This page was not yet optimized for use on mobile
devices.
Cisco FIPS Object Module
Certificate #2505
Webpage information
Security policy
Symmetric Algorithms
AES, DES, Triple-DES, HMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-2Schemes
MAC, Key Exchange, Key agreementProtocols
SSH, TLS, IKERandomness
DRBGLibraries
OpenSSLElliptic Curves
P-256, P-384, P-521Block cipher modes
GCM, CCM, XEX, XTSVendor
Qualcomm, Microsoft, Cisco Systems, Inc, Cisco, Cisco SystemsSecurity level
Level 1, level 1Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 140, FIPS 186-4, NIST SP 800-38E, NIST SP 800-131A, NIST SP 800-90AFile metadata
| Title | CISCO FIPS Object Module Security Policy |
|---|---|
| Subject | FIPS 140-2 Security Policy |
| Author | Kelvin Desplanque (kdesplan) |
| Creation date | D:20151215135503-05'00' |
| Modification date | D:20151215135505-05'00' |
| Pages | 16 |
| Creator | Acrobat PDFMaker 11 for Word |
| Producer | Adobe PDF Library 11.0 |
References
IncomingHeuristics
No heuristics are available for this certificate.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 2505,
"dgst": "9060ce5653093cd9",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"HMAC#2173",
"Triple-DES#1927",
"ECDSA#679",
"KBKDF#53",
"DRBG#818",
"RSA#1744",
"AES#3404",
"HMAC#2172",
"SHS#2818",
"CVL#507",
"KBKDF#52",
"CVL#505",
"RSA#1743",
"AES#3405",
"CVL#504",
"ECDSA#678",
"DSA#961",
"CVL#506",
"Triple-DES#1926",
"DSA#962",
"DRBG#817",
"SHS#2817"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"2484",
"2472",
"2471"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"2472",
"2471",
"3099",
"2484",
"2549"
]
},
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 5
},
"ECDSA": {
"ECDSA": 9
}
},
"FF": {
"DH": {
"DH": 5,
"Diffie-Hellman": 7
},
"DSA": {
"DSA": 9
}
}
},
"certification_process": {},
"cipher_mode": {
"CCM": {
"CCM": 2
},
"GCM": {
"GCM": 1
},
"XEX": {
"XEX": 2
},
"XTS": {
"XTS": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"IKE": {
"IKE": 2
},
"SSH": {
"SSH": 2
},
"TLS": {
"TLS": {
"TLS": 2
}
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 2
},
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 6,
"P-384": 6,
"P-521": 6
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES 128/192/256": 1,
"AES 3404": 1,
"CVL 504": 1,
"DRBG 817": 1,
"DSA 961": 1,
"HMAC 2172": 2,
"HMAC-SHA-1": 8,
"HMAC-SHA1": 4,
"HMAC-SHA224": 2,
"HMAC-SHA256": 2,
"HMAC-SHA384": 2,
"HMAC-SHA512": 2,
"RSA 1743": 1,
"SHA-1": 1,
"SHA-2": 1,
"SHS 2817": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 3,
"level 1": 3
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 11
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140": 1,
"FIPS 140-2": 17,
"FIPS 186-4": 2,
"FIPS PUB 140-2": 2
},
"NIST": {
"NIST SP 800-131A": 1,
"NIST SP 800-38E": 1,
"NIST SP 800-90A": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11
}
},
"DES": {
"3DES": {
"Triple-DES": 3
},
"DES": {
"DES": 6
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 9
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 18,
"Cisco Systems": 2,
"Cisco Systems, Inc": 17
},
"Microsoft": {
"Microsoft": 2
},
"Qualcomm": {
"Qualcomm": 1
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Kelvin Desplanque (kdesplan)",
"/Category": "FIPS 140-2 Submission Documentation",
"/Company": "Cisco Systems, Inc.",
"/CreationDate": "D:20151215135503-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 for Word",
"/Manager": "[email protected]",
"/ModDate": "D:20151215135505-05\u002700\u0027",
"/Module Name": "Cisco FIPS Object Module",
"/Module Name Short": "FOM",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20151215185455",
"/Subject": "FIPS 140-2 Security Policy",
"/Title": "CISCO FIPS Object Module Security Policy",
"pdf_file_size_bytes": 408391,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://csrc.nist.gov/groups/STM/cmvp/validation.html",
"http://www.cisco.com/",
"http://csrc.nist.gov/groups/STM/index.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "522ffec30fd36026be97aabf676e34b7b8f75014b9cb2df43b9efac7ef7fb4a7",
"policy_txt_hash": "a329e6b6ad355affe265546c120fef2639c02ad3cb8dc870e199a8aa6b82acc4"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When installed, initialized and configured as specified in the Security Policy Section 4.2 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy.",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertDec2015.pdf",
"date_sunset": null,
"description": "The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco\u0027s networking and collaboration products. The module provides FIPS 140 validated cryptographic algorithms for services such as IPSEC, SRTP, SSH, TLS, 802.1x, etc. The module does not directly implement any of these protocols, instead it provides the cryptographic primitives and functions to allow a developer to implement the various protocols.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Design Assurance: Level 3",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Cisco FIPS Object Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "6.0",
"tested_conf": [
"Android v4.4 running on a Qualcomm Snapdragon Pro APQ8064 ARMv7 on a Google Nexus 4",
"FreeBSD 9.2 running on an Intel Xeon on a Cisco UCS C200 M2 (single-user mode)",
"Linux 2.6 running on an Intel Xeon on a Cisco UCS C22 M3",
"Linux 2.6 running on an Octeon Evaluation Board CN5645 on a Cisco WLC 5508 with Octeon",
"Linux 2.6 running on an Octeon Evaluation Board CN5645 on a Cisco WLC 5508 without Octeon",
"Windows 8.1 running on an Intel Core i7 on a Gateway FX6860 with PAA",
"Windows 8.1 running on an Intel Core i7 on a Gateway FX6860 without PAA"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2015-12-21",
"lab": "CGI Information Systems \u0026 Management Consultants Inc",
"validation_type": "Initial"
}
],
"vendor": "Cisco Systems, Inc.",
"vendor_url": "http://www.cisco.com"
}
}