This page was not yet optimized for use on mobile
devices.
Security Builder® FIPS Module
Certificate #882
Webpage information
Security policy
Symmetric Algorithms
AES, DES, TDES, HMAC, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, CMACAsymmetric Algorithms
ECDH, ECDSA, ECIES, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD4, MD5Schemes
Key AgreementRandomness
RNGBlock cipher modes
ECB, CBC, CTR, GCM, CCMSecurity level
Level 1Side-channel analysis
Timing Attack, Timing Attacks, Bleichenbacher attackStandards
FIPS 140-2, FIPS PUB 140-2, FIPS 46-3, FIPS 197, FIPS 180-2, FIPS 198, FIPS 186-2, PKCS1, PKCS #1, RFC 2268, RFC 1321, RFC 1320, RFC 1115, RFC 2104File metadata
| Title | FIPSModule24SecurityPolicy.dvi |
|---|---|
| Creation date | D:20080922095649 |
| Modification date | D:20080922095649 |
| Pages | 25 |
| Creator | dvips(k) 5.86 Copyright 1999 Radical Eye Software |
| Producer | GNU Ghostscript 8.01 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 882,
"dgst": "1de4842b42fa3db3",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"ECDSA#57",
"RSA#246",
"SHS#614",
"DSA#223",
"AES#549",
"RNG#317",
"Triple-DES#545",
"HMAC#290"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 6
},
"ECDSA": {
"ECDSA": 7
},
"ECIES": {
"ECIES": 4
}
},
"FF": {
"DH": {
"DH": 6,
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 8
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 6
},
"CCM": {
"CCM": 2
},
"CTR": {
"CTR": 2
},
"ECB": {
"ECB": 6
},
"GCM": {
"GCM": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 7,
"#223": 1,
"#246": 2,
"#290": 5,
"#317": 1,
"#545": 1,
"#549": 1,
"#57": 1,
"#614": 5
}
},
"fips_certlike": {
"Certlike": {
"#246 RSA": 1,
"#57 RSA": 1,
"DSA 11": 1,
"HMAC- SHA-1": 1,
"HMAC-SHA-1": 2,
"HMAC-SHA-224": 4,
"HMAC-SHA-256": 2,
"HMAC-SHA-384": 4,
"HMAC-SHA-512": 4,
"HMAC-SHA256": 2,
"PKCS #1": 12,
"PKCS1": 3,
"RSA 2": 1,
"RSA PKCS #1": 2,
"RSA PKCS1": 3,
"SHA-1": 3,
"SHA-224": 2,
"SHA-256": 2,
"SHA-384": 2,
"SHA-512": 2
}
},
"fips_security_level": {
"Level": {
"Level 1": 3
}
},
"hash_function": {
"MD": {
"MD4": {
"MD4": 2
},
"MD5": {
"MD5": 2
}
},
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 2,
"SHA-384": 2,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 10
}
},
"side_channel_analysis": {
"SCA": {
"Timing Attack": 3,
"Timing Attacks": 1
},
"other": {
"Bleichenbacher attack": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 11,
"FIPS 180-2": 5,
"FIPS 186-2": 3,
"FIPS 197": 1,
"FIPS 198": 5,
"FIPS 46-3": 1,
"FIPS PUB 140-2": 6
},
"PKCS": {
"PKCS #1": 7,
"PKCS1": 3
},
"RFC": {
"RFC 1115": 1,
"RFC 1320": 1,
"RFC 1321": 1,
"RFC 2104": 1,
"RFC 2268": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"DES": {
"3DES": {
"TDES": 5
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CMAC": 2,
"HMAC": 2,
"HMAC-SHA-224": 2,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 2
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/CreationDate": "D:20080922095649",
"/Creator": "dvips(k) 5.86 Copyright 1999 Radical Eye Software",
"/ModDate": "D:20080922095649",
"/Producer": "GNU Ghostscript 8.01",
"/Title": "FIPSModule24SecurityPolicy.dvi",
"pdf_file_size_bytes": 94262,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "f0680c7a9cf8ef191fd888b9e7ddf4d9a9bc7962efa40148065f4f2232c90543",
"policy_txt_hash": "5417cb030e22e34b95dd6cecc34071d817c70286b53229c23a508eddc7a66fa3"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt882.pdf",
"date_sunset": null,
"description": "The Security Builder\u00ae FIPS Module is a standards-based cryptographic toolkit that supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into both mobile and server-based applications. The Security Builder FIPS Module is part of the Certicom Security Architecture, a comprehensive cross-platform security solution which supports multiple cryptographic software and hardware providers with a single common API.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": null,
"fw_versions": null,
"historical_reason": "RNG SP800-131A Revision 1 Transition",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Security Builder\u00ae FIPS Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "2.4",
"tested_conf": [
"Yellow Dog Linux 2.6 and Maemo Linux 5 (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2007-12-14",
"lab": "DOMUS",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2008-11-06",
"lab": "",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2009-03-06",
"lab": "",
"validation_type": "Update"
}
],
"vendor": "Certicom Corp.",
"vendor_url": "http://www.certicom.com"
}
}