This page was not yet optimized for use on mobile
devices.
Honeywell Mobility Edge™ BoringCrypto
Certificate #3828
Webpage information
Security policy
Symmetric Algorithms
AES, AES-256, DES, Triple-DES, TDEA, HMAC, HMAC-SHA-384, HMAC-SHA-512, HMAC-SHA-256Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-384, SHA-512, SHA-256, MD4, MD5Schemes
MAC, Key AgreementProtocols
SSL, TLS, TLS 1.0Randomness
DRBGLibraries
BoringSSLElliptic Curves
P-224, P-256, P-384, P-521Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCMVendor
QualcommSecurity level
Level 1Standards
FIPS 140-2, FIPS 140, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 180-4, FIPS PUB 140-2, SP 800-38A, SP 800-38D, SP 800-38F, SP 800-67, SP 800-135, NIST SP 800-133, NIST SP 800-90A, SP 800-90A, NIST SP 800-38D, NIST SP 800-131A, SP 800-56A, SP 800-131A, SP 800-133, RFC 5288, RFC 5246File metadata
| Author | Ryan Thomas |
|---|---|
| Creation date | D:20210125192735-08'00' |
| Modification date | D:20210125192735-08'00' |
| Pages | 26 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3828,
"dgst": "ba6d3b2e12a6de24",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"Triple-DES#C1774",
"ECDSA#C1774",
"HMAC#C1774",
"CVL#C1774",
"AES#C1774",
"RSA#C1774",
"SHS#C1774",
"DRBG#C1774",
"KTS#C1774"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDSA": {
"ECDSA": 18
}
},
"FF": {
"DH": {
"DH": 7,
"Diffie-Hellman": 3
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CFB": {
"CFB": 4
},
"CTR": {
"CTR": 2
},
"ECB": {
"ECB": 2
},
"GCM": {
"GCM": 3
},
"OFB": {
"OFB": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"BoringSSL": {
"BoringSSL": 4
}
},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 10,
"TLS 1.0": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 4
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-224": 4,
"P-256": 6,
"P-384": 4,
"P-521": 2
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES-256": 1,
"HMAC- SHA-224": 1,
"HMAC-SHA- 256": 2,
"HMAC-SHA-1": 4,
"HMAC-SHA-256": 4,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 4,
"SHA- 256": 1,
"SHA-1": 2,
"SHA-224": 2,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 2,
"SHA2-224": 1,
"SHA2-256": 1,
"SHA2-384": 1,
"SHA2-512": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 2
}
},
"hash_function": {
"MD": {
"MD4": {
"MD4": 4
},
"MD5": {
"MD5": 5
}
},
"SHA": {
"SHA1": {
"SHA-1": 2
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 8
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140": 4,
"FIPS 140-2": 20,
"FIPS 180-4": 2,
"FIPS 186-4": 3,
"FIPS 197": 2,
"FIPS 198-1": 2,
"FIPS PUB 140-2": 1
},
"NIST": {
"NIST SP 800-131A": 1,
"NIST SP 800-133": 1,
"NIST SP 800-38D": 1,
"NIST SP 800-90A": 1,
"SP 800-131A": 1,
"SP 800-133": 1,
"SP 800-135": 2,
"SP 800-38A": 2,
"SP 800-38D": 2,
"SP 800-38F": 2,
"SP 800-56A": 1,
"SP 800-67": 2,
"SP 800-90A": 2
},
"RFC": {
"RFC 5246": 2,
"RFC 5288": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 16,
"AES-256": 1
}
},
"DES": {
"3DES": {
"TDEA": 2,
"Triple-DES": 17
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"HMAC": 6,
"HMAC-SHA-256": 2,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 2
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Qualcomm": {
"Qualcomm": 6
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Ryan Thomas",
"/CreationDate": "D:20210125192735-08\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20210125192735-08\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 556979,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://golang.org/dl/",
"https://csrc.nist.gov/groups/STM/cmvp/index.html",
"https://github.com/ninja-build/ninja/releases"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 26
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "f41ef4dce909177ccdc19a5a688d85e969cc0b81c951f62db119af2f59404ba9",
"policy_txt_hash": "fc1892f46c0e9f9e50f845f1c7165b36187d9511eb8a2c12bef906fe2a342179"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When installed, initialized and configured as specified in Section 12.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/February 2021_010321_1145_signed.pdf",
"date_sunset": null,
"description": "Honeywell Mobility Edge\u2122 Boring SSL cryptographic module is a library that provides FIPS 140-2 approved cryptographic algorithms for the BoringSSL and other user-space Android applications which require cryptographic functionality. The physical cryptographic boundary is Honeywell Android mobile computer on which this module is installed.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": null,
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Honeywell Mobility Edge\u2122 BoringCrypto",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "2.0",
"tested_conf": [
"Android 9 running on Honeywell Mobility Edge CN80 with Qualcomm \u00ae 660 32-bit with PAA",
"Android 9 running on Honeywell Mobility Edge CN80 with Qualcomm \u00ae 660 32-bit without PAA (single-user mode)",
"Android 9 running on Honeywell Mobility Edge CN80 with Qualcomm \u00ae 660 64-bit with PAA",
"Android 9 running on Honeywell Mobility Edge CN80 with Qualcomm \u00ae 660 64-bit without PAA"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2021-02-25",
"lab": "Acumen Security",
"validation_type": "Initial"
}
],
"vendor": "Honeywell International Inc.",
"vendor_url": "http://www.honeywellaidc.com"
}
}