This page was not yet optimized for use on mobile
devices.
HYCU Cryptographic Library
Certificate #3221
Webpage information
Security policy
Symmetric Algorithms
AES, Twofish, Serpent, CAST5, RC4, RC2, DES, Triple-DES, TDEA, TDES, IDEA, Blowfish, Camellia, SEED, HMAC, HMAC-SHA-256, CMAC, CBC-MACAsymmetric Algorithms
RSA-OAEP, ECDSA, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, SHA-3, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE256, MD5, RIPEMD128, RIPEMD256, RIPEMD, PBKDFSchemes
MAC, Key AgreementProtocols
SSH, TLS, TLS 1.2, IKEv2Randomness
PRNG, DRBG, RNGLibraries
OpenSSLElliptic Curves
P-224, P-256, P-384, P-521, K-233, K-283, K-409, K-571, B-233, B-283, B-409, B-571Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCMTrusted Execution Environments
SEVendor
Microsoft, CiscoSecurity level
Level 1Side-channel analysis
timing attacks, timing attackStandards
FIPS 140-2, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 186-2, FIPS 180-4, FIPS 202, FIPS 186-3, FIPS PUB 140-2, SP 800-38A, SP 800-38C, SP 800-38B, SP 800-38D, SP 800-90A, SP 800-135, SP 800-108, SP 800-38F, SP 800-20, SP 800-132, SP 800-56B, SP 800-56C, SP 800-67, SP 800-56A, SP 800-89, PKCS #1, PKCS1, PKCS#12, PKCS#5, PKCS#1File metadata
| Subject | FIPS 140-2 Security Policy Template |
|---|---|
| Author | webex |
| Creation date | D:20180601173303-04'00' |
| Modification date | D:20180601173303-04'00' |
| Pages | 30 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
Heuristics
No heuristics are available for this certificate.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3221,
"dgst": "a762afde67e034eb",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"AES#3756",
"DRBG#1031",
"HMAC#2458",
"RSA#1932",
"CVL#704",
"ECDSA#804",
"DSA#1043",
"KTS#2090",
"SHS#3126",
"SHA-3#3",
"Triple-DES#2090",
"CVL#705",
"KBKDF#78",
"CVL#706"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"2768"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"2768"
]
}
},
"module_prunned_references": {
"_type": "Set",
"elements": [
"2768"
]
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDSA": {
"ECDSA": 12
}
},
"FF": {
"DH": {
"DH": 8,
"Diffie-Hellman": 6
},
"DSA": {
"DSA": 15
}
},
"RSA": {
"RSA-OAEP": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CCM": {
"CCM": 4
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 6
},
"ECB": {
"ECB": 3
},
"GCM": {
"GCM": 10
},
"OFB": {
"OFB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"IKE": {
"IKEv2": 5
},
"SSH": {
"SSH": 5
},
"TLS": {
"TLS": {
"TLS": 14,
"TLS 1.2": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 4
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"B-233": 1,
"B-283": 1,
"B-409": 1,
"B-571": 1,
"K-233": 1,
"K-283": 1,
"K-409": 1,
"K-571": 1,
"P-224": 2,
"P-256": 4,
"P-384": 2,
"P-521": 2
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 1
}
},
"fips_certlike": {
"Certlike": {
"Cert # AES": 1,
"Cert # RSA": 1,
"DSA4": 1,
"HMAC SHA-512/224": 1,
"HMAC-SHA-256": 2,
"HMAC-SHA256": 2,
"PKCS #1": 2,
"PKCS#1": 4,
"PKCS#12": 4,
"PKCS#5": 4,
"PKCS1": 2,
"SHA-1": 9,
"SHA-2": 2,
"SHA-224": 6,
"SHA-256": 6,
"SHA-3": 3,
"SHA-384": 6,
"SHA-512": 5,
"SHA-512 78": 1,
"SHA3-224": 2,
"SHA3-256": 2,
"SHA3-384": 2,
"SHA3-512": 2
}
},
"fips_security_level": {
"Level": {
"Level 1": 4
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 4
}
},
"PBKDF": {
"PBKDF": 14
},
"RIPEMD": {
"RIPEMD": 1,
"RIPEMD128": 1,
"RIPEMD256": 1
},
"SHA": {
"SHA1": {
"SHA-1": 9
},
"SHA2": {
"SHA-2": 2,
"SHA-224": 6,
"SHA-256": 6,
"SHA-384": 6,
"SHA-512": 6
},
"SHA3": {
"SHA-3": 3,
"SHA3-224": 2,
"SHA3-256": 2,
"SHA3-384": 2,
"SHA3-512": 2
}
},
"SHAKE": {
"SHAKE128": 1,
"SHAKE256": 2
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 19,
"PRNG": 1
},
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"SCA": {
"timing attack": 1,
"timing attacks": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 17,
"FIPS 180-4": 2,
"FIPS 186-2": 1,
"FIPS 186-3": 1,
"FIPS 186-4": 10,
"FIPS 197": 2,
"FIPS 198-1": 3,
"FIPS 202": 2,
"FIPS PUB 140-2": 1
},
"NIST": {
"SP 800-108": 6,
"SP 800-132": 5,
"SP 800-135": 7,
"SP 800-20": 2,
"SP 800-38A": 5,
"SP 800-38B": 2,
"SP 800-38C": 2,
"SP 800-38D": 5,
"SP 800-38F": 5,
"SP 800-56A": 4,
"SP 800-56B": 7,
"SP 800-56C": 3,
"SP 800-67": 3,
"SP 800-89": 1,
"SP 800-90A": 3
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 2,
"PKCS#12": 2,
"PKCS#5": 2,
"PKCS1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 25
},
"CAST": {
"CAST5": 1
},
"RC": {
"RC2": 1,
"RC4": 1
},
"Serpent": {
"Serpent": 1
},
"Twofish": {
"Twofish": 1
}
},
"DES": {
"3DES": {
"TDEA": 5,
"TDES": 1,
"Triple-DES": 24
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1,
"CMAC": 5,
"HMAC": 11,
"HMAC-SHA-256": 1
}
},
"miscellaneous": {
"Blowfish": {
"Blowfish": 1
},
"Camellia": {
"Camellia": 1
},
"IDEA": {
"IDEA": 1
},
"SEED": {
"SEED": 1
}
}
},
"tee_name": {
"IBM": {
"SE": 5
}
},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 1
},
"Microsoft": {
"Microsoft": 3
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "webex",
"/CreationDate": "D:20180601173303-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20180601173303-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Subject": "FIPS 140-2 Security Policy Template",
"pdf_file_size_bytes": 1577185,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.hycu.com/",
"http://csrc.nist.gov/groups/STM/cavp/documents/des/tripledesnewval.html#2090",
"http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html#3756"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 30
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "d2901a476ca546e44f6e90141663552e84ce6442848533c69d40e27d9edbee9f",
"policy_txt_hash": "b87724b1329a2dd18d9b224c9c1087fb8d044ee4aaf2d8e3843f37c3d9e90280"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys. This validation entry is a non-security relevant modification to Cert. #2768",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/JulyConsolidatedCert.pdf",
"date_sunset": null,
"description": "HYCU Cryptographic Library is a software library that provides cryptographic services to HYCU Data Protection for Nutanix, the only purpose-built data protection solution, built from the ground up with the Nutanix administrator in mind. The module provides FIPS 140 validated cryptographic algorithms for multiple services such as TLS and File Encryption.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 1,
"mentioned_certs": {
"2768": 1
},
"module_name": "HYCU Cryptographic Library",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "1.0.0",
"tested_conf": [
"Java SE Runtime Environment v7 (1.7.0) on Solaris 11 on vSphere 6 running on a Cisco UCSB-B200-M4 Blade",
"Java SE Runtime Environment v8 (1.8.0) on Centos 6.4 on vSphere 6 running on a Cisco UCSB-B200-M4 Blade (single-user mode)",
"Java SE Runtime Environment v8 (1.8.0) on Ubuntu 14.04 LTS on VMWare ESXi 6.0 running on a Simplicity OmniCube (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2018-07-09",
"lab": "Acumen Security",
"validation_type": "Initial"
}
],
"vendor": "HYCU, Inc.",
"vendor_url": "http://www.hycu.com"
}
}