
Page 35 of 51
© Copyright 2017 Oracle Corporation
This document may be freely reproduced and distributed whole and intact including this Copyright notice.
Key
Key Type
Generation / Input
Output
Storage
Zeroization
Use
SSH_HOST_PUB
RSA 2048-bit Public
Key
ECDSA P256 Curve
Public Key
Generated internally
via Approved DRBG
Output plaintext
Plaintext in
EEPROM
“Reset” service;
Power cycle;
Switch Approved
Mode
SSH Authentication
SSH_SK
AES CTR 128-bit
AES CBC 128-bit
Generated internally
via SSH PRF
Output encrypted via
DEKey
Plaintext in RAM
“Reset” service;
Power cycle;
Switch Approved
Mode
SSH Session Keys
(per SSH 2.0)
SSH_SA
HMAC SHA-1 (112-
bits)
Generated internally
via SSH PRF
Output encrypted via
DEKey
Plaintext in RAM
“Reset” service;
Power cycle;
Switch Approved
Mode
SSH Session integrity
Keys
(per SSH 2.0)
SSH_KEX_PRI
ECDH P-256 Curve
(128-bits) or FFC
DH Group 14 (112-
bits)
Generated internally
via ECDH or FFC
DH
Output encrypted via
DEKey
Plaintext in RAM
“Reset” service;
Power cycle;
Switch Approved
Mode
SSH Key Exchange
Private Key (per SSH
2.0)
SSH_KEX_PUB
ECDH P-256 Curve
(128-bits) or FFC
DH Group 14 (112-
bits)
Generated internally
via ECDH or FFC
DH
Output encrypted
via SSH_SK
Plaintext in RAM
Power cycle;
Switch Approved
Mode
SSH Key Exchange
Public Key (per SSH
2.0)
CA_Cert
RSA 2048-bit public
Key
Generated externally.
Input in plaintext via
CA
52
Output encrypted via
DEKey
Plaintext in
EEPROM and RAM
“Reset” service;
Switch Approved
Mode
Authenticate the OKM
cluster appliance to the
module during TLS
session
Key Wrap Key
Public Key
(KWKPublicKey)
RSA 2048-bit public
key
Generated externally;
Input encrypted via
TLS_ECK
Output encrypted via
DEKey
Plaintext in
EEPROM and RAM
“Reset” service;
Switch Approved
Mode
Wrap AKWK to be
sent to OKM cluster
52
CA – Certificate Authority