Sansec HSM

Certificate #3350

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 03.01.2019 , 21.11.2019
Standard FIPS 140-2
Security level 3
Type Hardware
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode
Exceptions
  • Mitigation of Other Attacks: N/A
Description The Sansec Hardware Security Module (HSM) is a hardware cryptographic module that provides data encryption, data decryption, signature generation, signature verification, message digest, message authentication code (MAC), random number generation and key management services to business systems.
Version (Hardware) SecHSM-V2
Version (Firmware) 1.0.12
Vendor Beijing Sansec Technology Development Co., Ltd
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES256, AES-256, CAST, RC2, RC4, RC5, DES, Triple-DES, TDEA, ARIA, SM4, SEED, HMAC, HMAC-SHA-256, CMAC
Asymmetric Algorithms
ECDSA, ECIES, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-256, SHA-224, SHA-384, SHA-512, SHA-2, SHA-3, SHA3-224, SHA3-256, SHA3-384, SHA3-512
Schemes
MAC
Randomness
DRBG, RNG
Elliptic Curves
P-192, P-224, P-256, P-384, P-521, K-163, B-163, K-283, K-409, K-571, B-283, B-409, B-571, K-233, B-233
Block cipher modes
ECB, CBC, CTR, GCM, CCM, XTS

JavaCard API constants
SM2
Trusted Execution Environments
SE

Security level
Level 3, Level 1
Side-channel analysis
physical tampering

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS197, FIPS 186-4, FIPS186-4, FIPS198-1, FIPS180-4, FIPS 202, FIPS140-2, SP 800-57, PKCS#1

File metadata

Title FIPS 140-2 Non-Proprietary Security Policy
Author Alejandro Fabio Masino
Creation date D:20181212165918-03'00'
Modification date D:20181212165918-03'00'
Pages 47
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3350,
  "dgst": "a29ba90b650139bb",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "RSA#3064",
        "ECDSA#1546",
        "SHS#4564",
        "AES#5694",
        "RSA#3065",
        "KTS#3792",
        "DRBG#2306",
        "Triple-DES#2853",
        "DSA#1465",
        "KBKDF#241",
        "AES#5693",
        "KTS#5693",
        "SHA-3#59",
        "HMAC#3792"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0.12"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDSA": {
            "ECDSA": 38
          },
          "ECIES": {
            "ECIES": 4
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 8
          },
          "DSA": {
            "DSA": 30
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 7
        },
        "CCM": {
          "CCM": 9
        },
        "CTR": {
          "CTR": 6
        },
        "ECB": {
          "ECB": 18
        },
        "GCM": {
          "GCM": 12
        },
        "XTS": {
          "XTS": 8
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 5
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-163": 3,
          "B-233": 2,
          "B-283": 4,
          "B-409": 4,
          "B-571": 6,
          "K-163": 3,
          "K-233": 4,
          "K-283": 4,
          "K-409": 4,
          "K-571": 4,
          "P-192": 10,
          "P-224": 8,
          "P-256": 12,
          "P-384": 8,
          "P-521": 8
        }
      },
      "eval_facility": {
        "atsec": {
          "atsec": 49
        }
      },
      "fips_cert_id": {
        "Cert": {
          "#1465": 1,
          "#1546": 1,
          "#2306": 1,
          "#241": 1,
          "#2853": 1,
          "#3064": 1,
          "#3065": 1,
          "#3792": 1,
          "#4564": 1,
          "#5693": 1,
          "#5694": 1,
          "#59": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "#2306 DRBG": 1,
          "#3064 RSA": 1,
          "#3065 RSA": 1,
          "#3792 HMAC": 1,
          "#4564 SHS": 1,
          "#5693 AES": 1,
          "#5694 AES": 1,
          "AES-256": 3,
          "AES256": 1,
          "HMAC SHA- 256": 1,
          "HMAC SHA-256": 1,
          "HMAC SHA-256 256": 1,
          "HMAC-SHA- 256": 2,
          "HMAC-SHA-256": 12,
          "PKCS#1": 2,
          "SHA- 256": 1,
          "SHA-1": 13,
          "SHA-2": 1,
          "SHA-224": 14,
          "SHA-256": 33,
          "SHA-3": 2,
          "SHA-384": 16,
          "SHA-512": 9,
          "SHA-512 1024": 3,
          "SHA-512 112": 1,
          "SHA-512 2048": 2,
          "SHA-512 2048 and 3072": 1,
          "SHA3-224": 2,
          "SHA3-256": 2,
          "SHA3-384": 2,
          "SHA3-512": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1,
          "Level 3": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 13
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-224": 14,
            "SHA-256": 33,
            "SHA-384": 16,
            "SHA-512": 16
          },
          "SHA3": {
            "SHA-3": 2,
            "SHA3-224": 2,
            "SHA3-256": 2,
            "SHA3-384": 2,
            "SHA3-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "curves": {
          "SM2": 22
        }
      },
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 42
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 12,
          "FIPS 186-4": 1,
          "FIPS 202": 1,
          "FIPS PUB 140-2": 2,
          "FIPS140-2": 1,
          "FIPS180-4": 2,
          "FIPS186-4": 5,
          "FIPS197": 3,
          "FIPS198-1": 2
        },
        "NIST": {
          "SP 800-57": 1
        },
        "PKCS": {
          "PKCS#1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 62,
            "AES-256": 3,
            "AES256": 1
          },
          "CAST": {
            "CAST": 4
          },
          "RC": {
            "RC2": 4,
            "RC4": 4,
            "RC5": 4
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 28
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 8,
            "HMAC": 18,
            "HMAC-SHA-256": 6
          }
        },
        "miscellaneous": {
          "ARIA": {
            "ARIA": 4
          },
          "SEED": {
            "SEED": 4
          },
          "SM4": {
            "SM4": 5
          }
        }
      },
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Alejandro Fabio Masino",
      "/CreationDate": "D:20181212165918-03\u002700\u0027",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20181212165918-03\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": "FIPS 140-2 Non-Proprietary Security Policy",
      "pdf_file_size_bytes": 1002758,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://csrc.nist.gov/publications/nistpubs/800-67-Rev1/SP-800-67-Rev1.pdf",
          "https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-108.pdf",
          "http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf",
          "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
          "http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf",
          "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf",
          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
          "http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf",
          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br1.pdf",
          "http://www.ietf.org/rfc/rfc3447.txt",
          "https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips140-2/FIPS1402IG.pdf",
          "http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf",
          "http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf",
          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
          "http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf",
          "http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf",
          "http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf",
          "http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf",
          "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133.pdf",
          "http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 47
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "4cfadff395d93fd11370db5368f8c9fba5686c341c388ad62306ce0e1fd113b9",
    "policy_txt_hash": "8bdf0b813ba24e43e08f9e4b0c609a8e536c9e8ddaa91c18a775bdc10d1b711e"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/JanuaryConsolidatedCert.pdf",
    "date_sunset": null,
    "description": "The Sansec Hardware Security Module (HSM) is a hardware cryptographic module that provides data encryption, data decryption, signature generation, signature verification, message digest, message authentication code (MAC), random number generation and key management services to business systems.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "1.0.12",
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": "SecHSM-V2",
    "level": 3,
    "mentioned_certs": {},
    "module_name": "Sansec HSM",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-01-03",
        "lab": "atsec information security corporation",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-11-21",
        "lab": "atsec information security corporation",
        "validation_type": "Update"
      }
    ],
    "vendor": "Beijing Sansec Technology Development Co., Ltd",
    "vendor_url": "http://en.sansec.com.cn"
  }
}