cert_id |
3208 |
3268 |
dgst |
204d81c4117dbac5 |
784818021864dcfd |
heuristics/algorithms |
KAS#155, HMAC#3335, KBKDF#165, DSA#1316, AES#5021, Triple-DES MAC#2588, RSA#2706, Triple-DES MAC#2573, Triple-DES MAC#2552, DRBG#1704, DSA#1317, Triple-DES#2573, AES#4849, Triple-DES#2588, DSA#1298, SHS#4080, Triple-DES#2552, CVL#1565, KTS#5021, AES#4960, ECDSA#1242, SHS#3988, ECDSA#1281, RSA#2691, ECDSA#1280, HMAC#3306 |
KAS#155, HMAC#3335, KBKDF#165, DSA#1316, AES#5021, Triple-DES MAC#2588, RSA#2706, Triple-DES MAC#2573, Triple-DES MAC#2552, DRBG#1704, DSA#1317, Triple-DES#2573, AES#4849, Triple-DES#2588, DSA#1298, SHS#4080, Triple-DES#2552, CVL#1565, KTS#5021, AES#4960, ECDSA#1242, SHS#3988, ECDSA#1281, RSA#2691, ECDSA#1280, HMAC#3306 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
6.24.6, 6.24.7 |
6.24.6, 6.24.7 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
- Cert:
- #1: 4
- #11: 6
- #1242: 2
- #1280: 2
- #1281: 2
- #1298: 2
- #1316: 2
- #1317: 2
- #155: 1
- #1565: 1
- #165: 1
- #1704: 1
- #2552: 2
- #2573: 2
- #2588: 3
- #2691: 2
- #2706: 2
- #3306: 2
- #3335: 2
- #3988: 1
- #4080: 1
- #4849: 1
- #4960: 1
- #5021: 4
|
- Cert:
- #1: 4
- #11: 6
- #1242: 2
- #1280: 2
- #1281: 2
- #1298: 2
- #1316: 2
- #1317: 2
- #155: 1
- #1565: 1
- #165: 1
- #1704: 1
- #2552: 2
- #2573: 2
- #2588: 3
- #2691: 2
- #2706: 2
- #3306: 2
- #3335: 2
- #3988: 1
- #4080: 1
- #4849: 1
- #4960: 1
- #5021: 4
|
pdf_data/keywords/fips_security_level |
- Level:
- Level 2: 16
- Level 3: 2
- level 2: 1
- level 3: 1
|
- Level:
- Level 2: 2
- Level 3: 14
- level 3: 1
|
pdf_data/keywords/fips_certlike |
- Certlike:
- #2588 AES: 1
- AES 128, 192: 2
- AES 128, 192 and 256: 1
- AES 256: 4
- AES Cert. #5021: 1
- DSA 2048: 1
- PKCS #1: 8
- PKCS #11: 12
- PKCS#11: 2
- RSA 2048: 3
- RSA 4096: 2
|
- Certlike:
- #2588 AES: 1
- AES 128, 192: 2
- AES 128, 192 and 256: 1
- AES 256: 5
- AES Cert. #5021: 1
- AES-256: 10
- AES-256 #1704: 1
- DSA 2048: 1
- Diffie-Hellman (2048: 1
- HMAC SHA-1: 1
- HMAC SHA-224: 1
- HMAC SHA-256: 1
- HMAC SHA-384: 1
- HMAC SHA-512: 1
- HMAC-SHA-1: 6
- HMAC-SHA-122: 2
- HMAC-SHA-123: 2
- HMAC-SHA-224: 2
- HMAC-SHA-256: 4
- HMAC-SHA-384: 4
- HMAC-SHA-512 #3306: 2
- HMAC-SHA-512 #3335: 2
- PKCS #1: 8
- PKCS #11: 12
- PKCS#11: 2
- RSA 2048: 3
- RSA 4096: 2
- SHA- 224: 2
- SHA- 384: 2
- SHA- 512: 1
- SHA-1: 15
- SHA-120: 1
- SHA-224: 16
- SHA-256: 19
- SHA-384: 16
- SHA-512: 17
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CMAC: 3
- HMAC: 9
- HMAC-SHA-224: 1
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
- miscellaneous:
|
pdf_data/keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA 2048: 3
- RSA 4096: 2
- RSA-1024: 1
- RSA-2048: 2
- RSA-4096: 2
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 16
- SHA-256: 19
- SHA-384: 16
- SHA-512: 17
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
- SCA:
- Timing attacks: 1
- physical probing: 1
|
- SCA:
- Timing attacks: 1
- physical probing: 1
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS PUB 113: 1
- FIPS PUB 197: 2
- PKCS:
- PKCS #1: 4
- PKCS #11: 6
- PKCS#11: 1
- X509:
|
- FIPS:
- FIPS 140-2: 12
- FIPS 186-4: 3
- FIPS PUB 113: 1
- FIPS PUB 140-2: 4
- FIPS PUB 180-4: 1
- FIPS PUB 186-2: 3
- FIPS PUB 186-4: 5
- FIPS PUB 197: 2
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-108: 2
- NIST SP 800-38B: 1
- NIST SP 800-56A: 1
- NIST SP 800-90A: 7
- SP 800-38F: 1
- SP 800-57: 2
- SP 800-67: 2
- PKCS:
- PKCS #1: 4
- PKCS #11: 6
- PKCS#11: 1
- X509:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: wtung
- /CreationDate: D:20180618120540-04'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20180618120540-04'00'
- /Producer: Acrobat Distiller 15.0 (Windows)
- /Title: Microsoft Word - 002-010962-001_Level 2 PCIe - FIPS Security Policy_RevE.docx
- pdf_file_size_bytes: 593218
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
- /Author: wtung
- /CreationDate: D:20180621123617-04'00'
- /Creator: PDFCreator 3.2.0.11758
- /Keywords:
- /ModDate: D:20180621123617-04'00'
- /Producer: PDFCreator 3.2.0.11758
- /Subject:
- /Title: 002-010961-001_Level 3 PCIe - FIPS Security Policy_RevF
- pdf_file_size_bytes: 708366
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode and initialized to Overall Level 2 per Security Policy |
When operated in FIPS mode and initialized to Overall Level 3 per Security Policy |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/JuneCertFinal.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertAug2018.pdf |
web_data/date_sunset |
|
|
web_data/description |
The SafeNet PCI-E Hardware Security Module is a multi-chip embedded hardware cryptographic module in the form of a PCI-Express card that typically resides within a custom computing or secure communications appliance. The cryptographic module is contained in its own secure enclosure that provides physical resistance to tampering. The cryptographic boundary of the module is defined to encompass all components inside the secure enclosure on the PCI-E card. |
SafeNet PCIe Hardware Security Module and SafeNet PCIe Hardware Security Module for SafeNet Network HSM is a multi-chip embedded hardware cryptographic module in the form of a PCI-Express card that typically resides within a custom computing or secure communications appliance. The cryptographic module is contained in its own secure enclosure that provides physical resistance to tampering. The cryptographic boundary of the module is defined to encompass all components inside the secure enclosure on the PCI-E card. |
web_data/embodiment |
Multi-Chip Embedded |
Multi-Chip Embedded |
web_data/exceptions |
Physical Security: Level 3, EMI/EMC: Level 3, Design Assurance: Level 3 |
[] |
web_data/fw_versions |
6, ., 2, 4, ., 6, , [, 1, ], , a, n, d, , 6, ., 2, 4, ., 7, , [, 2, ] |
6, ., 2, 4, ., 6, , [, 1, ], , a, n, d, , 6, ., 2, 4, ., 7, , [, 2, ] |
web_data/historical_reason |
SP 800-56Arev3 transition |
SP 800-56Arev3 transition |
web_data/hw_versions |
V, B, D, -, 0, 5, -, 0, 1, 0, 0, , [, 1, ,, , 2, ], ,, , V, B, D, -, 0, 5, -, 0, 1, 0, 1, , [, 1, ,, , 2, ], ,, , V, B, D, -, 0, 5, -, 0, 1, 0, 2, , [, 1, ,, , 2, ], , a, n, d, , V, B, D, -, 0, 5, -, 0, 1, 0, 3, , [, 1, ,, , 2, ] |
V, B, D, -, 0, 5, -, 0, 1, 0, 0, , [, 1, ,, , 2, ], ,, , V, B, D, -, 0, 5, -, 0, 1, 0, 1, , [, 1, ,, , 2, ], ,, , V, B, D, -, 0, 5, -, 0, 1, 0, 2, , [, 1, ,, , 2, ], , a, n, d, , V, B, D, -, 0, 5, -, 0, 1, 0, 3, , [, 1, ,, , 2, ] |
web_data/level |
2 |
3 |
web_data/mentioned_certs |
|
|
web_data/module_name |
SafeNet PCIe Hardware Security Module and SafeNet PCIe Hardware Security Module for SafeNet Network HSM |
SafeNet PCIe Hardware Security Module and SafeNet PCIe Hardware Security Module for SafeNet Network HSM |
web_data/module_type |
Hardware |
Hardware |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
None |
None |
web_data/tested_conf |
[] |
[] |
web_data/validation_history |
- date: 26.06.2018
- lab: EWA CANADA
- validation_type: Initial
|
- date: 24.08.2018
- lab: EWA CANADA
- validation_type: Initial
|
web_data/vendor |
Gemalto |
Gemalto |
web_data/vendor_url |
http://www.gemalto.com |
http://www.gemalto.com |