This page was not yet optimized for use on mobile
devices.
Keysight BC-FJA (Bouncy Castle FIPS Java API) for Network Visibility
Certificate #4847
Webpage information
Security policy
Symmetric Algorithms
AES, AES-128, AES-192, AES-256, Twofish, Serpent, CAST5, CAST, RC4, RC2, DES, Triple-DES, TDEA, TDES, ChaCha20, Poly1305, IDEA, Blowfish, Camellia, SEED, HMAC, HMAC-SHA-256, KMAC, CMAC, CBC-MACAsymmetric Algorithms
RSA-OAEP, ECDSA, EdDSA, ECC, Diffie-Hellman, DH, DSAPost-quantum Algorithms
LMSHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA2, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHA-3, SHA3, SHAKE128, SHAKE256, MD5, RIPEMD128, RIPEMD160, RIPEMD320, RIPEMD256, RIPEMD, scrypt, PBKDF, PBKDF2Schemes
MAC, Key Agreement, AEADProtocols
SSHv2, SSH, TLS, TLS 1.2, TLSv1.2, TLS 1.0, TLS 1.1, IKEv2, PGPRandomness
PRNG, DRBG, RNG, RBGLibraries
OpenSSL, BouncyCastleElliptic Curves
P-224, P-256, P-384, P-521, P-192, K-233, K-283, K-409, K-571, B-233, B-409, B-571, B-283, K-163, B-163, Ed25519, Ed448Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCMJavaCard API constants
X25519, X448Trusted Execution Environments
SSC, SESecurity level
Level 1Side-channel analysis
timing attacks, timing attackStandards
FIPS 140-3, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 186-2, FIPS 180-4, FIPS 202, FIPS 186-3, FIPS PUB 140-3, SP 800-38A, SP 800-38G, SP 800-38C, SP 800-38B, SP 800-38D, SP 800-132, SP 800-38F, SP 800-185, NIST SP 800-107, SP 800-90B, NIST SP 800-90C, SP 800-89, SP 800-90A, PKCS #1, PKCS1, PKCS#12, PKCS#5, PKCS#1, RFC 8708, RFC 7914, ISO/IEC 24759File metadata
| Title | Microsoft Word - Keysight BC-FJA FIPS 140-3 Security Policy V1.2r2.docx |
|---|---|
| Author | Rachel Shelby |
| Creation date | D:20250730163204-07'00' |
| Modification date | D:20250730163204-07'00' |
| Pages | 40 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | Acrobat Distiller 25.0 (Windows) |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4847,
"dgst": "29d9c129c3e755f6",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"HMAC DRBGA7176",
"KDF SRTPA7176",
"cSHAKE-128A7176",
"AES-CBC-CS1A7176",
"DSA SigVer (FIPS186-4)A7176",
"AES-CBC-CS2A7176",
"Counter DRBGA7176",
"AES-CBCA7176",
"DSA PQGVer (FIPS186-4)A7176",
"cSHAKE-256A7176",
"RSA Signature PrimitiveA7176",
"RSA SigVer (FIPS186-2)A7176",
"DSA KeyGen (FIPS186-4)A7176",
"Safe Primes Key GenerationA7176",
"KDF ANS 9.63A7176",
"SHA2-224A7176",
"HMAC-SHA2-224A7176",
"TupleHash-128A7176",
"AES-CTRA7176",
"HMAC-SHA2-512A7176",
"SHA3-224A7176",
"AES-CFB128A7176",
"AES-CBC-CS3A7176",
"KMAC-128A7176",
"KAS-IFCA7176",
"KDF SNMPA7176",
"SHA2-384A7176",
"KDF TLSA7176",
"AES-KWPA7176",
"DSA SigGen (FIPS186-4)A7176",
"KDF IKEv2A7176",
"DSA PQGGen (FIPS186-4)A7176",
"ECDSA KeyVer (FIPS186-4)A7176",
"SHA2-512/224A7176",
"AES-CCMA7176",
"SHA2-256A7176",
"SHAKE-128A7176",
"KDA TwoStep SP800-56Cr2A7176",
"KMAC-256A7176",
"KDF SP800-108A7176",
"AES-CFB8A7176",
"AES-OFBA7176",
"SHA2-512A7176",
"KAS-ECC Sp800-56Ar3A7176",
"HMAC-SHA2-384A7176",
"HMAC-SHA2-512/224A7176",
"KAS-FFC Sp800-56Ar3A7176",
"Hash DRBGA7176",
"SHA3-512A7176",
"KDF SSHA7176",
"AES-GMACA7176",
"HMAC-SHA3-224A7176",
"SHA3-384A7176",
"KDA OneStep SP800-56Cr2A7176",
"ECDSA KeyGen (FIPS186-4)A7176",
"HMAC-SHA2-512/256A7176",
"AES-GCMA7176",
"RSA KeyGen (FIPS186-4)A7176",
"SHAKE-256A7176",
"HMAC-SHA-1A7176",
"SHA-1A7176",
"HMAC-SHA3-512A7176",
"Safe Primes Key VerificationA7176",
"AES-ECBA7176",
"ECDSA SigVer (FIPS186-4)A7176",
"HMAC-SHA2-256A7176",
"HMAC-SHA3-256A7176",
"AES-CMACA7176",
"SHA2-512/256A7176",
"TupleHash-256A7176",
"KTS-IFCA7176",
"PBKDFA7176",
"RSA SigGen (FIPS186-4)A7176",
"KDA HKDF SP800-56Cr2A7176",
"RSA SigVer (FIPS186-4)A7176",
"AES-FF1A7176",
"HMAC-SHA3-384A7176",
"SHA3-256A7176",
"ECDSA SigGen (FIPS186-4)A7176",
"ParallelHash-128A7176",
"RSA Decryption PrimitiveA7176",
"ParallelHash-256A7176",
"AES-KWA7176"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 17
},
"EdDSA": {
"EdDSA": 2
}
},
"FF": {
"DH": {
"DH": 12,
"Diffie-Hellman": 6
},
"DSA": {
"DSA": 28
}
},
"RSA": {
"RSA-OAEP": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"CCM": {
"CCM": 5
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 7
},
"ECB": {
"ECB": 4
},
"GCM": {
"GCM": 18
},
"OFB": {
"OFB": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"BouncyCastle": {
"BouncyCastle": 1
},
"OpenSSL": {
"OpenSSL": 2
}
},
"crypto_protocol": {
"IKE": {
"IKEv2": 11
},
"PGP": {
"PGP": 1
},
"SSH": {
"SSH": 10,
"SSHv2": 1
},
"TLS": {
"TLS": {
"TLS": 25,
"TLS 1.0": 1,
"TLS 1.1": 1,
"TLS 1.2": 3,
"TLSv1.2": 2
}
}
},
"crypto_scheme": {
"AEAD": {
"AEAD": 1
},
"KA": {
"Key Agreement": 9
},
"MAC": {
"MAC": 9
}
},
"device_model": {},
"ecc_curve": {
"Edwards": {
"Ed25519": 2,
"Ed448": 2
},
"NIST": {
"B-163": 1,
"B-233": 7,
"B-283": 5,
"B-409": 6,
"B-571": 6,
"K-163": 1,
"K-233": 5,
"K-283": 5,
"K-409": 6,
"K-571": 4,
"P-192": 2,
"P-224": 12,
"P-256": 18,
"P-384": 12,
"P-521": 12
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 4
}
},
"fips_certlike": {
"Certlike": {
"AES-128": 1,
"AES-192": 1,
"AES-256": 1,
"AES-CTR 256": 1,
"AES-GCM Decrypt KAT (128": 1,
"AES-GCM Encrypt KAT (128": 1,
"DRBG16": 18,
"DRBG7": 1,
"DSA2": 1,
"HMAC SHA-1": 3,
"HMAC SHA-224": 3,
"HMAC SHA-256": 4,
"HMAC SHA-384": 3,
"HMAC SHA-512": 3,
"HMAC SHA-512/224": 3,
"HMAC SHA-512/256": 3,
"HMAC-SHA-256": 2,
"PKCS #1": 8,
"PKCS#1": 6,
"PKCS#12": 6,
"PKCS#5": 6,
"PKCS1": 8,
"SHA-1": 14,
"SHA-224": 8,
"SHA-256": 9,
"SHA-3": 8,
"SHA-384": 8,
"SHA-512": 8,
"SHA2": 2,
"SHA2-224": 5,
"SHA2-256": 8,
"SHA2-384": 6,
"SHA2-512": 7,
"SHA3": 1,
"SHA3-224": 7,
"SHA3-256": 7,
"SHA3-384": 7,
"SHA3-512": 7
}
},
"fips_security_level": {
"Level": {
"Level 1": 5
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 6
}
},
"PBKDF": {
"PBKDF": 20,
"PBKDF2": 2
},
"RIPEMD": {
"RIPEMD": 1,
"RIPEMD128": 2,
"RIPEMD160": 2,
"RIPEMD256": 1,
"RIPEMD320": 2
},
"SHA": {
"SHA1": {
"SHA-1": 14
},
"SHA2": {
"SHA-224": 8,
"SHA-256": 9,
"SHA-384": 8,
"SHA-512": 8,
"SHA2": 2
},
"SHA3": {
"SHA-3": 8,
"SHA3": 1,
"SHA3-224": 7,
"SHA3-256": 7,
"SHA3-384": 7,
"SHA3-512": 7
}
},
"SHAKE": {
"SHAKE128": 1,
"SHAKE256": 2
},
"scrypt": {
"scrypt": 1
}
},
"ic_data_group": {},
"javacard_api_const": {
"curves": {
"X25519": 2,
"X448": 2
}
},
"javacard_packages": {
"java": {
"java.security": 2
},
"org": {
"org.bouncycastle.crypto": 1,
"org.bouncycastle.entropy": 1,
"org.bouncycastle.fips": 2,
"org.bouncycastle.util": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {
"LMS": {
"LMS": 1
}
},
"randomness": {
"PRNG": {
"DRBG": 61,
"PRNG": 2
},
"RNG": {
"RBG": 2,
"RNG": 2
}
},
"side_channel_analysis": {
"SCA": {
"timing attack": 1,
"timing attacks": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-3": 14,
"FIPS 180-4": 2,
"FIPS 186-2": 1,
"FIPS 186-3": 1,
"FIPS 186-4": 7,
"FIPS 197": 2,
"FIPS 198-1": 2,
"FIPS 202": 2,
"FIPS PUB 140-3": 1
},
"ISO": {
"ISO/IEC 24759": 2
},
"NIST": {
"NIST SP 800-107": 1,
"NIST SP 800-90C": 1,
"SP 800-132": 4,
"SP 800-185": 1,
"SP 800-38A": 3,
"SP 800-38B": 2,
"SP 800-38C": 2,
"SP 800-38D": 3,
"SP 800-38F": 2,
"SP 800-38G": 2,
"SP 800-89": 1,
"SP 800-90A": 1,
"SP 800-90B": 3
},
"PKCS": {
"PKCS #1": 4,
"PKCS#1": 3,
"PKCS#12": 3,
"PKCS#5": 3,
"PKCS1": 4
},
"RFC": {
"RFC 7914": 1,
"RFC 8708": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 46,
"AES-128": 1,
"AES-192": 1,
"AES-256": 1
},
"CAST": {
"CAST": 3,
"CAST5": 1
},
"RC": {
"RC2": 1,
"RC4": 1
},
"Serpent": {
"Serpent": 1
},
"Twofish": {
"Twofish": 1
}
},
"DES": {
"3DES": {
"TDEA": 7,
"TDES": 1,
"Triple-DES": 9
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1,
"CMAC": 8,
"HMAC": 67,
"HMAC-SHA-256": 1,
"KMAC": 14
}
},
"djb": {
"ChaCha": {
"ChaCha20": 2
},
"Poly": {
"Poly1305": 2
}
},
"miscellaneous": {
"Blowfish": {
"Blowfish": 1
},
"Camellia": {
"Camellia": 1
},
"IDEA": {
"IDEA": 1
},
"SEED": {
"SEED": 1
}
}
},
"tee_name": {
"IBM": {
"SE": 25,
"SSC": 1
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Rachel Shelby",
"/CreationDate": "D:20250730163204-07\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20250730163204-07\u002700\u0027",
"/Producer": "Acrobat Distiller 25.0 (Windows)",
"/Title": "Microsoft Word - Keysight BC-FJA FIPS 140-3 Security Policy V1.2r2.docx",
"pdf_file_size_bytes": 512995,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 40
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "a23f2d89e5d038516ed42caec16ef483ec1553d95c1bb6d0b3a982c89d2a7f02",
"policy_txt_hash": "508c23d0211e58d6c9f99f81b6f041445cfe6408e560797aa6b81c578151cdc7"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in approved mode. No assurance of the minimum strength of generated SSPs (e.g., keys).",
"certificate_pdf_url": null,
"date_sunset": "2029-07-28",
"description": "The Keysight Technologies BC-FJA (Bouncy Castle FIPS Java API) is integrated into Keysight\u2019s network visibility product family to provide FIPS 140-3 validated cryptography for the protection of sensitive information.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical security: N/A",
"Non-invasive security: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Keysight BC-FJA (Bouncy Castle FIPS Java API) for Network Visibility",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": "2.0.0",
"tested_conf": [
"NVOS 6.7 with Java SE Runtime Environment v8 (1.8) running on Vision ONE with Intel i7 3555LE (Ivy Bridge)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2024-10-21",
"lab": "EWA - Canada",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2025-12-15",
"lab": "Acumen Security",
"validation_type": "Update"
}
],
"vendor": "Keysight Technologies",
"vendor_url": "http://www.keysight.com/us/en/home.html"
}
}