YubiKey 4 Cryptographic Module

Certificate #3204

Webpage information

Status revoked
Revoked reason The firmware versions have a security flaw. https://www.yubico.com/support/security-advisories/ysa-2019-02/
Validation dates 21.06.2018 , 07.02.2019 , 30.04.2019
Standard FIPS 140-2
Security level 2
Type Hardware
Embodiment Single Chip
Caveat When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Exceptions
  • Physical Security: Level 3
  • EMI/EMC: Level 3
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Description The Yubikey 4 cryptographic module is a secure element that supports multiple protocols designed to be embedded in USB security tokens. The module can generate, store, and perform cryptographic operations for sensitive data and can be utilized via an external touch-button for Test of User Presence in addition to PIN for smart card authentication.The module implements five major functions - Yubico One Time Password (OTP), FIDO Universal 2nd Factor (U2F), PIV-compatible smart card, OpenPGP smart card and OATH OTP authentication.
Version (Hardware) SLE78CLUFX3000PH
Version (Firmware) 4.4.2, 4.4.4
Vendor Yubico, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, DES, TDES, 3DES, HMAC, CMAC
Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC
Hash functions
SHA1, SHA256
Schemes
Key agreement
Protocols
PGP
Randomness
DRBG, RNG
Block cipher modes
ECB, CBC, CTR, CCM

Security level
Level 2, Level 3

Standards
FIPS 197, FIPS 201, PKCS #1, PKCS#1

File metadata

Title Microsoft Word - 210u - Yubico YubiKey 4 Security Policy v1.2_03.25.2019.docx
Author lgarcia
Creation date D:20190419094715-07'00'
Modification date D:20190419094715-07'00'
Pages 34
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 17.0 (Windows)

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3204,
  "dgst": "38177ec3e146433b",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "CVL#1360",
        "KTS#4714",
        "CVL#1395",
        "HMAC#3133",
        "CVL#1356",
        "AES#4714",
        "RSA#2569",
        "AES#4713",
        "HMAC#3134",
        "SHS#3862",
        "SHS#3861",
        "CVL#1358",
        "ECDSA#1165",
        "Triple-DES#2498",
        "AES#4712",
        "DRBG#1604"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.4.4",
        "4.4.2"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 14
          }
        },
        "RSA": {
          "RSA 2048": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 6
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PGP": {
          "PGP": 1
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1,
          "#1165": 1,
          "#1356": 1,
          "#1358": 1,
          "#1360": 1,
          "#1395": 1,
          "#16": 1,
          "#1604": 1,
          "#2498": 1,
          "#2569": 1,
          "#3133": 1,
          "#3134": 1,
          "#3861": 1,
          "#3862": 1,
          "#4712": 1,
          "#4713": 1,
          "#4714": 4
        }
      },
      "fips_certlike": {
        "Certlike": {
          "#1165 CVL": 1,
          "#2569 CVL": 1,
          "#3133 HMAC": 1,
          "#4712 DRBG": 1,
          "#4714 RSA": 1,
          "AES #4712": 1,
          "AES #4713": 1,
          "AES #4714": 3,
          "AES 128": 1,
          "CVL #1356": 1,
          "CVL #1358": 1,
          "CVL #1360": 1,
          "CVL #1395": 1,
          "Cert # AES": 1,
          "DRBG #1604": 1,
          "HMAC #3133": 2,
          "HMAC SHA1": 1,
          "HMAC SHA256": 1,
          "PKCS #1": 2,
          "PKCS#1": 12,
          "RSA #2569": 1,
          "RSA 2048": 3,
          "SHA #3861": 1,
          "SHA #3862": 1,
          "SHA1": 3,
          "SHA256": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 2,
          "Level 3": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA1": 3
          },
          "SHA2": {
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 19
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 197": 1,
          "FIPS 201": 2
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 6
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 12
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "TDES": 6
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1,
            "HMAC": 12
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "lgarcia",
      "/CreationDate": "D:20190419094715-07\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20190419094715-07\u002700\u0027",
      "/Producer": "Acrobat Distiller 17.0 (Windows)",
      "/Title": "Microsoft Word - 210u - Yubico YubiKey 4 Security Policy v1.2_03.25.2019.docx",
      "pdf_file_size_bytes": 402024,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 34
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "277adb134f6604c4d44fd74ef27ef92264024add1d33af87d2b446b53def1bc6",
    "policy_txt_hash": "aea7f019592872148831cf2acc65e3259349895fa85afb9faba3405786fb398c"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/JuneCertFinal.pdf",
    "date_sunset": null,
    "description": "The Yubikey 4 cryptographic module is a secure element that supports multiple protocols designed to be embedded in USB security tokens. The module can generate, store, and perform cryptographic operations for sensitive data and can be utilized via an external touch-button for Test of User Presence in addition to PIN for smart card authentication.The module implements five major functions - Yubico One Time Password (OTP), FIDO Universal 2nd Factor (U2F), PIV-compatible smart card, OpenPGP smart card and OATH OTP authentication.",
    "embodiment": "Single Chip",
    "exceptions": [
      "Physical Security: Level 3",
      "EMI/EMC: Level 3",
      "Design Assurance: Level 3",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "4.4.2, 4.4.4",
    "historical_reason": null,
    "hw_versions": "SLE78CLUFX3000PH",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "YubiKey 4 Cryptographic Module",
    "module_type": "Hardware",
    "revoked_link": "https://www.yubico.com/support/security-advisories/ysa-2019-02/",
    "revoked_reason": "The firmware versions have a security flaw.",
    "standard": "FIPS 140-2",
    "status": "revoked",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2018-06-21",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-02-07",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-04-30",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      }
    ],
    "vendor": "Yubico, Inc.",
    "vendor_url": "http://www.yubico.com"
  }
}