This page was not yet optimized for use on mobile
devices.
ActivIdentity Digital Identity Applet Suite V2 for PIV
Certificate #880
Webpage information
Security policy
Symmetric Algorithms
AES, DES, TDES, 3DES, KMACHash functions
SHA-1Schemes
MACRandomness
RNGBlock cipher modes
ECB, CBCVendor
Oberthur Card Systems, OberthurSecurity level
Level 2Side-channel analysis
SPA, DPA, Timing attacks, Fault Induction, fault induction, reverse engineeringCertification process
Integrity Mechanisms The cryptographic keys storage integrity mechanism is described in a separate confidential document called Self Test Description. 9.5.4 Cryptographic Key Zerorization The cryptographic moduleStandards
FIPS140-2, FIPS 140-2, FIPS PUB 186-2, FIPS 186-2, PKCS1, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 7816-3, ISO/IEC 7816-2, ISO/IEC 7816-4File metadata
| Title | Microsoft Word - 02 - ActivIdentity-Applet-v2-for-PIV-Security-Policy-V1.08a.doc |
|---|---|
| Author | cstephens |
| Creation date | D:20080423165420-07'00' |
| Modification date | D:20080423165420-07'00' |
| Pages | 27 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | Acrobat Distiller 8.1.0 (Windows) |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 880,
"dgst": "52efd2aad05d27e3",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"CVL#204",
"RSA#43",
"RNG#94",
"Triple-DES#232",
"SHS#209",
"Triple-DES MAC#232"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"2.6.2.3",
"2.6.2.2",
"2.6.2.6",
"2.6.2"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {},
"certification_process": {
"ConfidentialDocument": {
"Integrity Mechanisms The cryptographic keys storage integrity mechanism is described in a separate confidential document called Self Test Description. 9.5.4 Cryptographic Key Zerorization The cryptographic module": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 8
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"# 1": 1
}
},
"fips_certlike": {
"Certlike": {
"PKCS1": 1,
"RSA PKCS1": 1,
"SHA-1": 2
}
},
"fips_security_level": {
"Level": {
"Level 2": 4
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Fault Induction": 3,
"fault induction": 1
},
"SCA": {
"DPA": 6,
"SPA": 7,
"Timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 7,
"FIPS 186-2": 2,
"FIPS PUB 186-2": 1,
"FIPS140-2": 5
},
"ISO": {
"ISO/IEC 14443": 16,
"ISO/IEC 7816": 8,
"ISO/IEC 7816-2": 1,
"ISO/IEC 7816-3": 3,
"ISO/IEC 7816-4": 1
},
"PKCS": {
"PKCS1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"3DES": {
"3DES": 8,
"TDES": 30
},
"DES": {
"DES": 8
}
},
"constructions": {
"MAC": {
"KMAC": 1
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"Oberthur": 1,
"Oberthur Card Systems": 3
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "cstephens",
"/CreationDate": "D:20080423165420-07\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20080423165420-07\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/Title": "Microsoft Word - 02 - ActivIdentity-Applet-v2-for-PIV-Security-Policy-V1.08a.doc",
"pdf_file_size_bytes": 195081,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 27
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "22174da0538f9e3c4cb1868ffffa7723d13e40105e7cdc0e6546711687625816",
"policy_txt_hash": "21819e9cf4322d81f32dbeb53752299aaff22ad5d6609fbd9f164fbdbe893c77"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt880.pdf",
"date_sunset": null,
"description": "This version of the product can be used over contact and contactless interface (with some restrictions) and can be configured to use with ActivIdentity applet suite v2.6.2 for the support of GSC-IS v2.1, NIST SP800-73-1 Transitional and End-Point Card Edge (for HSPD-12/PIV). The product allows issuance and post-issuance support for PIV End Point Card Edge and Data Model.",
"embodiment": "Single Chip",
"exceptions": [
"Roles, Services, and Authentication: Level 3",
"Physical Security: Level 3",
"EMI/EMC: Level 3"
],
"fw_versions": "ACA applet package v2.6.2.2 and 2.6.2.A3; PKI/GC applet package v2.6.2.3 and 2.6.2.A1; ASC library package v2.6.2.2 and 2.6.2.A1; PIV End-Point packages v2.6.2.6, v2.6.2.A1 and v2.6.2.A2",
"historical_reason": "RNG SP800-131A Revision 1 Transition",
"hw_versions": "HW P/N 77 Versions E303-063683 and E303-063684",
"level": 2,
"mentioned_certs": {},
"module_name": "ActivIdentity Digital Identity Applet Suite V2 for PIV",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2007-11-30",
"lab": "UL Verification Services, Inc.",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2007-12-18",
"lab": "",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2008-01-25",
"lab": "",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2008-04-29",
"lab": "",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2014-02-06",
"lab": "",
"validation_type": "Update"
}
],
"vendor": "ActivIdentity, Inc.",
"vendor_url": "http://www.actividentity.com"
}
}