This page was not yet optimized for use on mobile
devices.
CryptoManager Root of Trust RT-660
Certificate #4758
Webpage information
Security policy
Symmetric Algorithms
AES, AES-, AES-256, HMAC, HMAC-SHA-256, HMAC-SHA-224, HMAC-SHA-384, CMACAsymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman, DSAHash functions
SHA-512, SHA-256, SHA-224, SHA-384, SHA2, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHA-3, SHA3Schemes
MAC, Key Agreement, Key agreementRandomness
TRNG, DRBG, RNGElliptic Curves
P-224, P-256, P-384, P-521, NIST P-256, NIST P-224Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCMTrusted Execution Environments
SSCSecurity level
Level 2, Level 1Side-channel analysis
side-channel, DPA, Fault InjectionStandards
FIPS 140-3, FIPS PUB 140-3, FIPS 197, FIPS186-4, FIPS198-1, FIPS180-4, FIPS202, FIPS 186-4, FIPS140-3, FIPS197, NIST SP 800-140B, NIST SP 800-140F, PKCS#1, RFC3394, RFC5649, ISO/IEC 24759, ISO/IEC 19790:2012File metadata
| Title | DRAFT_140-3_CMRT_SecurityPolicy_v1.1 |
|---|---|
| Author | Marylene Palard |
| Creation date | D:20240730155904Z00'00' |
| Modification date | D:20240730155904Z00'00' |
| Pages | 37 |
| Creator | Word |
| Producer | macOS Version 14.5 (Build 23F79) Quartz PDFContext |
References
Incoming- 661 - historical - IBM eServer Cryptographic Coprocessor Security Module
Heuristics
No heuristics are available for this certificate.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4758,
"dgst": "13908fe4d3eb986b",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"SHA2-512/224A2114",
"SHA2-384A2114",
"HMAC-SHA3-256A2115",
"HMAC-SHA2-384A2115",
"AES-ECBA2114",
"KAS-ECC Sp800-56Ar3A2114",
"KDA OneStep SP800-56Cr2A2114",
"KDF SP800-108A2114",
"SHA3-512A2115",
"SHA3-224A2115",
"AES-CFB128A2114",
"HMAC-SHA3-224A2115",
"SHA2-512/256A2114",
"KDA TwoStep SP800-56Cr2A2114",
"SHA3-384A2115",
"HMAC-SHA2-512/256A2114",
"AES-KWPA2114",
"RSA KeyGen (FIPS186-4)A2114",
"HMAC-SHA2-256A2115",
"HMAC-SHA3-384A2115",
"ECDSA KeyGen (FIPS186-4)A2114",
"RSA SigGen (FIPS186-4)A2115",
"HMAC-SHA2-224A2115",
"RSA SigVer (FIPS186-4)A2115",
"SHA3-256A2115",
"SHA2-256A2114",
"ECDSA SigVer (FIPS186-4)A2115",
"SHA2-224A2114",
"HMAC-SHA3-512A2115",
"KAS-ECC-SSC Sp800-56Ar3A2114",
"SHA2-512A2114",
"AES-CTRA2114",
"HMAC-SHA2-512/224A2114",
"ECDSA KeyVer (FIPS186-4)A2114",
"AES-CBCA2114",
"ECDSA SigGen (FIPS186-4)A2115",
"HMAC-SHA2-512A2115",
"AES-GCMA2114",
"AES-CMACA2114",
"Counter DRBGA2114",
"AES-GMACA2114"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"02",
"660",
"24",
"2022"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"661"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"909",
"661"
]
},
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 43
}
},
"FF": {
"DH": {
"Diffie-Hellman": 44
},
"DSA": {
"DSA": 2
}
},
"RSA": {
"RSA-CRT": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 8
},
"ECB": {
"ECB": 2
},
"GCM": {
"GCM": 3
},
"OFB": {
"OFB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 9,
"Key agreement": 1
},
"MAC": {
"MAC": 20
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"NIST P-224": 3,
"NIST P-256": 1,
"P-224": 31,
"P-256": 39,
"P-384": 26,
"P-521": 26
}
},
"eval_facility": {
"KTC": {
"KTC": 8
},
"atsec": {
"atsec": 39
}
},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES 256": 1,
"AES key 128": 1,
"AES-256": 1,
"HMAC- SHA-256": 1,
"HMAC- SHA-512": 2,
"HMAC-SHA- 256": 4,
"HMAC-SHA-224": 4,
"HMAC-SHA-256": 14,
"HMAC-SHA-384": 4,
"HMAC-SHA-512/224": 2,
"HMAC-SHA-512/256": 2,
"HMAC-SHA256": 2,
"PKCS#1": 14,
"SHA-224": 4,
"SHA-256": 12,
"SHA-3": 2,
"SHA-384": 4,
"SHA-512": 5,
"SHA-512 2048": 1,
"SHA2": 3,
"SHA2- 384": 2,
"SHA2-224": 4,
"SHA2-256": 14,
"SHA2-384": 2,
"SHA2-512": 5,
"SHA3": 4,
"SHA3- 384": 2,
"SHA3- 512": 1,
"SHA3- 512 2048": 1,
"SHA3-224": 4,
"SHA3-256": 6,
"SHA3-384": 3,
"SHA3-512": 3
}
},
"fips_security_level": {
"Level": {
"Level 1": 1,
"Level 2": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-224": 4,
"SHA-256": 12,
"SHA-384": 4,
"SHA-512": 6,
"SHA2": 3
},
"SHA3": {
"SHA-3": 2,
"SHA3": 4,
"SHA3-224": 5,
"SHA3-256": 6,
"SHA3-384": 3,
"SHA3-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 20
},
"RNG": {
"RNG": 1
},
"TRNG": {
"TRNG": 17
}
},
"side_channel_analysis": {
"FI": {
"Fault Injection": 1
},
"SCA": {
"DPA": 1,
"side-channel": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-3": 42,
"FIPS 186-4": 4,
"FIPS 197": 2,
"FIPS PUB 140-3": 2,
"FIPS140-3": 2,
"FIPS180-4": 3,
"FIPS186-4": 10,
"FIPS197": 1,
"FIPS198-1": 5,
"FIPS202": 2
},
"ISO": {
"ISO/IEC 19790:2012": 1,
"ISO/IEC 24759": 2
},
"NIST": {
"NIST SP 800-140B": 2,
"NIST SP 800-140F": 1
},
"PKCS": {
"PKCS#1": 7
},
"RFC": {
"RFC3394": 2,
"RFC5649": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 42,
"AES-": 12,
"AES-256": 1
}
},
"constructions": {
"MAC": {
"CMAC": 3,
"HMAC": 32,
"HMAC-SHA-224": 2,
"HMAC-SHA-256": 7,
"HMAC-SHA-384": 2
}
}
},
"tee_name": {
"IBM": {
"SSC": 9
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Marylene Palard",
"/CreationDate": "D:20240730155904Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20240730155904Z00\u002700\u0027",
"/Producer": "macOS Version 14.5 (Build 23F79) Quartz PDFContext",
"/Title": "DRAFT_140-3_CMRT_SecurityPolicy_v1.1",
"pdf_file_size_bytes": 908629,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 37
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "17fbcef46b79ee1188bf371777701155c03f1f433c1955897486dd38ab2f44f5",
"policy_txt_hash": "ce29758ade81c36a8a098dea47b0496c718c0df1dd532e8190e2bd220ac6b76d"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in approved mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/August 2024_010924_0336.pdf",
"date_sunset": "2029-08-11",
"description": "The CryptoManager Root of Trust (CMRT) RT-660 is an independent Silicon IP Security Module for integration into semiconductor devices, offering secure execution of authenticated user applications, tamper detection and protection, DPA resistance and secure storage and handling of keys and security assets.",
"embodiment": "Single Chip",
"exceptions": [
"Operational environment: N/A",
"Non-invasive security: N/A"
],
"fw_versions": "2022-02-24-g801c166",
"historical_reason": null,
"hw_versions": "0x6000_0931",
"level": 2,
"mentioned_certs": {},
"module_name": "CryptoManager Root of Trust RT-660",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": null,
"tested_conf": [
"Xilinx Zynq XC7Z045 FPGA"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2024-08-12",
"lab": "atsec information security corporation",
"validation_type": "Initial"
}
],
"vendor": "Rambus Inc.",
"vendor_url": "http://www.rambus.com"
}
}