cert_id |
1971 |
4427 |
dgst |
2b5d2ba5803e6fe3 |
e49e72095ac9721b |
heuristics/algorithms |
CVL#22, RSA#1072, AES#2105, SHS#1807, HMAC#1259, AES#2078, KTS#1253, HMAC#1253, SHS#1801, AES#2060, DRBG#822, ECDSA#303, KTS#2060 |
AES#A1701, SHS#A1701, KAS#A1702, AES#A1702, KAS-SSC#A1702, KTS#A1702, DRBG#A1702, HMAC#A1702, SHS#A1702, KBKDF#A1702, RSA#A1702, ECDSA#A1702, SHS#A2152, CVL#A1702, HMAC#A1701 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
5.0, 1.0 |
5.1, 1.0 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
- Cert:
- #1072: 1
- #1253: 2
- #1259: 1
- #1801: 1
- #1807: 1
- #2060: 3
- #2078: 1
- #2105: 1
- #22: 1
- #303: 1
- #822: 1
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- #2078 AES: 1
- AES #2060: 2
- AES key (256: 1
- HMAC #1253: 2
- HMAC SHA-1: 1
- HMAC-SHA-1: 2
- HMAC-SHA-224: 2
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
- SHA-1: 3
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-521: 1
- SHA1: 1
- SHA224: 3
- SHA256: 3
- SHA384: 3
- SHA512: 3
|
- Certlike:
- AES (128: 1
- AES CBC 128/192/256: 2
- AES key (256: 1
- AES- GCM (128: 1
- AES-128: 1
- AES-196: 1
- AES-256: 1
- AES-CBC (256: 1
- AES-CTR 128: 1
- HMAC SHA-1: 1
- HMAC-SHA-1-96: 2
- SHA-1: 7
- SHA-256: 1
- SHA1: 1
- SHA2- 224: 4
- SHA2- 256: 3
- SHA2- 384: 2
- SHA2- 512: 1
- SHA2-224: 5
- SHA2-256: 10
- SHA2-384: 7
- SHA2-512: 7
- SHA2-512 256: 1
- SHA3: 1
- SHA3- 224: 1
- SHA3-224: 1
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 1
- SHA3-512 256: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 6
- HMAC-SHA-224: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
- AES_competition:
- AES:
- AES: 35
- AES-: 3
- AES-128: 1
- AES-256: 1
- constructions:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA224: 3
- SHA256: 3
- SHA384: 3
- SHA512: 3
|
- SHA:
- SHA1:
- SHA2:
- SHA3:
- SHA3: 1
- SHA3-224: 1
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 2
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
- IKE:
- IPsec:
- TLS:
- TLS:
- TLS: 40
- TLS 1.2: 2
- TLSv1.2: 1
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
|
|
pdf_data/keywords/ecc_curve |
|
- NIST:
- P-256: 20
- P-384: 8
- P-521: 4
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 32
- FIPS 180-4: 5
- FIPS 186-4: 2
- FIPS 197: 2
- FIPS 198-1: 2
- FIPS 202: 2
- FIPS140-2: 1
- RFC:
- X509:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: 3eti
- /CreationDate: D:20180301160840-05'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20180301160840-05'00'
- /Producer: Microsoft® Word 2013
- /Title: The symmetric keys used for protecting wireless bridging traffic are not listed in the key management tables
- pdf_file_size_bytes: 1025057
- pdf_hyperlinks: https://csrc.nist.gov/publications/detail/fips/140/2/final
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When installed, initialized and configured as specified in the Security Policy Section 3.1 |
None |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0031.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/January 2023_010223_0657_signed.pdf |
web_data/date_sunset |
|
21.09.2026 |
web_data/description |
The 3e-520 Secure Access Point acts as an access point for the universal wireless family of devices from 3eTI. The 520 board is installed inside the wireless devices and provides the cryptographic functionality for the device. The access point allows for wireless clients or wireless bridges to securely connect wirelessly with the module and send encrypted data. |
The 3e-520 Secure Access Point acts as an access point for the universal wireless family of devices from 3eTI. The 520 board is installed inside the wireless devices and provides the cryptographic functionality for the device. The access point allows for wireless clients or wireless bridges to securely connect wirelessly with the module and send encrypted data. |
web_data/embodiment |
Multi-Chip Embedded |
Multi-Chip Embedded |
web_data/exceptions |
Roles, Services, and Authentication: Level 3, Design Assurance: Level 3 |
Design Assurance: Level 3, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
5, ., 0 |
5, ., 1 |
web_data/historical_reason |
Moved to historical list due to sunsetting |
|
web_data/hw_versions |
1, ., 0 |
1, ., 0 |
web_data/level |
2 |
2 |
web_data/mentioned_certs |
|
|
web_data/module_name |
3e-520 Secure Access Point Cryptographic Module |
3e-520 Secure Access Point Cryptographic Module |
web_data/module_type |
Hardware |
Hardware |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
active |
web_data/sw_versions |
None |
None |
web_data/tested_conf |
[] |
[] |
web_data/validation_history |
- date: 03.07.2013
- lab: SAIC-VA
- validation_type: Initial
- date: 26.02.2016
- lab: CYGNACOM SOLUTIONS INC
- validation_type: Update
- date: 16.03.2018
- lab: CYGNACOM SOLUTIONS INC
- validation_type: Update
|
- date: 27.01.2023
- lab: GOSSAMER SECURITY SOLUTIONS INC
- validation_type: Initial
|
web_data/vendor |
3e Technologies International, Inc. |
Ultra Intelligence & Communications |
web_data/vendor_url |
http://www.3eti.com |
http://www.ultra.group |