cert_id |
4416 |
2792 |
dgst |
479904cc2d928ec4 |
48be9979594810ed |
heuristics/algorithms |
KAS#A1905, SHS#A1905, KDA#A1905, KTS#A1905, CVL#A1905, Triple-DES#A1905, KTS-RSA#A1905, ECDSA#A1905, RSA#A1905, DSA#A1905, DRBG#A1905, KAS-SSC#A1905, PBKDF#A1905, SHA-3#A1905, AES#A1905, HMAC#A1905 |
AES#C2202, DSA#C2202, RSA#C2202, Triple-DES#C2202, HMAC#C2202, SHS#C2202, ECDSA#C2202, CVL#C2202, SHA-3#C2202, DRBG#C2202 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
3655 |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
3655 |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- Cert # AES: 1
- DSA3: 1
- Diffie-Hellman (224: 1
- HMAC SHA- 256: 1
- HMAC SHA- 512/256: 1
- HMAC SHA-1: 2
- HMAC SHA-224: 2
- HMAC SHA-256: 1
- HMAC SHA-384: 2
- HMAC SHA-512: 2
- HMAC SHA-512/224: 2
- HMAC SHA-512/256: 1
- HMAC-SHA-256: 6
- HMAC-SHA512: 2
- PKCS #1: 2
- PKCS#1: 2
- PKCS#12: 2
- PKCS#5: 2
- PKCS1: 2
- RSA13: 1
- SHA- 224: 1
- SHA- 256: 2
- SHA- 512: 1
- SHA-1: 12
- SHA-2: 2
- SHA-224: 7
- SHA-256: 8
- SHA-3: 4
- SHA-384: 8
- SHA-512: 7
- SHA3- 224: 1
- SHA3- 512: 2
- SHA3-224: 7
- SHA3-256: 8
- SHA3-384: 8
- SHA3-512: 6
|
- Certlike:
- Cert # AES: 1
- Cert # SHA: 1
- DSA3: 1
- HMAC-SHA512: 2
- PKCS #1: 2
- PKCS#1: 2
- PKCS#12: 2
- PKCS#5: 2
- PKCS1: 2
- SHA-1: 8
- SHA-2: 2
- SHA-224: 5
- SHA-256: 5
- SHA-3: 3
- SHA-384: 5
- SHA-512: 5
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 2
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- TDEA: 6
- TDES: 1
- Triple-DES: 22
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- CMAC: 5
- HMAC: 32
- HMAC-SHA-256: 3
- djb:
- miscellaneous:
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 6
- TDES: 1
- Triple-DES: 18
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- CMAC: 6
- HMAC: 9
- djb:
- miscellaneous:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- PBKDF:
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 7
- SHA-256: 8
- SHA-384: 8
- SHA-512: 7
- SHA3:
- SHA-3: 4
- SHA3-224: 7
- SHA3-256: 8
- SHA3-384: 8
- SHA3-512: 6
- SHAKE:
|
- MD:
- PBKDF:
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 5
- SHA-256: 5
- SHA-384: 5
- SHA-512: 5
- SHA3:
- SHA-3: 3
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 2
- SHAKE:
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
- TLS:
- TLS:
- TLS: 14
- TLS 1.0: 3
- TLS 1.2: 3
|
- TLS:
- TLS:
- TLS: 8
- TLS 1.0: 1
- TLS 1.2: 1
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
|
pdf_data/keywords/ecc_curve |
- NIST:
- B-233: 5
- B-283: 4
- B-409: 2
- B-571: 4
- K-233: 4
- K-283: 3
- K-409: 4
- K-571: 4
- P-224: 8
- P-256: 12
- P-384: 8
- P-521: 2
|
- NIST:
- B-283: 1
- B-409: 1
- B-571: 1
- K-233: 1
- K-283: 1
- K-409: 1
- K-571: 1
- P-224: 2
- P-256: 6
- P-384: 2
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
- SCA:
- timing attack: 1
- timing attacks: 1
|
- SCA:
- timing attack: 1
- timing attacks: 1
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 16
- FIPS 180-4: 2
- FIPS 186-2: 1
- FIPS 186-3: 1
- FIPS 186-4: 10
- FIPS 197: 2
- FIPS 198-1: 3
- FIPS 202: 2
- FIPS PUB 140-2: 1
- NIST:
- NIST SP 800-38D: 1
- SP 800-132: 5
- SP 800-133: 1
- SP 800-135: 5
- SP 800-185: 1
- SP 800-38A: 5
- SP 800-38B: 2
- SP 800-38C: 4
- SP 800-38D: 5
- SP 800-38F: 5
- SP 800-38G: 4
- SP 800-52: 1
- SP 800-56A: 3
- SP 800-56C: 5
- SP 800-67: 5
- SP 800-89: 1
- SP 800-90A: 3
- PKCS:
- PKCS #1: 1
- PKCS#1: 1
- PKCS#12: 1
- PKCS#5: 1
- PKCS1: 1
- RFC:
|
- FIPS:
- FIPS 140-2: 16
- FIPS 180-4: 2
- FIPS 186-2: 1
- FIPS 186-3: 1
- FIPS 186-4: 10
- FIPS 197: 2
- FIPS 198-1: 3
- FIPS 202: 2
- FIPS PUB 140-2: 1
- NIST:
- NIST SP 800-38D: 1
- SP 800-132: 5
- SP 800-135: 4
- SP 800-38A: 3
- SP 800-38B: 2
- SP 800-38C: 2
- SP 800-38D: 5
- SP 800-38F: 5
- SP 800-56A: 1
- SP 800-56B: 5
- SP 800-56C: 2
- SP 800-67: 5
- SP 800-89: 1
- SP 800-90A: 3
- PKCS:
- PKCS #1: 1
- PKCS#1: 1
- PKCS#12: 1
- PKCS#5: 1
- PKCS1: 1
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
|
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode. No assurance of the minimum strength of generated keys. |
When installed, initialized and configured as specified in the Security Policy Section 8 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys. |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/January 2023_010223_0657_signed.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertNov2016.pdf |
web_data/date_sunset |
21.09.2026 |
|
web_data/description |
The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well. |
The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A |
Physical Security: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
|
Moved to historical list due to sunsetting |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
BC-FNA (Bouncy Castle FIPS .NET API) |
BC-FNA (Bouncy Castle FIPS .NET API) |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
active |
historical |
web_data/sw_versions |
1.0.2 |
1.0.1.1 |
web_data/tested_conf |
Microsoft Windows 10 Professional (64-bit) on .NET 4.5.2 framework running on Dell XPS 15 7590 with Intel Core i7-9750H (single-user mode) |
Microsoft Windows 10 Professional (64-bit) on .NET 4.5.2 framework running on Dell XPS 15 7590 with Intel Core i7-9750H (single-user mode) |
web_data/validation_history |
- date: 18.01.2023
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
|
- date: 14.11.2016
- lab: CGI Information Systems & Management Consultants Inc
- validation_type: Initial
|
web_data/vendor |
Legion of the Bouncy Castle Inc. |
Legion of the Bouncy Castle Inc. |
web_data/vendor_url |
http://www.bouncycastle.org |
https://www.bouncycastle.org |