Envieta QFlex Hardware Security Module

Certificate #3963

Webpage information

Status active
Validation dates 30.06.2021
Sunset date 29-06-2026
Standard FIPS 140-2
Security level 3
Type Hardware
Embodiment Multi-Chip Embedded
Caveat None
Exceptions
  • Mitigation of Other Attacks: N/A
Description The Envieta QFlex HSM is designed, engineered, and manufactured in the United States, offering top of the market performance for a fraction of the cost. QFlex’s integrated FPGA fabric provides organizations the capability to run accelerated proprietary algorithms inside the security perimeter of the HSM. This unique solution provides the lowest cost per operation on the market today, making QFlex the clear choice to satisfy enterprise capacity requirements.
Version (Hardware) 385HSM-FIPS Rev A and 385HSM-FIPS Rev B
Version (Firmware) 1.3.0
Vendor Envieta Systems LLC
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES128, AES192, AES256, AES-, HMAC, HMAC-SHA-512, HMAC-SHA-256, CMAC
Asymmetric Algorithms
RSA 4096, RSA-4096, RSA-3072, RSA-PSS, ECDSA, ECC, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA-512, SHA-224, SHA-384, SHA512, SHA-256, PBKDF, PBKDF2
Schemes
MAC, Key Agreement
Randomness
DRBG, RNG
Elliptic Curves
P-224, P-384, P-192, P-256, P-521
Block cipher modes
ECB, CBC, CTR, GCM

Security level
Level 3

Standards
FIPS 140-2, FIPS 140, FIPS PUB 197, FIPS PUB 198-1, FIPS PUB 180-4, FIPS PUB 186-4, FIPS 186-4, NIST SP 800-38A, NIST SP 800-38D, SP 800-90A, SP 800-133, NIST SP 800-38B, NIST SP 800-38F, SP 800-38D, SP 800-56A, SP 800-56C, SP 800-108, SP 800-132, SP 800-90a, PKCS#11, PKCS1, PKCS#1, X.509

File metadata

Author Ryan Thomas
Creation date D:20210610083954-04'00'
Modification date D:20210610083954-04'00'
Pages 49
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3963,
  "dgst": "973ec83cacf8d2af",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "HMAC#1877",
        "KTS#C893",
        "KBKDF#C893",
        "SHS#2490",
        "RSA#C892",
        "HMAC#C892",
        "RSA#A1471",
        "RSA#C893",
        "ECDSA#C893",
        "SHS#C892",
        "AES#2958",
        "DSA#C893",
        "AES#C893",
        "KTS-RSA#A1471",
        "DRBG#559"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.3.0"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 6
          },
          "ECDSA": {
            "ECDSA": 16
          }
        },
        "FF": {
          "DH": {
            "DH": 6,
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 12
          }
        },
        "RSA": {
          "RSA 4096": 1,
          "RSA-3072": 1,
          "RSA-4096": 1,
          "RSA-PSS": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "CTR": {
          "CTR": 4
        },
        "ECB": {
          "ECB": 2
        },
        "GCM": {
          "GCM": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 4
        },
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-192": 2,
          "P-224": 4,
          "P-256": 6,
          "P-384": 8,
          "P-521": 14
        }
      },
      "eval_facility": {
        "Acumen": {
          "Acumen Security": 1
        }
      },
      "fips_cert_id": {
        "Cert": {
          "#3": 3
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 128, 192": 2,
          "AES-GCM 256": 1,
          "AES128": 1,
          "AES192": 1,
          "AES256": 1,
          "HMAC SHA-1": 1,
          "HMAC-SHA- 256": 2,
          "HMAC-SHA- 512": 2,
          "HMAC-SHA-1": 4,
          "HMAC-SHA-256": 2,
          "HMAC-SHA-512": 2,
          "PKCS#1": 2,
          "PKCS#11": 12,
          "PKCS1": 6,
          "RSA 4096": 1,
          "RSA 6144": 1,
          "SHA-1": 18,
          "SHA-256": 7,
          "SHA-512": 3,
          "SHA-512 2048": 1,
          "SHA2- 224": 1,
          "SHA2- 256": 1,
          "SHA2- 384": 1,
          "SHA2- 512": 1,
          "SHA2-224": 15,
          "SHA2-256": 24,
          "SHA2-384": 15,
          "SHA2-512": 16,
          "SHA2-512 160": 1,
          "SHA2-512 3072": 1,
          "SHA2-512 4096": 1,
          "SHA2-512 6144": 1,
          "SHA512": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 3": 2
        }
      },
      "hash_function": {
        "PBKDF": {
          "PBKDF": 3,
          "PBKDF2": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 18
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 6,
            "SHA-384": 1,
            "SHA-512": 3,
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 39
        },
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140": 4,
          "FIPS 140-2": 9,
          "FIPS 186-4": 2,
          "FIPS PUB 180-4": 2,
          "FIPS PUB 186-4": 13,
          "FIPS PUB 197": 4,
          "FIPS PUB 198-1": 2
        },
        "NIST": {
          "NIST SP 800-38A": 1,
          "NIST SP 800-38B": 1,
          "NIST SP 800-38D": 1,
          "NIST SP 800-38F": 1,
          "SP 800-108": 4,
          "SP 800-132": 1,
          "SP 800-133": 1,
          "SP 800-38D": 1,
          "SP 800-56A": 6,
          "SP 800-56C": 3,
          "SP 800-90A": 2,
          "SP 800-90a": 2
        },
        "PKCS": {
          "PKCS#1": 1,
          "PKCS#11": 6,
          "PKCS1": 3
        },
        "X509": {
          "X.509": 9
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 19,
            "AES-": 1,
            "AES128": 1,
            "AES192": 1,
            "AES256": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 5,
            "HMAC": 13,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-512": 1
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Ryan Thomas",
      "/CreationDate": "D:20210610083954-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20210610083954-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 1058714,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.acumensecurity.net/",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 49
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "8d996c7965834bc0911ee3445e1a4fafd69ea799b5dc54e1473b7c6a937f3554",
    "policy_txt_hash": "e4bfbfc44fcbdd04c572176ca45d2472f912d97a5e082d0263e98f375fec1593"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "None",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/June 2021_010721_0718.pdf",
    "date_sunset": "2026-06-29",
    "description": "The Envieta QFlex HSM is designed, engineered, and manufactured in the United States, offering top of the market performance for a fraction of the cost. QFlex\u2019s integrated FPGA fabric provides organizations the capability to run accelerated proprietary algorithms inside the security perimeter of the HSM. This unique solution provides the lowest cost per operation on the market today, making QFlex the clear choice to satisfy enterprise capacity requirements.",
    "embodiment": "Multi-Chip Embedded",
    "exceptions": [
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "1.3.0",
    "historical_reason": null,
    "hw_versions": "385HSM-FIPS Rev A and 385HSM-FIPS Rev B",
    "level": 3,
    "mentioned_certs": {},
    "module_name": "Envieta QFlex Hardware Security Module",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2021-06-30",
        "lab": "Acumen Security",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Envieta Systems LLC",
    "vendor_url": "https://envieta.com"
  }
}