User's Manual
Table Of Contents
- Table of Contents
- List of Tables
- List of Figures
- Preface
- Introduction and Overview
- Installation
- Job Done Examples
- Settings and Commands
- Performance Monitoring, Testing, andTroubleshooting
- Firmware and Manual Versions
- SEL3044 Encryption Card
SEL-3031 Instruction Manual Date Code 20091009
SEL-3044 Encryption Card
Theory of Operation—SEL Protocol
B.2
Protection of a cryptographic module within a security system is necessary to maintain
the confidentiality and integrity of the information protected by the module.
FIPS 140-2 Level 2 covers areas related to the secure design and implementation of
a cryptographic module.
These areas include the following:
➤ Cryptographic module specification
➤ Cryptographic module ports and interfaces
➤ Roles, services, and authentication
➤ Finite state model
➤ Physical security
➤ Operational environment
➤ Cryptographic key management
➤ Electromagnetic interference/electromagnetic compatibility
(EMI/EMC)
➤ Self-tests
➤ Design assurance
➤ Mitigation of other attacks
The SEL-3044 meets FIPS 140-2 Level 2 requirements and has been submitted for
FIPS 140-2 Level 2 security validation. The status is currently pending NIST approval.
This level of data security provides assurance that best practices have been applied to
the design, testing, and manufacturing of the SEL-3044.
Theory of Operation—SEL Protocol
Encryption Components
A cryptographic device consists of three components: encryption algorithm, key
management, and device security functions.
Encryption Algorithm
The Advanced Encryption Standard (AES) algorithm with a key length of 256 bits is
implemented in the SEL-3044. This algorithm is a secure means of encrypting data.
The AES algorithm and key length provide proven resistance to modern cryptanalysis.