cert_id |
4053 |
4568 |
dgst |
2a99104da82a5f1b |
7d91b762b534b3e2 |
heuristics/algorithms |
ECDSA#C2083, HMAC#C2078, DRBG#C2083, AES#C2078, HMAC#C2083, SHS#C2083, AES#C2083, CVL#C2083, SHS#C2078, RSA#C2083, KTS#C2083 |
ECDSA#C2083, HMAC#C2078, DRBG#C2083, AES#C2078, HMAC#C2083, KAS#C2083, KAS-SSC#A2457, AES#C2083, CVL#C2083, SHS#C2083, SHS#C2078, RSA#C2083, KAS#A2457, KTS#C2083 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES (128: 1
- AES 128/256: 1
- AES-256: 6
- AES-GCM (128: 1
- HMAC-SHA-1: 4
- HMAC-SHA-384: 2
- HMAC-SHA1: 4
- HMAC-SHA256: 6
- HMAC-SHA384: 2
- HMAC-SHA512: 6
- PKCS#1: 2
- PKCS#12: 2
- PKCS#5: 2
- RSA 4096: 3
- SHA-1: 1
- SHA-3: 1
- SHA-384: 4
- SHA1: 1
|
- Certlike:
- AES (128: 1
- AES 128/256: 1
- AES-256: 6
- AES-CBC 128/192/256: 2
- AES-GCM (128: 1
- HMAC-SHA-1: 2
- HMAC-SHA-1 160: 2
- HMAC-SHA-384: 2
- HMAC-SHA1: 4
- HMAC-SHA256: 6
- HMAC-SHA384: 2
- HMAC-SHA512 160: 2
- HMAC-SHA512 256: 4
- PKCS#1: 2
- PKCS#12: 2
- PKCS#5: 2
- RSA 4096: 3
- SHA-1: 1
- SHA-3: 1
- SHA-384: 4
- SHA1: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 9
- AES-: 3
- AES-256: 6
- DES:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 5
- HMAC-SHA-256: 1
- HMAC-SHA-512: 1
|
- AES_competition:
- AES:
- AES: 9
- AES-: 3
- AES-256: 6
- DES:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 5
- HMAC-SHA-256: 1
- HMAC-SHA-512: 1
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
- SHA3:
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
- SHA3:
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
- NIST:
- P-256: 4
- P-384: 12
- P-521: 8
|
- NIST:
- P-256: 8
- P-384: 14
- P-521: 12
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 13
- FIPS 180-4: 3
- FIPS 186-2: 7
- FIPS 186-4: 9
- FIPS 197: 3
- FIPS 198-1: 3
- FIPS 202: 1
- NIST:
- SP 800-108: 1
- SP 800-132: 1
- SP 800-133: 1
- SP 800-135: 2
- SP 800-38A: 3
- SP 800-38B: 1
- SP 800-38C: 1
- SP 800-38D: 2
- SP 800-38F: 3
- SP 800-52: 1
- SP 800-56A: 2
- SP 800-56B: 1
- SP 800-56C: 1
- SP 800-89: 1
- SP 800-90A: 6
- PKCS:
- PKCS#1: 1
- PKCS#12: 1
- PKCS#5: 1
- RFC:
|
- FIPS:
- FIPS 140-2: 13
- FIPS 180-4: 3
- FIPS 186-2: 7
- FIPS 186-4: 9
- FIPS 197: 3
- FIPS 198-1: 3
- FIPS 202: 1
- NIST:
- SP 800-108: 1
- SP 800-132: 1
- SP 800-133: 1
- SP 800-135: 2
- SP 800-38A: 3
- SP 800-38B: 1
- SP 800-38C: 1
- SP 800-38D: 2
- SP 800-38F: 3
- SP 800-52: 1
- SP 800-56A: 1
- SP 800-56B: 1
- SP 800-56C: 1
- SP 800-89: 1
- SP 800-90A: 6
- PKCS:
- PKCS#1: 1
- PKCS#12: 1
- PKCS#5: 1
- RFC:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
|
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode. When initialized and configured as specified in Section 8 of the Security Policy. |
When operated in FIPS mode. When initialized and configured as specified in Section 8 of the Security Policy. |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/October 2021_011121_0730_signed.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/August 2023_010923_0844.pdf |
web_data/date_sunset |
|
21.09.2026 |
web_data/description |
The Ruckus Virtual SmartZone (vSZ) is a Network Function Virtualization (NFV) based and cloud-ready controller for service providers and enterprises ready to elevate their wired and wireless infrastructure deployment to the next level of flexibility, resiliency, and scale. |
The Ruckus Virtual SmartZone (vSZ) is a Network Function Virtualization (NFV) based and cloud-ready controller for service providers and enterprises ready to elevate their wired and wireless infrastructure deployment to the next level of flexibility, resiliency, and scale. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Roles, Services, and Authentication: Level 2, Physical Security: N/A, Design Assurance: Level 2, Mitigation of Other Attacks: N/A |
Roles, Services, and Authentication: Level 2, Physical Security: N/A, Design Assurance: Level 2, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
SP 800-56Arev3 transition - replaced by certificate #4568 |
|
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Ruckus Networks Virtual SmartZone (vSZ) |
Ruckus Networks Virtual SmartZone (vSZ) |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
active |
web_data/sw_versions |
5.2.1.3 |
5.2.1.3 |
web_data/tested_conf |
CentOS 7.5 on VMware ESXi 6.5.0 running on Dell PowerEdge R620 with Intel Xeon E5-2650 v2 without AES-NI (single-user mode), CentOS 7.5 on VMware ESXi 6.5.0 running on Dell PowerEdge R620 with Intel XeonE5-2650 v2 with AES-NI |
CentOS 7.5 on VMware ESXi 6.5.0 running on Dell PowerEdge R620 with Intel Xeon E5-2650 v2 without AES-NI (single-user mode), CentOS 7.5 on VMware ESXi 6.5.0 running on Dell PowerEdge R620 with Intel XeonE5-2650 v2 with AES-NI |
web_data/validation_history |
- date: 27.10.2021
- lab: GOSSAMER SECURITY SOLUTIONS INC
- validation_type: Initial
|
- date: 30.08.2023
- lab: GOSSAMER SECURITY SOLUTIONS INC
- validation_type: Initial
|
web_data/vendor |
CommScope Technologies LLC |
CommScope Technologies LLC |
web_data/vendor_url |
http://www.commscope.com/ruckus |
http://www.commscope.com/ruckus |