cert_id |
3914 |
3907 |
dgst |
1b0c00bf165404fa |
96e85c9fe31daf26 |
heuristics/algorithms |
AES#C1680, KTS#C1680, RSA#A985, KBKDF#C1680, ECDSA#C1680, SHS#C1680, HMAC#C1680, Triple-DES#C1680, CVL#C1680, DRBG#C1680 |
AES#C1680, KTS#C1680, RSA#A985, KBKDF#C1680, ECDSA#C1680, SHS#C1680, HMAC#C1680, Triple-DES#C1680, CVL#C1680, DRBG#C1680 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
5.4.2, 5.4.3 |
5.4.2, 5.4.3 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES 128: 1
- AES-128: 9
- AES-256: 6
- HMAC SHA-1: 1
- HMAC SHA-256: 2
- HMAC SHA256: 1
- HMAC- SHA1: 2
- HMAC-SHA-256: 2
- PKCS#1: 1
- RSA 2048: 5
- RSA PKCS#1: 1
- SHA- 256: 1
- SHA-1: 3
- SHA-256: 3
- SHA-512: 1
- SHA1: 3
- SHA2- 512: 1
- SHA2-256: 2
- SHA2-384: 2
- SHA2-512: 1
- SHA256: 1
|
- Certlike:
- AES 128: 1
- AES-128: 9
- AES-256: 6
- HMAC SHA-1: 1
- HMAC SHA-256: 2
- HMAC SHA256: 1
- HMAC- SHA1: 2
- HMAC-SHA-256: 2
- PKCS#1: 1
- RSA 2048: 5
- RSA PKCS#1: 1
- SHA- 256: 1
- SHA-1: 3
- SHA-256: 3
- SHA-512: 1
- SHA1: 3
- SHA2- 512: 1
- SHA2-256: 2
- SHA2-384: 2
- SHA2-512: 1
- SHA256: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 10
- AES-128: 9
- AES-256: 6
- DES:
- constructions:
- MAC:
- CMAC: 8
- HMAC: 11
- HMAC-SHA-256: 1
- KMAC: 1
|
- AES_competition:
- AES:
- AES: 9
- AES-128: 9
- AES-256: 6
- DES:
- constructions:
- MAC:
- CMAC: 8
- HMAC: 9
- HMAC-SHA-256: 1
- KMAC: 1
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-512: 1
- SHA256: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-512: 1
- SHA256: 1
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
- NIST:
- P-224: 6
- P-256: 10
- P-384: 8
- P-521: 8
- secp256k1: 5
|
- NIST:
- P-224: 6
- P-256: 10
- P-384: 8
- P-521: 8
- secp256k1: 5
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
|
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
|
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode, installed, initialized, and configured as specified in Section 3 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy. |
When operated in FIPS mode, installed, initialized, and configured as specified in Section 3 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy. |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2021_010621_0658.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/April 2021_030521_0757_signed.pdf |
web_data/date_sunset |
02.05.2026 |
21.04.2026 |
web_data/description |
The YubiKey 5 cryptographic module is a secure element that supports multiple protocols designed to be embedded in USB and/or NFC security tokens. The module can generate, store, and perform cryptographic operations for sensitive data and can be utilized via an external touch-button for Test of User Presence in addition to PIN for smart card authentication.The module implements five major functions - Yubico One Time Password (OTP), FIDO2, PIV-compatible smart card, OpenPGP smart card and OATH OTP authentication. |
The YubiKey 5 cryptographic module is a secure element that supports multiple protocols designed to be embedded in USB and/or NFC security tokens. The module can generate, store, and perform cryptographic operations for sensitive data and can be utilized via an external touch-button for Test of User Presence. The module implements several major functions - Yubico One Time Password (OTP), FIDO/FIDO2, FIDO/U2F, PIV-compatible smart card, OpenPGP smart card, and OATH OTP authentication. |
web_data/embodiment |
Single Chip |
Single Chip |
web_data/exceptions |
Physical Security: Level 3, EMI/EMC: Level 3, Design Assurance: Level 3, Mitigation of Other Attacks: N/A |
Physical Security: Level 3, EMI/EMC: Level 3, Design Assurance: Level 3, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
5, ., 4, ., 2, , a, n, d, , 5, ., 4, ., 3 |
5, ., 4, ., 2, , a, n, d, , 5, ., 4, ., 3 |
web_data/historical_reason |
None |
None |
web_data/hw_versions |
S, L, E, 7, 8, C, L, U, F, X, 3, 0, 0, 0, P, H, , a, n, d, , S, L, E, 7, 8, C, L, U, F, X, 5, 0, 0, 0, P, H |
S, L, E, 7, 8, C, L, U, F, X, 3, 0, 0, 0, P, H, , a, n, d, , S, L, E, 7, 8, C, L, U, F, X, 5, 0, 0, 0, P, H |
web_data/level |
2 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
YubiKey 5 Cryptographic Module |
YubiKey 5 Cryptographic Module |
web_data/module_type |
Hardware |
Hardware |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
active |
active |
web_data/sw_versions |
None |
None |
web_data/tested_conf |
[] |
[] |
web_data/validation_history |
- date: 03.05.2021
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
- date: 19.08.2021
- lab: ACUMEN SECURITY, LLC
- validation_type: Update
|
- date: 22.04.2021
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
- date: 19.08.2021
- lab: ACUMEN SECURITY, LLC
- validation_type: Update
|
web_data/vendor |
Yubico, Inc. |
Yubico, Inc. |
web_data/vendor_url |
https://www.yubico.com |
https://www.yubico.com |