Riverbed Cryptographic Security Module

Certificate #2099

Webpage information

Status historical
Historical reason 186-2 transition
Validation dates 07.03.2014 , 16.04.2014 , 25.09.2014 , 15.12.2015 , 01.11.2016 , 02.11.2016 , 09.12.2016 , 05.01.2017
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When installed, initialized and configured as specified in the Security Policy Section 4 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description The Riverbed Cryptographic Security Module ("RCSM") provides the cryptographic functionality for a variety of Riverbed's platforms including Steelhead, SteelFusion and SteelCentral products. Using RCSM to provide FIPS compliance across Riverbed solutions, strengthens security and facilitates the product certification and accreditation processes, enabling hybrid enterprises to transform application performance into a competitive advantage by maximizing employee productivity and leveraging IT to create new forms of operational agility.
Tested configurations
  • Granite OS 2.0 running on Riverbed Granite Core Appliance
  • Granite OS 2.0 x86 on VMware ESXi 5.1 running on Dell PowerEdge R210II with AES-NI
  • Granite OS 2.0 x86 on VMware ESXi 5.1 running on Dell PowerEdge R210II without AES-NI
  • Interceptor OS 4.5 running on Riverbed Interceptor Appliance
  • RiOS 8.0 x86 32-bit running on Riverbed Steelhead Appliance
  • RiOS 8.0 x86 64-bit on VMware ESXi 5.1 running on Dell PowerEdge R210II with AES-NI
  • RiOS 8.0 x86 64-bit on VMware ESXi 5.1 running on Dell PowerEdge R210II without AES-NI
  • RiOS 8.0 x86 64-bit running on Riverbed Steelhead Appliance
  • RiOS 8.0 x86 64-bit running on Riverbed Steelhead Appliance with AES-NI
  • RiOS 8.6 32-bit running on Riverbed Steelhead Appliance
  • RiOS 8.6 64-bit on Vmware ESXi 5.1 running on Dell PowerEdge R210II with AES-NI
  • RiOS 8.6 64-bit on Vmware ESXi 5.1 running on Dell PowerEdge R210II without AES-NI
  • RiOS 8.6 64-bit running on Riverbed Steelhead Appliance
  • RiOS 8.6 64-bit running on Riverbed Steelhead Appliance with AES-NI
  • RiOS 9.2 x86 64-bit on KVM 1.0 running on Dell PowerEdge R320 with PAA
  • RiOS 9.2 x86 64-bit on KVM 1.0 running on Dell PowerEdge R320 without PAA
  • RiOS 9.2 x86 64-bit running on Riverbed Steelhead Appliance with PAA
  • RiOS 9.2 x86 64-bit running on Riverbed Steelhead Appliance without PAA
  • RiOS 9.2 x86 on VMware ESXi 5.5 running on Dell PowerEdge R320 with PAA
  • RiOS 9.2 x86 on VMware ESXi 5.5 running on Dell PowerEdge R320 without PAA
  • Riverbed License Manager 1.0 on VMware ESXi 5.5 running on Dell PowerEdge R320 with PAA
  • Riverbed License Manager 1.0 on VMware ESXi 5.5 running on Dell PowerEdge R320 without PAA
  • Riverbed SteelCentral AppResponse 11.2 64bit on VMware ESXi 5.5 running on Dell PowerEdge R320 with PAA
  • Riverbed SteelCentral AppResponse 11.2 64bit on VMware ESXi 5.5 running on Dell PowerEdge R320 without PAA
  • Riverbed SteelCentral AppResponse 11.2 running on Riverbed appliance with PAA
  • Riverbed SteelCentral AppResponse 11.2 running on Riverbed appliance without PAA (single-user mode)
  • SteelCentral Controller for SteelHead Mobile 5.0 on VMware ESXi 5.5 running on Dell PowerEdge R320 with PAA
  • SteelCentral Controller for SteelHead Mobile 5.0 on VMware ESXi 5.5 running on Dell PowerEdge R320 without PAA
  • SteelCentral Controller for SteelHead Mobile 5.0 running on SMC appliance with PAA
  • SteelCentral Controller for SteelHead Mobile 5.0 running on SMC appliance without PAA
  • SteelFusion 4.3 on VMware ESXi 5.5 running on Dell PowerEdge R320 with PAA
  • SteelFusion 4.3 on VMware ESXi 5.5 running on Dell PowerEdge R320 without PAA
  • SteelFusion 4.3 running on Riverbed SteelFusion appliance with PAA
  • SteelFusion 4.3 running on Riverbed SteelFusion appliance without PAA
  • Steelhead Mobile Controller 4.6 on Vmware ESXi 5.1 running on Dell PowerEdge R210II with AES-NI
  • Steelhead Mobile Controller 4.6 on Vmware ESXi 5.1 running on Dell PowerEdge R210II without AES-NI
  • Steelhead Mobile Controller 4.6 running on SMC with AES NI
  • Steelhead Mobile Controller 4.6 running on SMC without AES-NI
  • Stingray Traffic Manager Virtual Appliance x86 on VMware ESXi 5.1 running on Dell PowerEdge R210II with AES-NI
  • Stingray Traffic Manager Virtual Appliance x86 on VMware ESXi 5.1 running on Dell PowerEdge R210II without AES-NI
  • Whitewater OS 3.0 on VMware ESXi 5.1 running on Dell PowerEdge R210II with AES-NI
  • Whitewater OS 3.0 on VMware ESXi 5.1 running on Dell PowerEdge R210II without AES-NI
  • Whitewater OS 3.0 running on Whitewater Appliance with AES-NI
  • Whitewater OS 3.0 running on Whitewater Appliance without AES-NI
Vendor Riverbed Technology, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, HMAC, CMAC
Asymmetric Algorithms
ECDSA, ECC, DH, DSA
Hash functions
SHA1, SHA224, SHA256, SHA384, SHA512
Schemes
Key Agreement, Key agreement
Randomness
DRBG, RNG
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTS

Security level
Level 1, level 1

Standards
FIPS 197, FIPS 198, PKCS#1

File metadata

Author CPUBuilders Customer
Creation date D:20161108101945-05'00'
Pages 20
Creator Writer
Producer LibreOffice 4.2

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 2099,
  "dgst": "1aaf97e300d50bac",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "HMAC#1476",
        "Triple-DES#1485",
        "ECDSA#392",
        "SHS#2046",
        "DRBG#310",
        "AES#2374",
        "DSA#745",
        "CVL#65",
        "RSA#1229"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDSA": {
            "ECDSA": 17
          }
        },
        "FF": {
          "DH": {
            "DH": 8
          },
          "DSA": {
            "DSA": 17
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 3
        },
        "CFB": {
          "CFB": 3
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 5
        },
        "OFB": {
          "OFB": 1
        },
        "XTS": {
          "XTS": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES 128/ 192/256": 1,
          "AES 128/192/256": 1,
          "AES 128/192/256 1179": 1,
          "AES, 256": 1,
          "DRBG1": 1,
          "PKCS#1": 4,
          "SHA1": 1,
          "SHA224": 1,
          "SHA256": 3,
          "SHA384": 1,
          "SHA512": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1,
          "level 1": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA1": 1
          },
          "SHA2": {
            "SHA224": 1,
            "SHA256": 3,
            "SHA384": 1,
            "SHA512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 26
        },
        "RNG": {
          "RNG": 13
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 197": 1,
          "FIPS 198": 1
        },
        "PKCS": {
          "PKCS#1": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 22
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 14,
            "HMAC": 6
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "CPUBuilders Customer",
      "/CreationDate": "D:20161108101945-05\u002700\u0027",
      "/Creator": "Writer",
      "/Producer": "LibreOffice 4.2",
      "pdf_file_size_bytes": 567571,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://csrc.nist.gov/groups/STM/cmvp/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 20
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "e3ca58ee51cfa173bdbe59895666eda4fa0aa7f71c0b72da6ec81c351b3b24e1",
    "policy_txt_hash": "2063db9fb556c7b3e8c8c40a580515277c3ba47ed8ac352e09dd0e807f88ba11"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When installed, initialized and configured as specified in the Security Policy Section 4 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0039.pdf",
    "date_sunset": null,
    "description": "The Riverbed Cryptographic Security Module (\"RCSM\") provides the cryptographic functionality for a variety of Riverbed\u0027s platforms including Steelhead, SteelFusion and SteelCentral products. Using RCSM to provide FIPS compliance across Riverbed solutions, strengthens security and facilitates the product certification and accreditation processes, enabling hybrid enterprises to transform application performance into a competitive advantage by maximizing employee productivity and leveraging IT to create new forms of operational agility.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "186-2 transition",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Riverbed Cryptographic Security Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "1.0",
    "tested_conf": [
      "Granite OS 2.0 running on Riverbed Granite Core Appliance",
      "Granite OS 2.0 x86 on VMware ESXi 5.1 running on Dell PowerEdge R210II with AES-NI",
      "Granite OS 2.0 x86 on VMware ESXi 5.1 running on Dell PowerEdge R210II without AES-NI",
      "Interceptor OS 4.5 running on Riverbed Interceptor Appliance",
      "RiOS 8.0 x86 32-bit running on Riverbed Steelhead Appliance",
      "RiOS 8.0 x86 64-bit on VMware ESXi 5.1 running on Dell PowerEdge R210II with AES-NI",
      "RiOS 8.0 x86 64-bit on VMware ESXi 5.1 running on Dell PowerEdge R210II without AES-NI",
      "RiOS 8.0 x86 64-bit running on Riverbed Steelhead Appliance",
      "RiOS 8.0 x86 64-bit running on Riverbed Steelhead Appliance with AES-NI",
      "RiOS 8.6 32-bit running on Riverbed Steelhead Appliance",
      "RiOS 8.6 64-bit on Vmware ESXi 5.1 running on Dell PowerEdge R210II with AES-NI",
      "RiOS 8.6 64-bit on Vmware ESXi 5.1 running on Dell PowerEdge R210II without AES-NI",
      "RiOS 8.6 64-bit running on Riverbed Steelhead Appliance",
      "RiOS 8.6 64-bit running on Riverbed Steelhead Appliance with AES-NI",
      "RiOS 9.2 x86 64-bit on KVM 1.0 running on Dell PowerEdge R320 with PAA",
      "RiOS 9.2 x86 64-bit on KVM 1.0 running on Dell PowerEdge R320 without PAA",
      "RiOS 9.2 x86 64-bit running on Riverbed Steelhead Appliance with PAA",
      "RiOS 9.2 x86 64-bit running on Riverbed Steelhead Appliance without PAA",
      "RiOS 9.2 x86 on VMware ESXi 5.5 running on Dell PowerEdge R320 with PAA",
      "RiOS 9.2 x86 on VMware ESXi 5.5 running on Dell PowerEdge R320 without PAA",
      "Riverbed License Manager 1.0 on VMware ESXi 5.5 running on Dell PowerEdge R320 with PAA",
      "Riverbed License Manager 1.0 on VMware ESXi 5.5 running on Dell PowerEdge R320 without PAA",
      "Riverbed SteelCentral AppResponse 11.2 64bit on VMware ESXi 5.5 running on Dell PowerEdge R320 with PAA",
      "Riverbed SteelCentral AppResponse 11.2 64bit on VMware ESXi 5.5 running on Dell PowerEdge R320 without PAA",
      "Riverbed SteelCentral AppResponse 11.2 running on Riverbed appliance with PAA",
      "Riverbed SteelCentral AppResponse 11.2 running on Riverbed appliance without PAA (single-user mode)",
      "SteelCentral Controller for SteelHead Mobile 5.0 on VMware ESXi 5.5 running on Dell PowerEdge R320 with PAA",
      "SteelCentral Controller for SteelHead Mobile 5.0 on VMware ESXi 5.5 running on Dell PowerEdge R320 without PAA",
      "SteelCentral Controller for SteelHead Mobile 5.0 running on SMC appliance with PAA",
      "SteelCentral Controller for SteelHead Mobile 5.0 running on SMC appliance without PAA",
      "SteelFusion 4.3 on VMware ESXi 5.5 running on Dell PowerEdge R320 with PAA",
      "SteelFusion 4.3 on VMware ESXi 5.5 running on Dell PowerEdge R320 without PAA",
      "SteelFusion 4.3 running on Riverbed SteelFusion appliance with PAA",
      "SteelFusion 4.3 running on Riverbed SteelFusion appliance without PAA",
      "Steelhead Mobile Controller 4.6 on Vmware ESXi 5.1 running on Dell PowerEdge R210II with AES-NI",
      "Steelhead Mobile Controller 4.6 on Vmware ESXi 5.1 running on Dell PowerEdge R210II without AES-NI",
      "Steelhead Mobile Controller 4.6 running on SMC with AES NI",
      "Steelhead Mobile Controller 4.6 running on SMC without AES-NI",
      "Stingray Traffic Manager Virtual Appliance x86 on VMware ESXi 5.1 running on Dell PowerEdge R210II with AES-NI",
      "Stingray Traffic Manager Virtual Appliance x86 on VMware ESXi 5.1 running on Dell PowerEdge R210II without AES-NI",
      "Whitewater OS 3.0 on VMware ESXi 5.1 running on Dell PowerEdge R210II with AES-NI",
      "Whitewater OS 3.0 on VMware ESXi 5.1 running on Dell PowerEdge R210II without AES-NI",
      "Whitewater OS 3.0 running on Whitewater Appliance with AES-NI",
      "Whitewater OS 3.0 running on Whitewater Appliance without AES-NI"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2014-03-07",
        "lab": "CGI Information Systems \u0026 Management Consultants Inc",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2014-04-16",
        "lab": "CGI Information Systems \u0026 Management Consultants Inc",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2014-09-25",
        "lab": "CGI Information Systems \u0026 Management Consultants Inc",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2015-12-15",
        "lab": "CGI Information Systems \u0026 Management Consultants Inc",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2016-11-01",
        "lab": "CGI Information Systems \u0026 Management Consultants Inc",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2016-11-02",
        "lab": "CGI Information Systems \u0026 Management Consultants Inc",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2016-12-09",
        "lab": "CGI Information Systems \u0026 Management Consultants Inc",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2017-01-05",
        "lab": "CGI Information Systems \u0026 Management Consultants Inc",
        "validation_type": "Update"
      }
    ],
    "vendor": "Riverbed Technology, Inc.",
    "vendor_url": "http://www.riverbed.com"
  }
}