SLM-5650A TRANSEC Module

Certificate #1553

Webpage information

Status historical
Historical reason RNG SP800-131A Revision 1 Transition
Validation dates 07.06.2011
Standard FIPS 140-2
Security level 2
Type Hardware
Embodiment Multi-Chip Embedded
Caveat When operated in FIPS mode
Description The SLM-5650 satellite modem includes a single FIPS card called the SLM-5650A TRANSEC Module that will perform bulk encryption of all packets for transmission over the satellite regardless of the protocol, the format of data, or existing encryption on the incoming data. The SLM-5650A TRANSEC Module uses 256-bit AES in CBC mode for bulk encryption of all data requiring encryption. The module is managed using a proprietary graphical user interface (GUI) over TLS, referred to as the Management & Control Console, and a command line management interface over SSH.
Version (Hardware) 1.2
Version (Firmware) 1.2.0
Vendor Comtech EF Data Corporation
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, DES, TDES, Triple-DES, HMAC
Asymmetric Algorithms
ECDSA, Diffie-Hellman
Hash functions
SHA-1, MD5
Schemes
MAC
Protocols
SSH, SSL, TLS
Randomness
PRNG, RNG
Elliptic Curves
P-521
Block cipher modes
ECB, CBC

Vendor
Microsoft

Security level
Level 2, Level 1, level 2

Standards
FIPS 140-2, FIPS 186-2

File metadata

Title 1B - Comtech EF Data SLM-5650A TRANSEC Module Security Policy
Author hpanken
Creation date D:20110509101652-04'00'
Modification date D:20110509101652-04'00'
Pages 23
Creator PDFCreator Version 1.2.0
Producer GPL Ghostscript 9.0

References

Incoming
  • 2471 - historical - SUSE Linux Enterprise Server 12 - OpenSSH Server Module
  • 2472 - historical - SUSE Linux Enterprise Server 12 - OpenSSH Client Module

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 1553,
  "dgst": "8012472a35fd4093",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "RNG#827",
        "RSA#746",
        "SHS#1363",
        "AES#1538",
        "AES#1537",
        "HMAC#893",
        "Triple-DES#1012",
        "ECDSA#189"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.2.0",
        "1.2"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2471",
          "2472"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2471",
          "2472"
        ]
      },
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 7
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "ECB": {
          "ECB": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 13
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 13
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-521": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES 256": 1,
          "AES \u2013 128, 192": 1,
          "AES2": 1,
          "HMAC SHA-1": 3,
          "RSA12": 1,
          "SHA-1": 4,
          "SHA-1 1363": 1,
          "SHA-1 893": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1,
          "Level 2": 2,
          "level 2": 2
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 4
        },
        "RNG": {
          "RNG": 13
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 19,
          "FIPS 186-2": 8
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 5
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "hpanken",
      "/CreationDate": "D:20110509101652-04\u002700\u0027",
      "/Creator": "PDFCreator Version 1.2.0",
      "/Keywords": "",
      "/ModDate": "D:20110509101652-04\u002700\u0027",
      "/Producer": "GPL Ghostscript  9.0",
      "/Subject": "",
      "/Title": "1B - Comtech EF Data SLM-5650A TRANSEC Module Security Policy",
      "pdf_file_size_bytes": 3533423,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "6b99abcac696d591c5b5d009e1a7bbd48cecf4e072dec885b61f570e67cf5e2c",
    "policy_txt_hash": "a7fa16d7051170d7e24b7794a28757f0090dd0d2ed6fa6d4e999f14e92ffcb02"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0006.pdf",
    "date_sunset": null,
    "description": "The SLM-5650 satellite modem includes a single FIPS card called the SLM-5650A TRANSEC Module that will perform bulk encryption of all packets for transmission over the satellite regardless of the protocol, the format of data, or existing encryption on the incoming data. The SLM-5650A TRANSEC Module uses 256-bit AES in CBC mode for bulk encryption of all data requiring encryption. The module is managed using a proprietary graphical user interface (GUI) over TLS, referred to as the Management \u0026 Control Console, and a command line management interface over SSH.",
    "embodiment": "Multi-Chip Embedded",
    "exceptions": null,
    "fw_versions": "1.2.0",
    "historical_reason": "RNG SP800-131A Revision 1 Transition",
    "hw_versions": "1.2",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "SLM-5650A TRANSEC Module",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2011-06-07",
        "lab": "SAIC-VA",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Comtech EF Data Corporation",
    "vendor_url": "http://www.comtechefdata.com"
  }
}