2016 Symantec Corporation This document may be freely reproduced & distributed whole & intact including this copyright
notice.
41
KEK0 and KEK1 are derived from the PIN using the FIPS approved Password
Based Key Derivation Function (PBKDF) defined in PKCS#5 v2.0; details are
provided in NIST Special Publication 800-132. PBKDFv2 is implemented with
HMAC-SHA-1, has its Iteration Count set to 5,000, and a 136 bit salt length
(greater than the minimum is 128).
The PIN contains between 8 and 16 characters (when set using the guidance
provided) that can be upper or lower case alphabetic characters or the “space”
character. Keys derived from the PIN are only used for storage applications.
According to NIST Special Publication 800-63 the strength of the human-generated
PIN is between 18 bits and 30 bits. Thus, the probability of a random guess is
between 1 in 262,144 (for 8 characters) and 1 in 1,073,741,824 (for 16 characters)).
During the bootstrap process, a set of AES 256 bit master keys are created using
the internal DRBG. Master keys are encrypted with KEK1 and stored internally.
The master keys are used to encrypt AES 256 bit object keys. Object keys are
created using the internal DRBG and are used to encrypt data and keys for
storage. Object keys are created during the bootstrap process and as needed
during normal operations. Object keys are stored internally.
2.9 Self Tests
The SV3800/SV3800B/SV38000B-20 performs the following Power On Self Tests
(POST):
•
Firmware (software) integrity tests check critical O/S components and
appliance software binaries using RSA signature verification (2048 bit,
SHA-256)
•
AES encrypt/decrypt known answer tests (KAT) on software bulk ciphers
(128 bit, CBC mode)
•
AES encrypt/decrypt known answer tests (KAT) on software bulk ciphers
(128 bit, GCM mode)
•
AES encrypt/decrypt known answer tests (KAT) on software bulk ciphers
(128 bit, CFB128 mode)
•
Triple-DES encrypt/decrypt known answer tests (KAT) on software bulk
ciphers (keying option 1)
•
RSA known answer tests (KAT) on software signature operations (sign
and verify) using the following digests (2048 bit PKCS#1 1.5)
•
SHA-1 (verify only)
• SHA-224
• SHA-256
• SHA-384
• SHA-512
•
RSA known answer tests (KAT) on both NFPs hardware signature
operations (sign and verify) using the following digests (2048 bit)
•
SHA-1 (verify only)
• SHA-224