Page 9 of 17
© Copyright 2006 Lexmark International Inc.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
Operational Environment
The operational environment is non-modifiable and thus not applicable for this
firmware module. The PrintCryption module runs on the Linux OS, and
configured for single-user mode by default. The operating system is used as an
embedded OS within the Lexmark printers, and there is no direct access to the OS
provided.
Cryptographic Key Management
The module implements the following FIPS-approved algorithms.
•
AES ECB, CBC mode decryption – FIPS 197 (certificate #273, #274,
#275, #276, #277, and #452)
•
Deterministic Random Number Generator (RNG) – Appendix A.2.4 of
ANSI X9.31 (certificate #100, #101, #102, #103, #104, and #237)
•
HMAC – FIPS 198 (certificate #89, #90, #91, #92, #93, and #215)
•
RSA (sign/verify) – PKCS#1 (certificate #73, #74, #75, #76, #77, and
#171)
•
SHS– FIPS 180-2 (certificate #350, #351, #352, #353, #354, and #515)
•
TDES 2 key ECB mode encryption/decryption – FIPS 46-3 (certificate
#356, #357, #358, #359, #360, and #470) (Note: The FIPS approved
X9.31 Appendix A.2.4 PRNG utilizes 2 key TDES algorithm).
Additionally, the module utilizes the following non-FIPS-approved algorithm
implementation:
•
RSA Key Wrapping (PKCS #1): Key establishment method uses a 1024-
bit key length providing 80-bits of security.
The module supports the following critical security parameters:
Key or CSP
Key type
Generation
Storage
Use
AES Session Key
128, 192, 256
bits AES key
Externally generated. Imported in
encrypted form (RSA key transport)
Held in volatile
memory in plaintext.
Zerorized after the
session is closed or
on reboot.
Decrypts input data
for printing
RSA Public Key
1024 bit RSA
public key (80-
bits of
security)
Internally generated using PKCS#1
key generation mechanism
Stored on flash in
plaintext. Zerorized
by overwriting the
flash image.
Key transport