This page was not yet optimized for use on mobile
devices.
nShield F3 6000e, nShield F3 1500e, nShield F3 500e, nShield F3 10e, nShield F3 6000e for nShield Connect, nShield F3 1500e for nShield Connect and nShield F3 500e for nShield Connect
Certificate #2640
Webpage information
Security policy
Symmetric Algorithms
AES, AES-, AES-256, CAST-256, RC4, DES, Triple-DES, SEED, HMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD5, RIPEMD, RIPEMD160Schemes
MAC, Key ExchangeProtocols
SSL, TLSRandomness
PRNG, DRBGElliptic Curves
P-521, P-192, P-256, B-163, K-233, K-409, B-283, B-571Block cipher modes
ECB, CBC, CTR, GCMTrusted Execution Environments
Secure ExecutionVendor
ThalesSecurity level
level 3, Level 3, level 2, Level 1Standards
FIPS 140-2, FIPS PUB 140-2, SP 800-56A, SP 800-108, SP 800-90A, SP 800-131A, NIST SP 800-108, PKCS #8, RFC2612File metadata
| Title | nShield F3 Level 3 Security Policy |
|---|---|
| Author | Thales e-Security |
| Creation date | D:20160503161830+01'00' |
| Modification date | D:20191002160731+01'00' |
| Pages | 52 |
| Producer | MadCap Flare V10 |
References
Outgoing- 825 - historical - Microsoft Windows CE and Windows Mobile Enhanded Cryptographic Provider 6.00.1937 and Microsoft Windows Embedded Compact Enhanced Cryptographic Provider 7.00.1687
- 1752 - historical - Astro Subscriber Motorola Advanced Crypto Engine (MACE)
- 695 - historical - Cisco Aironet LWAPP AP1131AG, Cisco Aironet LWAPP AP1231G, Cisco Aironet LWAPP AP1232AG, and Cisco Aironet LWAPP AP1242AG Wireless Access Points
- 1931 - historical - SafeZone FIPS Cryptographic Module
- 3446 - historical - Christie IMB-S3 4K Integrated Media Block (IMB)
- 56 - historical - Luna2
Heuristics
No heuristics are available for this certificate.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 2640,
"dgst": "6c6ece85b5d6ea8c",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"KTS#3419",
"ECDSA#686",
"Triple-DES#1930",
"KBKDF#57",
"CVL#532",
"RSA#1751",
"HMAC#2177",
"DSA#963",
"DRBG#824",
"CVL#516",
"AES#3419",
"SHS#2825",
"Triple-DES MAC#1930"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"2.61.2"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"1752",
"3446",
"695",
"825",
"1931",
"56"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"261",
"1752",
"3446",
"695",
"825",
"1931",
"56",
"1535"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"1752",
"3446",
"695",
"825",
"1931",
"56"
]
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 12
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 11
},
"DSA": {
"DSA": 27
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 2
},
"GCM": {
"GCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 2
},
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 2
},
"MAC": {
"MAC": 17
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"B-163": 2,
"B-283": 1,
"B-571": 1,
"K-233": 1,
"K-409": 1,
"P-192": 4,
"P-256": 2,
"P-521": 6
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1752": 1,
"#1931": 3,
"#2178": 1,
"#2826": 1,
"#3420": 3,
"#3446": 1,
"#516": 3,
"#532": 1,
"#56": 1,
"#695": 1,
"#8": 1,
"#825": 1,
"#964": 1
}
},
"fips_certlike": {
"Certlike": {
"AES Certificate #3420": 3,
"AES-256": 3,
"Certificate #3420 AES": 1,
"Certificate #3420 HMAC": 1,
"DSA Certificate #964": 1,
"DSA2": 2,
"Diffie-Hellman (CVL Cert. #516": 1,
"Diffie-Hellman (CVL Cert. #532": 1,
"HMAC SHA- 1 (160": 2,
"HMAC SHA-1": 6,
"HMAC SHA-224": 1,
"HMAC SHA-256": 5,
"HMAC SHA-256 (256": 2,
"HMAC SHA-384": 1,
"HMAC SHA-512 Certificate #2178": 1,
"PKCS #8": 2,
"SHA- 1 (160": 2,
"SHA-1": 38,
"SHA-224": 6,
"SHA-256": 16,
"SHA-384": 6,
"SHA-512": 5,
"SHA-512 Certificate #2178": 1,
"SHA-512 Certificate #2826": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 1,
"Level 3": 6,
"level 2": 1,
"level 3": 31
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
},
"RIPEMD": {
"RIPEMD": 1,
"RIPEMD160": 1
},
"SHA": {
"SHA1": {
"SHA-1": 39
},
"SHA2": {
"SHA-224": 6,
"SHA-256": 16,
"SHA-384": 6,
"SHA-512": 7
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 9,
"PRNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 33,
"FIPS PUB 140-2": 1
},
"NIST": {
"NIST SP 800-108": 1,
"SP 800-108": 2,
"SP 800-131A": 1,
"SP 800-56A": 1,
"SP 800-90A": 4
},
"PKCS": {
"PKCS #8": 1
},
"RFC": {
"RFC2612": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 59,
"AES-": 1,
"AES-256": 3
},
"CAST": {
"CAST-256": 1
},
"RC": {
"RC4": 1
}
},
"DES": {
"3DES": {
"Triple-DES": 11
},
"DES": {
"DES": 41
}
},
"constructions": {
"MAC": {
"CMAC": 3,
"HMAC": 26
}
},
"miscellaneous": {
"SEED": {
"SEED": 1
}
}
},
"tee_name": {
"IBM": {
"Secure Execution": 2
}
},
"tls_cipher_suite": {},
"vendor": {
"Thales": {
"Thales": 29
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Thales e-Security",
"/CreationDate": "D:20160503161830+01\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20191002160731+01\u002700\u0027",
"/Producer": "MadCap Flare V10",
"/Subject": "",
"/Title": "nShield F3 Level 3 Security Policy",
"pdf_file_size_bytes": 671219,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://ncipher.zendesk.com/hc/en-us/categories/360001306412-Customer-Service",
"mailto:[email protected]",
"https://www.ncipher.com/",
"http://www.ncipher.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 52
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "f5b0ca150d42801e0c617493c5f01375bef1468dc0bab1e8c7147637beb0c322",
"policy_txt_hash": "cbd722e6b4e7e2026a784c662f258fbd0f07c29c9ac94d137dd7d11702b5c09e"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode and initialized to Overall Level 3 per Security Policy. The protocol TLS shall not be used when operated in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertMay2016.pdf",
"date_sunset": null,
"description": "The nShield modules: nShield F3 10e, nShield F3 500e, nShield F3 1500e, nShield F3 6000e, nShield F3 500e for nShield Connect, nShield F3 1500e for nShield Connect, nShield F3 6000e for nShield Connect are tamper evident and tamper responsive Hardware Security Modules which provide support for the widest range of cryptographic algorithms, application programming interfaces (APIs) and host operating systems, enabling the devices to be used with virtually any business application. The units are identical in operation and only vary in the processing speed.",
"embodiment": "Multi-Chip Embedded",
"exceptions": [
"Mitigation of Other Attacks: N/A"
],
"fw_versions": "2.61.2-3",
"historical_reason": "SP 800-131A transition which disallows key wrapping not compliant to SP 800-38F.",
"hw_versions": "nC4033E-6K0, nC4033E-1K5, nC4033E-500, nC4033E-010, nC4033E-6K0N, nC4033E-1K5N and nC4033E-500N, Build Standard N",
"level": 3,
"mentioned_certs": {},
"module_name": "nShield F3 6000e, nShield F3 1500e, nShield F3 500e, nShield F3 10e, nShield F3 6000e for nShield Connect, nShield F3 1500e for nShield Connect and nShield F3 500e for nShield Connect",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2016-05-13",
"lab": "DXC Technology",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2020-01-29",
"lab": "Lightship Security, Inc.",
"validation_type": "Update"
}
],
"vendor": "nCipher Security Limited",
"vendor_url": "http://www.ncipher.com"
}
}