background image

 

Page 9 of 17 

© Copyright 2006 Lexmark International Inc. 

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

  

 

Operational Environment 

The operational environment is non-modifiable and thus not applicable for this 
firmware module. The PrintCryption module runs on the Linux OS, and 
configured for single-user mode by default. The operating system is used as an 
embedded OS within the Lexmark printers, and there is no direct access to the OS 
provided. 

Cryptographic Key Management 

The module implements the following FIPS-approved algorithms. 
 

 

AES ECB, CBC mode decryption – FIPS 197 (certificate #273, #274, 
#275, #276, #277, and #452) 

 

 

Deterministic Random Number Generator (RNG)  – Appendix A.2.4 of 
ANSI X9.31 (certificate #100, #101, #102, #103, #104, and #237) 

 

HMAC – FIPS 198 (certificate #89, #90, #91, #92, #93, and #215) 

 

RSA  (sign/verify) – PKCS#1 (certificate #73, #74, #75, #76, #77, and 
#171) 

 

SHS– FIPS 180-2 (certificate #350, #351, #352, #353, #354, and #515) 

 

TDES 2 key ECB mode encryption/decryption – FIPS 46-3 (certificate 
#356, #357, #358, #359, #360, and #470) (Note: The FIPS approved 
X9.31 Appendix A.2.4 PRNG utilizes 2 key TDES algorithm). 

Additionally, the module utilizes the following non-FIPS-approved algorithm 
implementation: 

 

RSA Key Wrapping (PKCS #1): Key establishment method uses a 1024-
bit key length providing 80-bits of security. 

The module supports the following critical security parameters: 

Key or CSP 

Key type 

Generation 

Storage 

Use 

AES Session Key 

128, 192, 256 
bits AES key 

Externally generated. Imported in 
encrypted form (RSA key transport) 

Held in volatile 
memory in plaintext. 
Zerorized after the 
session is closed or 
on reboot. 

Decrypts input data 
for printing 

RSA Public Key 

1024 bit RSA 
public key (80-
bits of 
security) 

Internally generated using PKCS#1 
key generation mechanism 

Stored on flash in 
plaintext. Zerorized 
by overwriting the 
flash image.  

Key transport 

Summary of Contents for 10G0149 - PrintCryption Card Encryption Module

Page 1: ...nc This document may be freely reproduced and distributed whole and intact including this Copyright Notice Lexmark PrintCryptionTM Firmware Version 1 3 1 FIPS 140 2 Non Proprietary Security Policy Lev...

Page 2: ...NTM 4 OVERVIEW 4 MODULE SPECIFICATION 4 MODULE INTERFACES 6 ROLES AND SERVICES 7 Crypto Officer Role 7 User Role 8 PHYSICAL SECURITY 8 OPERATIONAL ENVIRONMENT 9 CRYPTOGRAPHIC KEY MANAGEMENT 9 Access C...

Page 3: ...exmark PrintCryptionTM is referred to in this document as PrintCryption PrintCryption module cryptographic module firmware module or module References This document deals only with operations and capa...

Page 4: ...the confidential document to be printed This new level of printing security is ideal for industries that commonly handle sensitive or personal information such as financial institutions government ag...

Page 5: ...1 4 Finite State Model 1 5 Physical Security 1 6 Operational Environment N A 7 Cryptographic Key Management 1 8 EMI EMC 1 9 Self tests 1 10 Design Assurance 1 11 Mitigation of Other Attacks N A Table...

Page 6: ...e network port parallel port USB port paper exit port multipurpose feeder LED and LCD display Since all of the module s services are server processes the logical interfaces of the module are network p...

Page 7: ...Log File LED LCD Display Network Ethernet 10 100 Port USB Port Parallel Port Status Output Interface Not Applicable Power Plug Power Connector Power Interface Table 2 FIPS 140 2 Logical Interfaces Rol...

Page 8: ...o CSP Public Key request Users request for printers public key The module generates a key pair if needed Public Key Request PKR at network port 9150 X 509 certificate RSA public key Read Write Secure...

Page 9: ...15 RSA sign verify PKCS 1 certificate 73 74 75 76 77 and 171 SHS FIPS 180 2 certificate 350 351 352 353 354 and 515 TDES 2 key ECB mode encryption decryption FIPS 46 3 certificate 356 357 358 359 360...

Page 10: ...ey is generated internally is 1024 bits RSA key pair using PKCS 1 compliant key generation techniques FIPS approved PRNG X9 31 Appendix A 2 4 is used to seed the RSA key generation mechanism AES Sessi...

Page 11: ...ncrypt Decrypt pair wise consistency check If any of these self tests fail the module will output an error indicator and enter an error state Design Assurance Source code and associated documentation...

Page 12: ...he page Note This Page is needed for later use c Configure the printer onto the TCP IP network per installation requirements If the printer is behind a firewall it must allow IP ports 9150 and 9152 to...

Page 13: ...a menu settings page Compare these settings to those on the page printed in step 1 7 Place the Option Added label on the printer next to the printer model and serial number label Lexmark provides the...

Page 14: ...though outside the boundary of the module the User should be careful to use secured printing services as needed Uses can select the AES encryption key length block length and mode using the printer pr...

Page 15: ...distributed whole and intact including this Copyright Notice Figure 4 Configuring a Secure Port Users must choose the key size and block size approved in FIPS PUB 197 standard FIPS approved key and bl...

Page 16: ...rs to determine The Lexmark PrintCryption Card is installed The network path exists even through a firewall and when ping command does not work The proper IP ports 9150 and 9152 are open The printer i...

Page 17: ...EMI Electromagnetic Interference FCC Federal Communication Commission FIPS Federal Information Processing Standard HMAC Keyed Hash MAC HTTP Hypertext Transfer Protocol IP Internet Protocol KAT Known...

Reviews: