cert_id |
3378 |
3453 |
dgst |
1877fbda982a46b7 |
8a10191e65ccf722 |
heuristics/algorithms |
ECDSA#1447, KAS#1887, HMAC#3601, CVL#1886, CVL#1884, CVL#1885, HMAC#3600, RSA#2919, AES#5443, CVL#1888, AES#5444, DRBG#2126, RSA#2918, CVL#1889, CVL#1887, SHS#4362, ECDSA#1448 |
ECDSA#1447, KAS#1887, HMAC#3601, CVL#1886, CVL#1884, CVL#1885, HMAC#3600, RSA#2919, AES#5443, CVL#1888, AES#5444, DRBG#2126, RSA#2918, CVL#1889, CVL#1887, SHS#4362, ECDSA#1448 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
- Cert:
- #1: 3
- #1447: 1
- #1448: 9
- #1885: 1
- #1887: 1
- #1888: 3
- #1889: 1
- #2919: 12
- #3601: 8
- #4362: 1
- #5443: 1
- #5444: 11
|
- Cert:
- #1: 3
- #1447: 1
- #1448: 9
- #1885: 1
- #1887: 1
- #1888: 3
- #1889: 1
- #2919: 12
- #3601: 8
- #4362: 1
- #5443: 1
- #5444: 11
|
pdf_data/keywords/fips_security_level |
- Level:
- Level 1: 2
- Level 2: 1
- Level 3: 1
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES-128: 7
- AES-256: 5
- HMAC-SHA-1: 6
- HMAC-SHA-256: 8
- HMAC-SHA-384: 6
- HMAC-SHA-512: 6
- PKCS #1: 4
- PKCS 1: 2
- PKCS1: 9
- RSA PKCS1: 1
- SHA-1: 1
- SHA-17: 1
- SHA-256: 5
- SHA-384: 2
- SHA-512: 2
|
- Certlike:
- AES-128: 7
- AES-256: 5
- HMAC-SHA-1: 6
- HMAC-SHA-256: 8
- HMAC-SHA-384: 6
- HMAC-SHA-512: 6
- PKCS #1: 4
- PKCS 1: 2
- PKCS1: 9
- RSA PKCS1: 1
- SHA-1: 1
- SHA-16: 1
- SHA-256: 7
- SHA-384: 2
- SHA-512: 2
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 52
- AES-128: 5
- AES-256: 5
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- CMAC: 3
- HMAC: 19
- HMAC-SHA-256: 4
- HMAC-SHA-384: 3
- HMAC-SHA-512: 3
|
- AES_competition:
- AES:
- AES: 52
- AES-128: 5
- AES-256: 5
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- CMAC: 3
- HMAC: 19
- HMAC-SHA-256: 4
- HMAC-SHA-384: 3
- HMAC-SHA-512: 3
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 5
- SHA-384: 2
- SHA-512: 2
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 7
- SHA-384: 2
- SHA-512: 2
|
pdf_data/keywords/crypto_scheme |
- KA:
- Key Agreement: 4
- Key agreement: 1
- MAC:
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- SIV:
- XTS:
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- SIV:
- XTS:
|
pdf_data/keywords/ecc_curve |
- NIST:
- P-224: 2
- P-256: 26
- P-384: 22
- P-521: 22
|
- NIST:
- P-224: 2
- P-256: 26
- P-384: 22
- P-521: 22
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 23
- FIPS 180-4: 1
- FIPS 186-4: 10
- FIPS 197: 4
- FIPS 198-1: 2
- NIST:
- NIST SP 800-38F: 1
- SP 800-133: 1
- SP 800-135: 1
- SP 800-38A: 2
- SP 800-38C: 1
- SP 800-38D: 1
- SP 800-38E: 1
- SP 800-38F: 3
- SP 800-56A: 1
- SP 800-56B: 1
- SP 800-90: 1
- PKCS:
- PKCS #1: 2
- PKCS 1: 1
- PKCS1: 5
|
- FIPS:
- FIPS 140-2: 24
- FIPS 180-4: 1
- FIPS 186-4: 10
- FIPS 197: 4
- FIPS 198-1: 2
- NIST:
- NIST SP 800-38F: 1
- SP 800-133: 1
- SP 800-135: 1
- SP 800-38A: 2
- SP 800-38C: 1
- SP 800-38D: 1
- SP 800-38E: 1
- SP 800-38F: 3
- SP 800-56A: 1
- SP 800-56B: 1
- SP 800-90: 1
- PKCS:
- PKCS #1: 2
- PKCS 1: 1
- PKCS1: 5
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: Dyadic Security
- /Company: Dyadic Security
- /ContentTypeId: 0x0101007E6DBAE75CE87C49839EDCA6F117BECD
- /CreationDate: D:20200424084415-07'00'
- /Creator: Acrobat PDFMaker 17 for Word
- /ModDate: D:20200424084444-07'00'
- /Producer: Adobe PDF Library 15.0
- /SourceModified: D:20200424151206
- pdf_file_size_bytes: 682536
- pdf_hyperlinks: http://www.rycombe.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
- /Author: Dyadic Security
- /Company: Dyadic Security
- /ContentTypeId: 0x0101007E6DBAE75CE87C49839EDCA6F117BECD
- /CreationDate: D:20200424082959-07'00'
- /Creator: Acrobat PDFMaker 17 for Word
- /ModDate: D:20200424083026-07'00'
- /Producer: Adobe PDF Library 15.0
- /SourceModified: D:20200424150918
- /Title:
- pdf_file_size_bytes: 695117
- pdf_hyperlinks: https://www.niap-ccevs.org/Product/CompliantCC.cfm?CCID=2019.1018, http://www.rycombe.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode with two additional Unbound Tech EKM Cryptographic Modules with each EKM Cryptographic Module running in Entry mode, Pair mode, and Auxiliary mode as specified in Section 3.1 of the Security Policy |
When operated in FIPS mode with two additional Unbound Tech EKM Cryptographic Modules with each EKM Cryptographic Module running in Entry mode, Pair mode, and Auxiliary mode as specified in Section 3.1 of the Security Policy |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FebConsolidated.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/MayConsolidatedCert.pdf |
web_data/date_sunset |
|
|
web_data/description |
Unbound's Enterprise Key Management (EKM) lets you manage and control keys working with any application. This pure-software solution is easy to deploy and maintain, while giving you unmatched levels of security and control for your crypto keys in the cloud. Based on Unbound vHSM technology, the keys are guaranteed to never appear in the clear, not even when generated or while at use - ensuring your most sensitive keys are kept private at all times. |
Unbound's Enterprise Key Management (EKM) lets you manage and control keys working with any application. This pure-software solution is easy to deploy and maintain, while giving you unmatched levels of security and control for your crypto keys in the cloud. Based on Unbound vHSM technology, the keys are guaranteed to never appear in the clear, not even when generated or while at use - ensuring your most sensitive keys are kept private at all times. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Roles, Services, and Authentication: Level 2, Physical Security: N/A, Design Assurance: Level 3 |
Physical Security: N/A, Design Assurance: Level 3, |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
SP 800-56Arev3 transition |
SP 800-56Arev3 transition |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
2 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Unbound Tech EKM Cryptographic Module |
Unbound Tech EKM Cryptographic Module |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
2.0 |
2.0 |
web_data/tested_conf |
Red Hat Enterprise Linux 7.3 on ESXi 6.5 running on Gigabyte GA-6LISL / Intel Core i3 with PAA, Red Hat Enterprise Linux 7.3 on ESXi 6.5 running on Gigabyte GA-6LISL / Intel Core i3 without PAA (single-user mode), Red Hat Enterprise Linux 7.3 running on Gigabyte GA-6LISL / Intel Core i3 with PAA, Red Hat Enterprise Linux 7.3 running on Gigabyte GA-6LISL / Intel Core i3 without PAA, Windows Server 2016 on ESXi 6.5 running on Gigabyte GA-6LISL / Intel Core i3 with PAA, Windows Server 2016 on ESXi 6.5 running on Gigabyte GA-6LISL / Intel Core i3 without PAA, Windows Server 2016 running on Gigabyte GA-6LISL / Intel Core i3 with PAA, Windows Server 2016 running on Gigabyte GA-6LISL / Intel Core i3 without PAA |
Windows Server version 1803 (2016 version 10.0.17134) running on IntelĀ® i3 on Gigabyte GA-6ISL with PAA (single-user mode), Windows Server version 1803 (2016 version 10.0.17134) running on IntelĀ® i3 on Gigabyte GA-6ISL without PAA, , , , , , |
web_data/validation_history |
- date: 19.02.2019
- lab: UL VERIFICATION SERVICES INC
- validation_type: Initial
- date: 24.04.2020
- lab: UL VERIFICATION SERVICES INC
- validation_type: Update
|
- date: 07.05.2019
- lab: UL VERIFICATION SERVICES INC
- validation_type: Initial
- date: 24.04.2020
- lab: UL VERIFICATION SERVICES INC
- validation_type: Update
|
web_data/vendor |
Unbound Tech |
Unbound Tech |
web_data/vendor_url |
http://www.unboundtech.com/ |
http://www.unboundtech.com/ |