{"_type": "sec_certs.sample.fips.FIPSCertificate", "dgst": "0c0ad5934ba82dd2", "cert_id": 1085, "web_data": {"_type": "sec_certs.sample.fips.FIPSCertificate.WebData", "module_name": "SafesITe TOP DL GX4 - FIPS with ActivIdentity Digital Identity Applet Suite V2 for Extended PIV", "validation_history": [{"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry", "date": "2009-02-03", "validation_type": "Initial", "lab": "SAIC-VA"}, {"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry", "date": "2009-02-23", "validation_type": "Update", "lab": ""}, {"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry", "date": "2011-02-24", "validation_type": "Update", "lab": "SAIC-VA"}, {"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry", "date": "2014-02-06", "validation_type": "Update", "lab": ""}], "vendor_url": "http://www.gemalto.com", "vendor": "Gemalto and ActivIdentity Inc.", "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt1085.pdf", "module_type": "Hardware", "standard": "FIPS 140-2", "status": "historical", "level": 2, "caveat": "When operated in FIPS mode", "exceptions": ["Roles, Services, and Authentication: Level 3", "Physical Security: Level 3", "EMI/EMC: Level 3"], "embodiment": "Single Chip", "description": "This module is based on a Gemalto Dual Interface (Contact ISO7816 and Contactless ISO14443) Open OS Smart Card with a large (128K EEPROM) memory, with a cryptographic applet suite V 2.6.2b developed by ActivIdentity. The SmartCard platform has on board Triple DES and RSA up to 2048 algorithms and provides X9.31 on board key generation. The Applet Suite supports management of 3DES keys and PINs, and provides services for authentication, access control, generic container, PKI, One Time password and Secure Messaging (SMA). The module conforms to Java Card 2.2.1, Global Platform 2.1.1 and GSC/IS 2", "tested_conf": null, "hw_versions": "A1005291 - CHIP.P5CD144.MPH051B, A1011108 - CHIP.P5CD144.MPH051B and A1047808 - CHIP.P5CD144.MPH051B", "fw_versions": "GX4-FIPS EI08, Applet Versions: ACA applet package v2.6.2B.4, ASC library package v2.6.2B.3, PKI/GC/SKI applet package v2.6.2B.4, PIV End Point Wrapper module v2.6.2B.4, PIV End Point Extended module v2.6.2B.3, SMA applet package v2.6.2B.3", "sw_versions": null, "mentioned_certs": {}, "historical_reason": "01-3052 was dropped.", "date_sunset": null, "revoked_reason": null, "revoked_link": null}, "pdf_data": {"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData", "keywords": {"fips_cert_id": {"Cert": {"# 1": 1}}, "fips_security_level": {"Level": {"Level 2": 2, "Level 3": 2, "level 1": 1, "level 2": 1}}, "fips_certlike": {"Certlike": {"SHA-1": 6, "PKCS#1": 4, "RSA PKCS1": 1, "PKCS1": 1}}, "vendor": {"Gemalto": {"Gemalto": 32}, "Philips": {"Philips": 2}}, "eval_facility": {}, "symmetric_crypto": {"AES_competition": {"AES": {"AES": 3}}, "DES": {"DES": {"DES": 3}, "3DES": {"Triple-DES": 6, "TDES": 35}}, "constructions": {"MAC": {"KMAC": 1}}}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {"SHA": {"SHA1": {"SHA-1": 6}}}, "crypto_scheme": {"MAC": {"MAC": 13}}, "crypto_protocol": {}, "randomness": {"PRNG": {"PRNG": 3}, "RNG": {"RNG": 2}}, "cipher_mode": {"ECB": {"ECB": 7}, "CBC": {"CBC": 9}}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {"SCA": {"SPA": 1, "DPA": 1, "Timing Attacks": 1}, "FI": {"physical tampering": 1, "Fault Induction": 1, "Fault injection": 3}}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"FIPS": {"FIPS140-2": 6, "FIPS 140-2": 7}, "PKCS": {"PKCS#1": 2, "PKCS1": 1}, "ISO": {"ISO/IEC 7816": 6, "ISO/IEC 14443": 6, "ISO/IEC 7816-2": 1, "ISO/IEC 7816-3": 1, "ISO/IEC 7816-4": 1}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {"ConfidentialDocument": {"Integrity Mechanisms The cryptographic keys storage integrity mechanism is described in a separate confidential document called Self Test Description. 8.5.4 Cryptographic Key Zerorization The cryptographic module": 1}}}, "policy_metadata": {"pdf_file_size_bytes": 693767, "pdf_is_encrypted": false, "pdf_number_of_pages": 30, "/Title": "Applet v2 Security Policy", "/Author": "Stephane Ardiley", "/Creator": "Microsoft\u00ae Office Word 2007", "/CreationDate": "D:20110124154838", "/ModDate": "D:20110124154838", "/Producer": "Microsoft\u00ae Office Word 2007", "pdf_hyperlinks": {"_type": "Set", "elements": []}}}, "heuristics": {"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics", "algorithms": {"_type": "Set", "elements": ["CVL#214", "Triple-DES MAC#678", "RNG#450", "AES#782", "Triple-DES#678", "SHS#786", "RSA#372"]}, "extracted_versions": {"_type": "Set", "elements": ["2.6.2"]}, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "policy_prunned_references": {"_type": "Set", "elements": []}, "module_prunned_references": {"_type": "Set", "elements": []}, "policy_processed_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null}, "module_processed_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": {"_type": "Set", "elements": ["2774"]}, "indirectly_referenced_by": {"_type": "Set", "elements": ["2774"]}, "directly_referencing": null, "indirectly_referencing": null}, "direct_transitive_cves": null, "indirect_transitive_cves": null}, "state": {"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState", "module_download_ok": true, "policy_download_ok": true, "policy_convert_ok": true, "module_extract_ok": true, "policy_extract_ok": true, "policy_pdf_hash": "b8f443a42aa2e30c87e7ddcabb0f8c95b2e01ad595848fa06f71277253b2ca0e", "policy_txt_hash": "eaea7dfe2876b7acf0e6a2f4c5b1de16d3a0e2a6bec6b2b070b06f4fc4b903cc", "policy_json_hash": null}}