cert_id |
4696 |
4697 |
dgst |
213caf5cf5560415 |
f13f21602832553d |
heuristics/algorithms |
PBKDF#A3218, KDA#A3218, DRBG#A3218, KBKDF#A3218, RSA#A3218, SHS#A3218, CVL#A3218, SHA-3#A3218, KAS-RSA-SSC#A3218, DSA#A3218, KAS-SSC#A3218, KTS#A3218, ECDSA#A3218, AES#A3218, HMAC#A3218 |
PBKDF#A3218, KDA#A3218, DRBG#A3218, KBKDF#A3218, RSA#A3218, SHS#A3218, CVL#A3218, SHA-3#A3218, KAS-RSA-SSC#A3218, DSA#A3218, KAS-SSC#A3218, KTS#A3218, ECDSA#A3218, AES#A3218, HMAC#A3218 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
6.3 |
6.3 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
- Level:
- Level 1: 6
- Level 2: 8
- Level 3: 3
|
- Level:
- Level 1: 10
- Level 2: 1
- Level 3: 1
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES-CTR 128: 1
- HMAC SHA-1: 2
- HMAC SHA1: 1
- HMAC SHA256: 1
- HMAC-SHA-1: 2
- HMAC-SHA1: 2
- PAA1: 1
- PKCS #1: 8
- PKCS #12: 10
- PKCS #5: 6
- SHA-1: 10
- SHA-2: 4
- SHA-256: 4
- SHA-3: 5
- SHA-384: 2
- SHA-512: 5
- SHA1: 3
- SHA2-224: 8
- SHA2-256: 6
- SHA2-384: 6
- SHA2-512: 6
- SHA256: 1
- SHA3-224: 6
- SHA3-256: 5
- SHA3-384: 6
- SHA3-512: 3
- SHA3-512 112: 2
- SHA3-512 128: 1
|
- Certlike:
- AES-CTR 128: 1
- HMAC SHA-1: 2
- HMAC SHA1: 1
- HMAC SHA256: 1
- HMAC-SHA-1: 2
- HMAC-SHA1: 2
- PAA1: 1
- PKCS #1: 8
- PKCS #12: 10
- PKCS #5: 6
- SHA-1: 10
- SHA-2: 4
- SHA-256: 4
- SHA-3: 5
- SHA-384: 2
- SHA-512: 4
- SHA1: 3
- SHA2-224: 8
- SHA2-256: 6
- SHA2-384: 6
- SHA2-512: 6
- SHA256: 1
- SHA3-224: 6
- SHA3-256: 5
- SHA3-384: 6
- SHA3-512: 3
- SHA3-512 112: 2
- SHA3-512 128: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDES: 2
- Triple-DES: 7
- DES:
- constructions:
- djb:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDES: 2
- Triple-DES: 7
- DES:
- constructions:
- djb:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- PBKDF:
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 4
- SHA-224: 1
- SHA-256: 3
- SHA-384: 3
- SHA-512: 4
- SHA256: 1
- SHA3:
- SHA-3: 5
- SHA3-224: 6
- SHA3-256: 5
- SHA3-384: 6
- SHA3-512: 6
- SHAKE:
- scrypt:
|
- MD:
- PBKDF:
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 4
- SHA-224: 1
- SHA-256: 3
- SHA-384: 3
- SHA-512: 3
- SHA256: 1
- SHA3:
- SHA-3: 5
- SHA3-224: 6
- SHA3-256: 5
- SHA3-384: 6
- SHA3-512: 6
- SHAKE:
- scrypt:
|
pdf_data/keywords/crypto_scheme |
- AEAD:
- KA:
- Key Agreement: 2
- Key agreement: 6
- MAC:
|
- AEAD:
- KA:
- Key Agreement: 2
- Key agreement: 6
- MAC:
|
pdf_data/keywords/crypto_protocol |
- TLS:
- TLS:
- TLS: 12
- TLS 1.0: 2
- TLS 1.2: 5
|
- TLS:
- TLS:
- TLS: 12
- TLS 1.0: 2
- TLS 1.2: 5
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
- SCA:
- timing attack: 1
- timing attacks: 2
|
- SCA:
- timing attack: 1
- timing attacks: 2
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 74
- FIPS 180-4: 1
- FIPS 186-2: 2
- FIPS 186-4: 17
- FIPS 198-1: 2
- FIPS 202: 2
- FIPS PUB 140-2: 1
- FIPS186: 1
- NIST:
- NIST SP 800-132: 1
- NIST SP 800-56B: 1
- NIST SP 800-57: 1
- SP 800-108: 6
- SP 800-132: 3
- SP 800-133: 2
- SP 800-135: 2
- SP 800-38A: 1
- SP 800-38B: 1
- SP 800-38C: 1
- SP 800-38D: 1
- SP 800-38E: 1
- SP 800-38F: 3
- SP 800-52: 1
- SP 800-56A: 16
- SP 800-56B: 6
- SP 800-56C: 3
- SP 800-89: 3
- SP 800-90A: 3
- PKCS:
- PKCS #1: 4
- PKCS #12: 5
- PKCS #5: 3
- RFC:
- RFC 2898: 2
- RFC 5288: 2
- RFC 7539: 3
- RFC 7627: 1
|
- FIPS:
- FIPS 140-2: 73
- FIPS 180-4: 1
- FIPS 186-2: 2
- FIPS 186-4: 17
- FIPS 198-1: 2
- FIPS 202: 2
- FIPS PUB 140-2: 1
- FIPS186: 1
- NIST:
- NIST SP 800-132: 1
- NIST SP 800-56B: 1
- NIST SP 800-57: 1
- SP 800-108: 6
- SP 800-132: 3
- SP 800-133: 2
- SP 800-135: 2
- SP 800-38A: 1
- SP 800-38B: 1
- SP 800-38C: 1
- SP 800-38D: 1
- SP 800-38E: 1
- SP 800-38F: 3
- SP 800-52: 1
- SP 800-56A: 16
- SP 800-56B: 6
- SP 800-56C: 3
- SP 800-89: 3
- SP 800-90A: 3
- PKCS:
- PKCS #1: 4
- PKCS #12: 5
- PKCS #5: 3
- RFC:
- RFC 2898: 2
- RFC 5288: 2
- RFC 7539: 3
- RFC 7627: 1
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
- com:
- com.rsa.crypto: 5
- com.rsa.crypto.jcm: 1
- com.rsa.cryptoj.jcm: 2
- java:
|
- com:
- com.rsa.crypto: 8
- com.rsa.crypto.jcm: 1
- com.rsa.cryptoj.jcm: 2
- java:
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: Dell Inc.
- /CreationDate: D:20100527131853Z
- /Creator: FrameMaker 17.0.3
- /Keywords: BSAFE, BSAFE Crypto Module for Java, 6.3, fips security policy, level 2, operating environments
- /ModDate: D:20240405122937+11'00'
- /Producer: Adobe PDF Library 17.0
- /Title: Dell BSAFE Crypto Module for Java 6.3 Security Policy Level 1 with Level 2 Roles, Services and Authentication
- /Trapped: /False
- pdf_file_size_bytes: 855403
- pdf_hyperlinks: https://www.dell.com/support, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf, http://csrc.nist.gov/publications/nistpubs/800-132/nist-sp800-132.pdf, http://csrc.nist.gov/index.html, https://eprint.iacr.org/2011/388, https://tools.ietf.org/html/rfc7539, http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br1.pdf, https://csrc.nist.gov/publications/nistpubs/800-89/SP-800-89_November2006.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
- /Author: Dell Inc.
- /CreationDate: D:20100527131853Z
- /Creator: FrameMaker 17.0.3
- /Keywords: BSAFE, BSAFE Crypto Module for Java, 6.3, fips security policy, level 1, operating environments
- /ModDate: D:20240405121723+11'00'
- /Producer: Adobe PDF Library 17.0
- /Title: Dell BSAFE Crypto Module for Java 6.3 Security Policy Level 1
- /Trapped: /False
- pdf_file_size_bytes: 866360
- pdf_hyperlinks: https://www.dell.com/support, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf, http://csrc.nist.gov/publications/nistpubs/800-132/nist-sp800-132.pdf, http://csrc.nist.gov/index.html, https://eprint.iacr.org/2011/388, https://tools.ietf.org/html/rfc7539, http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br1.pdf, https://csrc.nist.gov/publications/nistpubs/800-89/SP-800-89_November2006.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode. No assurance of the minimum strength of generated keys. |
When operated in FIPS mode. No assurance of the minimum strength of generated keys. |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/April 2024_010524_0757.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/April 2024_010524_0757.pdf |
web_data/date_sunset |
16.02.2026 |
16.02.2026 |
web_data/description |
Crypto-J software library is designed for developers to incorporate FIPS 140-2 approved cryptography into Java-based products. Crypto-J security software helps protect sensitive data as it is stored, using strong encryption techniques that ease integration with existing data models. Using the capabilities of Crypto-J software in applications helps provide a persistent level of protection for data, lessening the risk of internal, as well as external, compromise. |
Crypto-J software library is designed for developers to incorporate FIPS 140-2 approved cryptography into Java-based products. Crypto-J security software helps protect sensitive data as it is stored, using strong encryption techniques that ease integration with existing data models. Using the capabilities of Crypto-J software in applications helps provide a persistent level of protection for data, lessening the risk of internal, as well as external, compromise. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Roles, Services, and Authentication: Level 2, Physical Security: N/A, Design Assurance: Level 3 |
Physical Security: N/A, Design Assurance: Level 3, |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
None |
None |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
BSAFE™ Java Crypto Module 6.3 |
BSAFE™ Java Crypto Module 6.3 |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
active |
active |
web_data/sw_versions |
6.3 |
6.3 |
web_data/tested_conf |
OpenJDK 11 on SUSE Linux Enterprise Server 15 SP3 (64-bit) running on Dell PowerEdge™ R6525 with an AMD EPYC 7513 processor (single-user mode), Oracle(R) JRE 8 on Microsoft(R) Windows(R) Server 2019 (64-bit) running on Dell(TM) PowerEdge™ R6525 with an AMD EPYC 7513 processor |
OpenJDK 11 on SUSE Linux Enterprise Server 15 SP3 (64-bit) running on Dell PowerEdge(TM) R6525 with an AMD EPYC 7513 processor (single-user mode), Oracle(R) JRE 8 on Microsoft(R) Windows(R) Server 2019 (64-bit) running on Dell(TM) PowerEdge(TM) R6525 with an AMD EPYC 7513 processor |
web_data/validation_history |
- date: 30.04.2024
- lab: GOSSAMER SECURITY SOLUTIONS INC
- validation_type: Initial
|
- date: 30.04.2024
- lab: GOSSAMER SECURITY SOLUTIONS INC
- validation_type: Initial
|
web_data/vendor |
Dell Australia Pty Limited, BSAFE Product Team |
Dell Australia Pty Limited, BSAFE Product Team |
web_data/vendor_url |
http://www.dell.com |
http://www.dell.com |