
Aruba AP-5XX Wireless Access Points with ArubaOS FIPS Firmware FIPS 140-2 Level 2 Security Policy |35
Table 12 - CSPs/Keys Used in the Module
8
Diffie-Hellman
Shared Secret
Diffie-Hellman
Group 14
(2048 bits)
Established during Diffie-
Hellman Exchange. Used for
deriving IPSec/IKE
cryptographic keys.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module.
9
EC Diffie-Hellman
Private Key
EC Diffie-Hellman
(Curves: P-256 or
P-384)
Generated internally by calling
FIPS Approved DRBG (Cert.
#
C1253
) during EC Diffie-
Hellman Exchange. Used for
establishing EC Diffie-Hellman
Shared Secret.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module.
10
EC Diffie-Hellman
Public Key
EC Diffie-Hellman
(Curves: P-256 or
P-384)
Derived internally in
compliance with EC Diffie-
Hellman key agreement
scheme. Used for establishing
EC Diffie-Hellman Shared
Secret.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module.
11
EC Diffie-Hellman
Shared Secret
EC Diffie-Hellman
(Curves: P-256 or
P-384)
Established during EC Diffie-
Hellman Exchange. Used for
deriving IPSec/IKE
cryptographic keys.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module.
12
Factory CA Public
Key
RSA
(2048 bits)
This is RSA public key.
Loaded into the module during
manufacturing. Used for
Firmware verification.
Stored in TPM.
Since this is a public
key, the zeroization
requirements do not
apply.
IPSec/IKE
13
SKEYSEED
Shared Secret
(160/256/384 bits)
A shared secret known only to
IKEv2 peers. It was derived
via key derivation function
defined in SP800-135 KDF
(IKEv2) and it will be used for
deriving other keys in IKEv2
protocol.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module.
14
IKE Session
Authentication Key
HMAC-SHA-
1/256/384
(160/256/384 bits)
The IKE session (IKE Phase I)
authentication key. This key is
derived via key derivation
function defined in SP800-135
KDF (IKEv2). Used for IKEv2
payload integrity verification.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module.
15
IKE Session
Encryption Key
AES (CBC)
(128/192/256 bits)
The IKE session (IKE Phase I)
encrypt key. This key is
derived via key derivation
function defined in SP800-135
KDF (IKEv2). Used for IKE
payload protection.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module.