cert_id |
4566 |
3454 |
dgst |
0454a8d72f0fda82 |
819460fd9350632f |
heuristics/algorithms |
DRBG#2195, AES#5540, RSA#2973, CVL#1980, SHS#4446, ECDSA#1491, HMAC#3691, DSA#1422 |
DRBG#2195, AES#5540, RSA#2973, CVL#1980, SHS#4446, ECDSA#1491, HMAC#3691, DSA#1422 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES [197: 1
- AES-128: 1
- AES-192: 1
- AES-256: 1
- DSA [186: 1
- HMAC SHA-1: 1
- HMAC [198: 1
- PKCS #1: 2
- PKCS#1: 2
- SHA(1: 24
- SHA(224: 19
- SHA(256: 6
- SHA-1: 5
- SHA-224: 3
- SHA-256: 5
- SHA-384: 4
- SHA-512: 5
- SHA1: 13
- SHA1, 224: 3
- SHS [180: 1
|
- Certlike:
- AES [197: 1
- DSA [186: 1
- HMAC [198: 1
- PKCS #1: 2
- PKCS#1: 2
- SHA(1: 24
- SHA(224: 19
- SHA(256: 6
- SHA1: 13
- SHA1, 224: 3
- SHS [180: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 7
- AES-128: 1
- AES-192: 1
- AES-256: 1
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 4
- SHA-384: 5
- SHA-512: 4
|
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
pdf_data/keywords/ecc_curve |
- NIST:
- B-163: 1
- B-233: 4
- B-283: 4
- B-409: 5
- B-571: 5
- K-163: 1
- K-233: 6
- K-283: 4
- K-409: 5
- K-571: 5
- P-192: 4
- P-224: 14
- P-256: 10
- P-384: 10
- P-521: 10
|
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 8
- FIPS 186-2: 4
- FIPS 186-4: 1
- FIPS 197: 1
- FIPS PUB 140-2: 1
- FIPS140-2: 1
- NIST:
- SP 800-38A: 1
- SP 800-38B: 2
- SP 800-38C: 1
- SP 800-38D: 2
- SP 800-38E: 1
- SP 800-90: 1
- SP 800-90A: 1
- PKCS:
|
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: Peter Kim
- /Company: Microsoft
- /CreationDate: D:20220629080623-07'00'
- /Creator: Acrobat PDFMaker 22 for Word
- /ModDate: D:20220629080637-07'00'
- /Producer: Adobe PDF Library 22.1.174
- /SourceModified: D:20220629150519
- /Subject: FIPS 140-2 Security Policy Template
- pdf_file_size_bytes: 350619
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /Author: lgarcia
- /CreationDate: D:20190501085441-07'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20190501085441-07'00'
- /Producer: Acrobat Distiller 17.0 (Windows)
- /Title: Microsoft Word - 1m - Juniper Networks CryptoCore Security Policy V1.3.docx
- pdf_file_size_bytes: 231385
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode. No assurance of the minimum strength of generated keys |
When operated in FIPS mode. No assurance of the minimum strength of generated keys |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/August 2023_010923_0844.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/MayConsolidatedCert.pdf |
web_data/date_sunset |
|
|
web_data/description |
The cryptographic module provides FIPS 140-2 compliant cryptographic functionality for Juniper Networks security products such as JATP. |
The cryptographic module provides FIPS 140-2 compliant cryptographic functionality for Juniper Networks security products such as JATP. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A, Mitigation of Other Attacks: N/A |
Physical Security: N/A, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
Moved to historical list due to sunsetting |
SP 800-56Arev3 transition - replaced by certificate #4566 |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Juniper CryptoCore Cryptographic Module |
Juniper CryptoCore Cryptographic Module |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
1.0 |
1.0 |
web_data/tested_conf |
Ubuntu Linux 14.04 on VMware ESXi 6.0 running on Dell PowerEdge R320 with Intel Xeon E5 (single-user mode), Ubuntu Linux 14.04 running on Apple Mac mini with Intel Core i5, Ubuntu Linux 14.04 running on Juniper JATP700 with Intel Xeon E5 |
Ubuntu Linux 14.04 on VMware ESXi 6.0 running on Dell PowerEdge R320 with Intel Xeon E5 (single-user mode), Ubuntu Linux 14.04 running on Apple Mac mini with Intel Core i5, Ubuntu Linux 14.04 running on Juniper JATP700 with Intel Xeon E5 |
web_data/validation_history |
- date: 30.08.2023
- lab: UL VERIFICATION SERVICES INC
- validation_type: Initial
|
- date: 07.05.2019
- lab: UL VERIFICATION SERVICES INC
- validation_type: Initial
|
web_data/vendor |
Juniper Networks, Inc. |
Juniper Networks, Inc. |
web_data/vendor_url |
http://www.juniper.net/ |
http://www.juniper.net/ |