KONA N41M0

Certificate #2476

Webpage information

Status historical
Historical reason Moved to historical list in accordance with SP800-131A Revision 1 Transition (AES/TDES key wrapping)
Validation dates 20.11.2015
Standard FIPS 140-2
Security level 3
Type Hardware
Embodiment Single Chip
Caveat The module generates cryptographic keys whose strengths are modified by available entropy
Description The KONA N41M0 smart card can be employed in solutions which provide secure PKI (public key infrastructure) and digital signature technology. KONA N41M0 serves as highly portable physical forms which enhances the security of network access and ensures secure electronic communications. KONA N41M0 supports on-card Triple DES, AES, ECC and 2048-bit RSA algorithms with on-card key generation. The KONA N41M0 smart card is Java-based smart cards for physical and logical access, e-transactions and other applications, which is compliant to Java Card v3.0.4 and GlobalPlatform 2.2.
Version (Hardware) Infineon SLE97CNFX1M00PEA22
Version (Firmware) KONA N41M0 v2.01 and Demonstration Applet v1.2.4
Vendor KONA I Co., Ltd.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, DES, TDEA, TDES, HMAC, CMAC
Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, DH
Schemes
MAC, Key Agreement
Randomness
DRBG, RNG
Block cipher modes
ECB, CBC

JavaCard versions
Java Card 3.0.4, Java Card 3.0
Vendor
Infineon

Security level
Level 3
Side-channel analysis
Side‐channel, DPA, SPA, DFA

Standards
FIPS113, FIPS197, FIPS 197, PKCS#1, PKCS #1, SCP03

File metadata

Title Microsoft Word - 311n - KONA N41M0 Security Policy.docx
Author lgarcia
Creation date D:20151013084952-07'00'
Modification date D:20151013084952-07'00'
Pages 23
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 10.1.15 (Windows)

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 2476,
  "dgst": "1395d0b76b56509d",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "RSA#1811",
        "SHS#2907",
        "DRBG#884",
        "ECDSA#718",
        "HMAC#2253",
        "Triple-DES#1979",
        "Triple-DES MAC#1979",
        "AES#3525",
        "RSA#1812"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.2.4",
        "2.01"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 8
          }
        },
        "FF": {
          "DH": {
            "DH": 2
          }
        },
        "RSA": {
          "RSA 2048": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "ECB": {
          "ECB": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 5
        },
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "# 3525": 1,
          "#1": 1,
          "#1979": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES (Cert. # 3525": 1,
          "Cert. # DRBG": 1,
          "PKCS #1": 2,
          "PKCS#1": 4,
          "RSA 2048": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 3": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0": 2,
          "Java Card 3.0.4": 1
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 9
        },
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "Side\u2010channel": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 197": 1,
          "FIPS113": 2,
          "FIPS197": 1
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 2
        },
        "SCP": {
          "SCP03": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 2
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 8,
            "HMAC": 5
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 1
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "lgarcia",
      "/CreationDate": "D:20151013084952-07\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20151013084952-07\u002700\u0027",
      "/Producer": "Acrobat Distiller 10.1.15 (Windows)",
      "/Title": "Microsoft Word - 311n - KONA N41M0 Security Policy.docx",
      "pdf_file_size_bytes": 491692,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "8b40f2ca1b0833e866f173264ecac7f05725cd0a996a6b87f42c38395b04c953",
    "policy_txt_hash": "057a61d57e83b164684629fb4c961bfe4ff888617ff73cb94aeb8e49a7ae8ec7"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "The module generates cryptographic keys whose strengths are modified by available entropy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertNov2015.pdf",
    "date_sunset": null,
    "description": "The KONA N41M0 smart card can be employed in solutions which provide secure PKI (public key infrastructure) and digital signature technology. KONA N41M0 serves as highly portable physical forms which enhances the security of network access and ensures secure electronic communications. KONA N41M0 supports on-card Triple DES, AES, ECC and 2048-bit RSA algorithms with on-card key generation. The KONA N41M0 smart card is Java-based smart cards for physical and logical access, e-transactions and other applications, which is compliant to Java Card v3.0.4 and GlobalPlatform 2.2.",
    "embodiment": "Single Chip",
    "exceptions": null,
    "fw_versions": "KONA N41M0 v2.01 and Demonstration Applet v1.2.4",
    "historical_reason": "Moved to historical list in accordance with SP800-131A Revision 1 Transition (AES/TDES key wrapping)",
    "hw_versions": "Infineon SLE97CNFX1M00PEA22",
    "level": 3,
    "mentioned_certs": {},
    "module_name": "KONA N41M0",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2015-11-20",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      }
    ],
    "vendor": "KONA I Co., Ltd.",
    "vendor_url": "http://www.konai.com/"
  }
}