cert_id |
3643 |
4472 |
dgst |
6678394ac11e55af |
71cadd0c63e57249 |
heuristics/algorithms |
SHS#C792, AES#C790, KTS#C792, AES#C791, AES#C789, DSA#C792, Triple-DES#C792, AES#C792, SHS#C790, CVL#C792, HMAC#C792, ECDSA#C792, DRBG#C792, RSA#C792 |
KTS#A4151, SHS#C792, AES#C790, AES#C789, DSA#C792, RSA#A4151, KTS#A4152, SHS#A4152, KTS#C792, AES#C791, CVL#A4151, DSA#A4151, AES#C792, AES#A4152, HMAC#C792, Triple-DES#A4151, AES#A4151, DRBG#C792, HMAC#A4152, ECDSA#A4151, CVL#C792, AES#A4150, SHS#C790, ECDSA#C792, DRBG#A4151, HMAC#A4151, Triple-DES#C792, SHS#A4151, RSA#C792 |
heuristics/cpe_matches |
cpe:2.3:o:amazon:linux_2:-:*:*:*:*:*:*:* |
cpe:2.3:o:amazon:linux_2:-:*:*:*:*:*:*:* |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
2 |
2 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES- 256: 1
- AES-128: 1
- AES-256: 3
- AES-GCM 128: 1
- AES2: 1
- Cert# AES: 1
- HMAC 128: 2
- HMAC 192: 2
- HMAC-SHA-1: 4
- PKCS#1: 2
- PKCS#11: 4
- SHA-1: 7
- SHA2: 2
- SHA2-224: 9
- SHA2-256: 15
- SHA2-384: 14
- SHA2-512: 9
- SHA2-512 1024: 1
- SHA2-512 112: 1
- SHA2-512 2048 and 3072: 1
- SHA3: 2
|
- Certlike:
- AES- 256: 1
- AES-128: 1
- AES-256: 4
- AES-GCM 128: 2
- AES2: 1
- AES3: 1
- Cert# AES: 2
- HMAC 128: 4
- HMAC 192: 4
- HMAC-SHA-1: 4
- PKCS#1: 2
- PKCS#11: 4
- SHA-1: 11
- SHA2: 2
- SHA2-224: 17
- SHA2-256: 26
- SHA2-384: 26
- SHA2-512: 17
- SHA2-512 1024: 2
- SHA2-512 112: 2
- SHA2-512 2048 and 3072: 2
- SHA3: 2
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 29
- AES-: 2
- AES-128: 1
- AES-256: 3
- CAST:
- RC:
- Serpent:
- Twofish:
- DES:
- constructions:
- djb:
- miscellaneous:
- Blowfish:
- Camellia:
- GOST:
|
- AES_competition:
- AES:
- AES: 34
- AES-: 1
- AES-128: 1
- AES-256: 4
- CAST:
- RC:
- Serpent:
- Twofish:
- DES:
- constructions:
- djb:
- miscellaneous:
- Blowfish:
- Camellia:
- GOST:
|
pdf_data/keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 1
- DHE: 1
- Diffie-Hellman: 40
- DSA:
|
- ECC:
- FF:
- DH:
- DH: 1
- DHE: 1
- Diffie-Hellman: 15
- DSA:
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
|
|
pdf_data/keywords/crypto_scheme |
- KA:
- Key Agreement: 7
- Key agreement: 6
- KEX:
- MAC:
|
- KA:
- Key Agreement: 3
- Key agreement: 2
- KEX:
- MAC:
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
- NIST:
- P-256: 20
- P-384: 16
- P-521: 16
|
- NIST:
- P-256: 22
- P-384: 18
- P-521: 18
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
- SCA:
- Timing Attacks: 1
- timing attacks: 2
|
- SCA:
- Timing Attacks: 1
- timing attacks: 2
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 54
- FIPS 186-4: 7
- FIPS PUB 140-2: 1
- FIPS140-2: 1
- FIPS180-4: 2
- FIPS186-4: 4
- FIPS197: 5
- FIPS198-1: 4
- NIST:
- NIST SP 800-135: 1
- NIST SP 800-90A: 1
- SP 800-52: 1
- SP 800-90A: 1
- PKCS:
- RFC:
- RFC 5764: 1
- RFC3711: 1
- RFC4347: 2
- RFC4357: 2
- RFC5246: 3
- RFC5288: 2
- RFC5764: 1
- X509:
|
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 56
- FIPS 186-4: 6
- FIPS PUB 140-2: 1
- FIPS140-2: 1
- FIPS180-4: 3
- FIPS186-4: 6
- FIPS197: 9
- FIPS198-1: 7
- NIST:
- NIST SP 800-90A: 1
- SP 800-52: 1
- SP 800-90A: 1
- PKCS:
- RFC:
- RFC 5764: 1
- RFC3711: 1
- RFC4347: 2
- RFC4357: 2
- RFC5246: 3
- RFC5288: 2
- RFC5764: 1
- X509:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: Marcos Portnoi
- /CreationDate: D:20200306142644-06'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20200306142644-06'00'
- /Producer: Microsoft® Word for Office 365
- /Title: FIPS 140-2 Non-Proprietary Security Policy
- pdf_file_size_bytes: 725359
- pdf_hyperlinks: https://tools.ietf.org/html/rfc5288, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf, http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf, https://tools.ietf.org/html/rfc4347, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=11144, https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips140-2/FIPS1402IG.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=11145, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=11143, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=11146, https://tools.ietf.org/html/rfc5764, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf, https://tools.ietf.org/rfc/rfc8017.txt, https://tools.ietf.org/html/rfc3711, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, https://tools.ietf.org/html/rfc5246, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-67r2.pdf, http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r1.pdf, https://gnutls.org/manual/html_node/Error-codes.html, https://dl.acm.org/citation.cfm?id=1251354, https://tools.ietf.org/html/rfc4357, http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
- /Author: Marcos Portnoi
- /CreationDate: D:20240305215154+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20240305215154+00'00'
- /Title: FIPS 140-2 Non-Proprietary Security Policy
- pdf_file_size_bytes: 736735
- pdf_hyperlinks: https://tools.ietf.org/html/rfc5288, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16691, http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf, https://tools.ietf.org/html/rfc4347, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=11144, https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips140-2/FIPS1402IG.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=11143, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=11145, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=11146, https://tools.ietf.org/html/rfc5764, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf, https://tools.ietf.org/rfc/rfc8017.txt, https://tools.ietf.org/html/rfc3711, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16692, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, https://tools.ietf.org/html/rfc5246, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-67r2.pdf, http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r1.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16690, https://gnutls.org/manual/html_node/Error-codes.html, https://dl.acm.org/citation.cfm?id=1251354, https://tools.ietf.org/html/rfc4357, http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 41
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode. When installed, initialized and configured as specified in Section 10.1 of the Security Policy. |
When operated in FIPS mode. When installed, initialized and configured as specified in Section 10.1 of the Security Policy. |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/April 2020_010520_0717.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/April 2023_010523_0646.pdf |
web_data/date_sunset |
|
19.04.2025 |
web_data/description |
The Amazon Linux 2 GnuTLS Cryptographic Module implements general purpose cryptographic algorithms and network protocols. |
The Amazon Linux 2 GnuTLS Cryptographic Module implements general purpose cryptographic algorithms and network protocols. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A |
Physical Security: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
SP 800-56Arev3 transition - replaced by certificate #4472 |
|
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Amazon Linux 2 GnuTLS Cryptographic Module |
Amazon Linux 2 GnuTLS Cryptographic Module |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
active |
web_data/sw_versions |
1.0 |
1.0 |
web_data/tested_conf |
Amazon Linux 2 running on Amazon EC2 i3.metal with Intel Xeon E5 with PAA, Amazon Linux 2 running on Amazon EC2 i3.metal with Intel Xeon E5 without PAA (single-user mode), , |
Amazon Linux 2 running on Amazon EC2 c6g.metal with Graviton 2 with PAA, Amazon Linux 2 running on Amazon EC2 c6g.metal with Graviton 2 without PAA (single-user mode), Amazon Linux 2 running on Amazon EC2 i3.metal with Intel Xeon E5 with PAA, Amazon Linux 2 running on Amazon EC2 i3.metal with Intel Xeon E5 without PAA |
web_data/validation_history |
- date: 20.04.2020
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
- date: 14.04.2023
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
web_data/vendor |
Amazon Web Services, Inc. |
Amazon Web Services, Inc. |
web_data/vendor_url |
http://aws.amazon.com |
http://aws.amazon.com |