This page was not yet optimized for use on mobile
devices.
Allegro Cryptographic Engine
Certificate #5246
Webpage information
Security policy
Symmetric Algorithms
AES-, AES-128, AES-192, AES-256, AES, CAST, HMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, DHHash functions
SHA-1, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHA-3, MD5, PBKDF, PBKDF2Schemes
MAC, Key AgreementProtocols
SSH, SSHv2, TLS v1.2, TLS v1.3, TLS 1.2, TLS, TLS 1.3Randomness
DRBG, RBGElliptic Curves
P-224, P-256, P-384, P-521, P-192Block cipher modes
ECB, CBC, CTR, OFB, GCM, CCM, XTSTLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384Trusted Execution Environments
PSP, SSCSecurity level
Level 1Standards
FIPS 140-3, FIPS 198-1, FIPS186-4, FIPS 186-4, FIPS 180-4, FIPS 202, SP 800-38B, SP 800-38D, SP 800-38F, SP 800-90A, SP 800-56A, SP 800-56C, SP 800-135, SP 800-132, NIST SP 800-133, SP 800-52, SP 800-107, NIST SP 800-132, NIST SP 800-38F, NIST SP 800-90A, RFC7627, RFC 7627, RFC 5288, RFC 5246, RFC 8446File metadata
| Creation date | D:20260403155405-04'00' |
|---|---|
| Modification date | D:20260403155405-04'00' |
| Pages | 57 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 5246,
"dgst": "58785735f95f2e02",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": []
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 19
},
"ECDSA": {
"ECDSA": 38
}
},
"FF": {
"DH": {
"DH": 14
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"CCM": {
"CCM": 8
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 1
},
"GCM": {
"GCM": 19
},
"OFB": {
"OFB": 1
},
"XTS": {
"XTS": 7
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 11,
"SSHv2": 2
},
"TLS": {
"TLS": {
"TLS": 31,
"TLS 1.2": 17,
"TLS 1.3": 11,
"TLS v1.2": 5,
"TLS v1.3": 4
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 13
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-192": 2,
"P-224": 20,
"P-256": 18,
"P-384": 28,
"P-521": 20
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES- CMAC 128": 1,
"AES-128": 2,
"AES-192": 2,
"AES-256": 2,
"AES-GCM 128": 1,
"AES-GCM 96": 1,
"HMAC- 160": 1,
"HMAC- 160, 224": 1,
"HMAC- SHA-1": 1,
"HMAC-SHA- 1": 2,
"HMAC-SHA-1": 4,
"SHA-1": 9,
"SHA-3": 2,
"SHA2- 224": 1,
"SHA2- 256": 1,
"SHA2- 384": 1,
"SHA2- 512": 2,
"SHA2-224": 9,
"SHA2-256": 17,
"SHA2-384": 10,
"SHA2-512": 11,
"SHA3- 224": 1,
"SHA3- 256": 1,
"SHA3- 384": 1,
"SHA3-224": 5,
"SHA3-256": 5,
"SHA3-384": 5,
"SHA3-512": 6
}
},
"fips_security_level": {
"Level": {
"Level 1": 5
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
},
"PBKDF": {
"PBKDF": 12,
"PBKDF2": 16
},
"SHA": {
"SHA1": {
"SHA-1": 9
},
"SHA3": {
"SHA-3": 2,
"SHA3-224": 5,
"SHA3-256": 5,
"SHA3-384": 5,
"SHA3-512": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 49
},
"RNG": {
"RBG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-3": 9,
"FIPS 180-4": 5,
"FIPS 186-4": 7,
"FIPS 198-1": 9,
"FIPS 202": 6,
"FIPS186-4": 28
},
"NIST": {
"NIST SP 800-132": 2,
"NIST SP 800-133": 1,
"NIST SP 800-38F": 1,
"NIST SP 800-90A": 6,
"SP 800-107": 1,
"SP 800-132": 1,
"SP 800-135": 3,
"SP 800-38B": 1,
"SP 800-38D": 1,
"SP 800-38F": 3,
"SP 800-52": 1,
"SP 800-56A": 4,
"SP 800-56C": 1,
"SP 800-90A": 1
},
"RFC": {
"RFC 5246": 1,
"RFC 5288": 1,
"RFC 7627": 1,
"RFC 8446": 1,
"RFC7627": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 53,
"AES-": 24,
"AES-128": 2,
"AES-192": 2,
"AES-256": 2
},
"CAST": {
"CAST": 128
}
},
"constructions": {
"MAC": {
"CMAC": 11,
"HMAC": 8
}
}
},
"tee_name": {
"AMD": {
"PSP": 4
},
"IBM": {
"SSC": 18
}
},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_DSS_WITH_AES_128_GCM_SHA256": 1,
"TLS_DHE_DSS_WITH_AES_256_GCM_SHA384": 1,
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384": 1,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 1
}
},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/CreationDate": "D:20260403155405-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20260403155405-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 803007,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 57
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "56ba3632bfbef027d3cc92410c47650c63e40403f3aafb8e4c1b1921e8fa7585",
"policy_txt_hash": "d88eb249d9b77f670c7f9bb85898c897f0c91effe6d691050eeeba32eb7ecf8d"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "No assurance of the minimum strength of generated SSPs (e.g., keys). No assurance of minimum security of SSPs (e.g., keys, bit strings) that are externally loaded, or of SSPs established with externally loaded SSPs",
"certificate_pdf_url": null,
"date_sunset": "2033-01-16",
"description": "Allegro\u0027s suite of Embedded Device Security tool kits makes embedding standards-based security protocols into resource sensitive embedded systems and consumer electronics fast, easy and reliable. The Allegro Cryptographic Engine (ACE) is a cryptographic library module specifically engineered for embedded devices. The module provides embedded systems developers with an easily understood software interface to enable bulk encryption and decryption, message digests, digital signature creation and validation and key generation and exchange. For full details see www.allegrosoft.com/ace.",
"embodiment": "MultiChipStand",
"exceptions": [
"Physical security: N/A",
"Non-invasive security: N/A",
"Mitigation of other attacks: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Allegro Cryptographic Engine",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2026-04-22",
"lab": "Acumen Security",
"validation_type": "Initial"
}
],
"vendor": "Allegro Software Development Corporation",
"vendor_url": "http://www.allegrosoft.com"
}
}