cert_id |
3113 |
4372 |
dgst |
1a67316dfbb24cbd |
a43d0385bc15f6b0 |
heuristics/algorithms |
Triple-DES#2494, CVL#1344, SHS#3849, SHA-3#24, KTS#2494, DRBG#1600, CVL#1345, AES#4702, CVL#1343, ECDSA#1160, RSA#2562, DSA#1244, CVL#1342, HMAC#3114, KBKDF#145 |
SHA-3-Customized#A2720, AES#A2720, SHS#A2720, HMAC#A2720, KBKDF#A2720, CVL#A2720, ECDSA#A2720, SHA-3#A2720, Triple-DES#A2720, RSA#A2720, DSA#A2720, KTS#A2720, DRBG#A2720 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
- Cert:
- #1: 1
- #1342: 1
- #1344: 1
- #1600: 1
- #3114: 1
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES 128, 192: 2
- AES- 256: 1
- AES-128: 1
- AES-192: 1
- CVL #1342: 1
- CVL #1344: 1
- DRBG #1600: 1
- DRBG 112: 1
- DSA3: 1
- HMAC #3114: 2
- HMAC SHA-512/224: 1
- HMAC-SHA-256: 2
- HMAC-SHA256: 2
- PKCS #1: 2
- PKCS#1: 4
- PKCS#12: 4
- PKCS#5: 4
- PKCS1: 2
- SHA- 224: 1
- SHA-1: 9
- SHA-2: 2
- SHA-224: 5
- SHA-256: 6
- SHA-3: 3
- SHA-384: 6
- SHA-512: 6
- SHA3- 384: 1
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 1
- SHA3-512: 2
|
- Certlike:
- AES (128: 1
- AES9: 1
- DRBG 112: 1
- DRBG 15: 1
- DRBG14: 1
- DSA3: 1
- Diffie-Hellman (160: 1
- Diffie-Hellman (2048: 1
- HMAC-SHA-1: 2
- HMAC-SHA-224: 2
- HMAC-SHA-256: 8
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
- HMAC-SHA-512/224: 2
- HMAC-SHA-512/256: 2
- PKCS 1: 6
- PKCS#1: 4
- PKCS#12: 4
- PKCS#5: 4
- SHA- 224: 1
- SHA- 256: 1
- SHA-1: 9
- SHA-2: 3
- SHA-224: 3
- SHA-256: 5
- SHA-3: 5
- SHA-384: 4
- SHA-512: 6
- SHA-5128: 1
- SHA3: 1
- SHA3-224: 1
- SHA3-256: 2
- SHA3-384: 1
- SHA3-512: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 29
- AES-: 2
- AES-128: 1
- AES-192: 1
- CAST:
- RC:
- Serpent:
- Twofish:
- DES:
- 3DES:
- TDEA: 6
- TDES: 1
- Triple-DES: 25
- TripleDES: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- CMAC: 6
- HMAC: 13
- HMAC-SHA-256: 1
- miscellaneous:
- Blowfish:
- Camellia:
- IDEA:
- SEED:
|
- AES_competition:
- AES:
- CAST:
- RC:
- Serpent:
- Twofish:
- DES:
- 3DES:
- TDEA: 6
- TDES: 2
- Triple-DES: 31
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- CMAC: 9
- HMAC: 16
- HMAC-SHA-224: 1
- HMAC-SHA-256: 4
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
- KMAC: 1
- miscellaneous:
- Blowfish:
- Camellia:
- IDEA:
- SEED:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- PBKDF:
- RIPEMD:
- RIPEMD: 1
- RIPEMD-160: 1
- RIPEMD128: 1
- RIPEMD256: 1
- RIPEMD320: 1
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 5
- SHA-256: 6
- SHA-384: 6
- SHA-512: 6
- SHA3:
- SHA-3: 3
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 1
- SHA3-512: 2
- SHAKE:
|
- MD:
- PBKDF:
- RIPEMD:
- RIPEMD: 1
- RIPEMD128: 1
- RIPEMD160: 1
- RIPEMD256: 1
- RIPEMD320: 1
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-224: 3
- SHA-256: 5
- SHA-384: 4
- SHA-512: 6
- SHA3:
- SHA-3: 5
- SHA3: 1
- SHA3-224: 1
- SHA3-256: 2
- SHA3-384: 1
- SHA3-512: 1
- SHAKE:
- scrypt:
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
|
pdf_data/keywords/ecc_curve |
- NIST:
- B-233: 2
- B-283: 2
- B-409: 1
- B-571: 2
- K-233: 2
- K-283: 2
- K-409: 1
- K-571: 2
- P-224: 6
- P-256: 8
- P-384: 6
- P-521: 6
|
- Edwards:
- NIST:
- B-163: 1
- B-233: 5
- B-283: 5
- B-409: 4
- B-571: 5
- K-163: 1
- K-233: 5
- K-283: 5
- K-409: 5
- K-571: 4
- P-192: 2
- P-224: 10
- P-256: 12
- P-384: 10
- P-521: 8
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
- SCA:
- timing attack: 1
- timing attacks: 1
|
- SCA:
- timing attack: 1
- timing attacks: 1
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140: 6
- FIPS 140-2: 13
- FIPS 180-4: 2
- FIPS 186-3: 1
- FIPS 186-4: 10
- FIPS 197: 2
- FIPS 198-1: 3
- FIPS 202: 2
- FIPS PUB 140-2: 1
- NIST:
- SP 800-108: 6
- SP 800-132: 5
- SP 800-133: 1
- SP 800-135: 7
- SP 800-20: 1
- SP 800-38A: 5
- SP 800-38B: 2
- SP 800-38C: 2
- SP 800-38D: 5
- SP 800-38F: 4
- SP 800-56A: 5
- SP 800-56B: 7
- SP 800-56C: 3
- SP 800-67: 5
- SP 800-89: 1
- SP 800-90A: 3
- PKCS:
- PKCS #1: 1
- PKCS#1: 2
- PKCS#12: 2
- PKCS#5: 2
- PKCS1: 1
|
- FIPS:
- FIPS 140: 8
- FIPS 140-2: 15
- FIPS 180-4: 2
- FIPS 186-2: 2
- FIPS 186-4: 10
- FIPS 197: 5
- FIPS 198-1: 3
- FIPS 202: 2
- FIPS PUB 140-2: 1
- NIST:
- NIST SP 800-90C: 1
- SP 800-108: 9
- SP 800-132: 5
- SP 800-133: 2
- SP 800-135: 7
- SP 800-185: 2
- SP 800-38A: 7
- SP 800-38B: 3
- SP 800-38C: 4
- SP 800-38D: 5
- SP 800-38F: 5
- SP 800-56A: 2
- SP 800-56B: 9
- SP 800-56C: 7
- SP 800-67: 5
- SP 800-89: 1
- SP 800-90A: 5
- PKCS:
- PKCS 1: 3
- PKCS#1: 2
- PKCS#12: 2
- PKCS#5: 2
- RFC:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
- com:
- com.safelogic.cryptocomply.fips: 1
|
- com:
- com.safelogic.cryptocomply.fips: 1
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: SafeLogic
- /Client: Forcepoint
- /Company: Forcepoint
- /CreationDate: D:20171221151156-08'00'
- /Creator: Acrobat PDFMaker 18 for Word
- /DocVersion: 1.2
- /ModDate: D:20171221151214-08'00'
- /Producer: Adobe PDF Library 15.0
- /SourceModified: D:20171221200951
- /Subject: Forcepoint Java Crypto Module
- /Title: Security Policy
- pdf_file_size_bytes: 519747
- pdf_hyperlinks: https://www.safelogic.com/, https://www.forcepoint.com/, http://csrc.nist.gov/groups/STM/cmvp/index.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys |
When installed, initialized and configured as specified in the Security Policy Section 3 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertJan2018.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/November 2022_051222_0640_signed.pdf |
web_data/date_sunset |
|
22.02.2025 |
web_data/description |
The Forcepoint Java Crypto Module is a standards-based "Drop-in Compliance" cryptographic engine for native Java environments. The module delivers core cryptographic functions to mobile and server platforms and features robust algorithm support, including Suite B algorithms. The Forcepoint Java Crypto Module offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation. |
The Forcepoint Java Crypto Module is a standards-based cryptographic engine for native Java environments. The module delivers core cryptographic functions to mobile and server platforms and features robust algorithm support, including Suite B algorithms. The Forcepoint Java Crypto Module offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A |
Physical Security: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
Moved to historical list due to sunsetting |
|
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Forcepoint Java Crypto Module |
Forcepoint Java Crypto Module |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
active |
web_data/sw_versions |
3.0.1 |
3.0.2.1 |
web_data/tested_conf |
CentOS 6 and OpenJDK 1.7 running on HP ProLiant DL360 G7 Server using an Intel Xeon X5670 (single-user mode) |
VMware Photon OS 2.0 with JDK 11 on Vmware ESXi 6.7 running on Dell PowerEdge R830 with Intel Xeon E5 (single-user mode) |
web_data/validation_history |
- date: 26.01.2018
- lab: UL VERIFICATION SERVICES INC
- validation_type: Initial
|
- date: 16.11.2022
- lab: ÆGISOLVE
- validation_type: Initial
|
web_data/vendor |
Forcepoint |
Forcepoint |
web_data/vendor_url |
http://www.forcepoint.com |
http://www.forcepoint.com |