This page was not yet optimized for use on mobile
devices.
ActivIdentity Digital Identity Applet Suite V2 for Extended PIV
Certificate #962
Webpage information
Security policy
Symmetric Algorithms
DES, TDES, 3DES, KMACHash functions
SHA-1Schemes
MACRandomness
RNGBlock cipher modes
ECB, CBCVendor
Oberthur Card Systems, OberthurSecurity level
Level 2, Level 3Side-channel analysis
SPA, DPA, Timing attacks, Fault Induction, fault induction, reverse engineeringCertification process
Integrity Mechanisms The cryptographic keys storage integrity mechanism is described in a separate confidential document called Self Test Description. 9.5.4 Cryptographic Key Zerorization The cryptographic moduleStandards
FIPS140-2, FIPS 140-2, FIPS 186-2, FIPS PUB 186-2, PKCS1, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 7816-3, ISO/IEC 7816-2, ISO/IEC 7816-4File metadata
| Title | Microsoft Word - 01 - ActivIdentity-Applet-v2-for-ExtendedPIV-Security-Policy-V1.5.doc |
|---|---|
| Author | cstephens |
| Creation date | D:20080620162529-07'00' |
| Modification date | D:20080620162529-07'00' |
| Pages | 25 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | Acrobat Distiller 8.1.0 (Windows) |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 962,
"dgst": "084917af148384c1",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"CVL#204",
"RSA#43",
"RNG#94",
"Triple-DES#232",
"SHS#209",
"Triple-DES MAC#232"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"2.6.2"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {},
"certification_process": {
"ConfidentialDocument": {
"Integrity Mechanisms The cryptographic keys storage integrity mechanism is described in a separate confidential document called Self Test Description. 9.5.4 Cryptographic Key Zerorization The cryptographic module": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 8
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"# 1": 1
}
},
"fips_certlike": {
"Certlike": {
"PKCS1": 1,
"RSA PKCS1": 1,
"SHA-1": 2
}
},
"fips_security_level": {
"Level": {
"Level 2": 4,
"Level 3": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Fault Induction": 3,
"fault induction": 1
},
"SCA": {
"DPA": 6,
"SPA": 7,
"Timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 7,
"FIPS 186-2": 3,
"FIPS PUB 186-2": 1,
"FIPS140-2": 5
},
"ISO": {
"ISO/IEC 14443": 16,
"ISO/IEC 7816": 8,
"ISO/IEC 7816-2": 1,
"ISO/IEC 7816-3": 3,
"ISO/IEC 7816-4": 1
},
"PKCS": {
"PKCS1": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 8,
"TDES": 19
},
"DES": {
"DES": 8
}
},
"constructions": {
"MAC": {
"KMAC": 1
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"Oberthur": 1,
"Oberthur Card Systems": 3
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "cstephens",
"/CreationDate": "D:20080620162529-07\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20080620162529-07\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/Title": "Microsoft Word - 01 - ActivIdentity-Applet-v2-for-ExtendedPIV-Security-Policy-V1.5.doc",
"pdf_file_size_bytes": 185464,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "b2677836d3d71f5fa8392205dc425b5cac374ff836a7ef176a3ed2aaf3904bcd",
"policy_txt_hash": "e4ae2f3cfb09af6d9786780ec6d071aaa8759ef50618c448838369bf3ffb0543"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt962.pdf",
"date_sunset": null,
"description": "This version of the product can be used over contact and contactless interface (with some restrictions) and can be configured for use with ActivIdentity applet suite v2.6.2 for the support of GSC-IS v2.1, NIST SP800-73-1 Transitional and End-Point Card Edge (for HSPD-12/PIV). The product allows issuance and post-issuance support for PIV End Point Card Edge and Data Model. The validated product is similar to Applet v2.6.2a (FIPS 140-2 Cert. #880), but added the One Time Password applet.",
"embodiment": "Single Chip",
"exceptions": [
"Roles, Services, and Authentication: Level 3",
"Physical Security: Level 3",
"EMI/EMC: Level 3"
],
"fw_versions": "ACA applet package v2.6.2.A3, PKI/GC applet package v2.6.2.A1, ASC library package v2.6.2.A1, PIV End-Point package v2.6.2.A1 and v2.6.2.A2, SKI applet package v2.6.2.A2",
"historical_reason": "RNG SP800-131A Revision 1 Transition",
"hw_versions": "P/N 77 Versions E303-063683 and E303-063684",
"level": 2,
"mentioned_certs": {},
"module_name": "ActivIdentity Digital Identity Applet Suite V2 for Extended PIV",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2008-06-12",
"lab": "UL Verification Services, Inc.",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2008-06-23",
"lab": "",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2014-02-06",
"lab": "",
"validation_type": "Update"
}
],
"vendor": "ActivIdentity, Inc.",
"vendor_url": "http://www.actividentity.com"
}
}