This page was not yet optimized for use on mobile
devices.
Wickr FIPS Object Module for OpenSSL
Certificate #3608
Webpage information
Security policy
Symmetric Algorithms
AES, TDEA, Triple-DES, HMAC, CMACAsymmetric Algorithms
ECDSA, ECC, DH, DSAHash functions
SHA-1, SHA1, SHA-224, SHA224, SHA256, SHA384, SHA512, SHA-256, SHA-384, SHA-2Schemes
Key Agreement, Key agreementRandomness
DRBG, RNGLibraries
OpenSSLElliptic Curves
P-224, P-521, P-192, P-256, P-384, K-409, B-233, B-409, K-163, K-283, K-571, B-283, B-571, K-256, K-521, B-256, B-163, K-233Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSTrusted Execution Environments
SEVendor
Qualcomm, Microsoft, Microsoft CorporationStandards
FIPS 140-2, FIPS 180-4, FIPS 186-2, FIPS 186-4, FIPS 197, FIPS 198-1, FIPS 198, SP 800-38A, SP 800-38B, SP 800-38C, SP 800-38D, SP 800-38E, SP 800-56A, SP 800-56B, SP 800-57, SP 800-67, SP 800-89, SP 800-90A, SP 800-131A, PKCS#1File metadata
| Title | Microsoft Word - 140spWickr-0.2.docx |
|---|---|
| Creation date | D:20191112182653Z |
| Modification date | D:20191220143247-05'00' |
| Pages | 25 |
| Creator | Word |
| Producer | macOS Version 10.14.6 (Build 18G1012) Quartz PDFContext |
References
Outgoing- 2398 - historical - OpenSSL FIPS Object Module SE
Heuristics
No heuristics are available for this certificate.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3608,
"dgst": "86e83855c103c5ad",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"AES#C1359",
"Triple-DES#C1359",
"CVL#C1359",
"ECDSA#C1359",
"RSA#C1359",
"SHS#C1359",
"DRBG#C1359",
"HMAC#C1359",
"DSA#C1359"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"2398"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"2398"
]
}
},
"module_prunned_references": {
"_type": "Set",
"elements": [
"2398"
]
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"2398"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"112",
"2398"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"2398"
]
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDSA": {
"ECDSA": 17
}
},
"FF": {
"DH": {
"DH": 9
},
"DSA": {
"DSA": 18
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CCM": {
"CCM": 4
},
"CFB": {
"CFB": 4
},
"CTR": {
"CTR": 3
},
"ECB": {
"ECB": 4
},
"GCM": {
"GCM": 5
},
"OFB": {
"OFB": 2
},
"XTS": {
"XTS": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 36
}
},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 2,
"Key agreement": 2
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"B-163": 3,
"B-233": 1,
"B-256": 1,
"B-283": 2,
"B-409": 1,
"B-571": 2,
"K-163": 1,
"K-233": 3,
"K-256": 1,
"K-283": 1,
"K-409": 2,
"K-521": 1,
"K-571": 1,
"P-192": 8,
"P-224": 6,
"P-256": 4,
"P-384": 2,
"P-521": 4
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#2398": 2
}
},
"fips_certlike": {
"Certlike": {
"AES 128/ 192/256": 1,
"AES 128/192/256": 2,
"AES, 256": 1,
"DRBG4": 1,
"DSA (1024": 2,
"HMAC SHA-1": 1,
"HMAC- SHA-1": 2,
"HMAC-SHA-1": 18,
"HMAC-SHA1": 2,
"PKCS#1": 2,
"SHA( 224": 4,
"SHA( 256": 2,
"SHA- 1, 224": 2,
"SHA- 224": 1,
"SHA-1": 21,
"SHA-1, 224": 16,
"SHA-2": 3,
"SHA-2 (224": 2,
"SHA-224": 11,
"SHA-256": 1,
"SHA-384": 1,
"SHA1": 1,
"SHA224": 1,
"SHA256": 3,
"SHA384": 1,
"SHA512": 2
}
},
"fips_security_level": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 37,
"SHA1": 1
},
"SHA2": {
"SHA-2": 5,
"SHA-224": 11,
"SHA-256": 1,
"SHA-384": 1,
"SHA224": 1,
"SHA256": 3,
"SHA384": 1,
"SHA512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 18
},
"RNG": {
"RNG": 8
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 36,
"FIPS 180-4": 2,
"FIPS 186-2": 8,
"FIPS 186-4": 9,
"FIPS 197": 2,
"FIPS 198": 1,
"FIPS 198-1": 1
},
"NIST": {
"SP 800-131A": 2,
"SP 800-38A": 2,
"SP 800-38B": 2,
"SP 800-38C": 2,
"SP 800-38D": 2,
"SP 800-38E": 2,
"SP 800-56A": 4,
"SP 800-56B": 1,
"SP 800-57": 1,
"SP 800-67": 2,
"SP 800-89": 1,
"SP 800-90A": 6
},
"PKCS": {
"PKCS#1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 20
}
},
"DES": {
"3DES": {
"TDEA": 1,
"Triple-DES": 10
}
},
"constructions": {
"MAC": {
"CMAC": 15,
"HMAC": 8
}
}
},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1,
"Microsoft Corporation": 1
},
"Qualcomm": {
"Qualcomm": 2
}
},
"vulnerability": {}
},
"policy_metadata": {
"/AAPL:Keywords": "[]",
"/CreationDate": "D:20191112182653Z",
"/Creator": "Word",
"/Keywords": "",
"/ModDate": "D:20191220143247-05\u002700\u0027",
"/Producer": "macOS Version 10.14.6 (Build 18G1012) Quartz PDFContext",
"/Title": "Microsoft Word - 140spWickr-0.2.docx",
"pdf_file_size_bytes": 3610634,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
"http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf",
"http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-89.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf",
"http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf",
"http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf",
"http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
"http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf",
"http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf",
"https://csrc.nist.gov/csrc/media/publications/fips/198/1/final/documents/fips-198-1_final.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-67r2.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br2.pdf",
"https://csrc.nist.gov/publications/detail/sp/800-131a/rev-2/final",
"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf",
"https://csrc.nist.gov/CSRC/media/Publications/fips/186/2/archive/2000-01-27/documents/fips186-2.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "86d734faf1962db1f93024939fefd370a2a87c535092998e5ca849402e81c3e0",
"policy_txt_hash": "70bf82dec76dca63a6eb221e809f8e4f14c6e2e087626512d72a560ba807d11e"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When built, installed, protected and initialized as assumed by the Crypto Officer role and as specified in the provided Security Policy. Appendix A of the provided Security Policy specifies the actual distribution tar file containing the source code of this module. There shall be no additions, deletions or alterations to the tar file contents as used during module build. The distribution tar file shall be verified as specified in Appendix A of the provided Security Policy. Installation and protection shall be completed as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from specified verification, protection, installation and initialization procedures will result in a non FIPS 140-2 compliant module. This validation entry is a non-security relevant modification to Cert. #2398. No assurance of the minimum strength of generated keys",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/Jan2020ConsolidatedCert.pdf",
"date_sunset": null,
"description": "The Wickr FIPS Object Module for OpenSSL is a general purpose cryptographic module compiled from the source code for the OpenSSL FIPS Object Module 2.0.16.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Roles, Services, and Authentication: Level 2",
"Physical Security: N/A",
"Design Assurance: Level 3",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 1,
"mentioned_certs": {
"2398": 1
},
"module_name": "Wickr FIPS Object Module for OpenSSL",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "2.0.16",
"tested_conf": [
"Android 9 running on a Samsung Galaxy S10 with a Qualcomm Snapdragon 855 (Kryo) with PAA",
"Android 9 running on a Samsung Galaxy S10 with a Qualcomm Snapdragon 855 (Kryo) without PAA",
"Apple iOS 13.1 running on an Apple iPhone X with an Apple A11 Bionic (Monsoon, Mistral) with PAA",
"Apple iOS 13.1 running on an Apple iPhone X with an Apple A11 Bionic (Monsoon, Mistral) without PAA",
"Apple macOS Mojave running on an Apple Macbook Pro A1502 with an Intel Core i5 with PAA",
"Apple macOS Mojave running on an Apple Macbook Pro A1502 with an Intel Core i5 without PAA",
"Microsoft Windows 10 April 2018 Update running on an IBM ThinkPad with an Intel Core i7 with PAA",
"Microsoft Windows 10 April 2018 Update running on an IBM ThinkPad with an Intel Core i7 without PAA (single-user mode)",
"Ubuntu 18.04 running on an IBM ThinkPad with an Intel Core i7 with PAA",
"Ubuntu 18.04 running on an IBM ThinkPad with an Intel Core i7 without PAA"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2020-01-24",
"lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
"validation_type": "Initial"
}
],
"vendor": "Wickr Inc.",
"vendor_url": "http://wickr.com"
}
}