This page was not yet optimized for use on mobile devices.
Skyhigh Security OpenSSL Module
Certificate #4439
Webpage information ?
Security policy ?
Symmetric Algorithms
AES, AES-128, AES-192, AES-256, RC2, RC4, RC5, DES, HMAC, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-512, HMAC-SHA-384, CMAC, CBC-MACAsymmetric Algorithms
ECDSA, ECC, DHE, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-512, SHA3, SHA3-224, SHA3-256, SHA3-512, SHA-3, MD4, MD5, RIPEMD, PBKDFSchemes
MAC, Key AgreementProtocols
SSH, TLS, TLS v1.0, TLS 1.3, TLS v1.3, TLSv1.2, TLSv1.3Randomness
DRBG, RNGLibraries
OpenSSLElliptic Curves
P-224, P-384, P-521, P-256, B-233, B-283, B-409, B-571, K-283, K-409, K-571Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XEX, XTSTrusted Execution Environments
SSCSecurity level
Level 1Standards
FIPS 140-2, FIPS 197, FIPS 186-4, FIPS 180-4, FIPS 202, FIPS 198-1, FIPS140-2, FIPS PUB 140-2, SP 800-90A, SP 800-38E, PKCS#1, RFC-8446, RFC-3961, RFC5288, RFC-5288File metadata
Author | Richard Wang |
---|---|
Creation date | D:20230210145141-05'00' |
Modification date | D:20230210145141-05'00' |
Pages | 22 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
Heuristics ?
No heuristics are available for this certificate.
References ?
No references are available for this certificate.
Updates ?
-
12.03.2023 The certificate data changed.
Certificate changed
The web extraction data was updated.
- The certificate_pdf_url property was set to
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/February 2023_010323_0649.pdf
.
- The certificate_pdf_url property was set to
-
26.02.2023 The certificate was first processed.
New certificate
A new FIPS 140 certificate with the product name was processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4439,
"dgst": "8ee3d6eae3069ec5",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"RSA#A3012",
"DSA#A2366",
"KAS-SSC#A2366",
"ECDSA#A2366",
"CVL#A2366",
"KAS#A2366",
"AES#A2366",
"HMAC#A2366",
"RSA#A2366",
"DRBG#A2366",
"SHA-3#A2366",
"AES#A3012",
"PBKDF#A2366",
"KTS#A2366",
"SHS#A2366"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 17
}
},
"FF": {
"DH": {
"DH": 4,
"DHE": 1,
"Diffie-Hellman": 19
},
"DSA": {
"DSA": 20
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CCM": {
"CCM": 6
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 2
},
"ECB": {
"ECB": 3
},
"GCM": {
"GCM": 12
},
"OFB": {
"OFB": 2
},
"XEX": {
"XEX": 2
},
"XTS": {
"XTS": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 5
}
},
"crypto_protocol": {
"SSH": {
"SSH": 9
},
"TLS": {
"TLS": {
"TLS": 18,
"TLS 1.3": 1,
"TLS v1.0": 1,
"TLS v1.3": 1,
"TLSv1.2": 1,
"TLSv1.3": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"B-233": 3,
"B-283": 3,
"B-409": 3,
"B-571": 3,
"K-283": 3,
"K-409": 3,
"K-571": 3,
"P-224": 12,
"P-256": 6,
"P-384": 8,
"P-521": 12
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES GCM (128": 1,
"AES-128": 2,
"AES-192": 2,
"AES-256": 2,
"HMAC (128": 1,
"HMAC SHA-256": 2,
"HMAC-SHA- 384": 2,
"HMAC-SHA-1": 4,
"HMAC-SHA-224": 4,
"HMAC-SHA-256": 4,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 2,
"HMAC-SHA-512 112": 2,
"PAA 2": 1,
"PAA 3": 1,
"PAA 4": 1,
"PAA 5": 1,
"PAA 6": 1,
"PKCS#1": 6,
"SHA- 1": 1,
"SHA-1": 12,
"SHA-224": 1,
"SHA-256": 4,
"SHA-3": 1,
"SHA-512": 2,
"SHA2- 224": 1,
"SHA2- 256": 2,
"SHA2- 384": 6,
"SHA2- 512": 4,
"SHA2-224": 10,
"SHA2-256": 14,
"SHA2-384": 10,
"SHA2-512": 11,
"SHA3": 1,
"SHA3- 384": 1,
"SHA3-224": 1,
"SHA3-256": 2,
"SHA3-512": 2
}
},
"fips_security_level": {
"Level": {
"Level 1": 2
}
},
"hash_function": {
"MD": {
"MD4": {
"MD4": 2
},
"MD5": {
"MD5": 3
}
},
"PBKDF": {
"PBKDF": 13
},
"RIPEMD": {
"RIPEMD": 1
},
"SHA": {
"SHA1": {
"SHA-1": 12
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 4,
"SHA-512": 2
},
"SHA3": {
"SHA-3": 1,
"SHA3": 1,
"SHA3-224": 1,
"SHA3-256": 2,
"SHA3-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 11
},
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 7,
"FIPS 180-4": 2,
"FIPS 186-4": 17,
"FIPS 197": 8,
"FIPS 198-1": 3,
"FIPS 202": 2,
"FIPS PUB 140-2": 1,
"FIPS140-2": 2
},
"NIST": {
"SP 800-38E": 1,
"SP 800-90A": 5
},
"PKCS": {
"PKCS#1": 3
},
"RFC": {
"RFC-3961": 4,
"RFC-5288": 2,
"RFC-8446": 2,
"RFC5288": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 32,
"AES-128": 2,
"AES-192": 2,
"AES-256": 2
},
"RC": {
"RC2": 2,
"RC4": 1,
"RC5": 1
}
},
"DES": {
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1,
"CMAC": 8,
"HMAC": 30,
"HMAC-SHA-224": 2,
"HMAC-SHA-256": 2,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 2
}
}
},
"tee_name": {
"IBM": {
"SSC": 1
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Richard Wang",
"/CreationDate": "D:20230210145141-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20230210145141-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"pdf_file_size_bytes": 562400,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.skyhighsecurity.com/",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=14867",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35622"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 22
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "1b508e06578a91f2d0c77b8c1d0bc39c678800bd5e1866a5db54a65eab265ede",
"policy_txt_hash": "7dd125e7aa935f6617078f83f417097358643be979976ecc4d1e93e821b0adf9"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode. No assurance of the minimum strength of generated keys",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/February 2023_010323_0649.pdf",
"date_sunset": "2026-09-21",
"description": "The Skyhigh Security OpenSSL Module provides FIPS validated cryptographic services for Skyhigh Security products.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Skyhigh Security OpenSSL Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "active",
"sw_versions": "1.1.1v",
"tested_conf": [
"macOS 12.2.1 running on Apple MacBook Pro with Intel \u00ae Core \u2122 i7-7920HQ with PAA",
"macOS 12.2.1 running on Apple MacBook Pro with Intel \u00ae Core \u2122 i7-7920HQ without PAA",
"McAfee Linux 3.8.0 on VMware ESXi 6.7.0 running on Intel (R) Taylor Pass 2U Xeon (R) DP Quad Board Server with Intel \u00ae Xeon \u00ae E5-2699 with PAA",
"McAfee Linux 3.8.0 on Vmware ESXi 6.7.0 running on Intel \u00ae Taylor Pass 2U Xeon\u00ae DP Quad Board Server with Intel \u00ae Xeon \u00ae E5-2699 without PAA",
"SUSE Linux 15 SP3 Enterprise on Vmware ESXi 6.7.0 running on Intel \u00ae Taylor Pass 2U Xeon \u00ae DP Quad Board Server with Intel \u00ae Xeon \u00ae E5-2699 with PAA",
"SUSE Linux 15 SP3 Enterprise on Vmware ESXi 6.7.0 running on Intel \u00ae Taylor Pass 2U Xeon DP Quad Board Server with Intel \u00ae Xeon \u00ae E5-2699 without PAA (single-user mode)",
"Ubuntu 20.04.03 LTS running on Dell PowerEdge R720xd with Intel \u00ae Xeon \u00ae E5-2620 with PAA",
"Ubuntu 20.04.03 LTS running on Dell PowerEdge R720xd with Intel \u00ae Xeon \u00ae E5-2620 without PAA",
"Windows 10 Enterprise 20H2 32-bit running on HP EliteBook 860 G3 with Intel \u00ae Core \u2122 i5-6300U with PAA",
"Windows 10 Enterprise 20H2 32-bit running on HP EliteBook 860 G3 with Intel \u00ae Core \u2122 i5-6300U without PAA",
"Windows Server 2019 H2 64-bit on Vmware ESXi 6.7.0 running on Intel \u00ae Taylor Pass 2U Xeon \u00ae DP Quad Board Server with Intel \u00ae Xeon \u00ae E5-2699 with PAA",
"Windows Server 2019 H2 64-bit on Vmware ESXi 6.7.0 running on Intel \u00ae Taylor Pass 2U Xeon \u00ae DP Quad Board Server with Intel \u00ae Xeon \u00ae E5-2699 without PAA"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2023-02-15",
"lab": "GOSSAMER SECURITY SOLUTIONS INC",
"validation_type": "Initial"
}
],
"vendor": "Skyhigh Security",
"vendor_url": "http://www.skyhighsecurity.com"
}
}