cert_id |
4582 |
3529 |
dgst |
486ea85278bd246c |
e74d21caffe16a05 |
heuristics/algorithms |
AES#C221, CVL#C416, HMAC#C416, DRBG#C416, KAS#A3304, SHS#C416, RSA#C416, KDA#A3304, KTS#C416, KAS-SSC#A3304, AES#C416 |
AES#C221, CVL#C416, HMAC#C416, DRBG#C416, SHS#C416, RSA#C416, KTS#C416, AES#C416 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
1.3.12 |
1.3.12 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES 128, 192: 1
- AES-128: 1
- AES-192: 1
- AES-256: 1
- AES-GCM 256: 1
- CVL6: 1
- DSA8: 1
- HMAC 160: 1
- HMAC 160, 256: 1
- HMAC- SHA-256: 1
- HMAC-SHA- 512: 2
- HMAC-SHA-1: 4
- HMAC-SHA-256: 2
- HMAC-SHA-384: 10
- HMAC-SHA-512: 2
- PKCS1: 4
- RSA 2048: 1
- SHA- 256: 2
- SHA-1: 6
- SHA-256: 5
- SHA-384: 9
- SHA-512: 5
|
- Certlike:
- AES 128, 192: 1
- AES-128: 1
- AES-192: 1
- AES-256: 1
- AES-GCM 256: 1
- HMAC 160: 1
- HMAC 160, 256: 1
- HMAC- SHA-256: 1
- HMAC-SHA- 512: 2
- HMAC-SHA-1: 4
- HMAC-SHA-256: 2
- HMAC-SHA-384: 10
- HMAC-SHA-512: 2
- PKCS1: 4
- RSA 2048: 1
- SHA- 256: 2
- SHA-1: 5
- SHA-256: 5
- SHA-384: 7
- SHA-512: 5
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 18
- AES-128: 1
- AES-192: 1
- AES-256: 1
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 1
- HMAC-SHA-384: 5
- HMAC-SHA-512: 1
|
- AES_competition:
- AES:
- AES: 18
- AES-128: 1
- AES-192: 1
- AES-256: 1
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 1
- HMAC-SHA-384: 5
- HMAC-SHA-512: 1
|
pdf_data/keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 20
- Diffie-Hellman: 11
- RSA:
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 5
- SHA-384: 9
- SHA-512: 5
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 5
- SHA-384: 7
- SHA-512: 5
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
- SSH:
- TLS:
- TLS:
- TLS: 58
- TLS 1.2: 1
- TLS v1.2: 1
|
- SSH:
- TLS:
- TLS:
- TLS: 56
- TLS 1.2: 1
- TLS v1.2: 1
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
- NIST:
- P-256: 6
- P-384: 4
- P-521: 6
|
- NIST:
- P-256: 4
- P-384: 4
- P-521: 4
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140: 4
- FIPS 140-2: 15
- FIPS 186-4: 1
- FIPS 197: 2
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 198: 1
- NIST:
- NIST SP 800-135: 1
- NIST SP 800-38D: 1
- NIST SP 800-90A: 1
- SP 800-133: 2
- SP 800-135: 7
- SP 800-38A: 2
- SP 800-38D: 3
- SP 800-52: 1
- SP 800-56A: 1
- SP 800-90A: 60
- PKCS:
- RFC:
|
- FIPS:
- FIPS 140: 4
- FIPS 140-2: 15
- FIPS 197: 2
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 198: 1
- NIST:
- NIST SP 800-135: 1
- NIST SP 800-38D: 1
- NIST SP 800-56A: 1
- NIST SP 800-90A: 1
- SP 800-133: 2
- SP 800-135: 3
- SP 800-38A: 2
- SP 800-38D: 3
- SP 800-52: 1
- SP 800-56A: 2
- SP 800-90A: 60
- PKCS:
- RFC:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
|
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When installed, initialized and configured as specified in the Security Policy Section 10 and operated in FIPS mode |
When installed, initialized and configured as specified in the Security Policy Section 10 and operated in FIPS mode |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2023_101023_1100 signed (2).pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/SeptConsolidated.pdf |
web_data/date_sunset |
|
|
web_data/description |
PacketLight's PL-2000M, PL-2000AD and PL-2000ADS Layer-1 encryption solutions ensure the confidentiality and integrity of data, based on GCM-AES-256 encryption standards, supporting Diffie-Hellman (DH) key exchange up to every 1-minute. In addition, the solutions support multiple protocols including 10G/40G/100G Ethernet, 8G/16G/32G Fibre Channel, OTU2/OTU2e/OTU3/OTU4 and STM-64/OC-192 |
PacketLight's PL-2000M, PL-2000AD and PL-2000ADS Layer-1 encryption solutions ensure the confidentiality and integrity of data, based on GCM-AES-256 encryption standards, supporting Diffie-Hellman (DH) key exchange up to every 1-minute. In addition, the solutions support multiple protocols including 10G/40G/100G Ethernet, 8G/16G/32G Fibre Channel, OTU2/OTU2e/OTU3/OTU4 and STM-64/OC-192 |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Mitigation of Other Attacks: N/A |
Mitigation of Other Attacks: N/A |
web_data/fw_versions |
1, ., 3, ., 1, 2, d |
1, ., 3, ., 1, 2, |
web_data/historical_reason |
Moved to historical list due to sunsetting |
SP 800-56Arev3 transition |
web_data/hw_versions |
P, L, -, 2, 0, 0, 0, M, ,, , P, L, -, 2, 0, 0, 0, A, D, ,, , P, L, -, 2, 0, 0, 0, A, D, S |
P, L, -, 2, 0, 0, 0, M, ,, , P, L, -, 2, 0, 0, 0, A, D, ,, , P, L, -, 2, 0, 0, 0, A, D, S |
web_data/level |
2 |
2 |
web_data/mentioned_certs |
|
|
web_data/module_name |
PL-2000M, PL-2000AD and PL-2000ADS |
PL-2000M, PL-2000AD and PL-2000ADS |
web_data/module_type |
Hardware |
Hardware |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
None |
None |
web_data/tested_conf |
[] |
[] |
web_data/validation_history |
- date: 04.09.2023
- lab: Lightship Security, Inc.
- validation_type: Initial
|
- date: 18.09.2019
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
|
web_data/vendor |
PacketLight Networks Ltd. |
PacketLight Networks Ltd. |
web_data/vendor_url |
http://www.packetlight.com |
http://www.packetlight.com |