Samsung BoringSSL Android

Certificate #4216

Webpage information

Status active
Validation dates 09.05.2022 , 18.11.2022
Sunset date 21-09-2026
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. No assurance of the minimum strength of generated keys.
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description Provides general purpose cryptographic services to user-space applications on the mobile platform for the protection of data.
Tested configurations
  • Android 12 running on Galaxy A71 5G with Qualcomm Snapdragon 765 with PAA
  • Android 12 running on Galaxy A71 5G with Qualcomm Snapdragon 765 without PAA
  • Android 12 running on Galaxy Tab Active3 with Exynos 9810 with PAA
  • Android 12 running on Galaxy Tab Active3 with Exynos 9810 without PAA
  • Android 12 running on Galaxy XCover6 Pro Qualcomm Snapdragon 778G with PAA
  • Android 12 running on Galaxy XCover6 Pro Qualcomm Snapdragon 778G without PAA (single-user mode)
  • Android 12 running on Galaxy XCoverPro with Exynos 9611 with PAA
  • Android 12 running on Galaxy XCoverPro with Exynos 9611 without PAA
  • Android 12 running on Galaxy Z Flip 4 5G with Snapdragon 8+ Gen 1 Mobile Platform with PAA
  • Android 12 running on Galaxy Z Flip 4 5G with Snapdragon 8+ Gen 1 Mobile Platform without PAA
  • Android 12 running on Samsung Galaxy A52 with Qualcomm Snapdragon 750 with PAA
  • Android 12 running on Samsung Galaxy A52 with Qualcomm Snapdragon 750 without PAA
  • Android 12 running on Samsung Galaxy A53 with Samsung Exynos 1280 with PAA
  • Android 12 running on Samsung Galaxy A53 with Samsung Exynos 1280 without PAA
  • Android 12 running on Samsung Galaxy Note10+ with Samsung Exynos 9825 with PAA
  • Android 12 running on Samsung Galaxy Note10+ with Samsung Exynos 9825 without PAA
  • Android 12 running on Samsung Galaxy S10+ with Qualcomm Snapdragon 855 with PAA
  • Android 12 running on Samsung Galaxy S10+ with Qualcomm Snapdragon 855 without PAA
  • Android 12 running on Samsung Galaxy S10+ with Samsung Exynos 9820 with PAA
  • Android 12 running on Samsung Galaxy S10+ with Samsung Exynos 9820 without PAA
  • Android 12 running on Samsung Galaxy S20+ 5G with Qualcomm Snapdragon 865 with PAA
  • Android 12 running on Samsung Galaxy S20+ 5G with Qualcomm Snapdragon 865 without PAA
  • Android 12 running on Samsung Galaxy S20+ 5G with Samsung Exynos 990 with PAA
  • Android 12 running on Samsung Galaxy S20+ 5G with Samsung Exynos 990 without PAA
  • Android 12 running on Samsung Galaxy S21+ with Qualcomm Snapdragon 888 with PAA
  • Android 12 running on Samsung Galaxy S21+ with Qualcomm Snapdragon 888 without PAA
  • Android 12 running on Samsung Galaxy S21+ with Samsung Exynos 2100 with PAA
  • Android 12 running on Samsung Galaxy S21+ with Samsung Exynos 2100 without PAA
  • Android 12 running on Samsung Galaxy S22 Ultra with Qualcomm Snapdragon 8 Gen 1 Mobile Platforms with PAA
  • Android 12 running on Samsung Galaxy S22 Ultra with Qualcomm Snapdragon 8 Gen 1 Mobile Platforms without PAA
  • Android 12 running on Samsung Galaxy S22 Ultra with Samsung Exynos 2200 with PAA
  • Android 12 running on Samsung Galaxy S22 Ultra with Samsung Exynos 2200 without PAA
Vendor Samsung Electronics Co., Ltd.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-256, DES, Triple-DES, TDEA, HMAC, HMAC-SHA-384, HMAC-SHA-512, HMAC-SHA-256
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-384, SHA-512, SHA-256, MD4, MD5
Schemes
MAC, Key Agreement
Protocols
SSL, TLS, TLS 1.0, TLS v1.2
Randomness
DRBG
Libraries
BoringSSL
Elliptic Curves
P-224, P-256, P-384, P-521, Curve P-256
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM

Trusted Execution Environments
SSC
Vendor
Samsung, Qualcomm

Security level
Level 1

Standards
FIPS 140-2, FIPS 140, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 180-4, FIPS PUB 140-2, SP 800-38A, SP 800-38D, SP 800-38C, SP 800-38F, SP 800-67, SP 800-135, NIST SP 800-133, NIST SP 800-90A, SP 800-90A, NIST SP 800-52, NIST SP 800-38D, NIST SP 800-131A, SP 800-56A, SP 800-131A, SP 800-133, PKCS 1, RFC 5288, RFC 5246

File metadata

Author Ryan Thomas
Creation date D:20221108163516-08'00'
Modification date D:20221108163516-08'00'
Pages 24
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4216,
  "dgst": "b914d613c73fdf07",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "KTS#A2351",
        "KAS#A2351",
        "Triple-DES#A2351",
        "KAS-SSC#A2351",
        "DRBG#A2351",
        "CVL#A2351",
        "RSA#A2351",
        "AES#A2351",
        "HMAC#A2351",
        "SHS#A2351",
        "ECDSA#A2351"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDSA": {
            "ECDSA": 18
          }
        },
        "FF": {
          "DH": {
            "DH": 8,
            "Diffie-Hellman": 6
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 1
        },
        "CFB": {
          "CFB": 4
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 2
        },
        "GCM": {
          "GCM": 5
        },
        "OFB": {
          "OFB": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "BoringSSL": {
          "BoringSSL": 5
        }
      },
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 13,
            "TLS 1.0": 1,
            "TLS v1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 4
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "Curve P-256": 1,
          "P-224": 6,
          "P-256": 9,
          "P-384": 6,
          "P-521": 4
        }
      },
      "eval_facility": {
        "Acumen": {
          "Acumen Security": 1
        }
      },
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES-256": 1,
          "HMAC- SHA-224": 1,
          "HMAC-SHA- 256": 2,
          "HMAC-SHA-1": 4,
          "HMAC-SHA-256": 4,
          "HMAC-SHA-384": 2,
          "HMAC-SHA-512": 4,
          "PKCS 1": 2,
          "SHA- 256": 1,
          "SHA-1": 2,
          "SHA-224": 2,
          "SHA-256": 1,
          "SHA-384": 1,
          "SHA-512": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 2
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 4
          },
          "MD5": {
            "MD5": 5
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 6
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140": 4,
          "FIPS 140-2": 20,
          "FIPS 180-4": 2,
          "FIPS 186-4": 3,
          "FIPS 197": 2,
          "FIPS 198-1": 2,
          "FIPS PUB 140-2": 1
        },
        "NIST": {
          "NIST SP 800-131A": 1,
          "NIST SP 800-133": 1,
          "NIST SP 800-38D": 1,
          "NIST SP 800-52": 1,
          "NIST SP 800-90A": 1,
          "SP 800-131A": 1,
          "SP 800-133": 1,
          "SP 800-135": 2,
          "SP 800-38A": 2,
          "SP 800-38C": 1,
          "SP 800-38D": 2,
          "SP 800-38F": 2,
          "SP 800-56A": 1,
          "SP 800-67": 2,
          "SP 800-90A": 2
        },
        "PKCS": {
          "PKCS 1": 1
        },
        "RFC": {
          "RFC 5246": 2,
          "RFC 5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 17,
            "AES-256": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 2,
            "Triple-DES": 17
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 6,
            "HMAC-SHA-256": 2,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 2
          }
        }
      },
      "tee_name": {
        "IBM": {
          "SSC": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Qualcomm": {
          "Qualcomm": 4
        },
        "Samsung": {
          "Samsung": 8
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Ryan Thomas",
      "/CreationDate": "D:20221108163516-08\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20221108163516-08\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 510014,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://csrc.nist.gov/groups/STM/cmvp/index.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "f5c3838644963fbe3a5c79099f2df07506ea5cd0d0f1c6df93f5f596f63913c9",
    "policy_txt_hash": "b8bafbcbb6f5566ac9561435f4e56197f1f6cf20866f0eecf7997ce372f35826"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. No assurance of the minimum strength of generated keys.",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2022_010622_0641_signed.pdf",
    "date_sunset": "2026-09-21",
    "description": "Provides general purpose cryptographic services to user-space applications on the mobile platform for the protection of data.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Samsung BoringSSL Android",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": "1.6",
    "tested_conf": [
      "Android 12 running on Galaxy A71 5G with Qualcomm Snapdragon 765 with PAA",
      "Android 12 running on Galaxy A71 5G with Qualcomm Snapdragon 765 without PAA",
      "Android 12 running on Galaxy Tab Active3 with Exynos 9810 with PAA",
      "Android 12 running on Galaxy Tab Active3 with Exynos 9810 without PAA",
      "Android 12 running on Galaxy XCover6 Pro Qualcomm Snapdragon 778G with PAA",
      "Android 12 running on Galaxy XCover6 Pro Qualcomm Snapdragon 778G without PAA (single-user mode)",
      "Android 12 running on Galaxy XCoverPro with Exynos 9611 with PAA",
      "Android 12 running on Galaxy XCoverPro with Exynos 9611 without PAA",
      "Android 12 running on Galaxy Z Flip 4 5G with Snapdragon 8+ Gen 1 Mobile Platform with PAA",
      "Android 12 running on Galaxy Z Flip 4 5G with Snapdragon 8+ Gen 1 Mobile Platform without PAA",
      "Android 12 running on Samsung Galaxy A52 with Qualcomm Snapdragon 750 with PAA",
      "Android 12 running on Samsung Galaxy A52 with Qualcomm Snapdragon 750 without PAA",
      "Android 12 running on Samsung Galaxy A53 with Samsung Exynos 1280 with PAA",
      "Android 12 running on Samsung Galaxy A53 with Samsung Exynos 1280 without PAA",
      "Android 12 running on Samsung Galaxy Note10+ with Samsung Exynos 9825 with PAA",
      "Android 12 running on Samsung Galaxy Note10+ with Samsung Exynos 9825 without PAA",
      "Android 12 running on Samsung Galaxy S10+ with Qualcomm Snapdragon 855 with PAA",
      "Android 12 running on Samsung Galaxy S10+ with Qualcomm Snapdragon 855 without PAA",
      "Android 12 running on Samsung Galaxy S10+ with Samsung Exynos 9820 with PAA",
      "Android 12 running on Samsung Galaxy S10+ with Samsung Exynos 9820 without PAA",
      "Android 12 running on Samsung Galaxy S20+ 5G with Qualcomm Snapdragon 865 with PAA",
      "Android 12 running on Samsung Galaxy S20+ 5G with Qualcomm Snapdragon 865 without PAA",
      "Android 12 running on Samsung Galaxy S20+ 5G with Samsung Exynos 990 with PAA",
      "Android 12 running on Samsung Galaxy S20+ 5G with Samsung Exynos 990 without PAA",
      "Android 12 running on Samsung Galaxy S21+ with Qualcomm Snapdragon 888 with PAA",
      "Android 12 running on Samsung Galaxy S21+ with Qualcomm Snapdragon 888 without PAA",
      "Android 12 running on Samsung Galaxy S21+ with Samsung Exynos 2100 with PAA",
      "Android 12 running on Samsung Galaxy S21+ with Samsung Exynos 2100 without PAA",
      "Android 12 running on Samsung Galaxy S22 Ultra with Qualcomm Snapdragon 8 Gen 1 Mobile Platforms with PAA",
      "Android 12 running on Samsung Galaxy S22 Ultra with Qualcomm Snapdragon 8 Gen 1 Mobile Platforms without PAA",
      "Android 12 running on Samsung Galaxy S22 Ultra with Samsung Exynos 2200 with PAA",
      "Android 12 running on Samsung Galaxy S22 Ultra with Samsung Exynos 2200 without PAA"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2022-05-09",
        "lab": "Acumen Security",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2022-11-18",
        "lab": "Acumen Security",
        "validation_type": "Update"
      }
    ],
    "vendor": "Samsung Electronics Co., Ltd.",
    "vendor_url": "http://www.samsung.com"
  }
}