cert_id |
3204 |
3517 |
dgst |
38177ec3e146433b |
7811e7c165a37572 |
heuristics/algorithms |
Triple-DES#2498, CVL#1395, RSA#2569, CVL#1360, SHS#3862, HMAC#3133, CVL#1356, SHS#3861, ECDSA#1165, AES#4713, DRBG#1604, HMAC#3134, AES#4712, AES#4714, CVL#1358, KTS#4714 |
Triple-DES#2498, CVL#1395, RSA#2569, CVL#1360, SHS#3862, HMAC#3133, CVL#1356, SHS#3861, ECDSA#1165, AES#4713, DRBG#1604, HMAC#3134, AES#4712, AES#4714, CVL#1358, KTS#4714 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
4.4.4, 4.4.2 |
4.4.5 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
- Cert:
- #1: 1
- #1165: 1
- #1356: 1
- #1358: 1
- #1360: 1
- #1395: 1
- #16: 1
- #1604: 1
- #2498: 1
- #2569: 1
- #3133: 1
- #3134: 1
- #3861: 1
- #3862: 1
- #4712: 1
- #4713: 1
- #4714: 4
|
- Cert:
- #1: 1
- #1165: 1
- #1356: 2
- #1358: 1
- #1360: 1
- #1395: 1
- #16: 1
- #1604: 1
- #2498: 1
- #2569: 1
- #3133: 1
- #3134: 1
- #3861: 1
- #3862: 1
- #4712: 1
- #4713: 1
- #4714: 4
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- #1165 CVL: 1
- #2569 CVL: 1
- #3133 HMAC: 1
- #4712 DRBG: 1
- #4714 RSA: 1
- AES #4712: 1
- AES #4713: 1
- AES #4714: 3
- AES 128: 1
- CVL #1356: 1
- CVL #1358: 1
- CVL #1360: 1
- CVL #1395: 1
- Cert # AES: 1
- DRBG #1604: 1
- HMAC #3133: 2
- HMAC SHA1: 1
- HMAC SHA256: 1
- PKCS #1: 2
- PKCS#1: 12
- RSA #2569: 1
- RSA 2048: 3
- SHA #3861: 1
- SHA #3862: 1
- SHA1: 3
- SHA256: 1
|
- Certlike:
- #1165 CVL: 1
- #2569 CVL: 1
- #3133 HMAC: 1
- #4712 DRBG: 1
- #4714 RSA: 1
- AES #4712: 1
- AES #4713: 1
- AES #4714: 3
- AES 128: 1
- CVL #1356: 1
- CVL #1358: 1
- CVL #1360: 1
- CVL #1395: 1
- Cert # AES: 1
- DRBG #1604: 1
- HMAC #3133: 2
- HMAC SHA1: 1
- HMAC SHA256: 1
- PKCS #1: 2
- PKCS#1: 12
- RSA #2569: 1
- RSA 2048: 3
- SHA #3861: 1
- SHA #3862: 1
- SHA1: 3
- SHA256: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
|
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
|
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: lgarcia
- /CreationDate: D:20190419094715-07'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20190419094715-07'00'
- /Producer: Acrobat Distiller 17.0 (Windows)
- /Title: Microsoft Word - 210u - Yubico YubiKey 4 Security Policy v1.2_03.25.2019.docx
- pdf_file_size_bytes: 402024
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
- /Author: lgarcia
- /CreationDate: D:20190828151728-07'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20190828151728-07'00'
- /Producer: Acrobat Distiller 17.0 (Windows)
- /Title: Microsoft Word - 200k- Yubico YubiKey 4 Security Policy v1.5 08.28.2019.docx
- pdf_file_size_bytes: 414640
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy |
When operated in FIPS mode and configured as specified in Section 1.3 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/JuneCertFinal.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/SeptConsolidated.pdf |
web_data/date_sunset |
|
|
web_data/description |
The Yubikey 4 cryptographic module is a secure element that supports multiple protocols designed to be embedded in USB security tokens. The module can generate, store, and perform cryptographic operations for sensitive data and can be utilized via an external touch-button for Test of User Presence in addition to PIN for smart card authentication.The module implements five major functions - Yubico One Time Password (OTP), FIDO Universal 2nd Factor (U2F), PIV-compatible smart card, OpenPGP smart card and OATH OTP authentication. |
The Yubikey 4 cryptographic module is a secure element that supports multiple protocols designed to be embedded in USB security tokens. The module can generate, store, and perform cryptographic operations for sensitive data and can be utilized via an external touch-button for Test of User Presence in addition to PIN for smart card authentication.The module implements five major functions - Yubico One Time Password (OTP), FIDO Universal 2nd Factor (U2F), PIV-compatible smart card, OpenPGP smart card and OATH OTP authentication. |
web_data/embodiment |
Single Chip |
Single Chip |
web_data/exceptions |
Physical Security: Level 3, EMI/EMC: Level 3, Design Assurance: Level 3, Mitigation of Other Attacks: N/A |
Physical Security: Level 3, EMI/EMC: Level 3, Design Assurance: Level 3, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
4, ., 4, ., 2, ,, , 4, ., 4, ., 4 |
4, ., 4, ., 5, , , , , , , |
web_data/historical_reason |
|
SP 800-56Arev3 transition |
web_data/hw_versions |
S, L, E, 7, 8, C, L, U, F, X, 3, 0, 0, 0, P, H |
S, L, E, 7, 8, C, L, U, F, X, 3, 0, 0, 0, P, H |
web_data/level |
2 |
2 |
web_data/mentioned_certs |
|
|
web_data/module_name |
YubiKey 4 Cryptographic Module |
YubiKey 4 Cryptographic Module |
web_data/module_type |
Hardware |
Hardware |
web_data/revoked_link |
https://www.yubico.com/support/security-advisories/ysa-2019-02/ |
|
web_data/revoked_reason |
The firmware versions have a security flaw. |
|
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
revoked |
historical |
web_data/sw_versions |
None |
None |
web_data/tested_conf |
[] |
[] |
web_data/validation_history |
- date: 21.06.2018
- lab: UL VERIFICATION SERVICES INC
- validation_type: Initial
|
- date: 03.09.2019
- lab: UL VERIFICATION SERVICES INC
- validation_type: Initial
|
web_data/vendor |
Yubico, Inc. |
Yubico, Inc. |
web_data/vendor_url |
http://www.yubico.com |
http://www.yubico.com |