cert_id |
4217 |
4682 |
dgst |
7ec7bbd3677bee60 |
c3938f1bf0318a52 |
heuristics/algorithms |
AES#C2204, ECDSA#A1945, KTS#A1945, HMAC#C2204, SHS#A1945, HMAC#A1945, SHA-3#C2204, KTS#A1944, SHA-3#A1944, DSA#C2204, DRBG#A1944, ECDSA#C2204, ECDSA#A1944, SHA-3-Customized#A1945, CVL#A1944, CVL#C2204, DRBG#A1945, SHA-3-Customized#C2204, AES#A1944, SHA-3-Customized#A1944, DSA#A1944, SHS#C2204, SHA-3#A1945, KTS#C2204, HMAC#A1944, AES#A1945, KBKDF#A1944, RSA#A1945, Triple-DES#C2204, SHS#A1944, KBKDF#A1945, Triple-DES#A1944, KBKDF#C2204, DSA#A1945, RSA#C2204, DRBG#C2204, CVL#A1945, Triple-DES#A1945, RSA#A1944 |
SHA-3#A3357, SHA-3#A2113, Triple-DES#A3357, Triple-DES#A2113, SHA-3-Customized#A2113, DRBG#A3357, KTS#A2113, DRBG#A2113, DSA#A2113, SHS#A2113, CVL#A3357, CVL#A2113, ECDSA#A2113, AES#A3357, DSA#A3357, KBKDF#A2113, KBKDF#A3357, RSA#A3357, ECDSA#A3357, HMAC#A3357, HMAC#A2113, KTS#A3357, SHS#A3357, RSA#A2113, SHA-3-Customized#A3357, AES#A2113 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- Cert # AES: 1
- DRBG 11: 1
- DRBG10: 1
- DSA4: 1
- Diffie-Hellman (160: 1
- Diffie-Hellman (2048: 1
- HMAC SHA-256: 1
- HMAC-SHA-256: 2
- HMAC-SHA256: 2
- PKCS #1: 2
- PKCS#1: 4
- PKCS#12: 4
- PKCS#5: 4
- PKCS1: 2
- SHA-1: 9
- SHA-2: 2
- SHA-224: 5
- SHA-256: 8
- SHA-3: 3
- SHA-384: 5
- SHA-512: 7
- SHA3: 1
- SHA3-224: 2
- SHA3-256: 3
- SHA3-384: 2
- SHA3-512: 2
|
- Certlike:
- Cert # AES: 1
- Cert # RSA: 1
- DRBG10: 1
- DSA4: 1
- Diffie-Hellman (160: 1
- Diffie-Hellman (2048: 1
- HMAC SHA-256: 1
- HMAC-SHA-256: 2
- HMAC-SHA256: 2
- PKCS#1: 4
- PKCS#12: 4
- PKCS#5: 4
- PKCS1: 2
- SHA- 384: 1
- SHA- 512: 2
- SHA-1: 9
- SHA-2: 2
- SHA-224: 5
- SHA-256: 8
- SHA-3: 3
- SHA-384: 4
- SHA-512: 5
- SHA3: 1
- SHA3- 256: 1
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 2
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- CAST:
- RC:
- Serpent:
- Twofish:
- DES:
- 3DES:
- TDEA: 7
- TDES: 1
- Triple-DES: 27
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- CMAC: 5
- HMAC: 12
- HMAC-SHA-256: 1
- miscellaneous:
- Blowfish:
- Camellia:
- IDEA:
- SEED:
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 7
- TDES: 1
- Triple-DES: 31
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- CMAC: 6
- HMAC: 14
- HMAC-SHA-256: 1
- miscellaneous:
- Blowfish:
- Camellia:
- SEED:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- PBKDF:
- RIPEMD:
- RIPEMD: 1
- RIPEMD128: 1
- RIPEMD256: 1
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 5
- SHA-256: 8
- SHA-384: 5
- SHA-512: 7
- SHA3:
- SHA-3: 3
- SHA3: 1
- SHA3-224: 2
- SHA3-256: 3
- SHA3-384: 2
- SHA3-512: 2
- SHAKE:
|
- MD:
- PBKDF:
- RIPEMD:
- RIPEMD: 1
- RIPEMD128: 1
- RIPEMD160: 1
- RIPEMD256: 1
- RIPEMD320: 1
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 5
- SHA-256: 8
- SHA-384: 4
- SHA-512: 5
- SHA3:
- SHA-3: 3
- SHA3: 1
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 2
- SHAKE:
- scrypt:
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
|
pdf_data/keywords/ecc_curve |
- Edwards:
- NIST:
- B-233: 4
- B-283: 5
- B-409: 5
- B-571: 5
- K-233: 4
- K-283: 5
- K-409: 5
- K-571: 3
- P-224: 10
- P-256: 12
- P-384: 10
- P-521: 10
|
- Edwards:
- NIST:
- B-233: 5
- B-283: 4
- B-409: 5
- B-571: 5
- K-233: 5
- K-283: 3
- K-409: 5
- K-571: 5
- P-224: 10
- P-256: 12
- P-384: 10
- P-521: 10
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
- SCA:
- timing attack: 1
- timing attacks: 1
|
- SCA:
- timing attack: 1
- timing attacks: 1
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 17
- FIPS 180-4: 2
- FIPS 186-2: 1
- FIPS 186-3: 1
- FIPS 186-4: 10
- FIPS 197: 2
- FIPS 198-1: 3
- FIPS 202: 2
- FIPS PUB 140-2: 1
- NIST:
- NIST SP 800-90C: 1
- SP 800-108: 8
- SP 800-131: 1
- SP 800-132: 4
- SP 800-133: 2
- SP 800-135: 7
- SP 800-185: 1
- SP 800-38A: 7
- SP 800-38B: 2
- SP 800-38C: 4
- SP 800-38D: 5
- SP 800-38F: 5
- SP 800-56A: 4
- SP 800-56B: 8
- SP 800-56C: 5
- SP 800-67: 5
- SP 800-89: 1
- SP 800-90A: 3
- PKCS:
- PKCS #1: 1
- PKCS#1: 2
- PKCS#12: 2
- PKCS#5: 2
- PKCS1: 1
- RFC:
|
- FIPS:
- FIPS 140-2: 17
- FIPS 180-4: 2
- FIPS 186-2: 1
- FIPS 186-3: 1
- FIPS 186-4: 10
- FIPS 197: 2
- FIPS 198-1: 3
- FIPS 202: 2
- FIPS PUB 140-2: 1
- NIST:
- SP 800-108: 9
- SP 800-131: 1
- SP 800-132: 5
- SP 800-133: 2
- SP 800-135: 7
- SP 800-185: 1
- SP 800-38A: 7
- SP 800-38B: 2
- SP 800-38C: 4
- SP 800-38D: 5
- SP 800-38F: 5
- SP 800-56A: 5
- SP 800-56B: 8
- SP 800-56C: 5
- SP 800-67: 5
- SP 800-89: 1
- SP 800-90A: 3
- SP 800-90C: 1
- PKCS:
- PKCS#1: 2
- PKCS#12: 2
- PKCS#5: 2
- PKCS1: 1
- RFC:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
|
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When installed, initialized and configured as specified in the Security Policy Section 8 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy |
When installed, initialized and configured as specified in the Security Policy Section 8 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2022_010622_0641_signed.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/March 2024_010424_0643 signed.pdf |
web_data/date_sunset |
|
|
web_data/description |
The Nokia BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various Nokia applications via a well-defined Java-language application programming interface (API). |
The Nokia BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various Nokia applications via a well-defined Java-language application programming interface (API). |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A |
Physical Security: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
Moved to historical list due to sunsetting |
Moved to historical list due to sunsetting |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Nokia BC-FJA (Bouncy Castle FIPS Java API) |
Nokia BC-FJA (Bouncy Castle FIPS Java API) |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
1.0.2.1 |
1.0.2.3 |
web_data/tested_conf |
RHEL 7.9 with JDK 8 on KVM on RHEL 7.9 running on HP Proliant DL380 Gen10 with Intel Xeon Gold 5220, RHEL 8.4 with JDK 8 on Vmware ESXi 6.7 running on HP Proliant BL460c Gen10 with Intel Xeon Silver 4110, Vmware Photon OS 2.0 with JDK 11 on Vmware ESXi 6.7 running on Dell PowerEdge R830 with Intel Xeon E5 (single-user mode), VMware Photon OS 2.0 with JDK 7 on VMware ESXi 6.7 running on Dell PowerEdge R830 with Intel Xeon E5, VMware Photon OS 2.0 with JDK 8 on Vmware ESXi 6.7 running on Dell PowerEdge R830 with Intel Xeon E5, None, None |
RHEL 8.6 JDK 11 on VMware 7.0.3 running on HPE ProLiant G10 with CPU model Intel Xeon-Gold 6258R, RHEL 8.6 with JDK 11 on RHEL 8.6 KVM running on HPE ProLiant G10 with CPU model Intel Xeon-Gold 6132, RHEL 8.6 with JDK 8 on RHEL 8.6 KVM running on HPE ProLiant G10 with CPU model Intel Xeon-Gold 6132, RHEL 8.6 with JDK 8 on VMware 7.0.3 running on HPE ProLiant G10 with CPU model Intel Xeon-Gold 6258R, VMware Photon OS 2.0 with JDK 11 on VMware ESXi 6.7 running on Dell PowerEdge R830 with Intel Xeon E5 (single-user mode), VMware Photon OS 2.0 with JDK 7 on VMware ESXi 6.7 running on Dell PowerEdge R830 with Intel Xeon E5, VMware Photon OS 2.0 with JDK 8 on VMware ESXi 6.7 running on Dell PowerEdge R830 with Intel Xeon E5 |
web_data/validation_history |
- date: 09.05.2022
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
|
- date: 27.03.2024
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
|
web_data/vendor |
NOKIA SOLUTIONS AND NETWORKS OY |
NOKIA SOLUTIONS AND NETWORKS OY |
web_data/vendor_url |
http://www.nokia.com |
http://www.nokia.com |