cert_id |
2212 |
2851 |
dgst |
05c8bd5d4dcdb18b |
d0541665ae524cf1 |
heuristics/algorithms |
HMAC#1610, AES#2603, ECDSA#448, CVL#259, CVL#98, SHS#2187 |
SHS#2761, HMAC#2119, KBKDF#116, AES#4312, ECDSA#657, KTS#3328, AES#3328, KAS#55, CVL#484 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
1335, 1669 |
2357, 1578 |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
1321, 1335, 1669, 1333 |
2352, 2356, 2357, 1578, 2351, 2355 |
heuristics/module_prunned_references |
1335, 1669 |
2357, 1578 |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
1335, 998, 132, 133, 1669 |
2357, 523, 1578 |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
1321, 1333, 1335, 998, 132, 133, 1669 |
2352, 1494, 1609, 2356, 2357, 523, 1578, 2355, 2351 |
heuristics/policy_prunned_references |
1335, 998, 132, 133, 1669 |
2357, 523, 1578 |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
- Cert:
- #132: 1
- #133: 1
- #1335: 1
- #1610: 1
- #1669: 1
- #2187: 1
- #23: 1
- #259: 1
- #2603: 3
- #27: 1
- #448: 1
- #98: 1
- #998: 1
|
- Cert:
- #116: 2
- #1578: 2
- #2119: 1
- #2357: 1
- #2761: 1
- #3328: 6
- #4312: 3
- #484: 1
- #523: 1
- #55: 1
- #657: 1
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES-128: 1
- AES-192: 1
- AES-256: 1
- HMAC 2400: 2
- HMAC- 160: 2
- HMAC- SHA-1, 256: 1
- HMAC-160: 2
- HMAC-SHA-1, 224: 2
- SHA 2300: 1
- SHA-1: 2
- SHA-1, 224: 1
- SHA-1, 256: 1
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
- Certlike:
- AES-128: 5
- AES-192: 5
- Certificate AES: 1
- Certificate SHA: 1
- HMAC 2400: 2
- HMAC- 512: 2
- HMAC-512: 2
- HMAC-SHA- 224: 6
- HMAC-SHA- 384: 6
- HMAC-SHA-1: 20
- HMAC-SHA-224: 14
- HMAC-SHA-256: 2
- HMAC-SHA-384: 12
- HMAC-SHA-512: 2
- SHA 2300: 1
- SHA- 224: 1
- SHA-1: 20
- SHA-160: 23
- SHA-224: 25
- SHA-256: 13
- SHA-384: 26
- SHA-512: 15
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 5
- AES-128: 1
- AES-192: 1
- AES-256: 1
- constructions:
|
- AES_competition:
- AES:
- AES: 41
- AES-: 1
- AES-128: 5
- AES-192: 5
- constructions:
- MAC:
- CMAC: 10
- HMAC: 38
- HMAC-SHA-224: 7
- HMAC-SHA-256: 1
- HMAC-SHA-384: 6
- HMAC-SHA-512: 1
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-160: 23
- SHA-224: 25
- SHA-256: 13
- SHA-384: 26
- SHA-512: 15
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
- CBC:
- CTR:
- ECB:
- GCM:
- XEX:
- XTS:
|
pdf_data/keywords/ecc_curve |
- NIST:
- P-192: 4
- P-224: 6
- P-256: 4
- P-384: 4
- P-521: 4
|
- NIST:
- P-192: 10
- P-224: 36
- P-256: 36
- P-384: 32
- P-521: 36
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 23
- FIPS 186-3: 1
- NIST:
- NIST SP 800-131A: 3
- NIST SP 800-38D: 2
- NIST SP 800-38E: 2
- NIST SP 800-56A: 4
- SP 800-56A: 1
|
- FIPS:
- FIPS 140-2: 65
- FIPS 180-4: 2
- FIPS 186-4: 3
- FIPS 197: 1
- FIPS 198-1: 1
- NIST:
- NIST SP 800-108: 2
- NIST SP 800-118: 1
- NIST SP 800-131A: 2
- NIST SP 800-132: 5
- NIST SP 800-38B: 1
- NIST SP 800-38D: 1
- NIST SP 800-56A: 3
- SP 800-108: 1
- RFC:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: Cyber Security Division
- /Category:
- /Comments:
- /Company: KEYW Corporation
- /ContentTypeId: 0x010100299012E7A2FB964E8FCC7D75DF234340
- /CreationDate: D:20140723101743-04'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Keywords:
- /Manager:
- /ModDate: D:20140723101758-04'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20140721210154
- /Subject: FIPS 140-2 Security Policy
- /Title: Suite B Cryptographic Module
- pdf_file_size_bytes: 575175
- pdf_hyperlinks: http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf, http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, http://csrc.nist.gov/groups/STM/cavp/documents/aes/XTSVS.pdf, http://csrc.nist.gov/groups/STM/cavp/documents/mac/gcmvs.pdf, http://csrc.nist.gov/groups/STM/cavp/documents/mac/HMACVS.pdf, http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf, http://csrc.nist.gov/groups/STM/cavp/documents/keymgmt/KASVS.pdf, http://csrc.nist.gov/publications/nistpubs/800-131A/sp800-131A.pdf, http://csrc.nist.gov/groups/STM/cavp/documents/shs/SHAVS.pdf, http://csrc.nist.gov/publications/drafts/800-56a/draft-sp-800-56a.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf, http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf, http://csrc.nist.gov/groups/STM/cavp/documents/dss2/ecdsa2vs.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
- /AAPL:Keywords: []
- /CreationDate: D:20170209154410Z00'00'
- /Creator: Word
- /Keywords:
- /ModDate: D:20170209154410Z00'00'
- /Producer: Mac OS X 10.12.3 Quartz PDFContext
- /Title: Microsoft Word - Suite_B_Cryptographic_Module_FIPS_140-2_Non-Proprietary_Security_Policy.docx
- pdf_file_size_bytes: 926157
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode with module Microsoft Windows Server 2008 R2 Kernel Mode Cryptographic Primitives Library (cng.sys) validated to FIPS 140-2 under Cert. #1335 operating in FIPS mode or BlackBerry Cryptographic Kernel validated to FIPS 140-2 under Cert. #1669 operating in FIPS mode |
When operated in FIPS mode with module Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) in Microsoft Windows 8.1 Enterprise, Windows Server 2012 R2, Windows Storage Server 2012 R2, Surface Pro 3, Surface Pro 2, Surface Pro, Surface 2, Surface, Windows RT 8.1, Windows Phone 8.1, Windows Embedded 8.1 Industry Enterprise, StorSimple 8000 Series validated to FIPS 140-2 under Cert. #2357 operating in FIPS mode or BlackBerry OS Cryptographic Library validated to FIPS 140-2 under Cert. #1578 operating in FIPS mode |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0043.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertFeb2017.pdf |
web_data/date_sunset |
|
|
web_data/description |
KEYW, in coordination with the United States Special Operations Command (USSOCOM), has developed a Suite B-compliant, standards based, AES/GCM-256 layer of encrypted communications between a BlackBerry Enterprise Server (BES) and a BlackBerry Mobile Set (MS) with Elliptic Curve (EC) key exchange used to negotiate symmetric keys. |
KEYW, in coordination with the United States Special Operations Command (USSOCOM), has developed a Suite B-compliant, standards based, AES/GCM-256 layer of encrypted communications between a BlackBerry Enterprise Server (BES) and a BlackBerry Mobile Set (MS) with Elliptic Curve (EC) key exchange used to negotiate symmetric keys. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A, Mitigation of Other Attacks: N/A |
Physical Security: N/A, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
Moved to historical list due to sunsetting |
Moved to historical list due to dependency on certificate #2357 |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Suite B Cryptographic Module |
Suite B Cryptographic Module |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
2.3.1 |
v3.0.0.0 |
web_data/tested_conf |
Intel Xeon E5530 w/Microsoft Windows Server 2008, Qualcomm Snapdragon S2 MSM8655 w/BlackBerry OS Version 7.0.0 (single-user mode), None |
BlackBerry OS 10.3 running on Qualcomm Snapdragon 801, BlackBerry OS 10.3 running on Qualcomm Snapdragon S4, Microsoft Windows Server 2012 R2 (64-bit) running on Intel Xeon E5530 (single-user mode) |
web_data/validation_history |
- date: 23.07.2014
- lab: COACT INC CAFE LAB
- validation_type: Initial
|
- date: 27.02.2017
- lab: COACT INC CAFE LAB
- validation_type: Initial
|
web_data/vendor |
United States Special Operations Command (USSOCOM) |
United States Special Operations Command (USSOCOM) |
web_data/vendor_url |
http://www.socom.mil |
http://www.socom.mil |