This page was not yet optimized for use on mobile
devices.
Alliance Key Manager
Certificate #1449
Webpage information
Security policy
Symmetric Algorithms
AES, HMAC, HMAC-SHA-256Hash functions
SHA-1, SHA-256, MD5Protocols
TLSRandomness
RNGLibraries
OpenSSLSecurity level
Level 1Standards
FIPS 140-2, X.509File metadata
| Title | Microsoft Word - PTSS Security Policy V1.3.docx |
|---|---|
| Author | frankie_chat |
| Creation date | D:20101102113552-05'00' |
| Modification date | D:20101108074006-05'00' |
| Pages | 10 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | Acrobat Distiller 8.1.0 (Windows) |
References
Outgoing- 1320 - historical - Red Hat Enterprise Linux 5 OpenSSL Cryptographic Module
Heuristics
No heuristics are available for this certificate.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 1449,
"dgst": "afd7745eb5969016",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"SHS#1144",
"RNG#692",
"RNG#810",
"SHS#1342",
"HMAC#875",
"HMAC#728",
"RSA#729",
"AES#1245",
"AES#1486"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"1320"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"1320"
]
}
},
"module_prunned_references": {
"_type": "Set",
"elements": [
"1320"
]
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"1320"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"1320"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"1320"
]
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 18
}
},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 16
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 10
}
},
"fips_cert_id": {
"Cert": {
"#1144": 1,
"#1245": 1,
"#1320": 1,
"#1342": 1,
"#1486": 1,
"#692": 1,
"#728": 1,
"#729": 1,
"#810": 1,
"#875": 1
}
},
"fips_certlike": {
"Certlike": {
"AES (Cert. #1245": 1,
"AES, 128": 2,
"HMAC SHA-1": 1,
"HMAC SHA-256": 6,
"HMAC-SHA-1": 2,
"HMAC-SHA-256": 1,
"HMAC-SHA-256 (Cert. #728": 1,
"SHA-1": 2,
"SHA-256": 8
}
},
"fips_security_level": {
"Level": {
"Level 1": 5
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
},
"SHA": {
"SHA1": {
"SHA-1": 2
},
"SHA2": {
"SHA-256": 8
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 16
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 12
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 13
}
},
"constructions": {
"MAC": {
"HMAC": 19,
"HMAC-SHA-256": 1
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "frankie_chat",
"/CreationDate": "D:20101102113552-05\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20101108074006-05\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/Title": "Microsoft Word - PTSS Security Policy V1.3.docx",
"pdf_file_size_bytes": 86830,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 10
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "fa148abb776411e2a90638a0225b7d266cdd9b47d2138f31799b1001f6d4f13e",
"policy_txt_hash": "3674dd898a87d39f71e37f324669200f0f8886f150087f94d82032aced03076b"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated with the Red Hat Enterprise Linux 5 OpenSSL Cryptographic Module validated to FIPS 140-2 under Cert. #1320 operating in FIPS mode (approved algorithms retested on listed operating environment)",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt1449.pdf",
"date_sunset": null,
"description": "The Alliance Key Manager implements a client/server interface for key administration. The user application has the client role, and the key manager has the server role. The user opens a secure connection to the key server, sends an administrative request (create a key, change a key, etc.), receives a response from the server, and the session is disconnected.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": null,
"fw_versions": null,
"historical_reason": "RNG SP800-131A Revision 1 Transition",
"hw_versions": null,
"level": 1,
"mentioned_certs": {
"1320": 1
},
"module_name": "Alliance Key Manager",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "2.0.0",
"tested_conf": [
"rPath Linux, Version 2.6.29 (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2010-11-15",
"lab": "atsec information security corporation",
"validation_type": "Initial"
}
],
"vendor": "[email\u00a0protected]",
"vendor_url": "/cdn-cgi/l/email-protection"
}
}