REDCOM OpenSSL Cryptographic Module

Certificate #3768

Webpage information

Status historical
Historical reason SP 800-56Arev3 transition
Validation dates 14.12.2020
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Exceptions
  • Roles, Services, and Authentication: Level 2
  • Physical Security: N/A
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Description REDCOM OpenSSL Cryptographic Module is used with various REDCOM products. The module offloads functions for key management, data integrity, data at rest encryption, and communications to a trusted implementation. The module is a multi-chip standalone embodiment installed on a General-Purpose Device and relies on physical characteristics of the host. The physical cryptographic boundary is defined by the enclosure of the host platform. Operations occur via calls from host applications and their internal daemons/processes. As such there are no untrusted services calling the services of the module
Tested configurations
  • Oracle® Linux 7.6 64 bit running on Oracle® X7-2 Server with Intel® Xeon® Silver 4114 with PAA
  • Oracle® Linux 7.6 64 bit running on Oracle® X7-2 Server with Intel® Xeon® Silver 4114 without PAA
Vendor REDCOM Laboratories, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES-128, AES-192, AES-256, AES-, AES, TDES, Triple-DES, TDEA, HMAC, CMAC
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA1, SHA-224, SHA-256, SHA-384, SHA-512, SHA256, SHA-2, SHA2
Schemes
Key Agreement, Key agreement
Protocols
TLS
Randomness
DRBG
Libraries
OpenSSL
Elliptic Curves
P-224, P-384, P-521, P-192, P-256, K-283, K-571, B-283, B-571, B-163, B-233, B-409, K-233
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTS

Security level
Level 1, level 1

Standards
FIPS 140-2, FIPS 197, FIPS 180-4, FIPS 198, FIPS 186-2, FIPS 186-4, FIPS 198-1, SP 800-90A, SP 800-133, SP 800-67, SP 800-38A, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-38E, SP 800-56A, NIST SP 800-38D, SP 800-89, SP 800-131A, PKCS#1, RFC 5288, RFC 5246

File metadata

Author chris brych
Creation date D:20201211111131-05'00'
Modification date D:20201211111131-05'00'
Pages 21
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

References

Incoming
  • 2484 - historical - SUSE Linux Enterprise Server 12 - StrongSwan Cryptographic Module
  • 2471 - historical - SUSE Linux Enterprise Server 12 - OpenSSH Server Module
  • 2472 - historical - SUSE Linux Enterprise Server 12 - OpenSSH Client Module

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3768,
  "dgst": "71c4994de8c7229a",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "RSA#C1651",
        "CVL#C1651",
        "HMAC#C1651",
        "Triple-DES#C1651",
        "DSA#C1651",
        "ECDSA#C1651",
        "AES#C1651",
        "SHS#C1651"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2484",
          "2472",
          "2471"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2472",
          "2471",
          "3099",
          "2484",
          "2549"
        ]
      },
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDSA": {
            "ECDSA": 15
          }
        },
        "FF": {
          "DH": {
            "DH": 8,
            "Diffie-Hellman": 6
          },
          "DSA": {
            "DSA": 16
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 4
        },
        "CFB": {
          "CFB": 3
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 7
        },
        "OFB": {
          "OFB": 1
        },
        "XTS": {
          "XTS": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 29
        }
      },
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2,
          "Key agreement": 3
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-163": 2,
          "B-233": 1,
          "B-283": 1,
          "B-409": 1,
          "B-571": 1,
          "K-233": 1,
          "K-283": 2,
          "K-571": 2,
          "P-192": 6,
          "P-224": 4,
          "P-256": 2,
          "P-384": 2,
          "P-521": 4
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES 128/ 192/256": 1,
          "AES 128/192/256": 1,
          "AES, 256": 1,
          "AES- 256": 1,
          "AES-128": 3,
          "AES-128 128": 1,
          "AES-192": 2,
          "AES-256": 1,
          "AES-256 256": 1,
          "DRBG1": 1,
          "HMAC SHA-1": 1,
          "HMAC-SHA-1": 24,
          "HMAC-SHA1": 2,
          "PKCS#1": 2,
          "SHA-1": 19,
          "SHA-1 128": 1,
          "SHA-1, 224": 18,
          "SHA-2": 3,
          "SHA-2 (224": 2,
          "SHA-224": 15,
          "SHA-256": 5,
          "SHA-384": 5,
          "SHA-512": 4,
          "SHA-512 256": 1,
          "SHA1": 2,
          "SHA2": 1,
          "SHA256": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1,
          "level 1": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 38,
            "SHA1": 2
          },
          "SHA2": {
            "SHA-2": 5,
            "SHA-224": 16,
            "SHA-256": 5,
            "SHA-384": 5,
            "SHA-512": 5,
            "SHA2": 1,
            "SHA256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 19
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 15,
          "FIPS 180-4": 2,
          "FIPS 186-2": 4,
          "FIPS 186-4": 8,
          "FIPS 197": 2,
          "FIPS 198": 1,
          "FIPS 198-1": 1
        },
        "NIST": {
          "NIST SP 800-38D": 1,
          "SP 800-131A": 1,
          "SP 800-133": 1,
          "SP 800-38A": 2,
          "SP 800-38B": 2,
          "SP 800-38C": 2,
          "SP 800-38D": 2,
          "SP 800-38E": 1,
          "SP 800-56A": 4,
          "SP 800-67": 1,
          "SP 800-89": 1,
          "SP 800-90A": 4
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "RFC": {
          "RFC 5246": 1,
          "RFC 5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 19,
            "AES-": 1,
            "AES-128": 4,
            "AES-192": 3,
            "AES-256": 2
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 1,
            "Triple-DES": 7
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 15,
            "HMAC": 6
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "chris brych",
      "/CreationDate": "D:20201211111131-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20201211111131-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 557172,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://github.com/oracle/solaris-openssl-fips/",
          "https://software.intel.com/content/www/us/en/develop/articles/intel-advanced-encryption-standard-instructions-aes-ni.html?wapkw=aes-ni",
          "https://tools.ietf.org/html/rfc5246",
          "http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf",
          "http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf",
          "http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf",
          "http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf",
          "https://tools.ietf.org/html/rfc5288",
          "http://csrc.nist.gov/publications/nistpubs/800-131A/sp800-131A.pdf",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program",
          "https://github.com/oracle/solaris-openssl-fips/releases/download/v1.0/OpenSSL_2.0.13_OracleFIPS_1.0.tar.gz",
          "http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf",
          "http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf",
          "http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf",
          "http://www.intel.com/support/processors/sb/CS-030123.htm?wapkw=sse2",
          "http://csrc.nist.gov/publications/nistpubs/800-89/SP-800-89_November2006.pdf",
          "http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=32292",
          "http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "b2c8755f7686c364aec492cc1a1f6d2483774a6ad986b8b1967235f089d5834e",
    "policy_txt_hash": "51180b9df9d0f1841dae10d24f75a79e515151a5eafa21e4f574902e1325c786"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2020_040121_1006_signed.pdf",
    "date_sunset": null,
    "description": "REDCOM OpenSSL Cryptographic Module is used with various REDCOM products. The module offloads functions for key management, data integrity, data at rest encryption, and communications to a trusted implementation. The module is a multi-chip standalone embodiment installed on a General-Purpose Device and relies on physical characteristics of the host. The physical cryptographic boundary is defined by the enclosure of the host platform. Operations occur via calls from host applications and their internal daemons/processes. As such there are no untrusted services calling the services of the module",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Roles, Services, and Authentication: Level 2",
      "Physical Security: N/A",
      "Design Assurance: Level 3",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "SP 800-56Arev3 transition",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "REDCOM OpenSSL Cryptographic Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "1.0",
    "tested_conf": [
      "Oracle\u00ae Linux 7.6 64 bit running on Oracle\u00ae X7-2 Server with Intel\u00ae Xeon\u00ae Silver 4114 with PAA",
      "Oracle\u00ae Linux 7.6 64 bit running on Oracle\u00ae X7-2 Server with Intel\u00ae Xeon\u00ae Silver 4114 without PAA"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2020-12-14",
        "lab": "Acumen Security",
        "validation_type": "Initial"
      }
    ],
    "vendor": "REDCOM Laboratories, Inc.",
    "vendor_url": "https://www.redcom.com/"
  }
}