Advanced Configurable Crypto Environment (ACCE)

Certificate #112

Webpage information

Status historical
Historical reason Validation Sunsetting Policy - FIPS 140-1 Certificate
Validation dates 08.09.2000 , 18.07.2001 , 22.07.2002 , 04.10.2002 , 21.04.2005
Standard FIPS 140-1
Security level 4
Type Hardware
Embodiment Multi-Chip Embedded
Caveat When operated in FIPS mode
Description The ACCE provides highly-secure cryptographic services and key storage. It is used in a range of AEP Networks and OEM products including the SureWare Keyper family. There are two versions available: Version 1.3G1 will power-down and zeroize the SMK if the module's temperature exceeds the specified operational temperature range. Version 1.3G2 will power-down and zeroize the SMK when the specified operational temperature is exceeded, and zeroize the IMK when the storage temperature is exceeded.
Version (Firmware) 1, Releases 3G1 and 3G2
Vendor AEP Networks
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
DES
Schemes
MAC
Protocols
VPN
Block cipher modes
CBC

Security level
level 4

Standards
FIPS 140-1, FIPS PUB 140-1, FIPS PUB 113, ISO/IEC 9797:1994

File metadata

Title Certificate 112 - Baltimore ACCE
Subject Security Policy
Creation date D:20000918093034
Modification date D:20000918093128-04'00'
Pages 15
Producer Acrobat Distiller 4.05 for Windows

References

Incoming
  • 2398 - historical - OpenSSL FIPS Object Module SE
  • 123 - historical - Advanced Configurable Crypto Environment - Security Processor (ACCE SP and ACCE SP2)

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 112,
  "dgst": "b1556dea32e9d0cd",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "Triple-DES#25",
        "Triple-DES#24",
        "Triple-DES MAC; DSA/SHA-1#36"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "123",
          "2398"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "3608",
          "548",
          "2398",
          "3667",
          "3220",
          "3493",
          "668",
          "123"
        ]
      },
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 5
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {},
      "fips_security_level": {
        "Level": {
          "level 4": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-1": 16,
          "FIPS PUB 113": 1,
          "FIPS PUB 140-1": 1
        },
        "ISO": {
          "ISO/IEC 9797:1994": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/CreationDate": "D:20000918093034",
      "/ModDate": "D:20000918093128-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 4.05 for Windows",
      "/Subject": "Security Policy",
      "/Title": "Certificate 112 - Baltimore ACCE",
      "pdf_file_size_bytes": 71714,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "1641ac8f5a5c8720381b28ff1bcadcf0ec1d84da30d9f4b67c1d5672013e1419",
    "policy_txt_hash": "196c3370e863e364d7c0e5c2e2ab76d48387fe1aaac203099f1e3a104773561c"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt112.pdf",
    "date_sunset": null,
    "description": "The ACCE provides highly-secure cryptographic services and key storage. It is used in a range of AEP Networks and OEM products including the SureWare Keyper family. There are two versions available: Version 1.3G1 will power-down and zeroize the SMK if the module\u0027s temperature exceeds the specified operational temperature range. Version 1.3G2 will power-down and zeroize the SMK when the specified operational temperature is exceeded, and zeroize the IMK when the storage temperature is exceeded.",
    "embodiment": "Multi-Chip Embedded",
    "exceptions": null,
    "fw_versions": "1, Releases 3G1 and 3G2",
    "historical_reason": "Validation Sunsetting Policy - FIPS 140-1 Certificate",
    "hw_versions": null,
    "level": 4,
    "mentioned_certs": {},
    "module_name": "Advanced Configurable Crypto Environment (ACCE)",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-1",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2000-09-08",
        "lab": "DOMUS",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2001-07-18",
        "lab": "",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2002-07-22",
        "lab": "",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2002-10-04",
        "lab": "",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2005-04-21",
        "lab": "",
        "validation_type": "Update"
      }
    ],
    "vendor": "AEP Networks",
    "vendor_url": "http://www.aepnetworks.com"
  }
}