This page was not yet optimized for use on mobile
devices.
Mojo AirTight Sensor
Certificate #3218
Webpage information
Security policy
Symmetric Algorithms
AES, HMAC, HMAC-SHA-384Asymmetric Algorithms
RSA 2048, ECDHE, ECDH, ECC, Diffie-HellmanHash functions
SHA-1, SHA-256, SHA-384, SHA-2, MD5Protocols
SSH, TLS 1.2, TLSRandomness
DRBGElliptic Curves
P-256, secp256r1Block cipher modes
CBCSecurity level
Level 2Standards
FIPS 140-2, FIPS 197, FIPS 180-4, FIPS 198, FIPS 186-4, SP 800-108, SP 800-135, SP 800-56A, SP 800-38F, SP 800-133, PKCS#1File metadata
| Pages | 31 |
|---|---|
| Producer | Skia/PDF m69 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3218,
"dgst": "abbbff138efe2415",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"KTS#3419",
"DRBG#1936",
"RSA#2774",
"AES#5158",
"KTS#5158",
"KBKDF#174",
"HMAC#3419",
"SHS#4165",
"CVL#1672",
"CVL#1673"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"8.2.1"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 3,
"ECDHE": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 4
}
},
"RSA": {
"RSA 2048": 4
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 36
},
"TLS": {
"TLS": {
"TLS": 30,
"TLS 1.2": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 6,
"secp256r1": 1
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1672": 2,
"#1673": 1,
"#174": 1,
"#1936": 1,
"#2774": 1,
"#3419": 3,
"#4165": 3,
"#5158": 2
}
},
"fips_certlike": {
"Certlike": {
"AES #5158": 2,
"AES-CTR 256": 1,
"CVL #1672": 2,
"CVL #1673": 1,
"DRBG #1936": 1,
"HMAC #3419": 2,
"HMAC-SHA -1": 2,
"HMAC-SHA -384": 2,
"HMAC-SHA- 384": 2,
"HMAC-SHA-1": 22,
"HMAC-SHA-384": 2,
"HMAC-SHA1": 4,
"PKCS#1": 2,
"RSA #2774": 1,
"RSA 2048": 4,
"SHA-1": 2,
"SHA-2": 1,
"SHA-256": 3,
"SHA-384": 1,
"SHS #4165": 1
}
},
"fips_security_level": {
"Level": {
"Level 2": 2
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
},
"SHA": {
"SHA1": {
"SHA-1": 2
},
"SHA2": {
"SHA-2": 1,
"SHA-256": 3,
"SHA-384": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 13
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 8,
"FIPS 180-4": 3,
"FIPS 186-4": 2,
"FIPS 197": 1,
"FIPS 198": 2
},
"NIST": {
"SP 800-108": 2,
"SP 800-133": 1,
"SP 800-135": 2,
"SP 800-38F": 1,
"SP 800-56A": 1
},
"PKCS": {
"PKCS#1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11
}
},
"constructions": {
"MAC": {
"HMAC": 4,
"HMAC-SHA-384": 1
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Producer": "Skia/PDF m69",
"pdf_file_size_bytes": 337076,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://csrc.nist.gov/cryptval/",
"http://csrc.nist.gov/groups/STM/cmvp/index.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 31
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "ca0a150dd30e64c222330332bd10e1db2ba7bb45f70688c54ae4683290fdbb0b",
"policy_txt_hash": "77c0a12ba38469bdc0ab7321560657cb7b0a0f2834eb3d100beffde7f3090838"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode and with tamper evident seals installed as indicated in the security policy. When operated only on the specific platforms specified on the certificate.",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/JulyConsolidatedCert.pdf",
"date_sunset": null,
"description": "The module performs wireless intrusion detection and prevention. It monitors radio channels to ensure conformance of wireless activity to security policy. It mitigates various types of wireless security violations such as rogue wireless networks, unauthorized wireless connections, network mis-configurations and denial of service attacks.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Mitigation of Other Attacks: N/A"
],
"fw_versions": "8.2.1",
"historical_reason": "SP 800-56Arev3 transition",
"hw_versions": null,
"level": 2,
"mentioned_certs": {},
"module_name": "Mojo AirTight Sensor",
"module_type": "Firmware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": [
"Mojo AirTight Sensor (Hardware Versions: C-120 and C-130 with C-TPL-A) with Linux OS version 3.4.103"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2018-07-03",
"lab": "CYGNACOM SOLUTIONS INC",
"validation_type": "Initial"
}
],
"vendor": "Mojo Networks, Inc.",
"vendor_url": "http://www.mojonetworks.com"
}
}