Juniper CryptoCore Cryptographic Module

Certificate #3454

Webpage information

Status historical
Historical reason SP 800-56Arev3 transition - replaced by certificate #4566
Validation dates 07.05.2019
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. No assurance of the minimum strength of generated keys
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description The cryptographic module provides FIPS 140-2 compliant cryptographic functionality for Juniper Networks security products such as JATP.
Tested configurations
  • Ubuntu Linux 14.04 on VMware ESXi 6.0 running on Dell PowerEdge R320 with Intel Xeon E5 (single-user mode)
  • Ubuntu Linux 14.04 running on Apple Mac mini with Intel Core i5
  • Ubuntu Linux 14.04 running on Juniper JATP700 with Intel Xeon E5
Vendor Juniper Networks, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, TDEA, HMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, DH, DSA
Hash functions
SHA1
Schemes
MAC
Randomness
PRNG, DRBG
Block cipher modes
ECB, CBC, CTR, OFB, GCM, CCM, XTS

Security level
Level 1

Standards
FIPS 197, PKCS #1, PKCS#1

File metadata

Title Microsoft Word - 1m - Juniper Networks CryptoCore Security Policy V1.3.docx
Author lgarcia
Creation date D:20190501085441-07'00'
Modification date D:20190501085441-07'00'
Pages 17
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 17.0 (Windows)

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3454,
  "dgst": "819460fd9350632f",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "RSA#2973",
        "DRBG#2195",
        "HMAC#3691",
        "CVL#1980",
        "AES#5540",
        "ECDSA#1491",
        "SHS#4446",
        "DSA#1422"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 8
          },
          "ECDSA": {
            "ECDSA": 9
          }
        },
        "FF": {
          "DH": {
            "DH": 1
          },
          "DSA": {
            "DSA": 9
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "CCM": {
          "CCM": 2
        },
        "CTR": {
          "CTR": 3
        },
        "ECB": {
          "ECB": 2
        },
        "GCM": {
          "GCM": 7
        },
        "OFB": {
          "OFB": 1
        },
        "XTS": {
          "XTS": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1,
          "#1980": 1,
          "#3": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES [197": 1,
          "DSA [186": 1,
          "HMAC [198": 1,
          "PKCS #1": 2,
          "PKCS#1": 2,
          "SHA(1": 24,
          "SHA(224": 19,
          "SHA(256": 6,
          "SHA1": 13,
          "SHA1, 224": 3,
          "SHS [180": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA1": 16
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 19,
          "PRNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 197": 1
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2,
            "HMAC": 7
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "lgarcia",
      "/CreationDate": "D:20190501085441-07\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20190501085441-07\u002700\u0027",
      "/Producer": "Acrobat Distiller 17.0 (Windows)",
      "/Title": "Microsoft Word - 1m - Juniper Networks CryptoCore Security Policy V1.3.docx",
      "pdf_file_size_bytes": 231385,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "a52b02c2bcef8ae79ec394b3abeead3560c622f1f1502c78e40b815ea49ec47c",
    "policy_txt_hash": "51565a97b1bb5db79710c1c1b98d4dfee6027cac49f47dccf7da33f015b0781b"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. No assurance of the minimum strength of generated keys",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/MayConsolidatedCert.pdf",
    "date_sunset": null,
    "description": "The cryptographic module provides FIPS 140-2 compliant cryptographic functionality for Juniper Networks security products such as JATP.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "SP 800-56Arev3 transition - replaced by certificate #4566",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Juniper CryptoCore Cryptographic Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "1.0",
    "tested_conf": [
      "Ubuntu Linux 14.04 on VMware ESXi 6.0 running on Dell PowerEdge R320 with Intel Xeon E5 (single-user mode)",
      "Ubuntu Linux 14.04 running on Apple Mac mini with Intel Core i5",
      "Ubuntu Linux 14.04 running on Juniper JATP700 with Intel Xeon E5"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-05-07",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Juniper Networks, Inc.",
    "vendor_url": "http://www.juniper.net/"
  }
}