modules. Each validation entry corresponds to a uniquely assigned certificate number. Associated with each certificate number is the module name(s), module versioning information, applicable caveats, module type, date of initial validation and applicable revisions. Overall Level, individual Levels if different than the Overall Level. FIPS-approved and other algorithms. vendor contact information, a vendor provided description and the accredited Cryptographic Module Testing laboratory which performed the testing.
Signed on behalf of the
_/iVM
... // /
/
Signature:**-*-----
/ /
Dated:
--- -~-.,---*--* *----~U the United States Chief, Computer Security Division National Institute of Stapdards and Technology Page 1 of 4 Signed on.behalf of the.GQy_ernment of Canada
- / '")
i
/
.:;~/:::::...
S1gnahir-EL._
.......,. ~--.........
I
- ~*l '"'\\ /' --,
Dated:
./
,,1,,.-1,i.a *tc.. t'*L..
- *..;...,(ji L Director, Architecture and Technology Assurance Communications Security Establishment Canada ll.!- A f~;M~¥11on 2/29/2012
Certificate Number 1670 1671 1672 1673 Page 2 of 4 Validation I Posting Date 02/02/2012 02/06/2012 02/06/2012 02/06/2012 http://csrc.nist.gov/groups/STM/cmvp/documents/140-1 /140val-all. htm Module Name(s)
Vendor Name CAT862 Dolby JPEG 2000/MPEG-Dolby Laboratories, Inc.
2 Media Block I DC CryptoCore Module Sensage, Inc.
IBM z/OS Version 1 Release 13 IBM Corporation ICSF PKCS#11 Cryptographic Module Secure Router 2330 Avaya, Inc.
Version Information Hardware Versions: P/N CAT862Z, Revisions FIPS_ 1.0, FIPS_ 1.1, FIPS_ 1.2 and FIPS_ 1.3; Firmware Version: 4.4.0.37 Software Version: 1.0
-~-- ------~ ---~--**---
Hardware Version: CPACF (PIN COP) and optional 4765-001 (P/N 45D6048); Software Version: ICSF level HCR7780 w/ APAR OA36882 and RACF level HRF7780; Firmware Version: CPACF (FC3863 wt System Driver Level 86E) and optional 4765-001 (e1ced7a0)
Hardware Version: Chassis: 2330, Interface Cards: 2-port T1/E1 Small Card (Assembly Number: 333-70225-01 Rev 4); 2-port Serial Small Card (Assembly Number: 333-70240-01 Rev 02.0011 ); 1-port ADSL2+ Annex A Small Card (Assembly Number: 333-70260-01 Rev 01); Firmware Version:
10.3.0.100 2/29/2012
httb2://csrc. nistgov/grouQs/STM/cmvb2/documents/140-1 /140val-all. htm Certificate Validation I Module Name(s)
Vendor Name Version Information Number Posting Date 1674 02/06/2012 Secure Router 4134 Avaya, Inc.
Hardware Version: Chassis: 4134, Interface Cards: 2-port T1/E1 Small Card (Assembly Number: 333-70225-01 Rev 4); 2-port Serial Small Card (Assembly Number: 333-70240-01 Rev 02.0011 ); 1-port ADSL2+ Annex A Small Card (Assembly Number: 333-70260-01 Rev 01 ); 1-port HSSI Medium Card (Part Number: 333-70290-01 Rev 9); 1-port Channelized I Clear Channel T3 Medium Card (Part Number: 333-70280-01 Rev 8); 8-port T1/E1 Medium Card (Part Number: 333-70275-01 Rev 01.0012); 10-port Gigabit Ethernet (GbE) Medium Card (Part Number:
333-70330-01 Rev 01.0023); 24-port Fast Ethernet (FE) Medium Card (Part Number: 333-70325-01 Rev 15); 24-port Fast Ethernet/Power over Ethernet (FE/PoE) Medium Card (Part Number: 333-70325-02 Rev 01.0017); Firmware Version:
10.3.0.100 1675 02/06/2012 Uplogix 430 [1] and 3200 [2]
Uplogix, Inc.
Hardware Versions: ( 43-1002-50 and 43-1102-50) [1] and (37-0326-03 and 37-0326-04) [2]; Firmware Version: 4.3.5.19979 1677 02/09/2012 McAfee Endpoint Encryption Disk McAfee, Inc.
Software Version: 6.1.3 Driver Cryptographic Module 1.0 1678 02/09/2012 StarSign Crypto USB Token Giesecke & Devrient Hardware Version: P5CC081; powered by Sm@rtCafe Expert 6.0 Firmware Version: Sm@rtCafT Expert 6.0
-- ------~----
1679 02/14/2012 CN 1000 Fibre Channel Encryptor Sen etas Corporation Ltd.
Hardware Version: A5175B; Firmware Version: 1.9.3
--- --~- -- ----*
1680 02/14/2012 Absolute Encryption Engine Absolute Software Corporation Software Version: 1.2.0.46 Page 3 of 4 2/29/2012
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1 /140val-all. htm Certificate Validation I Module Name(s)
Vendor Name Version Information Number Posting Date 1681 02/28/2012 PGP Software Developer's Kit Symantec Corporation Software Version: 4.2.1 (SOK) Cryptographic Module 1682 02/14/2012 Voltage I BE Cryptographic Module Voltage Security, Inc.
Software Version: 4.0 1683 02/15/2012 Communication Server Lenel Systems International, Inc.
Software Versions: 5.12.110, 6.0.148, 6.1.22, 6.3.249 or 6.4.500 1684 02/24/2012 PGP Cryptographic Engine Symantec Corporation Software Version: 4.2.1 Page 4 of 4 2/29/2012