Juniper CryptoCore Cryptographic Module

Certificate #4566

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 30.08.2023
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. No assurance of the minimum strength of generated keys
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description The cryptographic module provides FIPS 140-2 compliant cryptographic functionality for Juniper Networks security products such as JATP.
Tested configurations
  • Ubuntu Linux 14.04 on VMware ESXi 6.0 running on Dell PowerEdge R320 with Intel Xeon E5 (single-user mode)
  • Ubuntu Linux 14.04 running on Apple Mac mini with Intel Core i5
  • Ubuntu Linux 14.04 running on Juniper JATP700 with Intel Xeon E5
Vendor Juniper Networks, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-256, AES-128, AES-192, Triple-DES, TDEA, HMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC
Randomness
PRNG, DRBG
Elliptic Curves
P-224, P-256, P-384, P-521, P-192, K-233, K-409, K-571, B-233, B-283, B-409, B-571, K-283, K-163, B-163
Block cipher modes
ECB, CBC, CTR, OFB, GCM, CCM, XTS

Security level
Level 1

Standards
FIPS 140-2, FIPS 197, FIPS 186-2, FIPS 186-4, FIPS140-2, FIPS PUB 140-2, SP 800-38A, SP 800-38B, SP 800-38C, SP 800-38E, SP 800-90A, SP 800-90, SP 800-38D, PKCS #1, PKCS#1

File metadata

Subject FIPS 140-2 Security Policy Template
Author Peter Kim
Creation date D:20220629080623-07'00'
Modification date D:20220629080637-07'00'
Pages 17
Creator Acrobat PDFMaker 22 for Word
Producer Adobe PDF Library 22.1.174

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4566,
  "dgst": "0454a8d72f0fda82",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "RSA#2973",
        "DRBG#2195",
        "HMAC#3691",
        "CVL#1980",
        "AES#5540",
        "ECDSA#1491",
        "SHS#4446",
        "DSA#1422"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDH": {
            "ECDH": 7
          },
          "ECDSA": {
            "ECDSA": 9
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 9
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "CCM": {
          "CCM": 2
        },
        "CTR": {
          "CTR": 3
        },
        "ECB": {
          "ECB": 2
        },
        "GCM": {
          "GCM": 7
        },
        "OFB": {
          "OFB": 1
        },
        "XTS": {
          "XTS": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-163": 1,
          "B-233": 4,
          "B-283": 4,
          "B-409": 5,
          "B-571": 5,
          "K-163": 1,
          "K-233": 6,
          "K-283": 4,
          "K-409": 5,
          "K-571": 5,
          "P-192": 4,
          "P-224": 14,
          "P-256": 10,
          "P-384": 10,
          "P-521": 10
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1,
          "#3": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES [197": 1,
          "AES-128": 1,
          "AES-192": 1,
          "AES-256": 1,
          "DSA [186": 1,
          "HMAC SHA-1": 1,
          "HMAC [198": 1,
          "PKCS #1": 2,
          "PKCS#1": 2,
          "SHA(1": 24,
          "SHA(224": 19,
          "SHA(256": 6,
          "SHA-1": 5,
          "SHA-224": 3,
          "SHA-256": 5,
          "SHA-384": 4,
          "SHA-512": 5,
          "SHA1": 13,
          "SHA1, 224": 3,
          "SHS [180": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 5,
            "SHA1": 16
          },
          "SHA2": {
            "SHA-224": 4,
            "SHA-256": 4,
            "SHA-384": 5,
            "SHA-512": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 19,
          "PRNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 8,
          "FIPS 186-2": 4,
          "FIPS 186-4": 1,
          "FIPS 197": 1,
          "FIPS PUB 140-2": 1,
          "FIPS140-2": 1
        },
        "NIST": {
          "SP 800-38A": 1,
          "SP 800-38B": 2,
          "SP 800-38C": 1,
          "SP 800-38D": 2,
          "SP 800-38E": 1,
          "SP 800-90": 1,
          "SP 800-90A": 1
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7,
            "AES-128": 1,
            "AES-192": 1,
            "AES-256": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2,
            "HMAC": 7
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Peter Kim",
      "/Company": "Microsoft",
      "/CreationDate": "D:20220629080623-07\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 22 for Word",
      "/ModDate": "D:20220629080637-07\u002700\u0027",
      "/Producer": "Adobe PDF Library 22.1.174",
      "/SourceModified": "D:20220629150519",
      "/Subject": "FIPS 140-2 Security Policy Template",
      "pdf_file_size_bytes": 350619,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "0f2a196bed1378623bbd7734fb1fc2cfe359a7ff0ed290150f167748866f9a12",
    "policy_txt_hash": "8710c5791523e1c438189f9c6fa00c99420a60e2115911fea201bee0d54567a5"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. No assurance of the minimum strength of generated keys",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/August 2023_010923_0844.pdf",
    "date_sunset": null,
    "description": "The cryptographic module provides FIPS 140-2 compliant cryptographic functionality for Juniper Networks security products such as JATP.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Juniper CryptoCore Cryptographic Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "1.0",
    "tested_conf": [
      "Ubuntu Linux 14.04 on VMware ESXi 6.0 running on Dell PowerEdge R320 with Intel Xeon E5 (single-user mode)",
      "Ubuntu Linux 14.04 running on Apple Mac mini with Intel Core i5",
      "Ubuntu Linux 14.04 running on Juniper JATP700 with Intel Xeon E5"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2023-08-30",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Juniper Networks, Inc.",
    "vendor_url": "http://www.juniper.net/"
  }
}