This page was not yet optimized for use on mobile
devices.
BC-FJA (Bouncy Castle FIPS Java API)
Certificate #3152
Webpage information
Security policy
Symmetric Algorithms
AES, Twofish, Serpent, CAST5, RC4, RC2, DES, Triple-DES, TDEA, TDES, IDEA, Blowfish, Camellia, SEED, HMAC, HMAC-SHA-256, CMAC, CBC-MACAsymmetric Algorithms
RSA-OAEP, ECDSA, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, SHA-3, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE256, MD5, RIPEMD128, RIPEMD256, RIPEMD, PBKDFSchemes
MAC, Key AgreementProtocols
SSH, TLS, TLS 1.2, IKEv2Randomness
PRNG, DRBG, RNGLibraries
OpenSSLElliptic Curves
P-224, P-256, P-384, P-521, K-233, K-283, K-409, K-571, B-233, B-283, B-409, B-571Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCMTrusted Execution Environments
SEVendor
Qualcomm, MicrosoftSecurity level
Level 1Side-channel analysis
timing attacks, timing attackStandards
FIPS 140-2, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 186-2, FIPS 180-4, FIPS 202, FIPS 186-3, FIPS PUB 140-2, SP 800-38A, SP 800-38C, SP 800-38B, SP 800-38D, SP 800-90A, SP 800-135, SP 800-108, SP 800-38F, SP 800-67, SP 800-133, SP 800-132, SP 800-56B, SP 800-56C, SP 800-56A, SP 800-89, PKCS #1, PKCS1, PKCS#12, PKCS#5, PKCS#1File metadata
| Subject | FIPS 140-2 Security Policy Template |
|---|---|
| Author | webex |
| Creation date | D:20200714083800-07'00' |
| Modification date | D:20200714083831-07'00' |
| Pages | 26 |
| Creator | Acrobat PDFMaker 17 for Word |
| Producer | Adobe PDF Library 15.0 |
Heuristics
No heuristics are available for this certificate.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3152,
"dgst": "b83d4086daad65f8",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"CVL#1402",
"DRBG#1636",
"CVL#1401",
"AES#4759",
"KTS#2529",
"SHA-3#38",
"HMAC#3170",
"CVL#1400",
"KBKDF#153",
"CVL#1398",
"RSA#2602",
"ECDSA#1191",
"CVL#1399",
"Triple DES#2529",
"DSA#1279",
"SHS#3901"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"3311"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"3311"
]
},
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 12
}
},
"FF": {
"DH": {
"DH": 8,
"Diffie-Hellman": 6
},
"DSA": {
"DSA": 15
}
},
"RSA": {
"RSA-OAEP": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CCM": {
"CCM": 4
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 6
},
"ECB": {
"ECB": 3
},
"GCM": {
"GCM": 9
},
"OFB": {
"OFB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"IKE": {
"IKEv2": 5
},
"SSH": {
"SSH": 5
},
"TLS": {
"TLS": {
"TLS": 14,
"TLS 1.2": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 3
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"B-233": 1,
"B-283": 1,
"B-409": 1,
"B-571": 1,
"K-233": 1,
"K-283": 1,
"K-409": 1,
"K-571": 1,
"P-224": 2,
"P-256": 4,
"P-384": 2,
"P-521": 2
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 1,
"#1398": 1
}
},
"fips_certlike": {
"Certlike": {
"CVL 1399": 1,
"Cert # AES": 1,
"Cert # HMAC": 1,
"Cert # SHS": 1,
"DRBG 1636": 1,
"DSA4": 1,
"HMAC 3170": 2,
"HMAC SHA-512/224": 1,
"HMAC-SHA-256": 2,
"HMAC-SHA256": 2,
"PKCS #1": 2,
"PKCS#1": 4,
"PKCS#12": 4,
"PKCS#5": 4,
"PKCS1": 2,
"SHA-1": 9,
"SHA-2": 2,
"SHA-224": 6,
"SHA-256": 6,
"SHA-3": 3,
"SHA-384": 6,
"SHA-512": 5,
"SHA-512 153": 1,
"SHA3-224": 2,
"SHA3-256": 2,
"SHA3-384": 2,
"SHA3-512": 2
}
},
"fips_security_level": {
"Level": {
"Level 1": 4
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 4
}
},
"PBKDF": {
"PBKDF": 14
},
"RIPEMD": {
"RIPEMD": 1,
"RIPEMD128": 1,
"RIPEMD256": 1
},
"SHA": {
"SHA1": {
"SHA-1": 9
},
"SHA2": {
"SHA-2": 2,
"SHA-224": 6,
"SHA-256": 6,
"SHA-384": 6,
"SHA-512": 6
},
"SHA3": {
"SHA-3": 3,
"SHA3-224": 2,
"SHA3-256": 2,
"SHA3-384": 2,
"SHA3-512": 2
}
},
"SHAKE": {
"SHAKE128": 2,
"SHAKE256": 2
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"org": {
"org.bouncycastle.fips": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 23,
"PRNG": 1
},
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"SCA": {
"timing attack": 1,
"timing attacks": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 17,
"FIPS 180-4": 2,
"FIPS 186-2": 1,
"FIPS 186-3": 1,
"FIPS 186-4": 10,
"FIPS 197": 2,
"FIPS 198-1": 3,
"FIPS 202": 2,
"FIPS PUB 140-2": 1
},
"NIST": {
"SP 800-108": 6,
"SP 800-132": 4,
"SP 800-133": 2,
"SP 800-135": 7,
"SP 800-38A": 5,
"SP 800-38B": 2,
"SP 800-38C": 2,
"SP 800-38D": 5,
"SP 800-38F": 5,
"SP 800-56A": 4,
"SP 800-56B": 7,
"SP 800-56C": 3,
"SP 800-67": 5,
"SP 800-89": 1,
"SP 800-90A": 3
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 2,
"PKCS#12": 2,
"PKCS#5": 2,
"PKCS1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 26
},
"CAST": {
"CAST5": 1
},
"RC": {
"RC2": 1,
"RC4": 1
},
"Serpent": {
"Serpent": 1
},
"Twofish": {
"Twofish": 1
}
},
"DES": {
"3DES": {
"TDEA": 7,
"TDES": 1,
"Triple-DES": 25
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1,
"CMAC": 5,
"HMAC": 12,
"HMAC-SHA-256": 1
}
},
"miscellaneous": {
"Blowfish": {
"Blowfish": 1
},
"Camellia": {
"Camellia": 1
},
"IDEA": {
"IDEA": 1
},
"SEED": {
"SEED": 1
}
}
},
"tee_name": {
"IBM": {
"SE": 11
}
},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 4
},
"Qualcomm": {
"Qualcomm": 3
}
},
"vulnerability": {}
},
"policy_metadata": {
"/AppVersion": "14.0000",
"/Author": "webex",
"/Company": "",
"/CreationDate": "D:20200714083800-07\u002700\u0027",
"/Creator": "Acrobat PDFMaker 17 for Word",
"/DocSecurity": "0.000000",
"/HyperlinksChanged": "0",
"/LinksUpToDate": "0",
"/ModDate": "D:20200714083831-07\u002700\u0027",
"/Producer": "Adobe PDF Library 15.0",
"/ScaleCrop": "0",
"/ShareDoc": "0",
"/SourceModified": "D:20200714152358",
"/Subject": "FIPS 140-2 Security Policy Template",
"/Title": "",
"pdf_file_size_bytes": 765013,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=15485",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=21109",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=18957",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=16212",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=27696",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=18449",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=9376",
"https://www.bouncycastle.org/",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=18795",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=14779",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=24652",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=539",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=18272",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=15591",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=14463",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=17499",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=30370"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 26
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "bc246a9ef3193d52c43a24ce6a7f8f0c4e35dfc98fe89d219ecb32c97de797fe",
"policy_txt_hash": "fbcd9869a54275a266aa254a53aa63dcf4705200c8dfaf01a8c060072ad3e5fb"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140-2-ConsolidatedMarch2018.pdf",
"date_sunset": null,
"description": "The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well. The module is designed to integrate with the associated Bouncy Castle APIs including those for TLS, X.509, CMS, S/MIME, TSP, PKIX, and OpenPGP.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A"
],
"fw_versions": null,
"historical_reason": "SP 800-56Arev3 transition",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "BC-FJA (Bouncy Castle FIPS Java API)",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "1.0.1",
"tested_conf": [
"Linux 3.10 on Java SE Runtime Environment v8 (1.8.0) running on NetScout PowerEdge R730 with an Intel Xeon Processor E5-2697 v3",
"Linux 3.10 on Java SE Runtime Environment v8 (1.8.0) running on NetScout PowerEdge R740 with an Intel Xeon Processor Silver 4110",
"Lollipop Android 5.1 on Android 5 Java ART running on Zebra TC75 Touch Computer with a Qualcomm MS8960 Pro",
"Marshmallow Android 6.0 on Android 6 Java ART running on Zebra TC51-HC Touch Computer with a Qualcomm MSM8956",
"Microsoft Windows Server 2016 ESXi 6.7 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon 6126",
"Oreo Android 8.1 on Android 8 Java ART running on Zebra TC52 Touch Computer with a Qualcomm SD660",
"Photon OS 2.0 on VMware ESXi 6.7 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon 6126",
"Red Hat Enterprise Linux (RHEL) 7.3 on VMware ESXi 5.5 and Java SE Runtime Environment v7 (1.7.0) running on HP ProLiant DL360 G7 Server with an Intel Xeon X5670",
"Red Hat Enterprise Linux (RHEL) 7.3 on VMware ESXi 5.5 and Java SE Runtime Environment v8 (1.8.0) running on HP ProLiant DL360 G7 Server with an Intel Xeon X5670",
"Ubuntu 16.04 on VMware ESXi 6.7 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon Processor 6126",
"Ubuntu 16.04 on VMware ESXi 7.0 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon Gold 6126",
"Ubuntu 18.04 on VMware ESXi 7.0 on Java SE Runtime Environment v11 (1.11.0) running on Dell PowerEdge R740 with an Intel Xeon Gold 6126 (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2018-03-15",
"lab": "UL Verification Services, Inc.",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2019-04-02",
"lab": "UL Verification Services, Inc.",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2019-04-09",
"lab": "UL Verification Services, Inc.",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2020-07-23",
"lab": "UL Verification Services, Inc.",
"validation_type": "Update"
}
],
"vendor": "Legion of the Bouncy Castle Inc.",
"vendor_url": "http://www.bouncycastle.org"
}
}