This page was not yet optimized for use on mobile devices.
Radiant Logic Cryptographic Module for Go
Certificate #4950
Webpage information ?
Security policy ?
Symmetric Algorithms
AES, DES, Triple-DES, TDEA, HMAC, HMAC-SHA-224, HMAC-SHA-384, HMAC-SHA-256, HMAC-SHA-512, CMACAsymmetric Algorithms
RSA 2048, ECDSA, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2Schemes
MACProtocols
TLSRandomness
DUAL_EC_DRBG, DRBG, RNGElliptic Curves
P-224, P-256, P-384, P-521, P-192, K-283, K-409, K-571, B-283, B-409, B-571, K-233, B-233, K-163, B-163Block cipher modes
ECB, CBC, CTR, OFB, GCM, CCM, XTSSecurity level
Level 1Standards
FIPS 140-2, FIPS 140, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 186-2, FIPS 180-4, FIPS PUB 140-2, SP 800-38, SP 800-133, SP 800-90A, SP 800-67, NIST SP 800-131A, SP 800-38B, SP 800-38C, SP 800-38D, PKCS1, PKCS #1, PKCS#1, RFC5288, RFC5289, RFC 5246File metadata
Title | Security Policy |
---|---|
Subject | MODULE NAME |
Author | SafeLogic |
Creation date | D:20241125085539-05'00' |
Modification date | D:20241125085539-05'00' |
Pages | 25 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
Heuristics ?
No heuristics are available for this certificate.
References ?
No references are available for this certificate.
Updates ?
-
27.01.2025 The certificate was first processed.
New certificate
A new FIPS 140 certificate with the product name Radiant Logic Cryptographic Module for Go was processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4950,
"dgst": "44864c96fa1c3660",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"SHS#A4873",
"Triple-DES#A4873",
"RSA#A4873",
"AES#A4873",
"DSA#A4873",
"DRBG#A4873",
"HMAC#A4873",
"ECDSA#A4873"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 13
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 13
}
},
"RSA": {
"RSA 2048": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"CCM": {
"CCM": 4
},
"CTR": {
"CTR": 2
},
"ECB": {
"ECB": 5
},
"GCM": {
"GCM": 7
},
"OFB": {
"OFB": 1
},
"XTS": {
"XTS": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"B-163": 3,
"B-233": 3,
"B-283": 7,
"B-409": 7,
"B-571": 7,
"K-163": 3,
"K-233": 4,
"K-283": 7,
"K-409": 7,
"K-571": 7,
"P-192": 10,
"P-224": 12,
"P-256": 14,
"P-384": 14,
"P-521": 14
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 1
}
},
"fips_certlike": {
"Certlike": {
"AES GCM 256": 2,
"HMAC SHA- 224": 1,
"HMAC SHA- 256": 1,
"HMAC SHA-1": 1,
"HMAC SHA-384": 1,
"HMAC SHA-512": 1,
"HMAC-SHA-1": 12,
"HMAC-SHA-224": 2,
"HMAC-SHA-256": 4,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 4,
"PKCS #1": 2,
"PKCS#1": 4,
"PKCS1": 6,
"RSA 2048": 2,
"SHA- 224": 1,
"SHA- 256": 2,
"SHA- 512": 1,
"SHA-1": 24,
"SHA-2": 11,
"SHA-224": 2,
"SHA-256": 3,
"SHA-384": 4,
"SHA-512": 4,
"SHS3": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 24
},
"SHA2": {
"SHA-2": 11,
"SHA-224": 2,
"SHA-256": 3,
"SHA-384": 4,
"SHA-512": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"DUAL_EC": {
"DUAL_EC_DRBG": 1
},
"PRNG": {
"DRBG": 15
},
"RNG": {
"RNG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140": 6,
"FIPS 140-2": 20,
"FIPS 180-4": 2,
"FIPS 186-2": 6,
"FIPS 186-4": 7,
"FIPS 197": 2,
"FIPS 198-1": 2,
"FIPS PUB 140-2": 1
},
"NIST": {
"NIST SP 800-131A": 2,
"SP 800-133": 1,
"SP 800-38": 1,
"SP 800-38B": 1,
"SP 800-38C": 1,
"SP 800-38D": 1,
"SP 800-67": 2,
"SP 800-90A": 3
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 2,
"PKCS1": 3
},
"RFC": {
"RFC 5246": 1,
"RFC5288": 2,
"RFC5289": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 20
}
},
"DES": {
"3DES": {
"TDEA": 1,
"Triple-DES": 11
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CMAC": 9,
"HMAC": 17,
"HMAC-SHA-224": 2,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 1
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "SafeLogic",
"/CreationDate": "D:20241125085539-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20241125085539-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"/Subject": "MODULE NAME",
"/Title": "Security Policy",
"pdf_file_size_bytes": 643341,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.radiantlogic.com/",
"https://csrc.nist.gov/projects/cryptographic-module-validation-program",
"http://www.safelogic.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "b908cb2804d7120de4d5a91a31f7463a1b3ff1a700b7239e08d8ce9f964d9e7d",
"policy_txt_hash": "6f004c4c7a52eafe55b6dbeffafd1dfded07069f7120a9975da837cf21dc2d72"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode. The module makes no assurance of the minimum strength of random strings and generated keys.",
"certificate_pdf_url": null,
"date_sunset": "2026-03-08",
"description": "Radiant Logic Cryptographic Module for Go is a standards-based cryptographic engine for Go applications. The module delivers core cryptographic functions to server platforms and features robust algorithm support. Radiant Logic Cryptographic Module for Go offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Radiant Logic Cryptographic Module for Go",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "active",
"sw_versions": "2.1.2",
"tested_conf": [
"CentOS 7 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 with PAA",
"CentOS 7 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 without PAA",
"macOS 13 (Ventura) running on a Mac Mini M2 with an Apple M2",
"Windows Server 2022 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 with PAA",
"Windows Server 2022 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 without PAA"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2025-01-24",
"lab": "DEKRA Testing and Certification S.A.U",
"validation_type": "Initial"
}
],
"vendor": "Radiant Logic",
"vendor_url": "http://www.radiantlogic.com/"
}
}