BC-FJA (Bouncy Castle FIPS Java API)

Certificate #3152

Webpage information

Status historical
Historical reason SP 800-56Arev3 transition
Validation dates 15.03.2018 , 02.04.2019 , 09.04.2019 , 23.07.2020
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys
Exceptions
  • Physical Security: N/A
Description The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well. The module is designed to integrate with the associated Bouncy Castle APIs including those for TLS, X.509, CMS, S/MIME, TSP, PKIX, and OpenPGP.
Tested configurations
  • Linux 3.10 on Java SE Runtime Environment v8 (1.8.0) running on NetScout PowerEdge R730 with an Intel Xeon Processor E5-2697 v3
  • Linux 3.10 on Java SE Runtime Environment v8 (1.8.0) running on NetScout PowerEdge R740 with an Intel Xeon Processor Silver 4110
  • Lollipop Android 5.1 on Android 5 Java ART running on Zebra TC75 Touch Computer with a Qualcomm MS8960 Pro
  • Marshmallow Android 6.0 on Android 6 Java ART running on Zebra TC51-HC Touch Computer with a Qualcomm MSM8956
  • Microsoft Windows Server 2016 ESXi 6.7 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon 6126
  • Oreo Android 8.1 on Android 8 Java ART running on Zebra TC52 Touch Computer with a Qualcomm SD660
  • Photon OS 2.0 on VMware ESXi 6.7 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon 6126
  • Red Hat Enterprise Linux (RHEL) 7.3 on VMware ESXi 5.5 and Java SE Runtime Environment v7 (1.7.0) running on HP ProLiant DL360 G7 Server with an Intel Xeon X5670
  • Red Hat Enterprise Linux (RHEL) 7.3 on VMware ESXi 5.5 and Java SE Runtime Environment v8 (1.8.0) running on HP ProLiant DL360 G7 Server with an Intel Xeon X5670
  • Ubuntu 16.04 on VMware ESXi 6.7 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon Processor 6126
  • Ubuntu 16.04 on VMware ESXi 7.0 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon Gold 6126
  • Ubuntu 18.04 on VMware ESXi 7.0 on Java SE Runtime Environment v11 (1.11.0) running on Dell PowerEdge R740 with an Intel Xeon Gold 6126 (single-user mode)
Vendor Legion of the Bouncy Castle Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, Twofish, Serpent, CAST5, RC4, RC2, DES, Triple-DES, TDEA, TDES, IDEA, Blowfish, Camellia, SEED, HMAC, HMAC-SHA-256, CMAC, CBC-MAC
Asymmetric Algorithms
RSA-OAEP, ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, SHA-3, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE256, MD5, RIPEMD128, RIPEMD256, RIPEMD, PBKDF
Schemes
MAC, Key Agreement
Protocols
SSH, TLS, TLS 1.2, IKEv2
Randomness
PRNG, DRBG, RNG
Libraries
OpenSSL
Elliptic Curves
P-224, P-256, P-384, P-521, K-233, K-283, K-409, K-571, B-233, B-283, B-409, B-571
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM

Trusted Execution Environments
SE
Vendor
Qualcomm, Microsoft

Security level
Level 1
Side-channel analysis
timing attacks, timing attack

Standards
FIPS 140-2, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 186-2, FIPS 180-4, FIPS 202, FIPS 186-3, FIPS PUB 140-2, SP 800-38A, SP 800-38C, SP 800-38B, SP 800-38D, SP 800-90A, SP 800-135, SP 800-108, SP 800-38F, SP 800-67, SP 800-133, SP 800-132, SP 800-56B, SP 800-56C, SP 800-56A, SP 800-89, PKCS #1, PKCS1, PKCS#12, PKCS#5, PKCS#1

File metadata

Subject FIPS 140-2 Security Policy Template
Author webex
Creation date D:20200714083800-07'00'
Modification date D:20200714083831-07'00'
Pages 26
Creator Acrobat PDFMaker 17 for Word
Producer Adobe PDF Library 15.0

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3152,
  "dgst": "b83d4086daad65f8",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "CVL#1402",
        "DRBG#1636",
        "CVL#1401",
        "AES#4759",
        "KTS#2529",
        "SHA-3#38",
        "HMAC#3170",
        "CVL#1400",
        "KBKDF#153",
        "CVL#1398",
        "RSA#2602",
        "ECDSA#1191",
        "CVL#1399",
        "Triple DES#2529",
        "DSA#1279",
        "SHS#3901"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "3311"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "3311"
        ]
      },
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDSA": {
            "ECDSA": 12
          }
        },
        "FF": {
          "DH": {
            "DH": 8,
            "Diffie-Hellman": 6
          },
          "DSA": {
            "DSA": 15
          }
        },
        "RSA": {
          "RSA-OAEP": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 4
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 6
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 9
        },
        "OFB": {
          "OFB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKEv2": 5
        },
        "SSH": {
          "SSH": 5
        },
        "TLS": {
          "TLS": {
            "TLS": 14,
            "TLS 1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 3
        },
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-233": 1,
          "B-283": 1,
          "B-409": 1,
          "B-571": 1,
          "K-233": 1,
          "K-283": 1,
          "K-409": 1,
          "K-571": 1,
          "P-224": 2,
          "P-256": 4,
          "P-384": 2,
          "P-521": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1,
          "#1398": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "CVL 1399": 1,
          "Cert # AES": 1,
          "Cert # HMAC": 1,
          "Cert # SHS": 1,
          "DRBG 1636": 1,
          "DSA4": 1,
          "HMAC 3170": 2,
          "HMAC SHA-512/224": 1,
          "HMAC-SHA-256": 2,
          "HMAC-SHA256": 2,
          "PKCS #1": 2,
          "PKCS#1": 4,
          "PKCS#12": 4,
          "PKCS#5": 4,
          "PKCS1": 2,
          "SHA-1": 9,
          "SHA-2": 2,
          "SHA-224": 6,
          "SHA-256": 6,
          "SHA-3": 3,
          "SHA-384": 6,
          "SHA-512": 5,
          "SHA-512 153": 1,
          "SHA3-224": 2,
          "SHA3-256": 2,
          "SHA3-384": 2,
          "SHA3-512": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 4
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 4
          }
        },
        "PBKDF": {
          "PBKDF": 14
        },
        "RIPEMD": {
          "RIPEMD": 1,
          "RIPEMD128": 1,
          "RIPEMD256": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 9
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-224": 6,
            "SHA-256": 6,
            "SHA-384": 6,
            "SHA-512": 6
          },
          "SHA3": {
            "SHA-3": 3,
            "SHA3-224": 2,
            "SHA3-256": 2,
            "SHA3-384": 2,
            "SHA3-512": 2
          }
        },
        "SHAKE": {
          "SHAKE128": 2,
          "SHAKE256": 2
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {
        "org": {
          "org.bouncycastle.fips": 1
        }
      },
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 23,
          "PRNG": 1
        },
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "timing attack": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 17,
          "FIPS 180-4": 2,
          "FIPS 186-2": 1,
          "FIPS 186-3": 1,
          "FIPS 186-4": 10,
          "FIPS 197": 2,
          "FIPS 198-1": 3,
          "FIPS 202": 2,
          "FIPS PUB 140-2": 1
        },
        "NIST": {
          "SP 800-108": 6,
          "SP 800-132": 4,
          "SP 800-133": 2,
          "SP 800-135": 7,
          "SP 800-38A": 5,
          "SP 800-38B": 2,
          "SP 800-38C": 2,
          "SP 800-38D": 5,
          "SP 800-38F": 5,
          "SP 800-56A": 4,
          "SP 800-56B": 7,
          "SP 800-56C": 3,
          "SP 800-67": 5,
          "SP 800-89": 1,
          "SP 800-90A": 3
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 2,
          "PKCS#12": 2,
          "PKCS#5": 2,
          "PKCS1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 26
          },
          "CAST": {
            "CAST5": 1
          },
          "RC": {
            "RC2": 1,
            "RC4": 1
          },
          "Serpent": {
            "Serpent": 1
          },
          "Twofish": {
            "Twofish": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 7,
            "TDES": 1,
            "Triple-DES": 25
          },
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1,
            "CMAC": 5,
            "HMAC": 12,
            "HMAC-SHA-256": 1
          }
        },
        "miscellaneous": {
          "Blowfish": {
            "Blowfish": 1
          },
          "Camellia": {
            "Camellia": 1
          },
          "IDEA": {
            "IDEA": 1
          },
          "SEED": {
            "SEED": 1
          }
        }
      },
      "tee_name": {
        "IBM": {
          "SE": 11
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 4
        },
        "Qualcomm": {
          "Qualcomm": 3
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/AppVersion": "14.0000",
      "/Author": "webex",
      "/Company": "",
      "/CreationDate": "D:20200714083800-07\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 17 for Word",
      "/DocSecurity": "0.000000",
      "/HyperlinksChanged": "0",
      "/LinksUpToDate": "0",
      "/ModDate": "D:20200714083831-07\u002700\u0027",
      "/Producer": "Adobe PDF Library 15.0",
      "/ScaleCrop": "0",
      "/ShareDoc": "0",
      "/SourceModified": "D:20200714152358",
      "/Subject": "FIPS 140-2 Security Policy Template",
      "/Title": "",
      "pdf_file_size_bytes": 765013,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=15485",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=21109",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=18957",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=16212",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=27696",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=18449",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=9376",
          "https://www.bouncycastle.org/",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=18795",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=14779",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=24652",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=539",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=18272",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=15591",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=14463",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=17499",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=30370"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 26
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "bc246a9ef3193d52c43a24ce6a7f8f0c4e35dfc98fe89d219ecb32c97de797fe",
    "policy_txt_hash": "fbcd9869a54275a266aa254a53aa63dcf4705200c8dfaf01a8c060072ad3e5fb"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140-2-ConsolidatedMarch2018.pdf",
    "date_sunset": null,
    "description": "The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well. The module is designed to integrate with the associated Bouncy Castle APIs including those for TLS, X.509, CMS, S/MIME, TSP, PKIX, and OpenPGP.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "SP 800-56Arev3 transition",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "BC-FJA (Bouncy Castle FIPS Java API)",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "1.0.1",
    "tested_conf": [
      "Linux 3.10 on Java SE Runtime Environment v8 (1.8.0) running on NetScout PowerEdge R730 with an Intel Xeon Processor E5-2697 v3",
      "Linux 3.10 on Java SE Runtime Environment v8 (1.8.0) running on NetScout PowerEdge R740 with an Intel Xeon Processor Silver 4110",
      "Lollipop Android 5.1 on Android 5 Java ART running on Zebra TC75 Touch Computer with a Qualcomm MS8960 Pro",
      "Marshmallow Android 6.0 on Android 6 Java ART running on Zebra TC51-HC Touch Computer with a Qualcomm MSM8956",
      "Microsoft Windows Server 2016 ESXi 6.7 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon 6126",
      "Oreo Android 8.1 on Android 8 Java ART running on Zebra TC52 Touch Computer with a Qualcomm SD660",
      "Photon OS 2.0 on VMware ESXi 6.7 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon 6126",
      "Red Hat Enterprise Linux (RHEL) 7.3 on VMware ESXi 5.5 and Java SE Runtime Environment v7 (1.7.0) running on HP ProLiant DL360 G7 Server with an Intel Xeon X5670",
      "Red Hat Enterprise Linux (RHEL) 7.3 on VMware ESXi 5.5 and Java SE Runtime Environment v8 (1.8.0) running on HP ProLiant DL360 G7 Server with an Intel Xeon X5670",
      "Ubuntu 16.04 on VMware ESXi 6.7 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon Processor 6126",
      "Ubuntu 16.04 on VMware ESXi 7.0 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon Gold 6126",
      "Ubuntu 18.04 on VMware ESXi 7.0 on Java SE Runtime Environment v11 (1.11.0) running on Dell PowerEdge R740 with an Intel Xeon Gold 6126 (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2018-03-15",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-04-02",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-04-09",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2020-07-23",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      }
    ],
    "vendor": "Legion of the Bouncy Castle Inc.",
    "vendor_url": "http://www.bouncycastle.org"
  }
}