cert_id |
4042 |
4301 |
dgst |
3df9083769048a26 |
f66939aed19dcd45 |
heuristics/algorithms |
CVL#A1421, Triple-DES#A1421, AES#A1421, DRBG#A1421, KTS#A1421, HMAC#A1421, ECDSA#A1421, SHS#A1421, RSA#A1421 |
KAS-SSC#A2751, SHS#A2751, DRBG#A2751, Triple-DES#A2751, CVL#A2751, KAS#A2751, AES#A2751, HMAC#A2751, KTS#A2751, ECDSA#A2751, RSA#A2751 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES-256: 1
- HMAC- SHA-224: 1
- HMAC-SHA- 256: 2
- HMAC-SHA-1: 4
- HMAC-SHA-256: 4
- HMAC-SHA-384: 2
- HMAC-SHA-512: 4
- SHA- 256: 1
- SHA-1: 2
- SHA-224: 2
- SHA-256: 1
- SHA-384: 1
- SHA-512: 2
- SHA2-224: 1
- SHA2-256: 1
- SHA2-384: 1
- SHA2-512: 1
|
- Certlike:
- AES-256: 1
- HMAC- SHA-224: 1
- HMAC-SHA- 256: 2
- HMAC-SHA-1: 4
- HMAC-SHA-256: 4
- HMAC-SHA-384: 2
- HMAC-SHA-512: 4
- PKCS 1: 2
- SHA- 256: 1
- SHA-1: 2
- SHA-224: 2
- SHA-256: 1
- SHA-384: 1
- SHA-512: 2
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 6
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
- HMAC-SHA-512: 2
|
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 6
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
- HMAC-SHA-512: 2
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 1
- SHA-384: 1
- SHA-512: 2
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 1
- SHA-384: 1
- SHA-512: 2
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
- TLS:
- SSL:
- TLS:
- TLS: 13
- TLS 1.0: 1
- TLS v1.2: 1
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
|
pdf_data/keywords/ecc_curve |
- NIST:
- P-224: 4
- P-256: 6
- P-384: 4
- P-521: 2
|
- NIST:
- Curve P-256: 1
- P-224: 6
- P-256: 9
- P-384: 6
- P-521: 4
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140: 4
- FIPS 140-2: 21
- FIPS 180-4: 2
- FIPS 186-4: 3
- FIPS 197: 2
- FIPS 198-1: 2
- FIPS PUB 140-2: 1
- NIST:
- NIST SP 800-131A: 1
- NIST SP 800-133: 1
- NIST SP 800-38D: 1
- NIST SP 800-52: 1
- NIST SP 800-90A: 1
- SP 800-131A: 1
- SP 800-133: 1
- SP 800-135: 2
- SP 800-38A: 2
- SP 800-38D: 2
- SP 800-38F: 2
- SP 800-56A: 1
- SP 800-67: 2
- SP 800-90A: 2
- RFC:
|
- FIPS:
- FIPS 140: 4
- FIPS 140-2: 21
- FIPS 180-4: 2
- FIPS 186-4: 3
- FIPS 197: 2
- FIPS 198-1: 2
- FIPS PUB 140-2: 1
- NIST:
- NIST SP 800-131A: 1
- NIST SP 800-133: 1
- NIST SP 800-38D: 1
- NIST SP 800-52: 1
- NIST SP 800-90A: 1
- SP 800-131A: 1
- SP 800-133: 1
- SP 800-135: 2
- SP 800-38A: 2
- SP 800-38C: 1
- SP 800-38D: 2
- SP 800-38F: 2
- SP 800-56A: 1
- SP 800-67: 2
- SP 800-90A: 2
- PKCS:
- RFC:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: Ryan Thomas
- /CreationDate: D:20230105134801-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230105134801-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 603012
- pdf_hyperlinks: https://csrc.nist.gov/groups/STM/cmvp/index.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
- /Author: Ryan Thomas
- /CreationDate: D:20220824194554-07'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20220824194554-07'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 559378
- pdf_hyperlinks: https://csrc.nist.gov/groups/STM/cmvp/index.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When installed, initialized and configured as specified in Section 12.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy |
When operated in FIPS mode. No assurance of the minimum strength of generated keys. |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/October 2021_011121_0730_signed.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2022_031022_0652_signed.pdf |
web_data/date_sunset |
01.12.2025 |
21.09.2026 |
web_data/description |
Motorola BoringCrypto Android Module on Motorola Mobile devices running Android 11. |
Motorola BoringCrypto Android module is an open-source, general-purpose cryptographic library which provides FIPS 140-2 approved cryptographic algorithms to serve BoringSSL and other user-space applications. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A, Mitigation of Other Attacks: N/A |
Physical Security: N/A, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
None |
None |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Motorola BoringCrypto Android |
Motorola BoringCrypto Android |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
active |
active |
web_data/sw_versions |
7f02881e96e51f1873afcf384d02f782b48967ca |
dcdc7bbc6e59ac0123407a9dc4d1f43dd0d117cd |
web_data/tested_conf |
Android 11 running on Motorola Edge + with Qualcomm Snapdragon 865 with PAA, Android 11 running on Motorola Edge + with Qualcomm Snapdragon 865 without PAA (single-user mode) |
Android 12 on Motorola Edge+ (2022) (a.k.a. Motorola Edge+ UW or Motorola edge 30 pro) with Qualcomm Snapdragon 8 gen 1 with PAA, Android 12 on Motorola Edge+ (2022) (a.k.a. Motorola Edge+ UW or Motorola edge 30 pro) with Qualcomm Snapdragon 8 gen 1 without PAA (single-user mode) |
web_data/validation_history |
- date: 06.10.2021
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
- date: 12.01.2023
- lab: ACUMEN SECURITY, LLC
- validation_type: Update
|
- date: 15.09.2022
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
- date: 07.11.2022
- lab: ACUMEN SECURITY, LLC
- validation_type: Update
|
web_data/vendor |
Motorola Mobility LLC |
Motorola Mobility Inc |
web_data/vendor_url |
http://www.motorola.com |
|