This page was not yet optimized for use on mobile
devices.
SapphirePlus OpenSSL Cryptographic Module
Certificate #3340
Webpage information
Security policy
Symmetric Algorithms
AES, TDEA, TDES, HMAC, CMACAsymmetric Algorithms
ECDSA, ECC, DH, DSAHash functions
SHA-1, SHA1, SHA-224, SHA224, SHA256, SHA384, SHA512, SHA-256, SHA-384, SHA-2Schemes
Key Agreement, Key agreementRandomness
DRBG, RNGLibraries
OpenSSLElliptic Curves
P-224, P-384, P-192, P-256, P-521, K-224, K-384, B-224, B-384, B-163, K-233, K-409, B-283, B-571Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSVendor
Microsoft, Microsoft CorporationStandards
FIPS 140-2, FIPS 180-4, FIPS 186-4, FIPS 197, FIPS 198-1, FIPS 198, FIPS 186-2, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-38E, SP 800-56A, SP 800-56B, SP 800-57, SP 800-89, SP 800-90A, SP 800-131A, SP 800-67, PKCS#1File metadata
| Author | Mark Minnoch |
|---|---|
| Creation date | D:20181127084920-08'00' |
| Modification date | D:20181127084925-08'00' |
| Pages | 23 |
| Creator | Acrobat PDFMaker 17 for Word |
| Producer | Adobe PDF Library 15.0 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3340,
"dgst": "098c34d0a9154864",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"ECDSA#1521",
"Triple-DES#2832",
"DRBG#2276",
"CVL#2038",
"AES#5643",
"DSA#1445",
"RSA#3035",
"HMAC#3758",
"SHS#4525"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDSA": {
"ECDSA": 16
}
},
"FF": {
"DH": {
"DH": 9
},
"DSA": {
"DSA": 18
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CCM": {
"CCM": 4
},
"CFB": {
"CFB": 3
},
"CTR": {
"CTR": 2
},
"ECB": {
"ECB": 3
},
"GCM": {
"GCM": 5
},
"OFB": {
"OFB": 1
},
"XTS": {
"XTS": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 35
}
},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 2,
"Key agreement": 2
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"B-163": 3,
"B-224": 1,
"B-283": 1,
"B-384": 1,
"B-571": 1,
"K-224": 1,
"K-233": 3,
"K-384": 1,
"K-409": 1,
"P-192": 6,
"P-224": 6,
"P-256": 4,
"P-384": 4,
"P-521": 2
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES 128/192/256": 2,
"AES, 256": 1,
"DRBG5": 1,
"DSA (1024": 2,
"HMAC SHA-1": 1,
"HMAC-SHA- 1": 2,
"HMAC-SHA-1": 24,
"HMAC-SHA1": 4,
"PKCS#1": 2,
"SHA-1": 19,
"SHA-1, 224": 23,
"SHA-2": 3,
"SHA-2 (224": 2,
"SHA-224": 16,
"SHA-256": 1,
"SHA-384": 1,
"SHA1": 1,
"SHA224": 1,
"SHA256": 4,
"SHA384": 1,
"SHA512": 2
}
},
"fips_security_level": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 42,
"SHA1": 1
},
"SHA2": {
"SHA-2": 5,
"SHA-224": 16,
"SHA-256": 1,
"SHA-384": 1,
"SHA224": 1,
"SHA256": 4,
"SHA384": 1,
"SHA512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 19
},
"RNG": {
"RNG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 13,
"FIPS 180-4": 2,
"FIPS 186-2": 5,
"FIPS 186-4": 9,
"FIPS 197": 2,
"FIPS 198": 1,
"FIPS 198-1": 1
},
"NIST": {
"SP 800-131A": 2,
"SP 800-38B": 2,
"SP 800-38C": 2,
"SP 800-38D": 2,
"SP 800-38E": 2,
"SP 800-56A": 4,
"SP 800-56B": 2,
"SP 800-57": 2,
"SP 800-67": 1,
"SP 800-89": 1,
"SP 800-90A": 9
},
"PKCS": {
"PKCS#1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 20
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 9
}
},
"constructions": {
"MAC": {
"CMAC": 15,
"HMAC": 8
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1,
"Microsoft Corporation": 1
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Mark Minnoch",
"/Company": "KeyPair Consulting",
"/CreationDate": "D:20181127084920-08\u002700\u0027",
"/Creator": "Acrobat PDFMaker 17 for Word",
"/ModDate": "D:20181127084925-08\u002700\u0027",
"/Producer": "Adobe PDF Library 15.0",
"/SourceModified": "D:20181127164906",
"pdf_file_size_bytes": 304775,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.openssl.org/source/old/fips/openssl-fips-2.0.9.tar.gz",
"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
"https://www.openssl.org/source/",
"https://csrc.nist.gov/csrc/media/publications/fips/198/1/final/documents/fips-198-1_final.pdf",
"http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf",
"http://www.openssl.org/source/openssl-fips-ecp-2.0.16.tar.gz",
"http://www.openssl.org/source/openssl-fips-2.0.9.tar.gz",
"http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/?wapkw=aes-ni",
"http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf",
"http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf",
"http://www.openssl.org/source/old/fips/openssl-fips-ecp-2.0.9.tar.gz",
"http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-89.pdf",
"https://csrc.nist.gov/CSRC/media/Publications/sp/800-67/rev-2/draft/documents/sp800-67r2-draft.pdf",
"http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
"http://www.openssl.org/source/old/fips/",
"http://www.arm.com/products/processors/technologies/neon.php",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf",
"http://www.intel.com/support/processors/sb/CS-030123.htm?wapkw=sse2",
"http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf",
"http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf",
"https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Module-Validation-Program/documents/fips140-2/FIPS1402IG.pdf",
"http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf",
"http://www.openssl.org/source/",
"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br1.pdf",
"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 23
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "20c232a4f00e754fb715518355c114103a1cd4d6ec2b3a5e046064f2ae78a24b",
"policy_txt_hash": "f346577671e9a257a0afedcbc38f2fb3e7f4e84f83a15cfb868bc14e43de9870"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When built, installed, protected and initialized as assumed by the Crypto Officer role and as specified in the provided Security Policy and operated in FIPS mode. Appendix A of the provided Security Policy specifies the actual distribution tar file containing the source code of this module. There shall be no additions, deletions or alterations to the tar file contents as used during module build. The distribution tar file shall be verified as specified in Appendix A of the provided Security Policy. Installation and protection shall be completed as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from specified verification, protection, installation and initialization procedures will result in a non FIPS 140-2 compliant module. No assurance of the minimum strength of generated keys.",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/Dec2018Cert.pdf",
"date_sunset": null,
"description": "The SapphirePlus infusion system provides a targeted solution for the Hospira MedNet users in the hospital market, offering the outstanding performance, ease of use and reliability of the entire Sapphire product family, with special concern for the clinical and ambulatory environments, as well as the pre-hospital medical ground transportation. With Q Core\u2019s advanced software version implemented, the SapphirePlus pump offers a complete integration of the Sapphire infusion pump with Hospira MedNet system, used in hospitals across the US.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Roles, Services, and Authentication: Level 2",
"Physical Security: N/A",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": "186-2 transition",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "SapphirePlus OpenSSL Cryptographic Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "2.0.9",
"tested_conf": [
"Custom Linux 2.6.35 running on SapphirePlus Infusion System with NXP-i.MX280-ARM (single user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2018-12-14",
"lab": "UL Verification Services, Inc.",
"validation_type": "Initial"
}
],
"vendor": "Q Core Medical Ltd.",
"vendor_url": "http://www.qcore.com"
}
}