Radiant Logic Cryptographic Module for Go

Certificate #4950

Webpage information ?

Status active
Validation dates 24.01.2025
Sunset date 08-03-2026
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. The module makes no assurance of the minimum strength of random strings and generated keys.
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description Radiant Logic Cryptographic Module for Go is a standards-based cryptographic engine for Go applications. The module delivers core cryptographic functions to server platforms and features robust algorithm support. Radiant Logic Cryptographic Module for Go offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.
Tested configurations
  • CentOS 7 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 with PAA
  • CentOS 7 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 without PAA
  • macOS 13 (Ventura) running on a Mac Mini M2 with an Apple M2
  • Windows Server 2022 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 with PAA
  • Windows Server 2022 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 without PAA
Vendor Radiant Logic
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy ?

Symmetric Algorithms
AES, DES, Triple-DES, TDEA, HMAC, HMAC-SHA-224, HMAC-SHA-384, HMAC-SHA-256, HMAC-SHA-512, CMAC
Asymmetric Algorithms
RSA 2048, ECDSA, ECC, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2
Schemes
MAC
Protocols
TLS
Randomness
DUAL_EC_DRBG, DRBG, RNG
Elliptic Curves
P-224, P-256, P-384, P-521, P-192, K-283, K-409, K-571, B-283, B-409, B-571, K-233, B-233, K-163, B-163
Block cipher modes
ECB, CBC, CTR, OFB, GCM, CCM, XTS

Security level
Level 1

Standards
FIPS 140-2, FIPS 140, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 186-2, FIPS 180-4, FIPS PUB 140-2, SP 800-38, SP 800-133, SP 800-90A, SP 800-67, NIST SP 800-131A, SP 800-38B, SP 800-38C, SP 800-38D, PKCS1, PKCS #1, PKCS#1, RFC5288, RFC5289, RFC 5246

File metadata

Title Security Policy
Subject MODULE NAME
Author SafeLogic
Creation date D:20241125085539-05'00'
Modification date D:20241125085539-05'00'
Pages 25
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics ?

No heuristics are available for this certificate.

References ?

No references are available for this certificate.

Updates ?

  • 27.01.2025 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name Radiant Logic Cryptographic Module for Go was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4950,
  "dgst": "44864c96fa1c3660",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "SHS#A4873",
        "Triple-DES#A4873",
        "RSA#A4873",
        "AES#A4873",
        "DSA#A4873",
        "DRBG#A4873",
        "HMAC#A4873",
        "ECDSA#A4873"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDSA": {
            "ECDSA": 13
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 13
          }
        },
        "RSA": {
          "RSA 2048": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "CCM": {
          "CCM": 4
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 5
        },
        "GCM": {
          "GCM": 7
        },
        "OFB": {
          "OFB": 1
        },
        "XTS": {
          "XTS": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-163": 3,
          "B-233": 3,
          "B-283": 7,
          "B-409": 7,
          "B-571": 7,
          "K-163": 3,
          "K-233": 4,
          "K-283": 7,
          "K-409": 7,
          "K-571": 7,
          "P-192": 10,
          "P-224": 12,
          "P-256": 14,
          "P-384": 14,
          "P-521": 14
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES GCM 256": 2,
          "HMAC SHA- 224": 1,
          "HMAC SHA- 256": 1,
          "HMAC SHA-1": 1,
          "HMAC SHA-384": 1,
          "HMAC SHA-512": 1,
          "HMAC-SHA-1": 12,
          "HMAC-SHA-224": 2,
          "HMAC-SHA-256": 4,
          "HMAC-SHA-384": 2,
          "HMAC-SHA-512": 4,
          "PKCS #1": 2,
          "PKCS#1": 4,
          "PKCS1": 6,
          "RSA 2048": 2,
          "SHA- 224": 1,
          "SHA- 256": 2,
          "SHA- 512": 1,
          "SHA-1": 24,
          "SHA-2": 11,
          "SHA-224": 2,
          "SHA-256": 3,
          "SHA-384": 4,
          "SHA-512": 4,
          "SHS3": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 24
          },
          "SHA2": {
            "SHA-2": 11,
            "SHA-224": 2,
            "SHA-256": 3,
            "SHA-384": 4,
            "SHA-512": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "DUAL_EC": {
          "DUAL_EC_DRBG": 1
        },
        "PRNG": {
          "DRBG": 15
        },
        "RNG": {
          "RNG": 3
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140": 6,
          "FIPS 140-2": 20,
          "FIPS 180-4": 2,
          "FIPS 186-2": 6,
          "FIPS 186-4": 7,
          "FIPS 197": 2,
          "FIPS 198-1": 2,
          "FIPS PUB 140-2": 1
        },
        "NIST": {
          "NIST SP 800-131A": 2,
          "SP 800-133": 1,
          "SP 800-38": 1,
          "SP 800-38B": 1,
          "SP 800-38C": 1,
          "SP 800-38D": 1,
          "SP 800-67": 2,
          "SP 800-90A": 3
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 2,
          "PKCS1": 3
        },
        "RFC": {
          "RFC 5246": 1,
          "RFC5288": 2,
          "RFC5289": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 20
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 11
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 9,
            "HMAC": 17,
            "HMAC-SHA-224": 2,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 2,
            "HMAC-SHA-512": 1
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "SafeLogic",
      "/CreationDate": "D:20241125085539-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20241125085539-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Subject": "MODULE NAME",
      "/Title": "Security Policy",
      "pdf_file_size_bytes": 643341,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.radiantlogic.com/",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program",
          "http://www.safelogic.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 25
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "b908cb2804d7120de4d5a91a31f7463a1b3ff1a700b7239e08d8ce9f964d9e7d",
    "policy_txt_hash": "6f004c4c7a52eafe55b6dbeffafd1dfded07069f7120a9975da837cf21dc2d72"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. The module makes no assurance of the minimum strength of random strings and generated keys.",
    "certificate_pdf_url": null,
    "date_sunset": "2026-03-08",
    "description": "Radiant Logic Cryptographic Module for Go is a standards-based cryptographic engine for Go applications. The module delivers core cryptographic functions to server platforms and features robust algorithm support. Radiant Logic Cryptographic Module for Go offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Radiant Logic Cryptographic Module for Go",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": "2.1.2",
    "tested_conf": [
      "CentOS 7 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 with PAA",
      "CentOS 7 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 without PAA",
      "macOS 13 (Ventura) running on a Mac Mini M2 with an Apple M2",
      "Windows Server 2022 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 with PAA",
      "Windows Server 2022 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 without PAA"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2025-01-24",
        "lab": "DEKRA Testing and Certification S.A.U",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Radiant Logic",
    "vendor_url": "http://www.radiantlogic.com/"
  }
}