This page was not yet optimized for use on mobile
devices.
YubiKey 4 Cryptographic Module
Certificate #3204
Webpage information
| Status | revoked |
|---|---|
| Revoked reason | The firmware versions have a security flaw. https://www.yubico.com/support/security-advisories/ysa-2019-02/ |
| Validation dates | 21.06.2018 , 07.02.2019 , 30.04.2019 |
| Standard | FIPS 140-2 |
| Security level | 2 |
| Type | Hardware |
| Embodiment | Single Chip |
| Caveat | When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy |
| Exceptions |
|
| Description | The Yubikey 4 cryptographic module is a secure element that supports multiple protocols designed to be embedded in USB security tokens. The module can generate, store, and perform cryptographic operations for sensitive data and can be utilized via an external touch-button for Test of User Presence in addition to PIN for smart card authentication.The module implements five major functions - Yubico One Time Password (OTP), FIDO Universal 2nd Factor (U2F), PIV-compatible smart card, OpenPGP smart card and OATH OTP authentication. |
| Version (Hardware) | SLE78CLUFX3000PH |
| Version (Firmware) | 4.4.2, 4.4.4 |
| Vendor | Yubico, Inc. |
| References | This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates. |
Security policy
Symmetric Algorithms
AES, DES, TDES, 3DES, HMAC, CMACAsymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECCHash functions
SHA1, SHA256Schemes
Key agreementProtocols
PGPRandomness
DRBG, RNGBlock cipher modes
ECB, CBC, CTR, CCMSecurity level
Level 2, Level 3Standards
FIPS 197, FIPS 201, PKCS #1, PKCS#1File metadata
| Title | Microsoft Word - 210u - Yubico YubiKey 4 Security Policy v1.2_03.25.2019.docx |
|---|---|
| Author | lgarcia |
| Creation date | D:20190419094715-07'00' |
| Modification date | D:20190419094715-07'00' |
| Pages | 34 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | Acrobat Distiller 17.0 (Windows) |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3204,
"dgst": "38177ec3e146433b",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"CVL#1360",
"KTS#4714",
"CVL#1395",
"HMAC#3133",
"CVL#1356",
"AES#4714",
"RSA#2569",
"AES#4713",
"HMAC#3134",
"SHS#3862",
"SHS#3861",
"CVL#1358",
"ECDSA#1165",
"Triple-DES#2498",
"AES#4712",
"DRBG#1604"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"4.4.4",
"4.4.2"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 14
}
},
"RSA": {
"RSA 2048": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CCM": {
"CCM": 6
},
"CTR": {
"CTR": 2
},
"ECB": {
"ECB": 6
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PGP": {
"PGP": 1
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 1,
"#1165": 1,
"#1356": 1,
"#1358": 1,
"#1360": 1,
"#1395": 1,
"#16": 1,
"#1604": 1,
"#2498": 1,
"#2569": 1,
"#3133": 1,
"#3134": 1,
"#3861": 1,
"#3862": 1,
"#4712": 1,
"#4713": 1,
"#4714": 4
}
},
"fips_certlike": {
"Certlike": {
"#1165 CVL": 1,
"#2569 CVL": 1,
"#3133 HMAC": 1,
"#4712 DRBG": 1,
"#4714 RSA": 1,
"AES #4712": 1,
"AES #4713": 1,
"AES #4714": 3,
"AES 128": 1,
"CVL #1356": 1,
"CVL #1358": 1,
"CVL #1360": 1,
"CVL #1395": 1,
"Cert # AES": 1,
"DRBG #1604": 1,
"HMAC #3133": 2,
"HMAC SHA1": 1,
"HMAC SHA256": 1,
"PKCS #1": 2,
"PKCS#1": 12,
"RSA #2569": 1,
"RSA 2048": 3,
"SHA #3861": 1,
"SHA #3862": 1,
"SHA1": 3,
"SHA256": 1
}
},
"fips_security_level": {
"Level": {
"Level 2": 2,
"Level 3": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA1": 3
},
"SHA2": {
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 19
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 197": 1,
"FIPS 201": 2
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 6
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 12
}
},
"DES": {
"3DES": {
"3DES": 1,
"TDES": 6
},
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 12
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "lgarcia",
"/CreationDate": "D:20190419094715-07\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20190419094715-07\u002700\u0027",
"/Producer": "Acrobat Distiller 17.0 (Windows)",
"/Title": "Microsoft Word - 210u - Yubico YubiKey 4 Security Policy v1.2_03.25.2019.docx",
"pdf_file_size_bytes": 402024,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 34
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "277adb134f6604c4d44fd74ef27ef92264024add1d33af87d2b446b53def1bc6",
"policy_txt_hash": "aea7f019592872148831cf2acc65e3259349895fa85afb9faba3405786fb398c"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/JuneCertFinal.pdf",
"date_sunset": null,
"description": "The Yubikey 4 cryptographic module is a secure element that supports multiple protocols designed to be embedded in USB security tokens. The module can generate, store, and perform cryptographic operations for sensitive data and can be utilized via an external touch-button for Test of User Presence in addition to PIN for smart card authentication.The module implements five major functions - Yubico One Time Password (OTP), FIDO Universal 2nd Factor (U2F), PIV-compatible smart card, OpenPGP smart card and OATH OTP authentication.",
"embodiment": "Single Chip",
"exceptions": [
"Physical Security: Level 3",
"EMI/EMC: Level 3",
"Design Assurance: Level 3",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": "4.4.2, 4.4.4",
"historical_reason": null,
"hw_versions": "SLE78CLUFX3000PH",
"level": 2,
"mentioned_certs": {},
"module_name": "YubiKey 4 Cryptographic Module",
"module_type": "Hardware",
"revoked_link": "https://www.yubico.com/support/security-advisories/ysa-2019-02/",
"revoked_reason": "The firmware versions have a security flaw.",
"standard": "FIPS 140-2",
"status": "revoked",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2018-06-21",
"lab": "UL Verification Services, Inc.",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2019-02-07",
"lab": "UL Verification Services, Inc.",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2019-04-30",
"lab": "UL Verification Services, Inc.",
"validation_type": "Update"
}
],
"vendor": "Yubico, Inc.",
"vendor_url": "http://www.yubico.com"
}
}