NLS2017085, Use of Encryption Software for Electronic Transmission of Safeguards Information

From kanterella
(Redirected from NLS2017085)
Jump to navigation Jump to search
Use of Encryption Software for Electronic Transmission of Safeguards Information
ML17264A069
Person / Time
Site: Cooper Entergy icon.png
Issue date: 09/13/2017
From: Dent J
Nebraska Public Power District (NPPD)
To:
Document Control Desk, Office of Nuclear Security and Incident Response
References
NLS2017085
Download: ML17264A069 (11)


Text

H Nebraska Public Power District Always there when you need us NLS2017085 73.22 September 13, 2017 U.S. Nuclear Regulatory Commission Attention:. Document Control Desk Director, Division of Security Policy Office of Nuclear Security and Incident Response Washington, D.C. 20555-0001 *

Subject:

Use of Encryption Software for Electronic Transmission of Safeguards Information Cooper Nuclear Station, Docket 50-298, DPR-46

Reference:

NRC Regulatory Issue Summary 2002-15, Revision 1, "NRC Approval of Commercial Data Encryption Products for the Electronic Transmission of Safeguards Information," dated January 26, 2006

Dear Sir or Madam:

Pursuant to the requirements of 10 CFR 73.22(+/-)(3) and the guidance in Nuclear Regulatory Commission (NRC) Regulatory Issue Summary 2002-15, Revision 1 (Reference), Nebraska Public Power District (NPPD) requests approval to process and transmit Safeguards Information (SGI) using Symantec Endpoint Encryption by PGP Technology, 11.1, or the latest validated version. This version of encryption product was developed with Symantec PGP Cryptographic Engine, Software Version 4.3. The National Institute of Standards and Technology (NIST)

Certificate 2377 validates compliance with Federal Information Processing Standard (FIPS) 140-2 requirements. FIPS Certificate 2377 is included in Consolidated Certificate No. 0053

. found on the NIST website and provided in the Enclosure to this letter.

Jerry Bebb, Security Manager at Cooper Nuclear Station, is responsible for overall implementation of the SGI encryption program at NPPD.

  • This letter makes no regulatory commitments.

Should you have any questions or require additional information, please contact Mr. Bebb at (402) 825-5244.

COOPER NUCLEAR STATION P.O. Box 98 /Brownville, NE 68321-0098 Telephone: (402) 825-3811 /Fax: (402) 825-5211 www.nppd.com

NLS2017085 Page 2 of2 Sincerely,

~

~Jr Vice President - Nuclear and Chief Nuclear Officer

/lb

Enclosure:

FIPS 140-2 Consolidated Validation Certificate No. 0053 cc: Regional Administrator w/enclosure USNRC - Region IV Cooper Project Manager w/enclosure USNRC - NRR Plant Licensing Branch IV

. Senior Resident Inspector w/enclosure USNRC-CNS NPG Distribution w/o enclosure CNS Records w/enclosure

NLS2017085 Enclosure Page 1 of9 FIPS 140-2 CONSOLIDATED VALIDATION CERTIFICATE NO. 0053

__J

FIPS 140-2 Consolidated Validation Certificate The National Institute of Standards The Communications Security and Technology of the United States EstabHshment of the Government of America of Canada Consolidated Certificate No. 0053 The National Institute of Standards and Technology, as the United States FIPS 140-2 Cryptographic Module Validation Authority; and the Communications Security Establishment Canada, as the Canadian FIPS 140-2 Cryptographic Module Validation Authority; hereby validate the FIPS 140-2 t~sting results of the cryptographic modules listed below in accordance with the Derived Test Requirements for FIPS 140-2, Security Requirements for Cryptographic Modules. FIPS 140-2 specifies the security requirements that are to be satisfied by a cryptographic module utilized within a security system protecting Sensitive Information (United States) or Protected Information (Canada) within computer and telecommunications systems (including voice systems).

Products which use a cryptographic module identified below may be labeled as complying with the requirements of FIPS 140-2 so long as the product, throughout its life-cycle, continues to use the validated version of the cryptographic module as specified in this consolidated certificate.

The validation report contains additional details concerning test results. No reRability test has been performed and no warranty of the products by both agencies is either expressed or implied.

FIPS 140-2 provides four increasing, qualitative levels of securify: Level 1, Level 2, Level 3, and Level 4. These levels are intended to cover the wide range and potential applications and environments in which cryptographic modules may be employed. The security requirements cover eleven areas related to the secure design and implementation of a cryptographic module.

The scope of conformance achieved by the cryptographic modules as tested are identified and listed on the Cryptographic Module Validation Program website. The website listing is the official list of validated cryptographic modules. Each validation entry corresponds to a uniquely assigned certificate number. Associated with each certificate number is the module name(s), module versioning information, applicable caveats, module type, date of initial validation and applicable revisions, Overall Level, individual Levels if different than the Overall Level, FIPS-approved and other algorithms, vendor contact information, a vendor provided description and the accredited Cryptographic Module Testing laboratory which performed the testing.

Si.gned on behalf _ he Gov;.r?m~ of Canada Signature: .* ** ~

Dated: '5 'l'\..;_9g:.. 2..o~ c; Chief, Computer Security Division Director, Architecture and Technology Assurance National Institute of Standards and Technology Communications Security Establishment Canada TM A.Cttrll'~t!Cll ~rti.dMST.lfthendonrict*rnaly~OO>>a~lbyNlST O'lttUS r..'1Ca,,acun~:'m'111ms.

. -* ;*,: 7*"~~*1;-JJ<:!~,,,,,

~ ""_.,,:..,;;;,,,.~.~

Page 1 of8 6/1/2015

httr,r//csrc.nist.gov/grougs/STM/cmvg/docu ments/140-1 /140val-all .htm Certificate Validation I Module Name(s) Vendor Name Version Information Number Posting Date 2356 05/19/2015 Kernel Mode Cryptographic Microsoft Corporation Software Versions: 6.3.9600 and Primitives Library (cng.sys) in 6.3.9600.17042 Microsoft Windows 8.1 Enterprise, Windows Server 2012 R2, Windows Storage Server 2012 R2, Surface Pro 3, Surface Pro 2, Surface Pro, Surface 2, Surface, Windows RT 8.1, Windows Phone 8.1, Windows Embedded 8.1 Industry Enterprise, StorSimple 8000 Series 2365 5/4/2015 Cisco Systems 5508 Wireless LAN Cisco Systems, Inc. Hardware Version: 5508 with 5508 Controller FIPS kit (AIR-CT5508FIPSKIT=)

and CN56XX; Firmware Version:

8.0 with SNMP Stack v15.3, OPENSSL-0.9.8g-8.0.0, QUICKSEC-2.0-8.0 and FP-CRYPT0-7.0.0 2366 5/4/2015 FortiGate-60C/600/80C and Fortinet, Inc. Hardware Versions: C40M93 [1],

FortiWiFi-60C/600 C1AB28 [2], C4BC61[3], C40M95

[4], and C1AB32 [5] with Tamper Evident Seal Kits: FIPS-SEAL-BLUE [3] or FIPS-SEAL-REO

[1,2,4,5]; Firmware Version: 5.0, build0305, 141216 2367 5/4/2015 FortiGate-1000, FortiGate-200B, Fortinet, Inc. Hardware Versions: C4LL40 [1 ],

FortiGate-2000, FortiGate-300C, C4C024 [2], C4KV72 [3], C4HY50 FortiGate-600C and FortiGate-800C [4], C4HZ51 [5] and C4LH81 [6] with Tamper Evident Seal Kits: FIPS-SEAL-BLUE [2] or FIPS-SEAL-REO

[1,3,4,5,6]; Firmware Version: 5.0, build0305, 141216 2368 5/4/2015 FortiGate-1 OOOC, FortiGate-1240B, Fortinet, Inc. Hardware Versions: C4HR40 [1 ],

FortiGate-3140B and FortiGate- C4CN43 [2], C4XC55 [3] and 3240C C4KC75 [4] with Tamper Evident Seal Kits: FIPS-SEAL-REO [1,3,4]

or FIPS-SEAL-BLUE [2]; Firmware Version: FortiOS 5.0, build0305, 141216 Page 2 of 8 6/1/2015

htt12://csrc. nist.gov/grou12s/STM/cmv12/documents/140-1 /140val-all. htm Certificate Validation I Module Name(s) Vendor Name Version Information Number Posting Date 2369 5/4/2015 FortiGate-1500D and 3700D Fortinet, Inc. Hardware Versions: C1AA64 [1] and C1AA92 [2] with Tamper Evident Seal Kits: FIPS-SEAL-RED [1,2];

Firmware Version: FortiOS 5.0, build0305, 141216 2370 5/4/2015 FortiOS' 5.0 Fortinet, Inc. Firmware Version: 5.0, build0305, 141216 2371 5/4/2015 FortiGate-3600C and FortiGate- Fortinet, Inc. Hardware Versions: C4MH12, 3950B [C4DE23 with P06698-02] with Tamper Evident Seal Kits: FIPS-SEAL-RED; Firmware Version:

FortiOS 5.0, build0305,141216 2372 05/05/2015 FortiGate-5140B Chassis with Fortinet, Inc. Hardware Version: Chassis:

FortiGate/FortiSwitch 5000 Series P09297-01; Blades: P4CJ36-04, Blades P4EV74, C4LG17 and P4EX84; AMC Component: P4FC12; Air Filter: PN P10938-01; Front Filler Panel: PN P10945-01: ten; Rear Filler Panel: PN P10946-01:

fourteen; Tamper Evident Seal Kit:

FIPS-SEAL-RED; Firmware Version: FortiOS 5.0, build0305, 141216 2373 05/05/2015 Neopost Postal Security Device Neopost Technologies, S.A. Hardware Version: A0014227-B; (PSD) Firmware Version: a30.00; P/N:

A0038091-A 2374 05/08/2015 Avaya WLAN 9100 Access Points Avaya Inc. Hardware Versions: P/Ns WA0912200-E6GS [1],

WAP913200-E6GS [2],

WAP913300-E6GS [2],

WAP917300-E6GS [2]; Enclosure (Form Factor): WA0912200-E6GS

[1], WAB910003-E6 [2]; SKU WLB910001-E6; Firmware Version:

AOS-7.1 2375 05/20/2015 HP P-Class Smart Array RAID Hewlett-Packard Development Hardware Versions: P230i, P430, Controllers Company, LP. P431, P731 m, P830, and P830i; Firmware Version: 1.66 Page 3 of 8 6/1/2015

http://csrc.nist.gov/groups/STM/cmvp/documents/140-1 /140val-all. htm Certificate Validation I Module Name(s) Vendor Name Version Information Number Posting Date 2376 05/21/2015 Aegis Secure Key 3.0 Apricorn Inc. Hardware Version: RevD; Firmware Cryptographic Module Version: 6.5 2377 5/21/2015 Symantec PGP Cryptographic Symantec Corporation Software Version: 4.3 Engine 2379 05/21/2015 Ciena 6500 Packet-Optical Ciena Corporation Hardware Version: 1.0; Firmware Platform 4x1 OG Version: 1.10 2380 05/21/2015 Samsung UFS (Universal Flash Samsung Electronics Co., Ltd. Hardware Versions: KLUAG2G18D-Storage) Shark SED 8082, KLU8G4G180-8081 I KLUCG8G180-8081; Firmware Version: 0102 Page 4 of 8 6/1/2015

_J

http://csrc.nist.gov/groups/STM/cmvp/docu ments/140-1 /140va I-all. htm Certificate Validation I Module Name(s) Vendor Name Version Information Number Posting Date 2381 05/21 /2015 Brocade MLXe, Brocade Brocade Communications Hardware Versions: {[BR-MLXE Netlron CER 2000 Ethernet Systems, Inc. MR-M-AC (P/N: 80-1006853-01),

Routers and Brocade CES 2000 BR-MLXE-4-MR-M-DC (P/N: 80-Routers and Switches 1006854-01 ), BR-MLXE-8-MR-M-AC (P/N: 80-1004809-04), BR-MLXE-8-MR-M-DC (P/N: 80-1004811-04), BR-MLXE-16-MR-M-AC (P/N: 80-1006820-02), BR-MLXE-16-MR-M-DC (P/N: 80-1006822-02), BR-MLXE-4-MR2-M-AC (P/N: 80-1006870-01 ), BR-MLXE-4-MR2-M-DC (P/N: 80-1006872-01 ), BR-MLXE-8-MR2-M-AC (P/N: 80-1007225-01), BR-MLXE-8-MR2-M-DC (P/N: 80-1007226-01 ), BR-MLXE-16-MR2-M-AC (P/N: 80-1006827-02), BR-MLXE-16-MR2-M-DC (P/N: 80-1006828-02)] with Component P/Ns 80-1006778-01, 80-1005643-01, 80-1003891-02, 80-1002983-01,80-1003971-01,80-1003972-01, 80-1003811-02, 80-1002756-03, 80-1004114-01,80-1004113-01,80-1004112-01, 80-1004760-02, 80-1006511-02, 80-1004757-02, 80-1003009-01, 80-1003052-01, 80-1003053-01, Nl-CER-2048F-ADVPREM-AC (P/N: 80-1003769-07), Nl-CER-2048F-ADVPREM-DC (P/N: 80-1003770-08), Nl-CER-2048FX-ADVPREM-AC (P/N: 80-1003771-07), Nl-CER-2048FX-ADVPREM-DC (P/N: 80-1003772-08), Nl-CER-2024F-ADVPREM-AC (P/N: 80-1006902-02), Nl-CER-2024F-ADVPREM-DC (P/N: 80-1006904-02), Nl-CER-2024C-ADVPREM-AC (P/N: 80-1007032-02), Nl-CER-2024C-ADVPREM-DC (P/N: 80-1007034-02), Nl-CER-2048C-ADVPREM-AC (P/N: 80-Page 5 of 8 6/1/2015

httg://csrc.nist.gov/grougs/STM/cmvg/documents/140-1/140val-all.htm Certificate Validation I Module Name(s) Vendor Name Version Information Number Posting Date 1007039-02), Nl-CER-2048C-ADVPREM-DC (P/N: 80-1007040-02), Nl-CER-2048CX-ADVPREM-AC (P/N: 80-1007041-02), Nl-CER-2048CX-ADVPREM-DC (P/N: 80-1007042-02), BR-CER-2024F-4X-RT-DC (P/N: 80-1007212-01), BR-CER-2024C-4X-RT-DC (P/N: 80-1007213-01 ), BR-CER-2024F-4X-RT-AC (P/N: 80-1006529-01 ), BR-CER-2024C-4X-RT-AC (P/N: 80-1006530-01 ), Nl-CER-2024C-2X10G (P/N: 80-1003719-03), BR-CES-2024C-4X-AC (P/N: 80-1000077-01 ), BR-CES-2024C-4X-DC (PIN: 80-1007215-01), BR-CES-2024F-4X-AC (P/N: 80-1000037-01 ), BR-CES-2024F-4X-DC (P/N:

80-1007214-01), RPS9 (P/N: 80-1003868-01) and RPS9DC (P/N: 80-1003869-02)} with FIPS Kit XBR-000195; Firmware Version: Multi-Service Ironware R05.7.00 2382 05/21/2015 HGST Ultrastar 7K6000 TCG HGST, Inc. Hardware Versions: P/Ns Enterprise HDDs HUS726060AL5215 (0001 );

HUS726060AL4215 (0001 );

HUS726050AL5215 (0001 );

HUS726050AL4215 (0001 );

HUS726040AL5215 (0001 );

HUS726040AL4215 (0001 );

HUS726030AL5215 (0001 );

HUS726030AL4215 (0001 );

HUS726020AL5215 (0001);

HUS726020AL4215 (0001);

Firmware Version: R519 2383 05/21/2015 HP Virtual Connect 16Gb 24-Port Hewlett-Packard Company Hardware Version: 40-1000779-08 FC Module Rev C (80-1007799-04); Firmware Version: VC 4.40 Page 6 of 8 6/1/2015

httg://csrc.nist.gov/grougs/STM/cmvg/documents/140-1 /140val-all .htm Certificate Validation I Module Name(s) Vendor Name Version Information Number Posting Date 2384 05/21/2015 Brocade DCX, DCX 8510-8, DCX- Brocade Communications Hardware Versions: {[DCX 4S and DCX 8510-4 Backbones, Systems, Inc. Backbone (P/Ns 80-1001064-10, 80-6510 FC Switch, 6520 FC Switch 1006751-01, 80-1004920-04 and 80-and 7800 Extension Switch 1006752-01 ), DCX-4S Backbone (P/Ns 80-1002071-10, 80-1006773-01, 80-1002066-10 and 80-1006772-01 ), DCX 8510-4 Backbone (P/Ns 80-1004697 -04, 80-1006963-01, 80-1005158-04 and 80-1006964-01 ),

DCX 8510-8 Backbone (P/Ns 80-1004917-04 and 80-1007025-01)]

with Blades (P/Ns 80-1001070-07, 80-1006794-01, 80-1004897-01, 80-1004898-01, 80-1002000-02, 80-1006771-01, 80-1001071-02, 80-1006750-01, 80-1005166-02, 80-1005187-02, 80-1001066-01, 80-1006936-01, 80-1001067-01, 80-1006779-01, 80-1001453-01, 80-1006823-01, 80-1003887-01, 80-1007000-01, 80-1002839-03, 80-1007017-01, 49-1000016-04, 49-1000064-02 and 49-1000294-05),

6510 FC Switch (P/Ns 80-1005232-03, 80-1005267-03, 80-1005268-03, 80-1005269-03, 80-1005271-03 and 80-1005272-03), 6520 FC Switch (P/Ns 80-1007245-03, 80-1007246-03, 80-1007242-03, 80-1007244-03, 80~1007257-03), 7800 Extension Switch (P/Ns 80-1002607-07, 80-1006977-02,80-1002608-07, 80-1006980-02, 80-1002609-07 and 80-1006979-02)} with FIPS Kit P/N Brocade XBR-000195; Firmware Version: Fabric OS v7.2.1 (P/N 63-1001421-01) 2385 05/22/2015 µMACE Motorola Solutions, Inc. Hardware Version: P/N AT58Z04; Firmware Version: R01.07.01 Page 7 of 8 6/1/2015

http://csrc.nist.gov/groups/STM/cmvp/documents/140-1 /140val-all .htm Certificate Validation I Module Name(s) Vendor Name Version Information Number Posting Date 2386 05/22/2015 Hitachi Virtual Storage Platform Hitachi, Ltd. Hardware Version: R800L 1; (VSP) Encryption Engine Firmware Version: 02.09.28.00 and 02.09.32.00 2387 05/22/2015 HP XP7 Encryption Ready Disk Hewlett-Packard Company Hardware Version: R800L 1; Adapter (eDKA) Level1 Firmware Version: 02.09.28.00 and 02.09.32.00 2388 05/28/2015 IOS Common Cryptographic Cisco System, Inc. Firmware Version: Rel 5 Module (IC2M) Rel5 Page 8 of 8 6/1/2015