This page was not yet optimized for use on mobile
devices.
nShield F2 PCI, nShield F2 Ultrasign PCI and nShield F2 Ultrasign 32 PCI
Certificate #298
Webpage information
Security policy
Symmetric Algorithms
AES, Twofish, Serpent, CAST, RC4, DES, Blowfish, SEED, HMACAsymmetric Algorithms
DSAHash functions
SHA-1, SHA-256, SHA-512, SHA-384, MD5, RIPEMD, RIPEMD160Schemes
MAC, Key ExchangeProtocols
SSLBlock cipher modes
ECB, CBCTrusted Execution Environments
Secure ExecutionSecurity level
level 2, level 3Standards
FIPS 140-2, PKCS #8, PKCS #1, RFC2144, RFC2612File metadata
| Title | Untitled Document |
|---|---|
| Creation date | D:20040116104854Z |
| Modification date | D:20040123110308-05'00' |
| Pages | 32 |
| Creator | FrameMaker 6.0 |
| Producer | Acrobat Distiller 4.05 for Windows |
References
IncomingHeuristics
No heuristics are available for this certificate.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 298,
"dgst": "76ebdb6d45c61ca1",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"Triple-DES#34",
"AES#15",
"Triple-DES MAC#34",
"RSA#1",
"DSA/SHA-1#11",
"HMAC-SHA-1#11"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"2.0.4",
"2.0.5",
"2.0.0",
"2.0.2"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"2157",
"578"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"2157",
"578"
]
},
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 17
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 2
}
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 2
},
"MAC": {
"MAC": 14
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 1,
"#11": 2,
"#15": 1,
"#24": 2,
"#34": 2,
"#8": 2
}
},
"fips_certlike": {
"Certlike": {
"#1 HMAC": 1,
"#24 DES": 1,
"AES Certificate #15": 1,
"Certificate #11 RSA": 1,
"Certificate #15 DES": 1,
"DES Certificate #24": 1,
"DES Certificate #34": 1,
"HMAC SHA-1": 1,
"PKCS #1": 2,
"PKCS #8": 4,
"SHA- 384": 1,
"SHA-1": 12,
"SHA-256": 3,
"SHA-384": 2,
"SHA-512": 3
}
},
"fips_security_level": {
"Level": {
"level 2": 11,
"level 3": 8
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 3
}
},
"RIPEMD": {
"RIPEMD": 2,
"RIPEMD160": 1
},
"SHA": {
"SHA1": {
"SHA-1": 12
},
"SHA2": {
"SHA-256": 3,
"SHA-384": 2,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 16
},
"PKCS": {
"PKCS #1": 1,
"PKCS #8": 2
},
"RFC": {
"RFC2144": 1,
"RFC2612": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7
},
"CAST": {
"CAST": 14
},
"RC": {
"RC4": 1
},
"Serpent": {
"Serpent": 7
},
"Twofish": {
"Twofish": 7
}
},
"DES": {
"DES": {
"DES": 34
}
},
"constructions": {
"MAC": {
"HMAC": 8
}
},
"miscellaneous": {
"Blowfish": {
"Blowfish": 7
},
"SEED": {
"SEED": 7
}
}
},
"tee_name": {
"IBM": {
"Secure Execution": 1
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/CreationDate": "D:20040116104854Z",
"/Creator": "FrameMaker 6.0",
"/ModDate": "D:20040123110308-05\u002700\u0027",
"/Producer": "Acrobat Distiller 4.05 for Windows",
"/Title": "Untitled Document",
"pdf_file_size_bytes": 283584,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ncipher.com"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 32
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "a22a72e0fa7757d97c9ba228b4724b2e0b31c52d2bba99344762b623d1eca6bc",
"policy_txt_hash": "452a99491b8c1857f32408cd453330b5570d4ef0ae5e180d18e969b592de340f"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt298.pdf",
"date_sunset": null,
"description": "The nCipher nShield \"SEE Ready\" range of Hardware Security Modules improves the security of cryptographic keys, security sensitive software applications and increases server throughput of secure transactions in Public Key Infrastructure and other high integrity applications such as: Certificate Authorities, Registration Authorities, Government and Financial Institutions.",
"embodiment": "Multi-Chip Embedded",
"exceptions": [
"Roles, Services, and Authentication: Level 2 or 3*",
"Physical Security: Level 3",
"Cryptographic Module Ports and interfaces: Level 2 or 3*",
"Cryptographic Key Management: Level 2 or 3*",
"*Level conditional on configuration as per Security Policy"
],
"fw_versions": "2.0.0, 2.0.2, 2.0.4 and 2.0.5",
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": "nC4022P-150, nC4022P-300 and nC4122P-300, Build Standard ER",
"level": 2,
"mentioned_certs": {},
"module_name": "nShield F2 PCI, nShield F2 Ultrasign PCI and nShield F2 Ultrasign 32 PCI",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2003-03-07",
"lab": "DOMUS",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2003-05-09",
"lab": "",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2004-01-23",
"lab": "",
"validation_type": "Update"
}
],
"vendor": "nCipher Corporation Ltd.",
"vendor_url": "http://www.ncipher.com"
}
}