Ascom Smartphone BoringCrypto

Certificate #4276

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 08.08.2022
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When installed, initialized and configured as specified in Section 12.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description Ascom Smartphone BoringCrypto is a general-purpose cryptographic library incorporated into the Ascom Myco smartphones for the protection of sensitive information.
Tested configurations
  • Android 10 running on Pixel 3 XL with Snapdragon 845 32-bit with PAA
  • Android 10 running on Pixel 3 XL with Snapdragon 845 32-bit without PAA
  • Android 10 running on Pixel 3 XL with Snapdragon 845 64-bit with PAA
  • Android 10 running on Pixel 3 XL with Snapdragon 845 64-bit without PAA
  • Android 10 running on Pixel 3a with Snapdragon 670 32-bit with PAA
  • Android 10 running on Pixel 3a with Snapdragon 670 32-bit without PAA
  • Android 10 running on Pixel 3a with Snapdragon 670 64-bit with PAA
  • Android 10 running on Pixel 3a with Snapdragon 670 64-bit without PAA
  • Android 10 running on Pixel 4 XL with Snapdragon 855 32-bit with PAA
  • Android 10 running on Pixel 4 XL with Snapdragon 855 32-bit without PAA
  • Android 10 running on Pixel 4 XL with Snapdragon 855 64-bit with PAA
  • Android 10 running on Pixel 4 XL with Snapdragon 855 64-bit without PAA (single user mode)
Vendor Ascom Sweden AB
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-256, DES, Triple-DES, TDEA, HMAC, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD4, MD5
Schemes
MAC, Key Agreement
Protocols
SSL, TLS, TLS 1.0
Randomness
DRBG
Libraries
BoringSSL
Elliptic Curves
P-224, P-256, P-384, P-521
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM

Security level
Level 1

Standards
FIPS 140-2, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 180-4, FIPS PUB 140-2, SP 800-38A, SP 800-38D, SP 800-38F, SP 800-67, SP 800-135, NIST SP 800-133, NIST SP 800-90A, SP 800-90A, NIST SP 800-52, NIST SP 800-38D, NIST SP 800-131A, SP 800-56A, SP 800-131A, SP 800-133, RFC 5288, RFC 5246

File metadata

Author Chaithanya Chilukuri
Creation date D:20220705173912-04'00'
Modification date D:20220705173912-04'00'
Pages 20
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4276,
  "dgst": "0252656a94fd2e92",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "CVL#C1314",
        "DRBG#C1314",
        "KTS#C1314",
        "AES#C1314",
        "Triple-DES#C1314",
        "HMAC#C1314",
        "RSA#C1314",
        "SHS#C1314",
        "ECDSA#C1314"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDSA": {
            "ECDSA": 18
          }
        },
        "FF": {
          "DH": {
            "DH": 7,
            "Diffie-Hellman": 3
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CFB": {
          "CFB": 4
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 2
        },
        "GCM": {
          "GCM": 4
        },
        "OFB": {
          "OFB": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "BoringSSL": {
          "BoringSSL": 1
        }
      },
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 10,
            "TLS 1.0": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 4
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-224": 4,
          "P-256": 6,
          "P-384": 4,
          "P-521": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES-256": 1,
          "DRBG 9": 1,
          "HMAC-SHA-1": 4,
          "HMAC-SHA-224": 2,
          "HMAC-SHA-256": 6,
          "HMAC-SHA-384": 2,
          "HMAC-SHA-512": 4,
          "SHA-1": 2,
          "SHA-224": 1,
          "SHA-256": 2,
          "SHA-384": 1,
          "SHA-512": 2,
          "SHA2-224": 1,
          "SHA2-256": 1,
          "SHA2-384": 1,
          "SHA2-512": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 4
          },
          "MD5": {
            "MD5": 5
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 2,
            "SHA-384": 1,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 8
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 19,
          "FIPS 180-4": 2,
          "FIPS 186-4": 3,
          "FIPS 197": 2,
          "FIPS 198-1": 2,
          "FIPS PUB 140-2": 1
        },
        "NIST": {
          "NIST SP 800-131A": 1,
          "NIST SP 800-133": 1,
          "NIST SP 800-38D": 1,
          "NIST SP 800-52": 1,
          "NIST SP 800-90A": 1,
          "SP 800-131A": 1,
          "SP 800-133": 1,
          "SP 800-135": 3,
          "SP 800-38A": 2,
          "SP 800-38D": 2,
          "SP 800-38F": 2,
          "SP 800-56A": 1,
          "SP 800-67": 2,
          "SP 800-90A": 2
        },
        "RFC": {
          "RFC 5246": 2,
          "RFC 5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 17,
            "AES-256": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 2,
            "Triple-DES": 16
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 6,
            "HMAC-SHA-224": 1,
            "HMAC-SHA-256": 3,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Chaithanya Chilukuri",
      "/CreationDate": "D:20220705173912-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20220705173912-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 569151,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 20
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "912457672ccab292dfb81d07a8b9ee4aad431ea29d1df006897490a92df25814",
    "policy_txt_hash": "bf56048e6fba7ce19a4a22df1cb2a44a3f0ffe9b45e649838c061c28f1b79157"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When installed, initialized and configured as specified in Section 12.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/August 2022_010922_0715_signed.pdf",
    "date_sunset": null,
    "description": "Ascom Smartphone BoringCrypto is a general-purpose cryptographic library incorporated into the Ascom Myco smartphones for the protection of sensitive information.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Ascom Smartphone BoringCrypto",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "7f02881e96e51f1873afcf384d02f782b48967ca",
    "tested_conf": [
      "Android 10 running on Pixel 3 XL with Snapdragon 845 32-bit with PAA",
      "Android 10 running on Pixel 3 XL with Snapdragon 845 32-bit without PAA",
      "Android 10 running on Pixel 3 XL with Snapdragon 845 64-bit with PAA",
      "Android 10 running on Pixel 3 XL with Snapdragon 845 64-bit without PAA",
      "Android 10 running on Pixel 3a with Snapdragon 670 32-bit with PAA",
      "Android 10 running on Pixel 3a with Snapdragon 670 32-bit without PAA",
      "Android 10 running on Pixel 3a with Snapdragon 670 64-bit with PAA",
      "Android 10 running on Pixel 3a with Snapdragon 670 64-bit without PAA",
      "Android 10 running on Pixel 4 XL with Snapdragon 855 32-bit with PAA",
      "Android 10 running on Pixel 4 XL with Snapdragon 855 32-bit without PAA",
      "Android 10 running on Pixel 4 XL with Snapdragon 855 64-bit with PAA",
      "Android 10 running on Pixel 4 XL with Snapdragon 855 64-bit without PAA (single user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2022-08-08",
        "lab": "Acumen Security",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Ascom Sweden AB",
    "vendor_url": "http://www.ascom.com"
  }
}