This page was not yet optimized for use on mobile
devices.
REDCOM OpenSSL Cryptographic Module
Certificate #3768
Webpage information
Security policy
Symmetric Algorithms
AES-128, AES-192, AES-256, AES-, AES, TDES, Triple-DES, TDEA, HMAC, CMACAsymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA1, SHA-224, SHA-256, SHA-384, SHA-512, SHA256, SHA-2, SHA2Schemes
Key Agreement, Key agreementProtocols
TLSRandomness
DRBGLibraries
OpenSSLElliptic Curves
P-224, P-384, P-521, P-192, P-256, K-283, K-571, B-283, B-571, B-163, B-233, B-409, K-233Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSSecurity level
Level 1, level 1Standards
FIPS 140-2, FIPS 197, FIPS 180-4, FIPS 198, FIPS 186-2, FIPS 186-4, FIPS 198-1, SP 800-90A, SP 800-133, SP 800-67, SP 800-38A, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-38E, SP 800-56A, NIST SP 800-38D, SP 800-89, SP 800-131A, PKCS#1, RFC 5288, RFC 5246File metadata
| Author | chris brych |
|---|---|
| Creation date | D:20201211111131-05'00' |
| Modification date | D:20201211111131-05'00' |
| Pages | 21 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
References
IncomingHeuristics
No heuristics are available for this certificate.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3768,
"dgst": "71c4994de8c7229a",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"RSA#C1651",
"CVL#C1651",
"HMAC#C1651",
"Triple-DES#C1651",
"DSA#C1651",
"ECDSA#C1651",
"AES#C1651",
"SHS#C1651"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"2484",
"2472",
"2471"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"2472",
"2471",
"3099",
"2484",
"2549"
]
},
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
},
"ECDSA": {
"ECDSA": 15
}
},
"FF": {
"DH": {
"DH": 8,
"Diffie-Hellman": 6
},
"DSA": {
"DSA": 16
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CCM": {
"CCM": 4
},
"CFB": {
"CFB": 3
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 3
},
"GCM": {
"GCM": 7
},
"OFB": {
"OFB": 1
},
"XTS": {
"XTS": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 29
}
},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2,
"Key agreement": 3
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"B-163": 2,
"B-233": 1,
"B-283": 1,
"B-409": 1,
"B-571": 1,
"K-233": 1,
"K-283": 2,
"K-571": 2,
"P-192": 6,
"P-224": 4,
"P-256": 2,
"P-384": 2,
"P-521": 4
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES 128/ 192/256": 1,
"AES 128/192/256": 1,
"AES, 256": 1,
"AES- 256": 1,
"AES-128": 3,
"AES-128 128": 1,
"AES-192": 2,
"AES-256": 1,
"AES-256 256": 1,
"DRBG1": 1,
"HMAC SHA-1": 1,
"HMAC-SHA-1": 24,
"HMAC-SHA1": 2,
"PKCS#1": 2,
"SHA-1": 19,
"SHA-1 128": 1,
"SHA-1, 224": 18,
"SHA-2": 3,
"SHA-2 (224": 2,
"SHA-224": 15,
"SHA-256": 5,
"SHA-384": 5,
"SHA-512": 4,
"SHA-512 256": 1,
"SHA1": 2,
"SHA2": 1,
"SHA256": 2
}
},
"fips_security_level": {
"Level": {
"Level 1": 1,
"level 1": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 38,
"SHA1": 2
},
"SHA2": {
"SHA-2": 5,
"SHA-224": 16,
"SHA-256": 5,
"SHA-384": 5,
"SHA-512": 5,
"SHA2": 1,
"SHA256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 19
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 15,
"FIPS 180-4": 2,
"FIPS 186-2": 4,
"FIPS 186-4": 8,
"FIPS 197": 2,
"FIPS 198": 1,
"FIPS 198-1": 1
},
"NIST": {
"NIST SP 800-38D": 1,
"SP 800-131A": 1,
"SP 800-133": 1,
"SP 800-38A": 2,
"SP 800-38B": 2,
"SP 800-38C": 2,
"SP 800-38D": 2,
"SP 800-38E": 1,
"SP 800-56A": 4,
"SP 800-67": 1,
"SP 800-89": 1,
"SP 800-90A": 4
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC 5246": 1,
"RFC 5288": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 19,
"AES-": 1,
"AES-128": 4,
"AES-192": 3,
"AES-256": 2
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 1,
"Triple-DES": 7
}
},
"constructions": {
"MAC": {
"CMAC": 15,
"HMAC": 6
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "chris brych",
"/CreationDate": "D:20201211111131-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20201211111131-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 557172,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://github.com/oracle/solaris-openssl-fips/",
"https://software.intel.com/content/www/us/en/develop/articles/intel-advanced-encryption-standard-instructions-aes-ni.html?wapkw=aes-ni",
"https://tools.ietf.org/html/rfc5246",
"http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf",
"http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf",
"http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf",
"http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf",
"https://tools.ietf.org/html/rfc5288",
"http://csrc.nist.gov/publications/nistpubs/800-131A/sp800-131A.pdf",
"https://csrc.nist.gov/projects/cryptographic-module-validation-program",
"https://github.com/oracle/solaris-openssl-fips/releases/download/v1.0/OpenSSL_2.0.13_OracleFIPS_1.0.tar.gz",
"http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf",
"http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf",
"http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf",
"http://www.intel.com/support/processors/sb/CS-030123.htm?wapkw=sse2",
"http://csrc.nist.gov/publications/nistpubs/800-89/SP-800-89_November2006.pdf",
"http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=32292",
"http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "b2c8755f7686c364aec492cc1a1f6d2483774a6ad986b8b1967235f089d5834e",
"policy_txt_hash": "51180b9df9d0f1841dae10d24f75a79e515151a5eafa21e4f574902e1325c786"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2020_040121_1006_signed.pdf",
"date_sunset": null,
"description": "REDCOM OpenSSL Cryptographic Module is used with various REDCOM products. The module offloads functions for key management, data integrity, data at rest encryption, and communications to a trusted implementation. The module is a multi-chip standalone embodiment installed on a General-Purpose Device and relies on physical characteristics of the host. The physical cryptographic boundary is defined by the enclosure of the host platform. Operations occur via calls from host applications and their internal daemons/processes. As such there are no untrusted services calling the services of the module",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Roles, Services, and Authentication: Level 2",
"Physical Security: N/A",
"Design Assurance: Level 3",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": "SP 800-56Arev3 transition",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "REDCOM OpenSSL Cryptographic Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "1.0",
"tested_conf": [
"Oracle\u00ae Linux 7.6 64 bit running on Oracle\u00ae X7-2 Server with Intel\u00ae Xeon\u00ae Silver 4114 with PAA",
"Oracle\u00ae Linux 7.6 64 bit running on Oracle\u00ae X7-2 Server with Intel\u00ae Xeon\u00ae Silver 4114 without PAA"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2020-12-14",
"lab": "Acumen Security",
"validation_type": "Initial"
}
],
"vendor": "REDCOM Laboratories, Inc.",
"vendor_url": "https://www.redcom.com/"
}
}