CryptoSwift HSM

Certificate #162

Webpage information

Status historical
Historical reason Validation Sunsetting Policy - FIPS 140-1 Certificate
Validation dates 15.08.2001 , 27.08.2001 , 19.11.2002 , 18.10.2004
Standard FIPS 140-1
Security level 3
Type Hardware
Embodiment Multi-Chip Embedded
Caveat When operated in FIPS mode
Exceptions
  • Self Tests: Level 4
Description The CryptoSwift HSM is for high-assurance applications requiring a high degree of physical security as well as optimal cryptographic processing performance. With its tamper active design, the evasive measures of the CryptoSwift HSM defeat physical attacks through detection and response to ensure the integrity and confidentiality of keying information. The key management features allow operators to backup or clone keys securely and easily. In addition, strong two-factor authentication is provided for Security Officers and Operators with the CryptoSwift HSM's trusted channel, a USB port with Rainbow Technologies iKey authentication solution.
Version (Hardware) P/N 107316
Version (Firmware) 5.6.27 and 5.6.28
Vendor SafeNet, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
RC4, DES, 3DES, HMAC
Asymmetric Algorithms
DSA
Post-quantum Algorithms
Rainbow
Hash functions
SHA-1, SHA1, MD5
Schemes
MAC
Protocols
SSL
Randomness
PRNG, RNG

Security level
Level 3, Level 4, level 3, level 4

Standards
FIPS 140-1, FIPS PUB 140-1, FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 180-1, FIPS140-1, PKCS #1, PKCS#11, PKCS 12

File metadata

Title sec_pol_pki_v25.PDF
Author Catherine
Creation date D:20010731103832
Modification date D:20010806115734-04'00'
Pages 19
Creator Microsoft Word
Producer Acrobat PDFWriter 4.05 for Windows

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 162,
  "dgst": "79d6eaa2676189eb",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "SHA-1#16",
        "RSA#1",
        "Triple-DES#30"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.6.27",
        "5.6.28"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DSA": {
            "DSA": 5
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 4
        }
      },
      "fips_certlike": {
        "Certlike": {
          "#1 RSA": 1,
          "PKCS #1": 8,
          "PKCS 12": 2,
          "PKCS#11": 2,
          "SHA-1": 12,
          "SHA1": 6
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 3": 12,
          "Level 4": 3,
          "level 3": 1,
          "level 4": 1
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 13
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 12,
            "SHA1": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {
        "Rainbow": {
          "Rainbow": 6
        }
      },
      "randomness": {
        "PRNG": {
          "PRNG": 8
        },
        "RNG": {
          "RNG": 3
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-1": 24,
          "FIPS PUB 140-1": 2,
          "FIPS PUB 180-1": 1,
          "FIPS PUB 46-3": 1,
          "FIPS PUB 81": 1,
          "FIPS140-1": 10
        },
        "PKCS": {
          "PKCS #1": 4,
          "PKCS 12": 1,
          "PKCS#11": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "RC": {
            "RC4": 11
          }
        },
        "DES": {
          "3DES": {
            "3DES": 15
          },
          "DES": {
            "DES": 14
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 8
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Catherine",
      "/CreationDate": "D:20010731103832",
      "/Creator": "Microsoft Word ",
      "/ModDate": "D:20010806115734-04\u002700\u0027",
      "/Producer": "Acrobat PDFWriter 4.05 for Windows",
      "/Title": "sec_pol_pki_v25.PDF",
      "pdf_file_size_bytes": 60476,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 19
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "926b6b3e715f856c44d40085c07427f312666521d45a7227f527d3e89c781fdc",
    "policy_txt_hash": "a45db5ddd42c2b63bbf71716dc00cd86e0b61321c8eb8f669993260562e2d594"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt162.pdf",
    "date_sunset": null,
    "description": "The CryptoSwift HSM is for high-assurance applications requiring a high degree of physical security as well as optimal cryptographic processing performance. With its tamper active design, the evasive measures of the CryptoSwift HSM defeat physical attacks through detection and response to ensure the integrity and confidentiality of keying information. The key management features allow operators to backup or clone keys securely and easily. In addition, strong two-factor authentication is provided for Security Officers and Operators with the CryptoSwift HSM\u0027s trusted channel, a USB port with Rainbow Technologies iKey authentication solution.",
    "embodiment": "Multi-Chip Embedded",
    "exceptions": [
      "Self Tests: Level 4"
    ],
    "fw_versions": "5.6.27 and 5.6.28",
    "historical_reason": "Validation Sunsetting Policy - FIPS 140-1 Certificate",
    "hw_versions": "P/N 107316",
    "level": 3,
    "mentioned_certs": {},
    "module_name": "CryptoSwift HSM",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-1",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2001-08-15",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2001-08-27",
        "lab": "",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2002-11-19",
        "lab": "",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2004-10-18",
        "lab": "",
        "validation_type": "Update"
      }
    ],
    "vendor": "SafeNet, Inc.",
    "vendor_url": "http://www.safenet-inc.com"
  }
}