MPU5

Certificate #4514

Webpage information ?

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 08.05.2023
Standard FIPS 140-2
Security level 2
Type Hardware
Embodiment Multi-Chip Stand Alone
Caveat When initialized and configured to overall level 2 per the Security Policy. The tamper evident material installed as indicated in the Security Policy
Exceptions
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Description The MPU5 and Wave Relay® MANET provide wireless network connectivity between highly mobile users in a true peer-to-peer topology without requiring additional infrastructure. The MPU5 is designed to be carried by dismount users or mounted on towers, vehicles and aircraft.
Version (Hardware) P/N WR-5100, Versions: 4.0.B, 4.1.B, 4.2.B, 4.2.C, 4.3.A, 4.3.B, 4.3.C, 4.3.D, 4.4.B, 4.4.C, 4.4.D, 4.5.C, 4.5.D, 4.6.D, 4.6.K, 4.6.L, 4.6.L.1, 4.6.M, 4.6.N, 4.9.N, 4.9.O and 4.9.P; Tamper Evident Paint P/N PROD-007
Version (Firmware) 19.6.10
Vendor Persistent Systems, LLC
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy ?

Symmetric Algorithms
AES, AES-, E2, HMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA256, SHA384, SHA512, SHA-384, SHA-256, SHA-224, SHA-512, MD5
Schemes
MAC, Key Agreement
Protocols
TLS, TLS1.2, TLSv1.2
Randomness
DRBG
Elliptic Curves
P-256, P-384, P-521, P-224, K-233
Block cipher modes
ECB, CBC, CTR, GCM, XTS

Trusted Execution Environments
SSC

Security level
Level 2

Standards
FIPS 140-2, FIPS 140, FIPS 197, FIPS 198, FIPS 180-4, FIPS 186-4, FIPS 186-2, SP 800-52, SP 800-90A, PKCS1

File metadata

Title Security Policy
Subject Wave Relay Man Portable Unit (Generation 5)
Author James Georgiades-Callado
Creation date D:20230421104519-07'00'
Modification date D:20230421104552-07'00'
Pages 31
Creator Acrobat PDFMaker 23 for Word
Producer Adobe PDF Library 23.1.175

References

Outgoing
  • 1191 - historical - TrustedFlash v1.0 - microSD
  • 4454 - active - TRANSEC Module

Heuristics ?

No heuristics are available for this certificate.

References ?

Updates ?

  • 31.07.2023 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The status property was set to historical.
    • The historical_reason property was set to Moved to historical list due to sunsetting.
    • The date_sunset property was set to None.
  • 26.06.2023 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The certificate_pdf_url property was set to https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2023_010623_0642.pdf.
  • 18.05.2023 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4514,
  "dgst": "6bb731a8009cb35b",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "RSA#2433",
        "HMAC#2957",
        "AES#4455",
        "CVL#1162",
        "SHS#3667",
        "CVL#1161",
        "ECDSA#1085",
        "KAS-SSC#A2543",
        "KTS#4455",
        "DRBG#1443",
        "HMAC#2956",
        "KAS#A2543",
        "SHS#3668",
        "HMAC#2955",
        "KAS#1163",
        "SHS#3666",
        "KTS#2956",
        "CVL#1163",
        "AES#4456"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.0",
        "4.3",
        "4.4",
        "4.1",
        "4.9",
        "19.6.10",
        "4.6",
        "4.2",
        "4.5"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "1191",
          "4454"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "1191",
          "4454"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "1191",
        "4454"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 18
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 4
          },
          "DSA": {
            "DSA": 3
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "CTR": {
          "CTR": 6
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 5
        },
        "XTS": {
          "XTS": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 80,
            "TLS1.2": 1,
            "TLSv1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 3
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "K-233": 2,
          "P-224": 4,
          "P-256": 4,
          "P-384": 26,
          "P-521": 4
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1085": 1,
          "#1161": 1,
          "#1162": 1,
          "#1163": 3,
          "#1164": 1,
          "#1191": 1,
          "#1443": 1,
          "#2433": 1,
          "#2955": 1,
          "#2956": 3,
          "#2957": 1,
          "#3666": 1,
          "#3667": 1,
          "#3668": 1,
          "#4454": 2,
          "#4455": 3,
          "#4456": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 128, 192": 1,
          "AES Cert. #4455": 1,
          "CVL #1161": 1,
          "CVL #1162": 1,
          "CVL #1163": 1,
          "CVL #1164": 1,
          "HMAC Cert. #2956": 2,
          "HMAC SHA-256": 1,
          "HMAC-SHA-1": 2,
          "HMAC-SHA1": 2,
          "HMAC-SHA256": 4,
          "HMAC-SHA512": 2,
          "PKCS1": 6,
          "SHA 256": 1,
          "SHA(1": 5,
          "SHA(224": 5,
          "SHA(256": 4,
          "SHA-1": 6,
          "SHA-224": 5,
          "SHA-256": 7,
          "SHA-384": 4,
          "SHA-512": 3,
          "SHA256": 1,
          "SHA384": 1,
          "SHA512": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 4
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 6
          },
          "SHA2": {
            "SHA-224": 5,
            "SHA-256": 7,
            "SHA-384": 4,
            "SHA-512": 3,
            "SHA256": 1,
            "SHA384": 1,
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 41
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140": 6,
          "FIPS 140-2": 13,
          "FIPS 180-4": 3,
          "FIPS 186-2": 1,
          "FIPS 186-4": 3,
          "FIPS 197": 4,
          "FIPS 198": 3
        },
        "NIST": {
          "SP 800-52": 1,
          "SP 800-90A": 1
        },
        "PKCS": {
          "PKCS1": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 13,
            "AES-": 4
          },
          "E2": {
            "E2": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 6
          }
        }
      },
      "tee_name": {
        "IBM": {
          "SSC": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/AppVersion": "15.0000",
      "/Author": "James Georgiades-Callado",
      "/Company": "",
      "/CreationDate": "D:20230421104519-07\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 for Word",
      "/DocSecurity": "0",
      "/Document_Revision": "1.3",
      "/EMB": "Persistent Systems Wave Relay\u00ae Embedded Module",
      "/EmbHWVer": "WR-5200 Version 4.0",
      "/FWver": "19.3.2",
      "/HyperlinksChanged": "0",
      "/LinksUpToDate": "0",
      "/MPU5HWver": "WR-5100 Versions 4.0.B, 4.1.B, 4.2.B, 4.3B, 4.4B",
      "/ModDate": "D:20230421104552-07\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "/ScaleCrop": "0",
      "/ShareDoc": "0",
      "/SourceModified": "D:20230421174504",
      "/Subject": "Wave Relay Man Portable Unit (Generation 5)",
      "/Title": "Security Policy",
      "/WR5": "Wave Relay\u00ae Man Portable Unit (Generation 5 (MPU5)) ",
      "pdf_file_size_bytes": 660114,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.persistentsystems.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 31
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "ad4af516ef9d7967eb8f3137a5e0ade554e01a84b9990835ba621638f1d159bd",
    "policy_txt_hash": "b0c35fe28ee0715ac998131df264e949ae2031598c8ff6e5233eb3d07cf96132"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When initialized and configured to overall level 2 per the Security Policy. The tamper evident material installed as indicated in the Security Policy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2023_010623_0642.pdf",
    "date_sunset": null,
    "description": "The MPU5 and Wave Relay\u00ae MANET provide wireless network connectivity between highly mobile users in a true peer-to-peer topology without requiring additional infrastructure. The MPU5 is designed to be carried by dismount users or mounted on towers, vehicles and aircraft.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Design Assurance: Level 3",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "19.6.10",
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": "P/N WR-5100, Versions: 4.0.B, 4.1.B, 4.2.B, 4.2.C, 4.3.A, 4.3.B, 4.3.C, 4.3.D, 4.4.B, 4.4.C, 4.4.D, 4.5.C, 4.5.D, 4.6.D, 4.6.K, 4.6.L, 4.6.L.1, 4.6.M, 4.6.N, 4.9.N, 4.9.O and 4.9.P; Tamper Evident Paint P/N PROD-007",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "MPU5",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2023-05-08",
        "lab": "UL VERIFICATION SERVICES INC",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Persistent Systems, LLC",
    "vendor_url": "http://www.persistentsystems.com"
  }
}