Mocana Cryptographic Suite B Module

Certificate #4299

Webpage information

Status active
Validation dates 12.09.2022 , 24.10.2023
Sunset date 21-09-2026
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. No assurance of the minimum strength of generated keys.
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description The Mocana Cryptographic Suite B Module (Software Version 6.5.2f) is a software only, multi-chip standalone cryptographic module that runs on a general purpose computer. The primary purpose of this module is to provide FIPS Approved cryptographic routines to consuming applications via an Application Programming Interface.
Tested configurations
  • Extreme VOSS 8 (32-bit) on KVM Yocto Linux 4.14 running on Extreme XA 1440 with Intel C3558 without PAA
  • Extreme VOSS 8 (32-bit) on KVM Yocto Linux 4.14 running on Extreme XA 1480 with Intel C3758 without PAA
  • Extreme VOSS 8 (32-bit) running on Extreme VSP 4900 with Intel C3338 without PAA
  • Extreme VOSS 8 (32-bit) running on Extreme VSP 4900 with Intel C3538 without PAA
  • Extreme VOSS 8 (32-bit) running on Extreme VSP 5420 with ARM Cortex A72 without PAA Extreme VOSS 8 (32-bit) running on Extreme VSP 7200 with Freescale P2020 without PAA
  • Extreme VOSS 8 (32-bit) running on Extreme VSP 7400 with Intel C3758 without PAA
  • Extreme VOSS 8 (32-bit) running on Extreme VSP 8400 with Freescale P2020 without PAA
  • Extreme VOSS 8 (32-bit) running on Extreme VSP 8600 with Freescale T1042 without PAA
  • Extreme VOSS 8 (32-bit) running on ExtremeSwitching 5520 with ARM Cortex A72 without PAA
  • Extreme VOSS 8 (64-bit) on KVM Yocto Linux 4.14 running on Extreme XA 1440 with Intel C3558 with PAA
  • Extreme VOSS 8 (64-bit) on KVM Yocto Linux 4.14 running on Extreme XA 1440 with Intel C3558 without PAA
  • Extreme VOSS 8 (64-bit) on KVM Yocto Linux 4.14 running on Extreme XA 1480 with Intel C3758 with PAA
  • Extreme VOSS 8 (64-bit) on KVM Yocto Linux 4.14 running on Extreme XA 1480 with Intel C3758 without PAA
  • Extreme VOSS 8 (64-bit) running on Extreme VSP 4900 with Intel C3338 with PAA
  • Extreme VOSS 8 (64-bit) running on Extreme VSP 4900 with Intel C3338 without PAA
  • Extreme VOSS 8 (64-bit) running on Extreme VSP 4900 with Intel C3538 with PAA
  • Extreme VOSS 8 (64-bit) running on Extreme VSP 4900 with Intel C3538 without PAA
  • Extreme VOSS 8 (64-bit) running on Extreme VSP 7400 with Intel C3758 with PAA
  • Extreme VOSS 8 (64-bit) running on Extreme VSP 7400 with Intel C3758 without PAA
  • Wind River Linux 9.0 (32-bit) running on Xerox Explorer 6.5 with Intel Atom E3950 with PAA
  • Wind River Linux 9.0 (32-bit) running on Xerox Explorer 6.5 with Intel Atom E3950 without PAA
  • Wind River Linux 9.0 (64-bit) running on Xerox Explorer 6.5 with Intel Atom E3950 with PAA
  • Wind River Linux 9.0 (64-bit) running on Xerox Explorer 6.5 with Intel Atom E3950 without PAA
  • Yocto Linux 4.1.15 (32-bit) running on Honeywell Xenon 1952 with NXP i.MX 6ULL without PAA (single-user mode)
Vendor DigiCert, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES-, AES, AES-128, AES-192, AES-256, DES, Triple-DES, TDES, HMAC, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, CMAC
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD4, MD5
Schemes
Key Exchange, Key agreement
Randomness
DRBG, RNG
Elliptic Curves
P-224, P-256
Block cipher modes
ECB, CBC, CTR, OFB, GCM, CCM, XTS

Vendor
NXP

Security level
Level 1

Standards
FIPS 140-2, FIPS 197, FIPS 186-4, FIPS 198, FIPS180-4, FIPS 186-2, SP 800-90A, SP 800-67, SP 800-108, PKCS #1

File metadata

Title Microsoft Word - 203e - Cert#1878 - Mocana Suite B Security Policy v3.1.doc
Author lgarcia
Creation date D:20230929114502-07'00'
Modification date D:20230929114525-07'00'
Pages 26
Creator Acrobat PDFMaker 23 for Word
Producer Adobe PDF Library 23.6.96

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4299,
  "dgst": "5c85d9ebda50d134",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "DSA#A661",
        "SHS#A661",
        "AES#C1811",
        "ECDSA#C1810",
        "DRBG#C1810",
        "AES#A663",
        "DRBG#A661",
        "Triple-DES#C1810",
        "SHS#C1810",
        "AES#A662",
        "HMAC#A661",
        "Triple-DES#A661",
        "AES#A661",
        "AES#C1810",
        "KBKDF#C1810",
        "AES#C1812",
        "HMAC#C1810",
        "RSA#C1810",
        "DSA#C1810",
        "KBKDF#A661",
        "ECDSA#A661",
        "RSA#A661"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 18
          },
          "ECDSA": {
            "ECDSA": 21
          }
        },
        "FF": {
          "DH": {
            "DH": 21,
            "Diffie-Hellman": 3
          },
          "DSA": {
            "DSA": 22
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CCM": {
          "CCM": 1
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 8
        },
        "OFB": {
          "OFB": 1
        },
        "XTS": {
          "XTS": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key agreement": 2
        },
        "KEX": {
          "Key Exchange": 6
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-224": 2,
          "P-256": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 5
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES-128": 1,
          "AES-192": 1,
          "AES-256": 1,
          "Cert # AES": 1,
          "HMAC- SHA- 1, 224": 1,
          "HMAC- SHA-384": 1,
          "HMAC- SHA-512": 1,
          "HMAC-SHA 256": 2,
          "HMAC-SHA- 224/256": 2,
          "HMAC-SHA- 256": 2,
          "HMAC-SHA- 384/512": 2,
          "HMAC-SHA-1": 12,
          "HMAC-SHA-224": 8,
          "HMAC-SHA-224/256": 4,
          "HMAC-SHA-256": 8,
          "HMAC-SHA-384": 6,
          "HMAC-SHA-384/512": 4,
          "HMAC-SHA-512": 6,
          "HMAC-SHA1": 2,
          "HMAC-SHA224/256": 2,
          "HMAC-SHA384/512": 2,
          "PKCS #1": 7,
          "RSA PKCS #1": 3,
          "SHA- 1, 224": 1,
          "SHA- 224": 1,
          "SHA- 256": 1,
          "SHA- 384": 1,
          "SHA-1": 15,
          "SHA-224": 15,
          "SHA-256": 18,
          "SHA-384": 19,
          "SHA-512": 20,
          "SHA2-224": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 2
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 2
          },
          "MD5": {
            "MD5": 2
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 15
          },
          "SHA2": {
            "SHA-224": 15,
            "SHA-256": 18,
            "SHA-384": 19,
            "SHA-512": 20
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 24
        },
        "RNG": {
          "RNG": 3
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 8,
          "FIPS 186-2": 2,
          "FIPS 186-4": 4,
          "FIPS 197": 5,
          "FIPS 198": 1,
          "FIPS180-4": 1
        },
        "NIST": {
          "SP 800-108": 1,
          "SP 800-67": 1,
          "SP 800-90A": 1
        },
        "PKCS": {
          "PKCS #1": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 38,
            "AES-": 4,
            "AES-128": 1,
            "AES-192": 1,
            "AES-256": 1
          }
        },
        "DES": {
          "3DES": {
            "TDES": 2,
            "Triple-DES": 12
          },
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2,
            "HMAC": 5,
            "HMAC-SHA-224": 4,
            "HMAC-SHA-256": 4,
            "HMAC-SHA-384": 3,
            "HMAC-SHA-512": 3
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 1
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "lgarcia",
      "/Company": "",
      "/Created": "D:20180625",
      "/CreationDate": "D:20230929114502-07\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 for Word",
      "/LastSaved": "D:20181211",
      "/ModDate": "D:20230929114525-07\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.6.96",
      "/SourceModified": "D:20230929184436",
      "/Title": "Microsoft Word - 203e - Cert#1878 - Mocana Suite B Security Policy v3.1.doc",
      "pdf_file_size_bytes": 633063,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 26
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "f708b0fda4259fab4cf9173a1b2f138c7cbda45527d772e795c160010df355f8",
    "policy_txt_hash": "77f6d863f79dbbb670c25820973c2178c9cf539d567308d62fac4df403373e89"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. No assurance of the minimum strength of generated keys.",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2022_031022_0652_signed.pdf",
    "date_sunset": "2026-09-21",
    "description": "The Mocana Cryptographic Suite B Module (Software Version 6.5.2f) is a software only, multi-chip standalone cryptographic module that runs on a general purpose computer. The primary purpose of this module is to provide FIPS Approved cryptographic routines to consuming applications via an Application Programming Interface.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Mocana Cryptographic Suite B Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": "6.5.2f",
    "tested_conf": [
      "Extreme VOSS 8 (32-bit) on KVM Yocto Linux 4.14 running on Extreme XA 1440 with Intel C3558 without PAA",
      "Extreme VOSS 8 (32-bit) on KVM Yocto Linux 4.14 running on Extreme XA 1480 with Intel C3758 without PAA",
      "Extreme VOSS 8 (32-bit) running on Extreme VSP 4900 with Intel C3338 without PAA",
      "Extreme VOSS 8 (32-bit) running on Extreme VSP 4900 with Intel C3538 without PAA",
      "Extreme VOSS 8 (32-bit) running on Extreme VSP 5420 with ARM Cortex A72 without PAA\nExtreme VOSS 8 (32-bit) running on Extreme VSP 7200 with Freescale P2020 without PAA",
      "Extreme VOSS 8 (32-bit) running on Extreme VSP 7400 with Intel C3758 without PAA",
      "Extreme VOSS 8 (32-bit) running on Extreme VSP 8400 with Freescale P2020 without PAA",
      "Extreme VOSS 8 (32-bit) running on Extreme VSP 8600 with Freescale T1042 without PAA",
      "Extreme VOSS 8 (32-bit) running on ExtremeSwitching 5520 with ARM Cortex A72 without PAA",
      "Extreme VOSS 8 (64-bit) on KVM Yocto Linux 4.14 running on Extreme XA 1440 with Intel C3558 with PAA",
      "Extreme VOSS 8 (64-bit) on KVM Yocto Linux 4.14 running on Extreme XA 1440 with Intel C3558 without PAA",
      "Extreme VOSS 8 (64-bit) on KVM Yocto Linux 4.14 running on Extreme XA 1480 with Intel C3758 with PAA",
      "Extreme VOSS 8 (64-bit) on KVM Yocto Linux 4.14 running on Extreme XA 1480 with Intel C3758 without PAA",
      "Extreme VOSS 8 (64-bit) running on Extreme VSP 4900 with Intel C3338 with PAA",
      "Extreme VOSS 8 (64-bit) running on Extreme VSP 4900 with Intel C3338 without PAA",
      "Extreme VOSS 8 (64-bit) running on Extreme VSP 4900 with Intel C3538 with PAA",
      "Extreme VOSS 8 (64-bit) running on Extreme VSP 4900 with Intel C3538 without PAA",
      "Extreme VOSS 8 (64-bit) running on Extreme VSP 7400 with Intel C3758 with PAA",
      "Extreme VOSS 8 (64-bit) running on Extreme VSP 7400 with Intel C3758 without PAA",
      "Wind River Linux 9.0 (32-bit) running on Xerox Explorer 6.5 with Intel Atom E3950 with PAA",
      "Wind River Linux 9.0 (32-bit) running on Xerox Explorer 6.5 with Intel Atom E3950 without PAA",
      "Wind River Linux 9.0 (64-bit) running on Xerox Explorer 6.5 with Intel Atom E3950 with PAA",
      "Wind River Linux 9.0 (64-bit) running on Xerox Explorer 6.5 with Intel Atom E3950 without PAA",
      "Yocto Linux 4.1.15 (32-bit) running on Honeywell Xenon 1952 with NXP i.MX 6ULL without PAA (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2022-09-12",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2023-10-24",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      }
    ],
    "vendor": "DigiCert, Inc.",
    "vendor_url": "http://www.digicert.com"
  }
}