cert_id |
542 |
1579 |
dgst |
2d86377d4cc3e6c8 |
ec11f26d671bcc37 |
heuristics/algorithms |
ECDSA#400, SHS#260, AES#2442, AES#175, RSA#20, SHS#2078, RNG#25, HMAC#9, Triple-DES#1509, RSA#1255, DSA#758, ECDSA#1, Triple-DES#276, HMAC#1508, DSA#115, RNG#1194 |
Triple-DES#1054, ECDSA#200, AES#1609, KTS#1609, RSA#791, DRBG#82, HMAC#945, KAS#14, DSA#500, SHS#1422 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
3713 |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
3713 |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
- Cert:
- #1: 8
- #115: 1
- #1194: 1
- #1255: 1
- #1508: 5
- #1509: 1
- #175: 1
- #20: 1
- #2078: 5
- #2442: 1
- #25: 1
- #260: 5
- #276: 1
- #400: 1
- #758: 1
- #9: 5
|
- Cert:
- #1: 5
- #1054: 1
- #14: 3
- #1422: 5
- #1609: 2
- #200: 1
- #500: 1
- #791: 2
- #82: 1
- #945: 5
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- #400 RSA: 1
- DSA 11: 1
- HMAC- SHA-384: 1
- HMAC-SHA-1: 4
- HMAC-SHA-224: 4
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 4
- HMAC-SHA256: 2
- PKCS #1: 11
- RSA 2: 1
- RSA PKCS #1: 3
- SHA- 512: 1
- SHA-1: 2
- SHA-224: 2
- SHA-256: 2
- SHA-384: 3
- SHA-512: 1
|
- Certlike:
- #1054 AES: 1
- #1609 DES: 1
- #200 RSA: 1
- #791 RSA: 1
- DSA 11: 1
- HMAC-SHA-1: 6
- HMAC-SHA-224: 4
- HMAC-SHA-256: 2
- HMAC-SHA-384: 4
- HMAC-SHA-512: 4
- HMAC-SHA256: 2
- PKCS #1: 7
- PKCS1: 3
- RSA #1: 1
- RSA 2: 1
- RSA PKCS #1: 1
- RSA PKCS1: 3
- SHA-1: 3
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 3
- HMAC-SHA-224: 2
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 2
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CMAC: 2
- HMAC: 3
- HMAC-SHA-224: 2
- HMAC-SHA-256: 1
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 3
- SHA-512: 1
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- XTS:
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
- SCA:
- Timing Attack: 2
- Timing Attacks: 1
- Timing attack: 1
- other:
|
- SCA:
- Timing Attack: 2
- Timing Attacks: 1
- other:
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 11
- FIPS 180-2: 5
- FIPS 186-2: 3
- FIPS 197: 1
- FIPS 198: 5
- FIPS 46-3: 1
- FIPS PUB 140-2: 6
- PKCS:
- RFC:
- RFC 1115: 1
- RFC 1321: 1
- RFC 2104: 1
- RFC 2268: 1
|
- FIPS:
- FIPS 140-2: 12
- FIPS 180-4: 5
- FIPS 186-2: 1
- FIPS 186-4: 4
- FIPS 197: 1
- FIPS 198: 5
- FIPS 46-3: 1
- FIPS PUB 140-2: 6
- NIST:
- NIST SP 800-131A: 2
- NIST SP 800-56A: 4
- NIST SP 800-56B: 2
- NIST SP 800-90: 2
- NIST SP 800-90A: 1
- SP 800-56A: 1
- PKCS:
- RFC:
- RFC 1115: 1
- RFC 1320: 1
- RFC 1321: 1
- RFC 2104: 1
- RFC 2268: 1
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /CreationDate: D:20131024180008
- /ModDate: D:20131024180008
- /Producer: ESP Ghostscript 815.02
- pdf_file_size_bytes: 95089
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
- /Author: user
- /CreationDate: D:20160617112240-04'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20160617112240-04'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 733964
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode |
When operated in FIPS mode |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt542.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0007.pdf |
web_data/date_sunset |
|
|
web_data/description |
The Security Builder FIPS Module is a standards-based cryptographic toolkit that supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into both mobile and server-based applications. The Security Builder FIPS Module is part of the Certicom Security Architecture, a comprehensive cross-platform security solution which supports multiple cryptographic software and hardware providers with a single common API. |
The Security Builder FIPS Module is a standards-based cryptographic toolkit that supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into both mobile and server-based applications. The Security Builder FIPS Module is part of the Certicom Security Architecture, a comprehensive cross-platform security solution which supports multiple cryptographic software and hardware providers with a single common API. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
[] |
[] |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
RNG SP800-131A Revision 1 Transition |
Moved to historical list due to sunsetting |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Security Builder FIPS Module |
Security Builder FIPS Module |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
2.0, 2.0.4 and 2.0.5 |
5.6, 5.6.1 or 5.6.2 |
web_data/tested_conf |
AIX 5.2, 32-bit Power PC, AIX 5.2, 64-bit Power PC, CentOS Linux release 5.4 (single-user mode), HP-UX 11.00, 32-bit PA-RISC, HP-UX 11.00, 64-bit PA-RISC, HP-UX 11i, Itanium, HPUX B11 32-bit IA64, Linux 64-bit, Microsoft Red Hat Linux Application Server 3.0, x86, Red Hat Linux Application Server 3.0, Itanium, Red Hat Linux AS 4.0 32 bit and 64 bit on an IBM PowerPC 5, Solaris 10 64 Bit, Solaris 2.9, SPARC 32- bit, Solaris 2.9, SPARC 64-bit, Solaris 8 32 Bit, SPARC, SPARC, Symbian 9, ARM, Windows 2003, Itanium, Windows 2003, x86, Windows 64-bit, x86, Windows CE 3.0, ARM, Windows Vista 64 bit, 64 bit x86, Windows Vista, x86 |
QNX Neutrino Version 6.5 (single-user mode), QNX Neutrino Version 6.6, , , , , , , , , , , , , , , , , , , , , , |
web_data/validation_history |
- date: 02.06.2005
- lab: DOMUS
- validation_type: Initial
- date: 16.03.2006
- lab:
- validation_type: Update
- date: 29.08.2006
- lab:
- validation_type: Update
- date: 06.11.2006
- lab:
- validation_type: Update
- date: 20.07.2007
- lab:
- validation_type: Update
- date: 12.09.2007
- lab:
- validation_type: Update
|
- date: 21.07.2011
- lab: DXC Technology
- validation_type: Initial
- date: 05.06.2012
- lab:
- validation_type: Update
- date: 16.08.2012
- lab: CGI Information Systems & Management Consultants Inc
- validation_type: Update
- date: 13.03.2015
- lab: CGI Information Systems & Management Consultants Inc
- validation_type: Update
- date: 26.01.2016
- lab: CGI Information Systems & Management Consultants Inc
- validation_type: Update
- date: 05.07.2016
- lab: CGI Information Systems & Management Consultants Inc
- validation_type: Update
|
web_data/vendor |
Certicom Corp. |
Certicom Corp. |
web_data/vendor_url |
http://www.certicom.com |
http://www.certicom.com |