1 Reply Latest reply on Oct 27, 2016 8:20 AM by Intel Corporation

    NU80579ED009C

    angelaoh

      Hello,

       

      I am exporting NU80579ED009C overseas from Canada and the parts have been declared.

      I have been asked to submit the answers to the following technical questions.

      This is the Intel website link for the part: Intel® EP80579 Integrated Processor with Intel® QuickAssist Technology, 1200 MHz Specifications

       

      Question 1: Is the item nu80579ed009c manufactured from a compound semiconductor (semiconductor composed of 2 or more elements)?

       

      Question 2: What cryptographic algorithms and strengths are employed and for what purposes (eg: digital signature, authentication, confidentiality of data, etc)? Identify the key length as well as whether the algorithm is symmetric or asymmetric.

       

      Question 3: Provide details on the product architecture.  Is the cryptographic engine user-accessible or modifiable? Describe how the architecture and/or distribution method inhibit user accessibility.

       

      Question 4: Describe how the product architecture prohibits modification of the product-use for which it was designed.  State how the product is written to preclude user modification of the encryption algorithms, key management and key space.

       

      Question 5: Describe how the product architecture prohibits modification of the product-use for which it was designed.  State how the product is written to preclude user modification of the encryption algorithms, key management and key space.

       

      Question 6: For products which incorporate encryption-related Application Programming Interfaces (APIs), describe the APIs that are implemented and/or supported.  Explain which interfaces are for internal (private) and/or external (public) use.

       

      Question 7: Describe whether the cryptographic routines are statically or dynamically linked, and the routines (if any) that are provided by third-party modules or libraries. Identify the third-party manufacturers of the modules or toolkits.

       

      Question 8: In what form will the cryptographic software be distributed/exported (e.g.: source code, object code, etc)?

       

      Thank you in advance.

      Best,

      Angela