Cisco FIPS Object Module

Certificate #2505

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 21.12.2015
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When installed, initialized and configured as specified in the Security Policy Section 4.2 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy.
Exceptions
  • Physical Security: N/A
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Description The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products. The module provides FIPS 140 validated cryptographic algorithms for services such as IPSEC, SRTP, SSH, TLS, 802.1x, etc. The module does not directly implement any of these protocols, instead it provides the cryptographic primitives and functions to allow a developer to implement the various protocols.
Tested configurations
  • Android v4.4 running on a Qualcomm Snapdragon Pro APQ8064 ARMv7 on a Google Nexus 4
  • FreeBSD 9.2 running on an Intel Xeon on a Cisco UCS C200 M2 (single-user mode)
  • Linux 2.6 running on an Intel Xeon on a Cisco UCS C22 M3
  • Linux 2.6 running on an Octeon Evaluation Board CN5645 on a Cisco WLC 5508 with Octeon
  • Linux 2.6 running on an Octeon Evaluation Board CN5645 on a Cisco WLC 5508 without Octeon
  • Windows 8.1 running on an Intel Core i7 on a Gateway FX6860 with PAA
  • Windows 8.1 running on an Intel Core i7 on a Gateway FX6860 without PAA
Vendor Cisco Systems, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, DES, Triple-DES, HMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-2
Schemes
MAC, Key Exchange, Key agreement
Protocols
SSH, TLS, IKE
Randomness
DRBG
Libraries
OpenSSL
Elliptic Curves
P-256, P-384, P-521
Block cipher modes
GCM, CCM, XEX, XTS

Vendor
Qualcomm, Microsoft, Cisco Systems, Inc, Cisco, Cisco Systems

Security level
Level 1, level 1

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 140, FIPS 186-4, NIST SP 800-38E, NIST SP 800-131A, NIST SP 800-90A

File metadata

Title CISCO FIPS Object Module Security Policy
Subject FIPS 140-2 Security Policy
Author Kelvin Desplanque (kdesplan)
Creation date D:20151215135503-05'00'
Modification date D:20151215135505-05'00'
Pages 16
Creator Acrobat PDFMaker 11 for Word
Producer Adobe PDF Library 11.0

References

Incoming
  • 2484 - historical - SUSE Linux Enterprise Server 12 - StrongSwan Cryptographic Module
  • 2471 - historical - SUSE Linux Enterprise Server 12 - OpenSSH Server Module
  • 2472 - historical - SUSE Linux Enterprise Server 12 - OpenSSH Client Module

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 2505,
  "dgst": "9060ce5653093cd9",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "HMAC#2173",
        "Triple-DES#1927",
        "ECDSA#679",
        "KBKDF#53",
        "DRBG#818",
        "RSA#1744",
        "AES#3404",
        "HMAC#2172",
        "SHS#2818",
        "CVL#507",
        "KBKDF#52",
        "CVL#505",
        "RSA#1743",
        "AES#3405",
        "CVL#504",
        "ECDSA#678",
        "DSA#961",
        "CVL#506",
        "Triple-DES#1926",
        "DSA#962",
        "DRBG#817",
        "SHS#2817"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2484",
          "2472",
          "2471"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2472",
          "2471",
          "3099",
          "2484",
          "2549"
        ]
      },
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 5
          },
          "ECDSA": {
            "ECDSA": 9
          }
        },
        "FF": {
          "DH": {
            "DH": 5,
            "Diffie-Hellman": 7
          },
          "DSA": {
            "DSA": 9
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CCM": {
          "CCM": 2
        },
        "GCM": {
          "GCM": 1
        },
        "XEX": {
          "XEX": 2
        },
        "XTS": {
          "XTS": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 2
        },
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "TLS": {
            "TLS": 2
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 2
        },
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 6,
          "P-384": 6,
          "P-521": 6
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES 128/192/256": 1,
          "AES 3404": 1,
          "CVL 504": 1,
          "DRBG 817": 1,
          "DSA 961": 1,
          "HMAC 2172": 2,
          "HMAC-SHA-1": 8,
          "HMAC-SHA1": 4,
          "HMAC-SHA224": 2,
          "HMAC-SHA256": 2,
          "HMAC-SHA384": 2,
          "HMAC-SHA512": 2,
          "RSA 1743": 1,
          "SHA-1": 1,
          "SHA-2": 1,
          "SHS 2817": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 3,
          "level 1": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-2": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 11
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140": 1,
          "FIPS 140-2": 17,
          "FIPS 186-4": 2,
          "FIPS PUB 140-2": 2
        },
        "NIST": {
          "NIST SP 800-131A": 1,
          "NIST SP 800-38E": 1,
          "NIST SP 800-90A": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 11
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 3
          },
          "DES": {
            "DES": 6
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1,
            "HMAC": 9
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 18,
          "Cisco Systems": 2,
          "Cisco Systems, Inc": 17
        },
        "Microsoft": {
          "Microsoft": 2
        },
        "Qualcomm": {
          "Qualcomm": 1
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Kelvin Desplanque (kdesplan)",
      "/Category": "FIPS 140-2 Submission Documentation",
      "/Company": "Cisco Systems, Inc.",
      "/CreationDate": "D:20151215135503-05\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 11 for Word",
      "/Manager": "[email protected]",
      "/ModDate": "D:20151215135505-05\u002700\u0027",
      "/Module Name": "Cisco FIPS Object Module",
      "/Module Name Short": "FOM",
      "/Producer": "Adobe PDF Library 11.0",
      "/SourceModified": "D:20151215185455",
      "/Subject": "FIPS 140-2 Security Policy",
      "/Title": "CISCO FIPS Object Module Security Policy",
      "pdf_file_size_bytes": 408391,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://csrc.nist.gov/groups/STM/cmvp/validation.html",
          "http://www.cisco.com/",
          "http://csrc.nist.gov/groups/STM/index.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "522ffec30fd36026be97aabf676e34b7b8f75014b9cb2df43b9efac7ef7fb4a7",
    "policy_txt_hash": "a329e6b6ad355affe265546c120fef2639c02ad3cb8dc870e199a8aa6b82acc4"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When installed, initialized and configured as specified in the Security Policy Section 4.2 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy.",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertDec2015.pdf",
    "date_sunset": null,
    "description": "The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco\u0027s networking and collaboration products. The module provides FIPS 140 validated cryptographic algorithms for services such as IPSEC, SRTP, SSH, TLS, 802.1x, etc. The module does not directly implement any of these protocols, instead it provides the cryptographic primitives and functions to allow a developer to implement the various protocols.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Design Assurance: Level 3",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Cisco FIPS Object Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "6.0",
    "tested_conf": [
      "Android v4.4 running on a Qualcomm Snapdragon Pro APQ8064 ARMv7 on a Google Nexus 4",
      "FreeBSD 9.2 running on an Intel Xeon on a Cisco UCS C200 M2  (single-user mode)",
      "Linux 2.6 running on an Intel Xeon on a  Cisco UCS C22 M3",
      "Linux 2.6 running on an Octeon Evaluation Board CN5645 on a Cisco WLC 5508 with Octeon",
      "Linux 2.6 running on an Octeon Evaluation Board CN5645 on a Cisco WLC 5508 without Octeon",
      "Windows 8.1 running on an Intel Core i7 on a Gateway FX6860 with PAA",
      "Windows 8.1 running on an Intel Core i7 on a Gateway FX6860 without PAA"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2015-12-21",
        "lab": "CGI Information Systems \u0026 Management Consultants Inc",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Cisco Systems, Inc.",
    "vendor_url": "http://www.cisco.com"
  }
}