This page was not yet optimized for use on mobile devices.
Keysight BC-FJA (Bouncy Castle FIPS Java API) for Network Visibility
Certificate #4847
Webpage information ?
Security policy ?
Symmetric Algorithms
AES, AES-128, AES-192, AES-256, Twofish, Serpent, CAST5, CAST, RC4, RC2, DES, Triple-DES, TDEA, TDES, ChaCha20, Poly1305, IDEA, Blowfish, Camellia, SEED, HMAC, HMAC-SHA-256, KMAC, CMAC, CBC-MACAsymmetric Algorithms
RSA-OAEP, ECDSA, EdDSA, ECC, Diffie-Hellman, DH, DSAPost-quantum Algorithms
LMSHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA2, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHA-3, SHA3, SHAKE128, SHAKE256, MD5, RIPEMD128, RIPEMD160, RIPEMD320, RIPEMD256, RIPEMD, scrypt, PBKDF, PBKDF2Schemes
MAC, Key Agreement, AEADProtocols
SSH, TLS, TLS 1.2, TLSv1.2, TLS 1.0, TLS 1.1, IKEv2, PGPRandomness
PRNG, DRBG, RNG, RBGLibraries
OpenSSL, BouncyCastleElliptic Curves
P-224, P-256, P-384, P-521, P-192, K-233, K-283, K-409, K-571, B-233, B-409, B-571, B-283, K-163, B-163, Ed25519, Ed448Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCMJavaCard API constants
X25519, X448Trusted Execution Environments
SESecurity level
Level 1Side-channel analysis
timing attacks, timing attackStandards
FIPS 140-3, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 186-2, FIPS 180-4, FIPS 202, FIPS 186-3, SP 800-38A, SP 800-38G, SP 800-38C, SP 800-38B, SP 800-38D, SP 800-132, SP 800-38F, SP 800-185, NIST SP 800-107, SP 800-90B, NIST SP 800-90C, SP 800-89, SP 800-90A, PKCS #1, PKCS1, PKCS#12, PKCS#5, PKCS#1, RFC 8708, RFC 7914, ISO/IEC 24759File metadata
Title | Microsoft Word - Keysight BC-FJA FIPS 140-3 Security Policy v1.0r1.docx |
---|---|
Author | Rachel Shelby |
Creation date | D:20240821114900-07'00' |
Modification date | D:20240821114900-07'00' |
Pages | 39 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 24.0 (Windows) |
Heuristics ?
No heuristics are available for this certificate.
References ?
No references are available for this certificate.
Updates ?
-
12.11.2024 The certificate was first processed.
New certificate
A new FIPS 140 certificate with the product name was processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4847,
"dgst": "29d9c129c3e755f6",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"SHA2-512/256A4399",
"KDF ANS 9.63A4399",
"HMAC-SHA3-512A4399",
"AES-GCMA4399",
"ECDSA SigGen (FIPS186-4)A4399",
"HMAC-SHA3-384A4399",
"HMAC-SHA2-224A4399",
"HMAC-SHA2-512/224A4399",
"AES-CCMA4399",
"KDF TLSA4399",
"AES-CBC-CS3A4399",
"KMAC-128A4399",
"RSA Decryption PrimitiveA4399",
"RSA KeyGen (FIPS186-4)A4399",
"AES-OFBA4399",
"AES-CBC-CS2A4399",
"AES-ECBA4399",
"AES-CBCA4399",
"DSA PQGGen (FIPS186-4)A4399",
"KDF SNMPA4399",
"AES-GMACA4399",
"SHA2-512/224A4399",
"Hash DRBGA4399",
"DSA PQGVer (FIPS186-4)A4399",
"SHA3-512A4399",
"TupleHash-128A4399",
"cSHAKE-256A4399",
"cSHAKE-128A4399",
"HMAC-SHA-1A4399",
"KDF SSHA4399",
"KTS-IFCA4399",
"ParallelHash-256A4399",
"PBKDFA4399",
"KDA HKDF SP800-56Cr2A4399",
"RSA SigGen (FIPS186-4)A4399",
"SHA2-256A4399",
"SHA2-512A4399",
"DSA KeyGen (FIPS186-4)A4399",
"RSA SigVer (FIPS186-2)A4399",
"HMAC-SHA2-256A4399",
"AES-CFB128A4399",
"KDF SP800-108A4399",
"KDF IKEv2A4399",
"RSA SigVer (FIPS186-4)A4399",
"AES-KWA4399",
"AES-FF1A4399",
"ParallelHash-128A4399",
"HMAC-SHA2-384A4399",
"KDF SRTPA4399",
"Safe Primes Key GenerationA4399",
"SHA2-384A4399",
"AES-CTRA4399",
"AES-CFB8A4399",
"AES-KWPA4399",
"HMAC-SHA3-256A4399",
"KDA OneStep SP800-56Cr2A4399",
"SHA2-224A4399",
"KMAC-256A4399",
"SHA3-256A4399",
"Counter DRBGA4399",
"DSA SigVer (FIPS186-4)A4399",
"SHAKE-256A4399",
"KDA TwoStep SP800-56Cr2A4399",
"SHA-1A4399",
"KAS-ECC Sp800-56Ar3A4399",
"AES-CBC-CS1A4399",
"HMAC DRBGA4399",
"Safe Primes Key VerificationA4399",
"ECDSA KeyGen (FIPS186-4)A4399",
"HMAC-SHA2-512/256A4399",
"ECDSA SigVer (FIPS186-4)A4399",
"RSA Signature PrimitiveA4399",
"SHA3-224A4399",
"DSA SigGen (FIPS186-4)A4399",
"HMAC-SHA2-512A4399",
"HMAC-SHA3-224A4399",
"AES-CMACA4399",
"KAS-IFCA4399",
"SHA3-384A4399",
"ECDSA KeyVer (FIPS186-4)A4399",
"KAS-FFC Sp800-56Ar3A4399",
"SHAKE-128A4399",
"TupleHash-256A4399"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 17
},
"EdDSA": {
"EdDSA": 2
}
},
"FF": {
"DH": {
"DH": 12,
"Diffie-Hellman": 6
},
"DSA": {
"DSA": 28
}
},
"RSA": {
"RSA-OAEP": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"CCM": {
"CCM": 5
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 7
},
"ECB": {
"ECB": 4
},
"GCM": {
"GCM": 18
},
"OFB": {
"OFB": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"BouncyCastle": {
"BouncyCastle": 1
},
"OpenSSL": {
"OpenSSL": 2
}
},
"crypto_protocol": {
"IKE": {
"IKEv2": 11
},
"PGP": {
"PGP": 1
},
"SSH": {
"SSH": 10
},
"TLS": {
"TLS": {
"TLS": 25,
"TLS 1.0": 1,
"TLS 1.1": 1,
"TLS 1.2": 3,
"TLSv1.2": 2
}
}
},
"crypto_scheme": {
"AEAD": {
"AEAD": 1
},
"KA": {
"Key Agreement": 9
},
"MAC": {
"MAC": 9
}
},
"device_model": {},
"ecc_curve": {
"Edwards": {
"Ed25519": 2,
"Ed448": 2
},
"NIST": {
"B-163": 1,
"B-233": 7,
"B-283": 5,
"B-409": 6,
"B-571": 6,
"K-163": 1,
"K-233": 5,
"K-283": 5,
"K-409": 6,
"K-571": 4,
"P-192": 2,
"P-224": 12,
"P-256": 18,
"P-384": 12,
"P-521": 12
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 4
}
},
"fips_certlike": {
"Certlike": {
"AES-128": 1,
"AES-192": 1,
"AES-256": 1,
"AES-CTR 256": 1,
"AES-GCM Decrypt KAT (128": 1,
"AES-GCM Encrypt KAT (128": 1,
"DRBG16": 18,
"DRBG7": 1,
"DSA2": 1,
"HMAC 8": 2,
"HMAC SHA-1": 3,
"HMAC SHA-224": 3,
"HMAC SHA-256": 4,
"HMAC SHA-384": 3,
"HMAC SHA-512": 3,
"HMAC SHA-512/224": 3,
"HMAC SHA-512/256": 3,
"HMAC-SHA-256": 2,
"PAA 2": 1,
"PAA 3": 1,
"PAA 4": 1,
"PKCS #1": 8,
"PKCS#1": 6,
"PKCS#12": 6,
"PKCS#5": 6,
"PKCS1": 8,
"SHA-1": 14,
"SHA-224": 8,
"SHA-256": 9,
"SHA-3": 7,
"SHA-384": 8,
"SHA-512": 8,
"SHA2": 2,
"SHA2-224": 5,
"SHA2-256": 8,
"SHA2-384": 6,
"SHA2-512": 7,
"SHA3": 1,
"SHA3-224": 7,
"SHA3-256": 7,
"SHA3-384": 7,
"SHA3-512": 7
}
},
"fips_security_level": {
"Level": {
"Level 1": 5
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 6
}
},
"PBKDF": {
"PBKDF": 20,
"PBKDF2": 2
},
"RIPEMD": {
"RIPEMD": 1,
"RIPEMD128": 2,
"RIPEMD160": 2,
"RIPEMD256": 1,
"RIPEMD320": 2
},
"SHA": {
"SHA1": {
"SHA-1": 14
},
"SHA2": {
"SHA-224": 8,
"SHA-256": 9,
"SHA-384": 8,
"SHA-512": 8,
"SHA2": 2
},
"SHA3": {
"SHA-3": 7,
"SHA3": 1,
"SHA3-224": 7,
"SHA3-256": 7,
"SHA3-384": 7,
"SHA3-512": 7
}
},
"SHAKE": {
"SHAKE128": 1,
"SHAKE256": 2
},
"scrypt": {
"scrypt": 1
}
},
"ic_data_group": {},
"javacard_api_const": {
"curves": {
"X25519": 2,
"X448": 2
}
},
"javacard_packages": {
"java": {
"java.security": 2
},
"org": {
"org.bouncycastle.crypto": 1,
"org.bouncycastle.entropy": 1,
"org.bouncycastle.fips": 2,
"org.bouncycastle.util": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {
"LMS": {
"LMS": 1
}
},
"randomness": {
"PRNG": {
"DRBG": 61,
"PRNG": 2
},
"RNG": {
"RBG": 2,
"RNG": 2
}
},
"side_channel_analysis": {
"SCA": {
"timing attack": 1,
"timing attacks": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-3": 14,
"FIPS 180-4": 2,
"FIPS 186-2": 1,
"FIPS 186-3": 1,
"FIPS 186-4": 7,
"FIPS 197": 2,
"FIPS 198-1": 2,
"FIPS 202": 2
},
"ISO": {
"ISO/IEC 24759": 2
},
"NIST": {
"NIST SP 800-107": 1,
"NIST SP 800-90C": 1,
"SP 800-132": 4,
"SP 800-185": 1,
"SP 800-38A": 3,
"SP 800-38B": 2,
"SP 800-38C": 2,
"SP 800-38D": 3,
"SP 800-38F": 2,
"SP 800-38G": 2,
"SP 800-89": 1,
"SP 800-90A": 1,
"SP 800-90B": 3
},
"PKCS": {
"PKCS #1": 4,
"PKCS#1": 3,
"PKCS#12": 3,
"PKCS#5": 3,
"PKCS1": 4
},
"RFC": {
"RFC 7914": 1,
"RFC 8708": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 46,
"AES-128": 1,
"AES-192": 1,
"AES-256": 1
},
"CAST": {
"CAST": 3,
"CAST5": 1
},
"RC": {
"RC2": 1,
"RC4": 1
},
"Serpent": {
"Serpent": 1
},
"Twofish": {
"Twofish": 1
}
},
"DES": {
"3DES": {
"TDEA": 7,
"TDES": 1,
"Triple-DES": 9
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1,
"CMAC": 8,
"HMAC": 67,
"HMAC-SHA-256": 1,
"KMAC": 14
}
},
"djb": {
"ChaCha": {
"ChaCha20": 2
},
"Poly": {
"Poly1305": 2
}
},
"miscellaneous": {
"Blowfish": {
"Blowfish": 1
},
"Camellia": {
"Camellia": 1
},
"IDEA": {
"IDEA": 1
},
"SEED": {
"SEED": 1
}
}
},
"tee_name": {
"IBM": {
"SE": 7
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Rachel Shelby",
"/CreationDate": "D:20240821114900-07\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20240821114900-07\u002700\u0027",
"/Producer": "Acrobat Distiller 24.0 (Windows)",
"/Title": "Microsoft Word - Keysight BC-FJA FIPS 140-3 Security Policy v1.0r1.docx",
"pdf_file_size_bytes": 611700,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 39
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "3d8cfcd90e912b46158aa1c71021569bae9daf0cfe453ceb2ac2cf3756937392",
"policy_txt_hash": "d46ac4aabc8fbce8333a1f9b996a666b1595dc8c6aef8f2fd74b85d971d53922"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in approved mode. No assurance of the minimum strength of generated SSPs (e.g., keys).",
"certificate_pdf_url": null,
"date_sunset": "2029-07-28",
"description": "The Keysight Technologies BC-FJA (Bouncy Castle FIPS Java API) is integrated into Keysight\u2019s network visibility product family to provide FIPS 140-3 validated cryptography for the protection of sensitive information.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical security: N/A",
"Non-invasive security: N/A",
"Documentation requirements: N/A",
"Cryptographic module security policy: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Keysight BC-FJA (Bouncy Castle FIPS Java API) for Network Visibility",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": "2.0.0",
"tested_conf": [
"VMware Photon OS 4.0 with Java SE Runtime Environment v8 on VMware ESXi 8.0 running on Dell PowerEdge R650 with Intel Xeon Gold 6330, VMware Photon OS 4.0 with Java SE Runtime Environment v11 on VMware ESXi 8.0 running on Dell PowerEdge R650 with Intel Xeon Gold 6330, VMware Photon OS 4.0 with Java SE Runtime Environment v17 on VMware ESXi 8.0 running on Dell PowerEdge R650 with Intel Xeon Gold 6330, VMware Photon OS 5.0 with Java SE Runtime Environment v21 on VMware ESXi 8.0 running on Dell PowerEdge R650 with Intel Xeon Gold 6330"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2024-10-21",
"lab": "EWA CANADA",
"validation_type": "Initial"
}
],
"vendor": "Keysight Technologies",
"vendor_url": "http://www.keysight.com/us/en/home.html"
}
}