ML17313B223

From kanterella
Jump to navigation Jump to search
Use of Encryption Software for Electronic Transmission of Safeguards Information
ML17313B223
Person / Time
Site: Palisades, Indian Point, Grand Gulf, Pilgrim, Arkansas Nuclear, River Bend, Vermont Yankee, Waterford  Entergy icon.png
Issue date: 11/09/2017
From: Halter M
Entergy Nuclear Operations, Entergy Operations
To:
Document Control Desk, Office of Nuclear Material Safety and Safeguards, Office of Nuclear Reactor Regulation
References
CNRO-2017-0020
Download: ML17313B223 (12)


Text

CNRO-2017-0020 November 9, 2017 U.S. Nuclear Regulatory Commission ATTN: Document Control Desk Washington, DC 20555-0001 Arkansas Nuclear One (Units 1 & 2)

Docket Nos. 50-313 & 50-368 License Nos. DPR-51 & NPF-6 Grand Gulf Nuclear Station Docket No. 50-416 License No. NPF-29 Indian Point 1 Nuclear Power Plant Docket No.50-003 License No. DPR-05 Indian Point 2 Nuclear Power Plant Docket No. 50-247 License No. DPR-26 Indian Point 3 Nuclear Power Plant Docket No. 50-286 License No. DPR-64 Palisades Nuclear Power Plant Docket No. 50-255 License No. DPR-20 Pilgrim Nuclear Power Station Docket No. 50-293 License No. DPR-35 River Bend Station Docket No. 50-458 License No. NPF-47 Vermont Yankee Nuclear Power Station Docket No. 50-271 License No. DPR-28 Waterford 3 Steam Electric Station Docket No. 50-382 License No. NPF-38

SUBJECT:

Use of Encryption Software for Electronic Transmission of Safeguards Information

REFERENCES:

1.

NRC Regulatory Guide 5.79, Protection of Safeguards Information, April 2011

2.

NRC Regulatory Issue Summary 2002-15, Revision 1, NRC Approval of Commercial Data Encryption Products for the Electronic Transmission of Safeguards Information, dated January 26, 2006

Dear Sir or Madam:

Pursuant to the requirements of Title 10 of the Code of Federal Regulations (10CFR) 73.22(f)(3) and the guidance provided in Nuclear Regulatory Commission (NRC) Regulatory Guide 5.79 (Reference 1) and Regulatory Issue Summary 2002-15, Revision 1 (Reference 2),

Entergy Nuclear Operations, Inc. and Entergy Operations, Inc. (collectively, Entergy) requests approval to process and transmit safeguards information (SGI) using Symantec Endpoint Encryption by PGP Technology, 11.1, or the latest validated version. This version of Entergy Operations, Inc.

Entergy Nuclear Operations, Inc.

1340 Echelon Parkway Jackson, MS 39213 Mandy Halter Director, Nuclear Licensing 10 CFR 73.22

CNRO-2017-0020 / Page 2 of 3 encryption product was developed with PGP Cryptographic Engine Software Version 4.3 and complies with Federal Information Processing Standard (FIPS) 140-2 as validated by the National Institute of Standards and Technology (NIST) Consolidated Certificate No. 0053 (Enclosure).

Entergy has and continues to maintain an established written procedure in place that describes, as a minimum: access controls; where and when encrypted communications can be made; how encryption keys, codes and passwords are protected from compromise; actions to be taken if the encryption keys, codes or passwords are, or are suspected to have been, compromised (such as notification of all authorized users); and how the identity and access authorization of the recipient will be verified.

Entergy intends to exchange SGI with the NRC, Nuclear Energy Institute, and other SGI holders who have received NRC approval to use PGP software. Pursuant to 10 CFR 73.22(f)(3), the transmission of encrypted material to other authorized SGI holders who have received NRC approval to use PGP software would be considered a protected telecommunications system. The transmission and dissemination of unencrypted SGI is subject to the provisions of 10 CFR 73.22(g).

There are no new regulatory commitments in this letter. If you have any questions, please contact Mr. David Berkenpas, Senior Manager, Security Operations, at (601) 368-5824.

Sincerely, MH / plc

Enclosure:

FIPS 140-2 Consolidated Certificate No. 0053 cc:

Mr. R. Anderson (ANO)

Mr. E. Larson (GGNS)

Mr. A. Vitale (IPEC)

Mr. C. Arnone (PAL)

Mr. B. Sullivan (PNPS)

Mr. W. Maguire (RBS)

Mr. J. Boyle (VY)

Mr. M. Chisum (WF3)

Mr. R. Gaston (ECH)

USNRC Regional Administrator, Region I USNRC Regional Administrator, Region III USNRC Regional Administrator, Region IV USNRC Project Manager, ANO 1/2 USNRC Project Manager, Grand Gulf USNRC Project Manager, Indian Point 1 USNRC Project Manager, Indian Point 2/3 USNRC Project Manager, Palisades

CNRO-2017-0020 / Page 3 of 3 cc (contd):

USNRC Project Manager, Pilgrim USNRC Project Manager, River Bend USNRC Project Manager, Vermont Yankee USNRC Project Manager, Waterford 3 USNRC Project Manager, Entergy Fleet USNRC Senior Resident Inspector, ANO 1/2 USNRC Senior Resident Inspector, Grand Gulf USNRC Senior Resident Inspector, Indian Point 2 / 3 USNRC Senior Resident Inspector, Palisades USNRC Senior Resident Inspector, Pilgrim USNRC Senior Resident Inspector, River Bend USNRC Senior Resident Inspector, Waterford 3

CNRO-2017-0020 Enclosure FIPS 140-2 Consolidated Certificate No. 0053

FIPS 140-2 Consolidated Validation Certificate The National Institute of Standards and Technology of the United States of America

.. ~.

~ --~

  • ~ w~

~ :

~

~~40~~

~

The Communications Security Establishment of the Government of Canada Consolidated Certificate No. 0053 The National Institute of Standards and Technology, as the United States FIPS 140-2 Cryptographic Module Validation Authority; and the Communications Security Establishment Canada, as the Canadian FIPS 140-2 Cryptographic Module Validation Authority; hereby validate the FIPS 140-2 testing results of the cryptographic modules listed below in accordance with the Derived Test Requirements for FIPS 140-2, Security Requirements for Cryptographic Modules. FIPS 140-2 specifies the security requirements that are to be satisfied by a cryptographic module utilized within a security system protecting Sensitive Information (United States) or Protected Information (Canada) within computer and telecommunications systems (including voice systems).

Products which use a cryptographic module identified below may be labeled as complying with the requirements of FIPS 140-2 so long as the product, throughout its life-cycle, continues to use the validated version of the cryptographic module as specified in this consolidated certificate.

The validation report contains additional details concerning test results. No reliability test has been performed and no warranty of the products by both agencies is either expressed or implied.

FIPS 140-2 provides four increasing, qualitative levels of security: Level1, Level2, Level3, and Level4. These levels are intended to cover the wide range and potential applications and environments in which cryptographic modules may be employed. The security requirements cover eleven areas related to the secure design and implementation of a cryptographic module.

The scope of conformance achieved by the cryptographic modules as tested are identified and listed on the Cryptographic Module Validation Program website. The website listing is the official list of validated cryptographic modules. Each validation entry corresponds to a uniquely assigned certificate number. Associated with each certificate number is the module name(s), module versioning information, applicable caveats, module type, date of initial validation and applicable revisions, Overall Level, individual Levels if different than the Overall Level, FIPS-approved and other algorithms, vendor contact information, a vendor provided description and the accredited Cryptographic Module Testing laboratory which performed the testing.

Signature:

, r,. b'. /( 'FV.*-

n

- v v

I

)

Dated:

Chief, Computer Security Division National Institute of Standards and Technology Page 1 of 8 Signature:

Dated:

Director, Architecture and Technology Assurance Communications Security Establishment Canada TM A.CttriJhcat!Crt M~rk d NIST. whiCh do~ net *moly ptodud ~Mn'llt'nl by NIST lhtt US CJIII Can..., ~:Ynel'1~

r..,,

6/1/2015

KWWSFVUFQLVWJRYJURXSV670FPYSGRFXPHQWVYDODOOKWP

&HUWLILFDWH

1XPEHU

9DOLGDWLRQ

3RVWLQJ'DWH

0RGXOH1DPH V 

9HQGRU1DPH

9HUVLRQ,QIRUPDWLRQ





.HUQHO0RGH&U\\SWRJUDSKLF

3ULPLWLYHV/LEUDU\\ FQJV\\V LQ

0LFURVRIW:LQGRZV(QWHUSULVH

LQGRZV6HUYHU5
LQGRZV6WRUDJH6HUYHU5

6XUIDFH3UR6XUIDFH3UR

6XUIDFH3UR6XUIDFH6XUIDFH

LQGRZV57:LQGRZV3KRQH

:LQGRZV(PEHGGHG

,QGXVWU\\(QWHUSULVH6WRU6LPSOH

6HULHV

0LFURVRIW&RUSRUDWLRQ

6RIWZDUH9HUVLRQVDQG







&LVFR6\\VWHPV:LUHOHVV/$1

&RQWUROOHU

&LVFR6\\VWHPV,QF

+DUGZDUH9HUVLRQZLWK

),36NLW $,5&7),36.,7 

DQG&1;;)LUPZDUH9HUVLRQ

ZLWK61036WDFNY

23(166/J

48,&.6(&DQG)3

&5<372





)RUWL*DWH&'&DQG

)RUWL:L)L&'

)RUWLQHW,QF

+DUGZDUH9HUVLRQV&'0>@

&$%>@&%&>@&'0

>@DQG&$%>@ZLWK7DPSHU

(YLGHQW6HDO.LWV),366($/

%/8(>@RU),366($/5('

>@)LUPZDUH9HUVLRQ

EXLOG





)RUWL*DWH')RUWL*DWH%

)RUWL*DWH')RUWL*DWH&

)RUWL*DWH&DQG)RUWL*DWH&

)RUWLQHW,QF

+DUGZDUH9HUVLRQV&//>@

&&'>@&.9>@&+<

>@&+=>@DQG&/+>@ZLWK

7DPSHU(YLGHQW6HDO.LWV),36

6($/%/8(>@RU),366($/5('

>@)LUPZDUH9HUVLRQ

EXLOG





)RUWL*DWH&)RUWL*DWH%

)RUWL*DWH%DQG)RUWL*DWH

&

)RUWLQHW,QF

+DUGZDUH9HUVLRQV&+5>@

&&1>@&;&>@DQG

&.&>@ZLWK7DPSHU(YLGHQW

6HDO.LWV),366($/5('>@

RU),366($/%/8(>@)LUPZDUH

9HUVLRQ)RUWL26

EXLOG

3DJHRI



KWWSFVUFQLVWJRYJURXSV670FPYSGRFXPHQWVYDODOOKWP

&HUWLILFDWH

1XPEHU

9DOLGDWLRQ

3RVWLQJ'DWH

0RGXOH1DPH V 

9HQGRU1DPH

9HUVLRQ,QIRUPDWLRQ





)RUWL*DWH'DQG'

)RUWLQHW,QF

+DUGZDUH9HUVLRQV&$$>@DQG

&$$>@ZLWK7DPSHU(YLGHQW

6HDO.LWV),366($/5('>@

)LUPZDUH9HUVLRQ)RUWL26

EXLOG





)RUWL26

)RUWLQHW,QF

)LUPZDUH9HUVLRQEXLOG







)RUWL*DWH&DQG)RUWL*DWH

%

)RUWLQHW,QF

+DUGZDUH9HUVLRQV&0+

>&'(ZLWK3@ZLWK

7DPSHU(YLGHQW6HDO.LWV),36

6($/5(')LUPZDUH9HUVLRQ

)RUWL26EXLOG





)RUWL*DWH%&KDVVLVZLWK

)RUWL*DWH)RUWL6ZLWFK6HULHV

%ODGHV

)RUWLQHW,QF

+DUGZDUH9HUVLRQ&KDVVLV

3%ODGHV3&-

3(9&/*DQG3(;

$0&&RPSRQHQW3)&$LU

)LOWHU313)URQW)LOOHU

3DQHO313WHQ5HDU

)LOOHU3DQHO313

IRXUWHHQ7DPSHU(YLGHQW6HDO.LW

),366($/5(')LUPZDUH

9HUVLRQ)RUWL26EXLOG







1HRSRVW3RVWDO6HFXULW\\'HYLFH

36' 

1HRSRVW7HFKQRORJLHV6$

+DUGZDUH9HUVLRQ$%

)LUPZDUH9HUVLRQD31

$$





$YD\\D:/$1$FFHVV3RLQWV

$YD\\D,QF

+DUGZDUH9HUVLRQV31V

$2(*6>@
$3(*6>@
$3(*6>@
$3(*6>@(QFORVXUH

)RUP)DFWRU :$2(*6

>@:$%(>@6.8

/%()LUPZDUH9HUVLRQ

$26





+33&ODVV6PDUW$UUD\\5$,'

&RQWUROOHUV

+HZOHWW3DFNDUG'HYHORSPHQW

&RPSDQ\\/3

+DUGZDUH9HUVLRQV3L3

33P3DQG3L

)LUPZDUH9HUVLRQ

3DJHRI



KWWSFVUFQLVWJRYJURXSV670FPYSGRFXPHQWVYDODOOKWP

&HUWLILFDWH

1XPEHU

9DOLGDWLRQ

3RVWLQJ'DWH

0RGXOH1DPH V 

9HQGRU1DPH

9HUVLRQ,QIRUPDWLRQ





$HJLV6HFXUH.H\\

&U\\SWRJUDSKLF0RGXOH

$SULFRUQ,QF

+DUGZDUH9HUVLRQ5HY')LUPZDUH

9HUVLRQ





6\\PDQWHF3*3&U\\SWRJUDSKLF

(QJLQH

6\\PDQWHF&RUSRUDWLRQ

6RIWZDUH9HUVLRQ





&LHQD3DFNHW2SWLFDO

3ODWIRUP[*

&LHQD&RUSRUDWLRQ

+DUGZDUH9HUVLRQ)LUPZDUH

9HUVLRQ





6DPVXQJ8)6 8QLYHUVDO)ODVK

6WRUDJH 6KDUN6('

6DPVXQJ(OHFWURQLFV&R/WG

+DUGZDUH9HUVLRQV./8$**%'

%%./8%**%'%%

./8&**%'%%)LUPZDUH

9HUVLRQ

3DJHRI



KWWSFVUFQLVWJRYJURXSV670FPYSGRFXPHQWVYDODOOKWP

&HUWLILFDWH

9DOLGDWLRQ

0RGXOH1DPH V 

9HQGRU1DPH

9HUVLRQ,QIRUPDWLRQ

1XPEHU

3RVWLQJ'DWH





%URFDGH0/;H%URFDGH

%URFDGH&RPPXQLFDWLRQV

1HW,URQ&(5(WKHUQHW

6\\VWHPV,QF

5RXWHUVDQG%URFDGH&(6

5RXWHUVDQG6ZLWFKHV

+DUGZDUH9HUVLRQV^>%50/;(

050$& 31 

%50/;(050'& 31

 %50/;(050

$& 31 %5

0/;(050'& 31

 %50/;(050

$& 31 %5

0/;(050'& 31

 %50/;(050

$& 31 %5

0/;(050'& 31

 %50/;(050

$& 31 %5

0/;(050'& 31

 %50/;(050

$& 31 %5

0/;(050'& 31

 @ZLWK&RPSRQHQW31V

















1,&(5)

$'935(0$& 31

 1,&(5)$'935(0'&

31 1,&(5

);$'935(0$& 31

 1,&(5);

$'935(0'& 31

 1,&(5)$'935(0$&

31 1,&(5

)$'935(0'& 31

 1,&(5&

$'935(0$& 31

 1,&(5&$'935(0'&

31 1,&(5

&$'935(0$& 31

3DJHRI



KWWSFVUFQLVWJRYJURXSV670FPYSGRFXPHQWVYDODOOKWP

&HUWLILFDWH

1XPEHU

9DOLGDWLRQ

3RVWLQJ'DWH

0RGXOH1DPH V 

9HQGRU1DPH

9HUVLRQ,QIRUPDWLRQ

 1,&(5&

$'935(0'& 31

 1,&(5&;$'935(0

$& 31 1,&(5

&;$'935(0'& 31

 %5&(5);

57'& 31 %5

&(5&;57'& 31

 %5&(5);

57$& 31 %5

&(5&;57$& 31

 1,&(5&

;* 31 %5

&(6&;$& 31

 %5&(6&;

'& 31 %5&(6

);$& 31

 %5&(6);'& 31

 536 31

 DQG536'& 31

 `ZLWK),36.LW;%5

)LUPZDUH9HUVLRQ0XOWL

6HUYLFH,URQ:DUH5





+*678OWUDVWDU.7&*

(QWHUSULVH+V

+*67,QF

+DUGZDUH9HUVLRQV31V

+86$/  

+86$/  

+86$/  

+86$/  

+86$/  

+86$/  

+86$/  

+86$/  

+86$/  

+86$/  

)LUPZDUH9HUVLRQ5





+39LUWXDO&RQQHFW*E3RUW

)&0RGXOH

+HZOHWW3DFNDUG&RPSDQ\\

+DUGZDUH9HUVLRQ

5HY&  )LUPZDUH

9HUVLRQ9&

3DJHRI



KWWSFVUFQLVWJRYJURXSV670FPYSGRFXPHQWVYDODOOKWP

&HUWLILFDWH

9DOLGDWLRQ

0RGXOH1DPH V 

9HQGRU1DPH

9HUVLRQ,QIRUPDWLRQ

1XPEHU

3RVWLQJ'DWH





%URFDGH'&;'&;'&;

%URFDGH&RPPXQLFDWLRQV

6DQG'&;%DFNERQHV

6\\VWHPV,QF

)&6ZLWFK)&6ZLWFK

DQG([WHQVLRQ6ZLWFK

+DUGZDUH9HUVLRQV^>'&;

%DFNERQH 31V

DQG

 '&;6%DFNERQH

31V

DQG

 '&;%DFNERQH 31V



DQG 

'&;%DFNERQH 31V

DQG @

ZLWK%ODGHV 31V





















DQG 

)&6ZLWFK 31V



DQG

 )&6ZLWFK

31V



 ([WHQVLRQ

6ZLWFK 31V



DQG

 `ZLWK),36.LW31

%URFDGH;%5)LUPZDUH

9HUVLRQ)DEULF26Y 31

 





0$&(

0RWRUROD6ROXWLRQV,QF

+DUGZDUH9HUVLRQ31$7=

)LUPZDUH9HUVLRQ5

3DJHRI



KWWSFVUFQLVWJRYJURXSV670FPYSGRFXPHQWVYDODOOKWP

&HUWLILFDWH

1XPEHU

9DOLGDWLRQ

3RVWLQJ'DWH

0RGXOH1DPH V 

9HQGRU1DPH

9HUVLRQ,QIRUPDWLRQ





+LWDFKL9LUWXDO6WRUDJH3ODWIRUP

963 (QFU\\SWLRQ(QJLQH

+LWDFKL/WG

+DUGZDUH9HUVLRQ5/

)LUPZDUH9HUVLRQDQG







+3;3(QFU\\SWLRQ5HDG\\'LVN

$GDSWHU H'.$ /HYHO

+HZOHWW3DFNDUG&RPSDQ\\

+DUGZDUH9HUVLRQ5/

)LUPZDUH9HUVLRQDQG







,26&RPPRQ&U\\SWRJUDSKLF

0RGXOH ,&0 5HO

&LVFR6\\VWHP,QF

)LUPZDUH9HUVLRQ5HO

3DJHRI