ML17313B223
| ML17313B223 | |
| Person / Time | |
|---|---|
| Site: | Palisades, Indian Point, Grand Gulf, Pilgrim, Arkansas Nuclear, River Bend, Vermont Yankee, Waterford |
| Issue date: | 11/09/2017 |
| From: | Halter M Entergy Nuclear Operations, Entergy Operations |
| To: | Document Control Desk, Office of Nuclear Material Safety and Safeguards, Office of Nuclear Reactor Regulation |
| References | |
| CNRO-2017-0020 | |
| Download: ML17313B223 (12) | |
Text
CNRO-2017-0020 November 9, 2017 U.S. Nuclear Regulatory Commission ATTN: Document Control Desk Washington, DC 20555-0001 Arkansas Nuclear One (Units 1 & 2)
Docket Nos. 50-313 & 50-368 License Nos. DPR-51 & NPF-6 Grand Gulf Nuclear Station Docket No. 50-416 License No. NPF-29 Indian Point 1 Nuclear Power Plant Docket No.50-003 License No. DPR-05 Indian Point 2 Nuclear Power Plant Docket No. 50-247 License No. DPR-26 Indian Point 3 Nuclear Power Plant Docket No. 50-286 License No. DPR-64 Palisades Nuclear Power Plant Docket No. 50-255 License No. DPR-20 Pilgrim Nuclear Power Station Docket No. 50-293 License No. DPR-35 River Bend Station Docket No. 50-458 License No. NPF-47 Vermont Yankee Nuclear Power Station Docket No. 50-271 License No. DPR-28 Waterford 3 Steam Electric Station Docket No. 50-382 License No. NPF-38
SUBJECT:
Use of Encryption Software for Electronic Transmission of Safeguards Information
REFERENCES:
- 1.
NRC Regulatory Guide 5.79, Protection of Safeguards Information, April 2011
- 2.
NRC Regulatory Issue Summary 2002-15, Revision 1, NRC Approval of Commercial Data Encryption Products for the Electronic Transmission of Safeguards Information, dated January 26, 2006
Dear Sir or Madam:
Pursuant to the requirements of Title 10 of the Code of Federal Regulations (10CFR) 73.22(f)(3) and the guidance provided in Nuclear Regulatory Commission (NRC) Regulatory Guide 5.79 (Reference 1) and Regulatory Issue Summary 2002-15, Revision 1 (Reference 2),
Entergy Nuclear Operations, Inc. and Entergy Operations, Inc. (collectively, Entergy) requests approval to process and transmit safeguards information (SGI) using Symantec Endpoint Encryption by PGP Technology, 11.1, or the latest validated version. This version of Entergy Operations, Inc.
Entergy Nuclear Operations, Inc.
1340 Echelon Parkway Jackson, MS 39213 Mandy Halter Director, Nuclear Licensing 10 CFR 73.22
CNRO-2017-0020 / Page 2 of 3 encryption product was developed with PGP Cryptographic Engine Software Version 4.3 and complies with Federal Information Processing Standard (FIPS) 140-2 as validated by the National Institute of Standards and Technology (NIST) Consolidated Certificate No. 0053 (Enclosure).
Entergy has and continues to maintain an established written procedure in place that describes, as a minimum: access controls; where and when encrypted communications can be made; how encryption keys, codes and passwords are protected from compromise; actions to be taken if the encryption keys, codes or passwords are, or are suspected to have been, compromised (such as notification of all authorized users); and how the identity and access authorization of the recipient will be verified.
Entergy intends to exchange SGI with the NRC, Nuclear Energy Institute, and other SGI holders who have received NRC approval to use PGP software. Pursuant to 10 CFR 73.22(f)(3), the transmission of encrypted material to other authorized SGI holders who have received NRC approval to use PGP software would be considered a protected telecommunications system. The transmission and dissemination of unencrypted SGI is subject to the provisions of 10 CFR 73.22(g).
There are no new regulatory commitments in this letter. If you have any questions, please contact Mr. David Berkenpas, Senior Manager, Security Operations, at (601) 368-5824.
Sincerely, MH / plc
Enclosure:
FIPS 140-2 Consolidated Certificate No. 0053 cc:
Mr. R. Anderson (ANO)
Mr. E. Larson (GGNS)
Mr. A. Vitale (IPEC)
Mr. C. Arnone (PAL)
Mr. B. Sullivan (PNPS)
Mr. W. Maguire (RBS)
Mr. J. Boyle (VY)
Mr. M. Chisum (WF3)
Mr. R. Gaston (ECH)
USNRC Regional Administrator, Region I USNRC Regional Administrator, Region III USNRC Regional Administrator, Region IV USNRC Project Manager, ANO 1/2 USNRC Project Manager, Grand Gulf USNRC Project Manager, Indian Point 1 USNRC Project Manager, Indian Point 2/3 USNRC Project Manager, Palisades
CNRO-2017-0020 / Page 3 of 3 cc (contd):
USNRC Project Manager, Pilgrim USNRC Project Manager, River Bend USNRC Project Manager, Vermont Yankee USNRC Project Manager, Waterford 3 USNRC Project Manager, Entergy Fleet USNRC Senior Resident Inspector, ANO 1/2 USNRC Senior Resident Inspector, Grand Gulf USNRC Senior Resident Inspector, Indian Point 2 / 3 USNRC Senior Resident Inspector, Palisades USNRC Senior Resident Inspector, Pilgrim USNRC Senior Resident Inspector, River Bend USNRC Senior Resident Inspector, Waterford 3
CNRO-2017-0020 Enclosure FIPS 140-2 Consolidated Certificate No. 0053
FIPS 140-2 Consolidated Validation Certificate The National Institute of Standards and Technology of the United States of America
.. ~.
~ --~
- ~ w~
~ :
~
~~40~~
~
The Communications Security Establishment of the Government of Canada Consolidated Certificate No. 0053 The National Institute of Standards and Technology, as the United States FIPS 140-2 Cryptographic Module Validation Authority; and the Communications Security Establishment Canada, as the Canadian FIPS 140-2 Cryptographic Module Validation Authority; hereby validate the FIPS 140-2 testing results of the cryptographic modules listed below in accordance with the Derived Test Requirements for FIPS 140-2, Security Requirements for Cryptographic Modules. FIPS 140-2 specifies the security requirements that are to be satisfied by a cryptographic module utilized within a security system protecting Sensitive Information (United States) or Protected Information (Canada) within computer and telecommunications systems (including voice systems).
Products which use a cryptographic module identified below may be labeled as complying with the requirements of FIPS 140-2 so long as the product, throughout its life-cycle, continues to use the validated version of the cryptographic module as specified in this consolidated certificate.
The validation report contains additional details concerning test results. No reliability test has been performed and no warranty of the products by both agencies is either expressed or implied.
FIPS 140-2 provides four increasing, qualitative levels of security: Level1, Level2, Level3, and Level4. These levels are intended to cover the wide range and potential applications and environments in which cryptographic modules may be employed. The security requirements cover eleven areas related to the secure design and implementation of a cryptographic module.
The scope of conformance achieved by the cryptographic modules as tested are identified and listed on the Cryptographic Module Validation Program website. The website listing is the official list of validated cryptographic modules. Each validation entry corresponds to a uniquely assigned certificate number. Associated with each certificate number is the module name(s), module versioning information, applicable caveats, module type, date of initial validation and applicable revisions, Overall Level, individual Levels if different than the Overall Level, FIPS-approved and other algorithms, vendor contact information, a vendor provided description and the accredited Cryptographic Module Testing laboratory which performed the testing.
Signature:
, r,. b'. /( 'FV.*-
n
- v v
I
)
Dated:
Chief, Computer Security Division National Institute of Standards and Technology Page 1 of 8 Signature:
Dated:
Director, Architecture and Technology Assurance Communications Security Establishment Canada TM A.CttriJhcat!Crt M~rk d NIST. whiCh do~ net *moly ptodud ~Mn'llt'nl by NIST lhtt US CJIII Can..., ~:Ynel'1~
r..,,
6/1/2015
KWWSFVUFQLVWJRYJURXSV670FPYSGRFXPHQWVYDODOOKWP
&HUWLILFDWH
1XPEHU
9DOLGDWLRQ
3RVWLQJ'DWH
0RGXOH1DPHV
9HQGRU1DPH
9HUVLRQ,QIRUPDWLRQ
.HUQHO0RGH&U\\SWRJUDSKLF
3ULPLWLYHV/LEUDU\\FQJV\\VLQ
0LFURVRIW:LQGRZV(QWHUSULVH
- LQGRZV6HUYHU5
- LQGRZV6WRUDJH6HUYHU5
6XUIDFH3UR6XUIDFH3UR
6XUIDFH3UR6XUIDFH6XUIDFH
- LQGRZV57:LQGRZV3KRQH
:LQGRZV(PEHGGHG
,QGXVWU\\(QWHUSULVH6WRU6LPSOH
6HULHV
0LFURVRIW&RUSRUDWLRQ
6RIWZDUH9HUVLRQVDQG
&LVFR6\\VWHPV:LUHOHVV/$1
&RQWUROOHU
&LVFR6\\VWHPV,QF
+DUGZDUH9HUVLRQZLWK
),36NLW$,5&7),36.,7
DQG&1;;)LUPZDUH9HUVLRQ
ZLWK61036WDFNY
23(166/J
48,&.6(&DQG)3
&5<372
)RUWL*DWH&'&DQG
)RUWL:L)L&'
)RUWLQHW,QF
+DUGZDUH9HUVLRQV&'0>@
&$%>@&%&>@&'0
>@DQG&$%>@ZLWK7DPSHU
(YLGHQW6HDO.LWV),366($/
%/8(>@RU),366($/5('
>@)LUPZDUH9HUVLRQ
EXLOG
)RUWL*DWH')RUWL*DWH%
)RUWL*DWH')RUWL*DWH&
)RUWL*DWH&DQG)RUWL*DWH&
)RUWLQHW,QF
+DUGZDUH9HUVLRQV&//>@
&&'>@&.9>@&+<
>@&+=>@DQG&/+>@ZLWK
7DPSHU(YLGHQW6HDO.LWV),36
6($/%/8(>@RU),366($/5('
>@)LUPZDUH9HUVLRQ
EXLOG
)RUWL*DWH&)RUWL*DWH%
)RUWL*DWH%DQG)RUWL*DWH
&
)RUWLQHW,QF
+DUGZDUH9HUVLRQV&+5>@
&&1>@&;&>@DQG
&.&>@ZLWK7DPSHU(YLGHQW
6HDO.LWV),366($/5('>@
RU),366($/%/8(>@)LUPZDUH
9HUVLRQ)RUWL26
EXLOG
3DJHRI
KWWSFVUFQLVWJRYJURXSV670FPYSGRFXPHQWVYDODOOKWP
&HUWLILFDWH
1XPEHU
9DOLGDWLRQ
3RVWLQJ'DWH
0RGXOH1DPHV
9HQGRU1DPH
9HUVLRQ,QIRUPDWLRQ
)RUWL*DWH'DQG'
)RUWLQHW,QF
+DUGZDUH9HUVLRQV&$$>@DQG
&$$>@ZLWK7DPSHU(YLGHQW
6HDO.LWV),366($/5('>@
)LUPZDUH9HUVLRQ)RUWL26
EXLOG
)RUWL26
)RUWLQHW,QF
)LUPZDUH9HUVLRQEXLOG
)RUWL*DWH&DQG)RUWL*DWH
%
)RUWLQHW,QF
+DUGZDUH9HUVLRQV&0+
>&'(ZLWK3@ZLWK
7DPSHU(YLGHQW6HDO.LWV),36
6($/5(')LUPZDUH9HUVLRQ
)RUWL26EXLOG
)RUWL*DWH%&KDVVLVZLWK
)RUWL*DWH)RUWL6ZLWFK6HULHV
%ODGHV
)RUWLQHW,QF
+DUGZDUH9HUVLRQ&KDVVLV
3%ODGHV3&-
3(9&/*DQG3(;
$0&&RPSRQHQW3)&$LU
)LOWHU313)URQW)LOOHU
3DQHO313WHQ5HDU
)LOOHU3DQHO313
IRXUWHHQ7DPSHU(YLGHQW6HDO.LW
),366($/5(')LUPZDUH
9HUVLRQ)RUWL26EXLOG
1HRSRVW3RVWDO6HFXULW\\'HYLFH
36'
1HRSRVW7HFKQRORJLHV6$
+DUGZDUH9HUVLRQ$%
)LUPZDUH9HUVLRQD31
$$
$YD\\D:/$1$FFHVV3RLQWV
$YD\\D,QF
+DUGZDUH9HUVLRQV31V
- $2(*6>@
- $3(*6>@
- $3(*6>@
- $3(*6>@(QFORVXUH
)RUP)DFWRU:$2(*6
>@:$%(>@6.8
- /%()LUPZDUH9HUVLRQ
$26
+33&ODVV6PDUW$UUD\\5$,'
&RQWUROOHUV
+HZOHWW3DFNDUG'HYHORSPHQW
&RPSDQ\\/3
+DUGZDUH9HUVLRQV3L3
33P3DQG3L
)LUPZDUH9HUVLRQ
3DJHRI
KWWSFVUFQLVWJRYJURXSV670FPYSGRFXPHQWVYDODOOKWP
&HUWLILFDWH
1XPEHU
9DOLGDWLRQ
3RVWLQJ'DWH
0RGXOH1DPHV
9HQGRU1DPH
9HUVLRQ,QIRUPDWLRQ
$HJLV6HFXUH.H\\
&U\\SWRJUDSKLF0RGXOH
$SULFRUQ,QF
+DUGZDUH9HUVLRQ5HY')LUPZDUH
9HUVLRQ
6\\PDQWHF3*3&U\\SWRJUDSKLF
(QJLQH
6\\PDQWHF&RUSRUDWLRQ
6RIWZDUH9HUVLRQ
&LHQD3DFNHW2SWLFDO
3ODWIRUP[*
&LHQD&RUSRUDWLRQ
+DUGZDUH9HUVLRQ)LUPZDUH
9HUVLRQ
6DPVXQJ8)68QLYHUVDO)ODVK
6WRUDJH6KDUN6('
6DPVXQJ(OHFWURQLFV&R/WG
+DUGZDUH9HUVLRQV./8$**%'
%%./8%**%'%%
./8&**%'%%)LUPZDUH
9HUVLRQ
3DJHRI
KWWSFVUFQLVWJRYJURXSV670FPYSGRFXPHQWVYDODOOKWP
&HUWLILFDWH
9DOLGDWLRQ
0RGXOH1DPHV
9HQGRU1DPH
9HUVLRQ,QIRUPDWLRQ
1XPEHU
3RVWLQJ'DWH
%URFDGH0/;H%URFDGH
%URFDGH&RPPXQLFDWLRQV
1HW,URQ&(5(WKHUQHW
6\\VWHPV,QF
5RXWHUVDQG%URFDGH&(6
5RXWHUVDQG6ZLWFKHV
+DUGZDUH9HUVLRQV^>%50/;(
050$&31
%50/;(050'&31
%50/;(050
$&31%5
0/;(050'&31
%50/;(050
$&31%5
0/;(050'&31
%50/;(050
$&31%5
0/;(050'&31
%50/;(050
$&31%5
0/;(050'&31
%50/;(050
$&31%5
0/;(050'&31
@ZLWK&RPSRQHQW31V
1,&(5)
$'935(0$&31
1,&(5)$'935(0'&
311,&(5
);$'935(0$&31
1,&(5);
$'935(0'&31
1,&(5)$'935(0$&
311,&(5
)$'935(0'&31
1,&(5&
$'935(0$&31
1,&(5&$'935(0'&
311,&(5
&$'935(0$&31
3DJHRI
KWWSFVUFQLVWJRYJURXSV670FPYSGRFXPHQWVYDODOOKWP
&HUWLILFDWH
1XPEHU
9DOLGDWLRQ
3RVWLQJ'DWH
0RGXOH1DPHV
9HQGRU1DPH
9HUVLRQ,QIRUPDWLRQ
1,&(5&
$'935(0'&31
1,&(5&;$'935(0
$&311,&(5
&;$'935(0'&31
%5&(5);
57'&31%5
&(5&;57'&31
%5&(5);
57$&31%5
&(5&;57$&31
1,&(5&
;*31%5
&(6&;$&31
%5&(6&;
'&31%5&(6
);$&31
%5&(6);'&31
53631
DQG536'&31
`ZLWK),36.LW;%5
)LUPZDUH9HUVLRQ0XOWL
6HUYLFH,URQ:DUH5
+*678OWUDVWDU.7&*
(QWHUSULVH+V
+*67,QF
+DUGZDUH9HUVLRQV31V
+86$/
+86$/
+86$/
+86$/
+86$/
+86$/
+86$/
+86$/
+86$/
+86$/
)LUPZDUH9HUVLRQ5
+39LUWXDO&RQQHFW*E3RUW
)&0RGXOH
+HZOHWW3DFNDUG&RPSDQ\\
+DUGZDUH9HUVLRQ
5HY&)LUPZDUH
9HUVLRQ9&
3DJHRI
KWWSFVUFQLVWJRYJURXSV670FPYSGRFXPHQWVYDODOOKWP
&HUWLILFDWH
9DOLGDWLRQ
0RGXOH1DPHV
9HQGRU1DPH
9HUVLRQ,QIRUPDWLRQ
1XPEHU
3RVWLQJ'DWH
%URFDGH'&;'&;'&;
%URFDGH&RPPXQLFDWLRQV
6DQG'&;%DFNERQHV
6\\VWHPV,QF
)&6ZLWFK)&6ZLWFK
DQG([WHQVLRQ6ZLWFK
+DUGZDUH9HUVLRQV^>'&;
%DFNERQH31V
DQG
'&;6%DFNERQH
31V
DQG
'&;%DFNERQH31V
DQG
'&;%DFNERQH31V
DQG@
ZLWK%ODGHV31V
DQG
)&6ZLWFK31V
DQG
)&6ZLWFK
31V
([WHQVLRQ
6ZLWFK31V
DQG
`ZLWK),36.LW31
%URFDGH;%5)LUPZDUH
9HUVLRQ)DEULF26Y31
0$&(
0RWRUROD6ROXWLRQV,QF
+DUGZDUH9HUVLRQ31$7=
)LUPZDUH9HUVLRQ5
3DJHRI
KWWSFVUFQLVWJRYJURXSV670FPYSGRFXPHQWVYDODOOKWP
&HUWLILFDWH
1XPEHU
9DOLGDWLRQ
3RVWLQJ'DWH
0RGXOH1DPHV
9HQGRU1DPH
9HUVLRQ,QIRUPDWLRQ
+LWDFKL9LUWXDO6WRUDJH3ODWIRUP
963(QFU\\SWLRQ(QJLQH
+LWDFKL/WG
+DUGZDUH9HUVLRQ5/
)LUPZDUH9HUVLRQDQG
+3;3(QFU\\SWLRQ5HDG\\'LVN
$GDSWHUH'.$/HYHO
+HZOHWW3DFNDUG&RPSDQ\\
+DUGZDUH9HUVLRQ5/
)LUPZDUH9HUVLRQDQG
,26&RPPRQ&U\\SWRJUDSKLF
0RGXOH,&05HO
&LVFR6\\VWHP,QF
)LUPZDUH9HUVLRQ5HO
3DJHRI