TrustedKeep Encryption Module

Certificate #3078

Webpage information

Status historical
Historical reason SP 800-56Arev3 transition
Validation dates 11.12.2017
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode as assumed by the Crypto Officer role and as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from the procedures outlined in the Security Policy will result in a non FIPS 140-2 compliant module.
Exceptions
  • Roles, Services, and Authentication: Level 2
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description TrustedKeep is a secure object storage and sharing solution, providing robust access controls around your objects and securing them both in transit and at rest. It is designed from the ground up for object-level encryption, assigning a unique key to each object being stored, and capable of managing billions of objects in a single cluster. TrustedKeep handles all encryption and decryption at the boundaries, maintaining control at all times over key material, so that engineering mistakes do not result in key material (or sensitive data) being swapped to disk or left in memory.
Tested configurations
  • MacBook Pro running on Intel Core i7 on CentOS 7.3 (gcc Compiler Version 4.8.5) with PAA
  • MacBook Pro running on Intel Core i7 on CentOS 7.3 (gcc Compiler Version 4.8.5) without PAA. (single-user mode)
Vendor Trusted Concepts, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, TDEA, TDES, Triple-DES, HMAC, CMAC
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA1, SHA-224, SHA-256, SHA224, SHA256, SHA384, SHA512, SHA-384, SHA-512, SHA-2
Schemes
Key Agreement, Key agreement
Protocols
SSH, TLS
Randomness
DRBG
Libraries
OpenSSL
Elliptic Curves
P-224, P-256, P-384, P-192, K-233, K-283, K-409, B-233, B-283, B-409, B-571, B-163, K-163, K-571
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTS

Standards
FIPS 140-2, FIPS 180-4, FIPS 186-4, FIPS 197, FIPS 198-1, FIPS 198, FIPS 186-2, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-56A, SP 800-89, SP 800-90A, SP 800-131A, SP 800-133, SP 800-90, SP 800-67, SP 800-38E, SP 800-56B, PKCS#1, RFC5288

File metadata

Author Ryan Thomas
Creation date D:20171201105659-05'00'
Modification date D:20171201105659-05'00'
Pages 23
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3078,
  "dgst": "7ddc73742388547e",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "ECDSA#1142",
        "CVL#1295",
        "RSA#2532",
        "HMAC#3070",
        "DRBG#1563",
        "SHS#3801",
        "Triple-DES#2466",
        "AES#4637",
        "DSA#1227"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDSA": {
            "ECDSA": 16
          }
        },
        "FF": {
          "DH": {
            "DH": 8,
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 16
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 4
        },
        "CFB": {
          "CFB": 3
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 8
        },
        "OFB": {
          "OFB": 1
        },
        "XTS": {
          "XTS": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 2
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-163": 2,
          "B-233": 2,
          "B-283": 1,
          "B-409": 1,
          "B-571": 2,
          "K-163": 1,
          "K-233": 3,
          "K-283": 2,
          "K-409": 1,
          "K-571": 1,
          "P-192": 6,
          "P-224": 4,
          "P-256": 2,
          "P-384": 4
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1142": 1,
          "#1227": 1,
          "#1295": 1,
          "#1563": 1,
          "#2466": 1,
          "#2532": 2,
          "#3070": 1,
          "#3801": 1,
          "#4637": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 128/192/256": 1,
          "AES, 256": 1,
          "CVL #1295": 1,
          "HMAC SHA-1": 1,
          "HMAC-SHA-1": 6,
          "HMAC-SHA1": 8,
          "PAA1": 1,
          "PKCS#1": 2,
          "SHA- 1": 1,
          "SHA- 256": 1,
          "SHA-1": 22,
          "SHA-1, 224": 39,
          "SHA-1, 256": 2,
          "SHA-2": 1,
          "SHA-2 (224": 2,
          "SHA-224": 4,
          "SHA-256": 6,
          "SHA-384": 1,
          "SHA-512": 3,
          "SHA1": 1,
          "SHA224": 1,
          "SHA256": 3,
          "SHA384": 1,
          "SHA512": 2
        }
      },
      "fips_security_level": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 63,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-2": 3,
            "SHA-224": 4,
            "SHA-256": 6,
            "SHA-384": 1,
            "SHA-512": 3,
            "SHA224": 1,
            "SHA256": 3,
            "SHA384": 1,
            "SHA512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 18
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 10,
          "FIPS 180-4": 2,
          "FIPS 186-2": 4,
          "FIPS 186-4": 8,
          "FIPS 197": 2,
          "FIPS 198": 1,
          "FIPS 198-1": 1
        },
        "NIST": {
          "SP 800-131A": 2,
          "SP 800-133": 2,
          "SP 800-38B": 2,
          "SP 800-38C": 2,
          "SP 800-38D": 2,
          "SP 800-38E": 1,
          "SP 800-56A": 4,
          "SP 800-56B": 1,
          "SP 800-67": 1,
          "SP 800-89": 1,
          "SP 800-90": 3,
          "SP 800-90A": 2
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "RFC": {
          "RFC5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 22
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 8,
            "Triple-DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 15,
            "HMAC": 7
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Ryan Thomas",
      "/CreationDate": "D:20171201105659-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20171201105659-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "pdf_file_size_bytes": 871012,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://openssl.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "4399b1a801ca9ab89d62d837f899e2f5412247b5fb30a4108ca7a354a8c5c389",
    "policy_txt_hash": "81ee2f909823982a25222dc1a890af52e468c243822a01e8ac4c3fe7525bf479"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode as assumed by the Crypto Officer role and as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from the procedures outlined in the Security Policy will result in a non FIPS 140-2 compliant module.",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertDec2017.pdf",
    "date_sunset": null,
    "description": "TrustedKeep is a secure object storage and sharing solution, providing robust access controls around your objects and securing them both in transit and at rest. It is designed from the ground up for object-level encryption, assigning a unique key to each object being stored, and capable of managing billions of objects in a single cluster. TrustedKeep handles all encryption and decryption at the boundaries, maintaining control at all times over key material, so that engineering mistakes do not result in key material (or sensitive data) being swapped to disk or left in memory.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Roles, Services, and Authentication: Level 2",
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "SP 800-56Arev3 transition",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "TrustedKeep Encryption Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "1.8.3",
    "tested_conf": [
      "MacBook Pro running on Intel Core i7 on CentOS 7.3 (gcc Compiler Version 4.8.5) with PAA",
      "MacBook Pro running on Intel Core i7 on CentOS 7.3 (gcc Compiler Version 4.8.5) without PAA. (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2017-12-11",
        "lab": "Acumen Security",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Trusted Concepts, Inc.",
    "vendor_url": "http://www.trustedconcepts.com"
  }
}