IBM Java JCE FIPS 140-2 Cryptographic Module with CPACF

Certificate #2837

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 13.02.2017
Standard FIPS 140-2
Security level 1
Type Software-Hybrid
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode
Description The IBM Java JCE (Java Cryptographic Extension) FIPS provider (IBMJCEFIPS) for multi-platforms is a scalable, multipurpose cryptographic module that supports many FIPS approved cryptographic operations. This gives Java applications access to the FIPS algorithms via the standard JCE framework.
Version (Hardware) COP chips integrated within processor unit
Version (Firmware) 3863 (aka FC3863) with System Driver Level 22H
Tested configurations
  • Red Hat Enterprise Linux Server release 7.2 running on IBM z13 model N63 (single-user mode)
  • z/OS version 2 release 2 running on IBM z13 model N63
Vendor IBM Corporation
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, DES, Triple-DES, TDEA, HMAC, HMAC-SHA-256, HMAC-SHA-384
Asymmetric Algorithms
ECDSA, ECC, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-256, SHA-512, SHA-224, SHA-384, MD5
Schemes
MAC, Key Agreement
Protocols
TLS 1.0, TLS
Randomness
DRBG, RNG
Elliptic Curves
P-224, P-256, P-384, P-192, P-521, NIST P-256
Block cipher modes
ECB, CBC, CFB, OFB, GCM

Security level
Level 1
Side-channel analysis
timing attacks

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS186-4, FIPS 186-4, FIPS140-2, FIPS180-4, FIPS197, FIPS198-1, PKCS#1, PKCS1

File metadata

Creation date D:20170208152116-06'00'
Modification date D:20170208152116-06'00'
Pages 23
Producer Foxit PhantomPDF Printer Version 7.3.9.0803

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 2837,
  "dgst": "3b063d4c746d45e9",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "CVL#770",
        "Triple-DES#2145",
        "AES#3910",
        "ECDSA#853",
        "RSA#1994",
        "DRBG#1125",
        "SHS#3222",
        "DSA#1067",
        "CVL#768",
        "SHS#3221",
        "ECDSA#852",
        "CVL#769",
        "AES#3909",
        "Triple-DES#2146",
        "DRBG#1124",
        "DSA#1068",
        "CVL#771",
        "HMAC#2538",
        "HMAC#2539",
        "RSA#1993"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "140",
        "2",
        "3863"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDSA": {
            "ECDSA": 22
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 15
          },
          "DSA": {
            "DSA": 27
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        },
        "CFB": {
          "CFB": 1
        },
        "ECB": {
          "ECB": 7
        },
        "GCM": {
          "GCM": 5
        },
        "OFB": {
          "OFB": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 7,
            "TLS 1.0": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-256": 1,
          "P-192": 10,
          "P-224": 10,
          "P-256": 13,
          "P-384": 10,
          "P-521": 8
        }
      },
      "eval_facility": {
        "atsec": {
          "atsec": 25
        }
      },
      "fips_cert_id": {
        "Cert": {
          "#1067": 1,
          "#1068": 1,
          "#1124": 2,
          "#1125": 2,
          "#1993": 1,
          "#1994": 1,
          "#2145": 1,
          "#2146": 1,
          "#2538": 1,
          "#2539": 1,
          "#3221": 1,
          "#3222": 1,
          "#3909": 1,
          "#3910": 1,
          "#770": 1,
          "#771": 1,
          "#852": 1,
          "#853": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "#1994 RSA": 1,
          "#771 Diffie-Hellman": 1,
          "CVL#768": 1,
          "CVL#769": 1,
          "HMAC- SHA-512": 1,
          "HMAC-SHA-1": 4,
          "HMAC-SHA-256": 2,
          "HMAC-SHA-384": 2,
          "PKCS#1": 4,
          "PKCS1": 2,
          "PKCS1-v1_5": 1,
          "SHA- 1": 3,
          "SHA- 224": 1,
          "SHA- 256": 5,
          "SHA- 384": 2,
          "SHA-1": 7,
          "SHA-224": 7,
          "SHA-256": 9,
          "SHA-384": 8,
          "SHA-512": 8,
          "SHA-512 #1124": 1,
          "SHA-512 #2538": 1,
          "SHA-512 #3221": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 6
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 7
          },
          "SHA2": {
            "SHA-224": 7,
            "SHA-256": 9,
            "SHA-384": 8,
            "SHA-512": 11
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {
        "java": {
          "java.security": 1
        }
      },
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 7
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "timing attacks": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 57,
          "FIPS 186-4": 1,
          "FIPS PUB 140-2": 2,
          "FIPS140-2": 1,
          "FIPS180-4": 1,
          "FIPS186-4": 4,
          "FIPS197": 1,
          "FIPS198-1": 1
        },
        "PKCS": {
          "PKCS#1": 2,
          "PKCS1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 15
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 15
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 13,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "",
      "/CreationDate": "D:20170208152116-06\u002700\u0027",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "D:20170208152116-06\u002700\u0027",
      "/Producer": "Foxit PhantomPDF Printer Version 7.3.9.0803",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 320404,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "3e1b9baa0642d4dcea1f7542b065db66c59f1d482d22e3c24f8ad1db38f6f051",
    "policy_txt_hash": "cd026eb37e2a1056dc5c6f2e788c0afd1055a0c66ea94140e22aa30b2199e793"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertFeb2017.pdf",
    "date_sunset": null,
    "description": "The IBM Java JCE (Java Cryptographic Extension) FIPS provider (IBMJCEFIPS) for multi-platforms is a scalable, multipurpose cryptographic module that supports many FIPS approved cryptographic operations. This gives Java applications access to the FIPS algorithms via the standard JCE framework.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": null,
    "fw_versions": "3863 (aka FC3863) with System Driver Level 22H",
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": "COP chips integrated within processor unit",
    "level": 1,
    "mentioned_certs": {},
    "module_name": "IBM Java JCE FIPS 140-2 Cryptographic Module with CPACF",
    "module_type": "Software-Hybrid",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "1.8",
    "tested_conf": [
      "Red Hat Enterprise Linux Server release 7.2 running on IBM z13 model N63 (single-user mode)",
      "z/OS version 2 release 2 running on IBM z13 model N63"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2017-02-13",
        "lab": "atsec information security corporation",
        "validation_type": "Initial"
      }
    ],
    "vendor": "IBM Corporation",
    "vendor_url": "http://www.ibm.com"
  }
}