This page was not yet optimized for use on mobile
devices.
Cisco FIPS Object Module
Certificate #4036
Webpage information
Security policy
Symmetric Algorithms
AES, AES-, DES, Triple-DES, HMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-384, SHA-512, SHA-256, SHA256, SHA3-256, SHA-3, SHA3-384, SHA3-512, SHA3-224Schemes
MAC, Key exchange, Key Exchange, Key agreementProtocols
SSH, SSHv2, TLS, IKEv2, IKERandomness
DRBG, RNGLibraries
OpenSSLElliptic Curves
P-224, P-256, P-384, P-521, K-233, K-283, K-409, K-571, B-233, B-283, B-409, B-571Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XEX, XTSVendor
Microsoft, Cisco Systems, Inc, Cisco, Cisco SystemsSecurity level
Level 1, level 1Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 186-4, NIST SP 800-38F, NIST SP 800-90A, SP 800-90A, SP 800-38D, NIST SP 800-133, RFC 5246, RFC 4253, RFC 5288File metadata
| Title | CISCO FIPS Object Module Security Policy |
|---|---|
| Subject | FIPS 140-2 Security Policy |
| Author | Kelvin Desplanque (kdesplan) |
| Creation date | D:20210915173526-04'00' |
| Modification date | D:20210915173526-04'00' |
| Pages | 26 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4036,
"dgst": "bfeb4fe71a02b5c0",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"CVL#A1420",
"KBKDF#A1420",
"RSA#A1420",
"AES#A1420",
"SHS#A1420",
"Triple-DES#A1420",
"KAS-SSC#A1420",
"ECDSA#A1420",
"DRBG#A1420",
"DSA#A1420",
"HMAC#A1420",
"SHA-3#A1420"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"7.2"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 5
}
},
"FF": {
"DH": {
"DH": 3,
"Diffie-Hellman": 5
},
"DSA": {
"DSA": 5
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"CCM": {
"CCM": 3
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 5
},
"ECB": {
"ECB": 4
},
"GCM": {
"GCM": 6
},
"OFB": {
"OFB": 5
},
"XEX": {
"XEX": 1
},
"XTS": {
"XTS": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"IKE": {
"IKE": 1,
"IKEv2": 8
},
"SSH": {
"SSH": 6,
"SSHv2": 2
},
"TLS": {
"TLS": {
"TLS": 10
}
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 2
},
"KEX": {
"Key Exchange": 1,
"Key exchange": 1
},
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"B-233": 2,
"B-283": 2,
"B-409": 2,
"B-571": 2,
"K-233": 2,
"K-283": 2,
"K-409": 2,
"K-571": 2,
"P-224": 10,
"P-256": 12,
"P-384": 10,
"P-521": 2
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 1,
"#3": 1,
"Certificate 1": 1,
"Certificate 6": 1
}
},
"fips_certlike": {
"Certlike": {
"AES 128/192/256": 1,
"DRBG 6": 1,
"HMAC-SHA-1": 10,
"HMAC-SHA1": 8,
"HMAC-SHA224": 2,
"HMAC-SHA256": 2,
"HMAC-SHA384": 2,
"HMAC-SHA512": 2,
"SHA-1": 2,
"SHA-256": 1,
"SHA-3": 1,
"SHA-3 (256": 1,
"SHA-384": 1,
"SHA-512": 1,
"SHA2- 384": 1,
"SHA2-224": 4,
"SHA2-256": 3,
"SHA2-384": 2,
"SHA2-512": 2,
"SHA2-512 2": 1,
"SHA256": 1,
"SHA3-224": 2,
"SHA3-256": 4,
"SHA3-384": 3,
"SHA3-512": 3
}
},
"fips_security_level": {
"Level": {
"Level 1": 3,
"level 1": 3
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
},
"SHA2": {
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1,
"SHA256": 1
},
"SHA3": {
"SHA-3": 2,
"SHA3-224": 2,
"SHA3-256": 4,
"SHA3-384": 3,
"SHA3-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 14
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 23,
"FIPS 186-4": 6,
"FIPS PUB 140-2": 1
},
"NIST": {
"NIST SP 800-133": 1,
"NIST SP 800-38F": 1,
"NIST SP 800-90A": 1,
"SP 800-38D": 1,
"SP 800-90A": 6
},
"RFC": {
"RFC 4253": 1,
"RFC 5246": 2,
"RFC 5288": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 15,
"AES-": 3
}
},
"DES": {
"3DES": {
"Triple-DES": 12
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 6,
"HMAC": 6
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 32,
"Cisco Systems": 2,
"Cisco Systems, Inc": 26
},
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Kelvin Desplanque (kdesplan)",
"/CreationDate": "D:20210915173526-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20210915173526-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"/Subject": "FIPS 140-2 Security Policy",
"/Title": "CISCO FIPS Object Module Security Policy",
"pdf_file_size_bytes": 652158,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://csrc.nist.gov/groups/STM/cmvp/validation.html",
"http://www.cisco.com/",
"http://csrc.nist.gov/groups/STM/index.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 26
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "ae551584199b873c51dabb78a7f4a935194a48a65f3374e03259dc9de6e81347",
"policy_txt_hash": "64569c4d139d4dc4b32922554e0e93c5e96ff46b8bcc2f39c01fcb9fa23a17d5"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When installed, initialized and configured as specified in the Security Policy Section 3 and operated in FIPS mode. No assurance of the minimum strength of generated keys",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2021_011021_0714_Signed2.pdf",
"date_sunset": null,
"description": "The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco\u0027s networking and collaboration products. The module provides FIPS 140 validated cryptographic algorithms for services such as IPSEC, SRTP, SSH, TLS, 802.1x, etc. The module does not directly implement any of these protocols, instead it provides the cryptographic primitives and functions to allow a developer to implement the various protocols.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Design Assurance: Level 3",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": "7.2a",
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Cisco FIPS Object Module",
"module_type": "Firmware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": [
"Cisco ASA 5555 with Linux 4.1 with Intel Xeon X3460 without PAA",
"Cisco Catalyst 9200 with Linux 4.4 with ARM 8 Cortex-A53 AArch64 without PAA",
"Cisco Catalyst 9300 with Linux 4.4 with Intel Xeon D-1526 with PAA",
"Cisco Firepower 9300 with Linux 4.1 with Intel Xeon E5-2658 with PAA",
"Cisco ISR 4321 with Linux 5.4 with Intel Atom C2558 with PAA",
"Cisco ISR 4451 with Linux 5.4 with Intel Xeon E3-1105C with PAA",
"Cisco UCS M5 with Linux 4.18 with Intel Xeon Gold 6128 with PAA",
"Evaluation board with Linux 2.6 with Cavium Octeon CN5230 without PAA"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2021-09-23",
"lab": "Acumen Security",
"validation_type": "Initial"
}
],
"vendor": "Cisco Systems, Inc.",
"vendor_url": "http://www.cisco.com"
}
}