nShield F3 6000e, nShield F3 1500e, nShield F3 500e, nShield F3 10e, nShield F3 6000e for nShield Connect, nShield F3 1500e for nShield Connect and nShield F3 500e for nShield Connect

Certificate #2640

Webpage information

Status historical
Historical reason SP 800-131A transition which disallows key wrapping not compliant to SP 800-38F.
Validation dates 13.05.2016 , 29.01.2020
Standard FIPS 140-2
Security level 3
Type Hardware
Embodiment Multi-Chip Embedded
Caveat When operated in FIPS mode and initialized to Overall Level 3 per Security Policy. The protocol TLS shall not be used when operated in FIPS mode
Exceptions
  • Mitigation of Other Attacks: N/A
Description The nShield modules: nShield F3 10e, nShield F3 500e, nShield F3 1500e, nShield F3 6000e, nShield F3 500e for nShield Connect, nShield F3 1500e for nShield Connect, nShield F3 6000e for nShield Connect are tamper evident and tamper responsive Hardware Security Modules which provide support for the widest range of cryptographic algorithms, application programming interfaces (APIs) and host operating systems, enabling the devices to be used with virtually any business application. The units are identical in operation and only vary in the processing speed.
Version (Hardware) nC4033E-6K0, nC4033E-1K5, nC4033E-500, nC4033E-010, nC4033E-6K0N, nC4033E-1K5N and nC4033E-500N, Build Standard N
Version (Firmware) 2.61.2-3
Vendor nCipher Security Limited
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-, AES-256, CAST-256, RC4, DES, Triple-DES, SEED, HMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD5, RIPEMD, RIPEMD160
Schemes
MAC, Key Exchange
Protocols
SSL, TLS
Randomness
PRNG, DRBG
Elliptic Curves
P-521, P-192, P-256, B-163, K-233, K-409, B-283, B-571
Block cipher modes
ECB, CBC, CTR, GCM

Trusted Execution Environments
Secure Execution
Vendor
Thales

Security level
level 3, Level 3, level 2, Level 1

Standards
FIPS 140-2, FIPS PUB 140-2, SP 800-56A, SP 800-108, SP 800-90A, SP 800-131A, NIST SP 800-108, PKCS #8, RFC2612

File metadata

Title nShield F3 Level 3 Security Policy
Author Thales e-Security
Creation date D:20160503161830+01'00'
Modification date D:20191002160731+01'00'
Pages 52
Producer MadCap Flare V10

References

Outgoing
  • 825 - historical - Microsoft Windows CE and Windows Mobile Enhanded Cryptographic Provider 6.00.1937 and Microsoft Windows Embedded Compact Enhanced Cryptographic Provider 7.00.1687
  • 1752 - historical - Astro Subscriber Motorola Advanced Crypto Engine (MACE)
  • 695 - historical - Cisco Aironet LWAPP AP1131AG, Cisco Aironet LWAPP AP1231G, Cisco Aironet LWAPP AP1232AG, and Cisco Aironet LWAPP AP1242AG Wireless Access Points
  • 1931 - historical - SafeZone FIPS Cryptographic Module
  • 3446 - historical - Christie IMB-S3 4K Integrated Media Block (IMB)
  • 56 - historical - Luna2

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 2640,
  "dgst": "6c6ece85b5d6ea8c",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "KTS#3419",
        "ECDSA#686",
        "Triple-DES#1930",
        "KBKDF#57",
        "CVL#532",
        "RSA#1751",
        "HMAC#2177",
        "DSA#963",
        "DRBG#824",
        "CVL#516",
        "AES#3419",
        "SHS#2825",
        "Triple-DES MAC#1930"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.61.2"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "1752",
          "3446",
          "695",
          "825",
          "1931",
          "56"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "261",
          "1752",
          "3446",
          "695",
          "825",
          "1931",
          "56",
          "1535"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "1752",
        "3446",
        "695",
        "825",
        "1931",
        "56"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 12
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 11
          },
          "DSA": {
            "DSA": 27
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 2
        },
        "GCM": {
          "GCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 2
          },
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        },
        "MAC": {
          "MAC": 17
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-163": 2,
          "B-283": 1,
          "B-571": 1,
          "K-233": 1,
          "K-409": 1,
          "P-192": 4,
          "P-256": 2,
          "P-521": 6
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1752": 1,
          "#1931": 3,
          "#2178": 1,
          "#2826": 1,
          "#3420": 3,
          "#3446": 1,
          "#516": 3,
          "#532": 1,
          "#56": 1,
          "#695": 1,
          "#8": 1,
          "#825": 1,
          "#964": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES Certificate #3420": 3,
          "AES-256": 3,
          "Certificate #3420 AES": 1,
          "Certificate #3420 HMAC": 1,
          "DSA Certificate #964": 1,
          "DSA2": 2,
          "Diffie-Hellman (CVL Cert. #516": 1,
          "Diffie-Hellman (CVL Cert. #532": 1,
          "HMAC SHA- 1 (160": 2,
          "HMAC SHA-1": 6,
          "HMAC SHA-224": 1,
          "HMAC SHA-256": 5,
          "HMAC SHA-256 (256": 2,
          "HMAC SHA-384": 1,
          "HMAC SHA-512 Certificate #2178": 1,
          "PKCS #8": 2,
          "SHA- 1 (160": 2,
          "SHA-1": 38,
          "SHA-224": 6,
          "SHA-256": 16,
          "SHA-384": 6,
          "SHA-512": 5,
          "SHA-512 Certificate #2178": 1,
          "SHA-512 Certificate #2826": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1,
          "Level 3": 6,
          "level 2": 1,
          "level 3": 31
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "RIPEMD": {
          "RIPEMD": 1,
          "RIPEMD160": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 39
          },
          "SHA2": {
            "SHA-224": 6,
            "SHA-256": 16,
            "SHA-384": 6,
            "SHA-512": 7
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 9,
          "PRNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 33,
          "FIPS PUB 140-2": 1
        },
        "NIST": {
          "NIST SP 800-108": 1,
          "SP 800-108": 2,
          "SP 800-131A": 1,
          "SP 800-56A": 1,
          "SP 800-90A": 4
        },
        "PKCS": {
          "PKCS #8": 1
        },
        "RFC": {
          "RFC2612": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 59,
            "AES-": 1,
            "AES-256": 3
          },
          "CAST": {
            "CAST-256": 1
          },
          "RC": {
            "RC4": 1
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 11
          },
          "DES": {
            "DES": 41
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 3,
            "HMAC": 26
          }
        },
        "miscellaneous": {
          "SEED": {
            "SEED": 1
          }
        }
      },
      "tee_name": {
        "IBM": {
          "Secure Execution": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Thales": {
          "Thales": 29
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Thales e-Security",
      "/CreationDate": "D:20160503161830+01\u002700\u0027",
      "/Keywords": "",
      "/ModDate": "D:20191002160731+01\u002700\u0027",
      "/Producer": "MadCap Flare V10",
      "/Subject": "",
      "/Title": "nShield F3 Level 3 Security Policy",
      "pdf_file_size_bytes": 671219,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://ncipher.zendesk.com/hc/en-us/categories/360001306412-Customer-Service",
          "mailto:[email protected]",
          "https://www.ncipher.com/",
          "http://www.ncipher.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 52
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "f5b0ca150d42801e0c617493c5f01375bef1468dc0bab1e8c7147637beb0c322",
    "policy_txt_hash": "cbd722e6b4e7e2026a784c662f258fbd0f07c29c9ac94d137dd7d11702b5c09e"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode and initialized to Overall Level 3 per Security Policy. The protocol TLS shall not be used when operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertMay2016.pdf",
    "date_sunset": null,
    "description": "The nShield modules: nShield F3 10e, nShield F3 500e, nShield F3 1500e, nShield F3 6000e, nShield F3 500e for nShield Connect, nShield F3 1500e for nShield Connect, nShield F3 6000e for nShield Connect are tamper evident and tamper responsive Hardware Security Modules which provide support for the widest range of cryptographic algorithms, application programming interfaces (APIs) and host operating systems, enabling the devices to be used with virtually any business application. The units are identical in operation and only vary in the processing speed.",
    "embodiment": "Multi-Chip Embedded",
    "exceptions": [
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "2.61.2-3",
    "historical_reason": "SP 800-131A transition which disallows key wrapping not compliant to SP 800-38F.",
    "hw_versions": "nC4033E-6K0, nC4033E-1K5, nC4033E-500, nC4033E-010, nC4033E-6K0N, nC4033E-1K5N and nC4033E-500N, Build Standard N",
    "level": 3,
    "mentioned_certs": {},
    "module_name": "nShield F3 6000e, nShield F3 1500e, nShield F3 500e, nShield F3 10e, nShield F3 6000e for nShield Connect, nShield F3 1500e for nShield Connect and nShield F3 500e for nShield Connect",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2016-05-13",
        "lab": "DXC Technology",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2020-01-29",
        "lab": "Lightship Security, Inc.",
        "validation_type": "Update"
      }
    ],
    "vendor": "nCipher Security Limited",
    "vendor_url": "http://www.ncipher.com"
  }
}