cert_id |
3738 |
3393 |
dgst |
35041ec21b0be43f |
5e9c1dc390130fae |
heuristics/algorithms |
RSA#2758, CVL#1777, RSA#2878, CVL#1646, DRBG#1902, HMAC#3564, ECDSA#1321, HMAC#3398, AES#5381, Triple-DES#2627, AES#5312, SHS#4144, SHS#4317, KTS#2627, KBKDF#199, AES#5309, KTS#3398, AES#5096 |
RSA#2758, CVL#1777, RSA#2878, CVL#1646, DRBG#1902, HMAC#3564, ECDSA#1321, HMAC#3398, AES#5381, Triple-DES#2627, AES#5312, SHS#4144, SHS#4317, KTS#2627, KBKDF#199, AES#5309, KTS#3398, AES#5096 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
3.6.0.3 |
3.6.0.3 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
3738 |
heuristics/module_processed_references/directly_referencing |
3393 |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
3738 |
heuristics/module_processed_references/indirectly_referencing |
3393 |
{} |
heuristics/module_prunned_references |
3393 |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- DRBG 5: 1
- Diffie-Hellman (CVL Cert. #1646: 2
- HMAC-SHA-1 160, 256: 2
- HMAC-SHA-256: 2
- HMAC-SHA-512: 2
- PKCS#1: 2
- PKCS#12: 2
- PKCS#5: 2
- PKCS1: 2
- SHA-1: 2
- SHA-256: 1
- SHA-3: 1
- SHA512: 1
|
- Certlike:
- DRBG 5: 1
- Diffie-Hellman (CVL Cert. #1646: 2
- HMAC-SHA-1: 2
- HMAC-SHA-512 160: 2
- PKCS#1: 2
- PKCS#12: 2
- PKCS#5: 2
- PKCS1: 2
- SHA-1: 2
- SHA-3: 1
- SHA-512: 1
- SHA256: 1
- SHA512: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 6
- HMAC-SHA-256: 1
- HMAC-SHA-512: 1
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 6
- HMAC-SHA-256: 1
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA256: 1
- SHA512: 1
- SHA3:
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- P-256: 2
- P-384: 2
- P-521: 2
- secp256k1: 1
|
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- P-256: 2
- P-384: 2
- P-521: 2
- secp256k1: 1
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 4
- FIPS 180-4: 2
- FIPS 186-2: 1
- FIPS 186-4: 3
- FIPS 197: 2
- FIPS 198-1: 2
- FIPS 202: 1
- FIPS186-2: 1
- NIST:
- SP 800-108: 2
- SP 800-132: 1
- SP 800-133: 1
- SP 800-135: 2
- SP 800-38A: 1
- SP 800-38B: 1
- SP 800-38C: 2
- SP 800-38D: 2
- SP 800-38F: 2
- SP 800-56A: 1
- SP 800-56B: 1
- SP 800-56C: 1
- SP 800-67: 1
- SP 800-89: 1
- SP 800-90A: 2
- PKCS:
- PKCS#1: 1
- PKCS#12: 1
- PKCS#5: 1
- PKCS1: 1
- RFC:
|
- FIPS:
- FIPS 140-2: 4
- FIPS 180-4: 2
- FIPS 186-4: 2
- FIPS 197: 2
- FIPS 198-1: 2
- FIPS 202: 1
- FIPS186-2: 1
- NIST:
- SP 800-108: 2
- SP 800-132: 1
- SP 800-133: 1
- SP 800-135: 2
- SP 800-38A: 1
- SP 800-38B: 1
- SP 800-38C: 2
- SP 800-38D: 2
- SP 800-38F: 2
- SP 800-56A: 1
- SP 800-56B: 1
- SP 800-56C: 1
- SP 800-67: 1
- SP 800-89: 1
- SP 800-90A: 2
- PKCS:
- PKCS#1: 1
- PKCS#12: 1
- PKCS#5: 1
- PKCS1: 1
- RFC:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: Admin
- /CreationDate: D:20201026161052-04'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20201026161052-04'00'
- /Producer: Microsoft® Word 2016
- /Title: Microsoft Word - Ruckus_SP_APs_Feb_2019_New.docx
- pdf_file_size_bytes: 803885
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /Author: Admin
- /CreationDate: D:20190306181032-08'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20190306181032-08'00'
- /Producer: GPL Ghostscript 8.64
- /Title: Microsoft Word - Ruckus_SP_APs_Feb_2019_New.docx
- pdf_file_size_bytes: 2177632
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode and with the tamper evident seals installed as indicated in the Security Policy. This validation entry is a non-security-relevant modification to Cert. #3393 |
When operated in FIPS mode and with the tamper evident seals installed as indicated in the Security Policy |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/October 2020_021120_0702_signed.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPSConsolidatedMarch2019.pdf |
web_data/date_sunset |
|
|
web_data/description |
The Ruckus Wireless, Inc. Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our indoor and outdoor wireless access points fit just about any budget, performance requirement or deployment scenario. |
The Ruckus Wireless, Inc. Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our indoor and outdoor wireless access points fit just about any budget, performance requirement or deployment scenario. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Mitigation of Other Attacks: N/A |
Mitigation of Other Attacks: N/A |
web_data/fw_versions |
3, ., 6, ., 0, ., 3 |
3, ., 6, ., 0, ., 3 |
web_data/historical_reason |
SP 800-56Arev3 transition |
186-2 transition |
web_data/hw_versions |
R, 7, 1, 0, ,, , R, 6, 1, 0, ,, , R, 7, 2, 0, ,, , T, 6, 1, 0, , a, n, d, , T, 7, 1, 0 |
R, 7, 1, 0, ,, , R, 6, 1, 0, ,, , R, 7, 2, 0, ,, , T, 6, 1, 0, , a, n, d, , T, 7, 1, 0 |
web_data/level |
2 |
2 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Ruckus Wireless, Inc. R710, R610, R720, T610 and T710 Wireless Access Points |
Ruckus Wireless, Inc. R710, R610, R720, T610 and T710 Wireless Access Points |
web_data/module_type |
Hardware |
Hardware |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
None |
None |
web_data/tested_conf |
[] |
[] |
web_data/validation_history |
- date: 27.10.2020
- lab: GOSSAMER SECURITY SOLUTIONS INC
- validation_type: Initial
|
- date: 08.03.2019
- lab: ADVANCED DATA SECURITY LLC
- validation_type: Initial
|
web_data/vendor |
Ruckus Wireless, Inc. |
Ruckus Wireless, Inc. |
web_data/vendor_url |
http://www.ruckuswireless.com |
http://www.ruckuswireless.com |