cert_id |
2566 |
2611 |
dgst |
00c08d89fea39498 |
cc41d80b1697c04d |
heuristics/algorithms |
RSA#1622, SHS#2637, Triple-DES#1818, DSA#914, AES#3192, ECDSA#583, DRBG#668, HMAC#2011 |
RSA#1622, SHS#2637, Triple-DES#1818, DSA#914, AES#3192, ECDSA#583, DRBG#668, HMAC#2011 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES-128: 1
- AES128, 192: 1
- AES2: 1
- Certificate AES: 1
- DRBG2: 1
- DSA 1024: 1
- DSA 2048: 1
- DSA2: 1
- HMAC SHA-256: 1
- HMAC SHA-512: 1
- HMAC SHA1: 1
- HMAC-SHA-512: 2
- HMAC-SHA512: 2
- PKCS1: 2
- PKCS12: 2
- RSA 1024: 1
- RSA 2048: 1
- RSA2: 1
- SHA-1: 8
- SHA-224: 7
- SHA-256: 7
- SHA-32: 1
- SHA-384: 2
- SHA-512: 15
- SHA-512 1622: 1
- SHA-512 2011: 1
- SHA-512 2637: 1
- SHA-512 914: 1
- SHA1: 1
- SHS6: 1
|
- Certlike:
- AES-128: 1
- AES128, 192: 1
- AES2: 1
- Certificate AES: 1
- DRBG2: 1
- DSA 1024: 1
- DSA 2048: 1
- DSA2: 1
- HMAC SHA-256: 1
- HMAC SHA-512: 1
- HMAC SHA1: 1
- HMAC-SHA-512: 2
- HMAC-SHA512: 2
- PKCS1: 2
- PKCS12: 2
- RSA 1024: 1
- RSA 2048: 1
- RSA2: 1
- SHA-1: 8
- SHA-224: 7
- SHA-256: 7
- SHA-32: 1
- SHA-384: 2
- SHA-512: 15
- SHA-512 1622: 1
- SHA-512 2011: 1
- SHA-512 2637: 1
- SHA-512 914: 1
- SHA1: 1
- SHS6: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 7
- AES-128: 1
- AES128: 1
- CAST:
- RC:
- Rijndael:
- Serpent:
- Twofish:
- DES:
- LWC_competition:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 13
- HMAC-SHA-512: 1
- djb:
- miscellaneous:
- Blowfish:
- Camellia:
- IDEA:
- SEED:
|
- AES_competition:
- AES:
- AES: 7
- AES-128: 1
- AES128: 1
- CAST:
- RC:
- Rijndael:
- Serpent:
- Twofish:
- DES:
- LWC_competition:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 13
- HMAC-SHA-512: 1
- djb:
- miscellaneous:
- Blowfish:
- Camellia:
- IDEA:
- SEED:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 7
- SHA-256: 7
- SHA-384: 2
- SHA-512: 19
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 7
- SHA-256: 7
- SHA-384: 2
- SHA-512: 19
|
pdf_data/keywords/crypto_scheme |
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140: 3
- FIPS 140-2: 17
- FIPS 186-2: 2
- FIPS 186-4: 3
- NIST:
- PKCS:
- RFC:
|
- FIPS:
- FIPS 140: 3
- FIPS 140-2: 17
- FIPS 186-2: 2
- FIPS 186-4: 3
- NIST:
- PKCS:
- RFC:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
- com:
- com.safelogic.cryptocomply.jce.provider: 1
|
- com:
- com.safelogic.cryptocomply.jce.provider: 1
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /AAPL:Keywords: []
- /CreationDate: D:20151211224232Z00'00'
- /Creator: Word
- /Keywords:
- /ModDate: D:20151211224232Z00'00'
- /Producer: Mac OS X 10.11.1 Quartz PDFContext
- /Title: Microsoft Word - Skyhigh Java FIPS 140 SP v1-0.doc
- pdf_file_size_bytes: 516111
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys. |
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys. |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertFeb2016.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertApril2016.pdf |
web_data/date_sunset |
|
|
web_data/description |
The Java Crypto Module provides cryptographic functions for Skyhigh Networks cloud visibility and enablement products. |
The Java Crypto Module provides cryptographic functions for SilentOS from Silent Circle. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A, Mitigation of Other Attacks: N/A |
Physical Security: N/A, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
Moved to historical list due to sunsetting |
Moved to historical list due to sunsetting |
web_data/hw_versions |
N, /, A, ;, , F, i, r, m, w, a, r, e, , V, e, r, s, i, o, n, :, , N, /, A |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Java Crypto Module |
Java Crypto Module |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
1.0 |
1.0 |
web_data/tested_conf |
Windows Server 2012 with Java Runtime Environment (JRE) v1.7.0_17 running on OEM PowerEdge R420 (single-user mode) |
Windows Server 2012 with Java Runtime Environment (JRE) v1.7.0_17 running on OEM PowerEdge R420 (single-user mode) |
web_data/validation_history |
- date: 18.02.2016
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
|
- date: 07.04.2016
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
|
web_data/vendor |
Skyhigh Networks |
Silent Circle |
web_data/vendor_url |
http://www.skyhighnetworks.com |
http://www.silentcircle.com |