cert_id |
4593
|
3709
|
web_data/caveat |
When operated in FIPS mode with module Amazon Linux 2 NSS Cryptographic Module validated to FIPS 140-2 under Cert. #4565 operating in FIPS mode
|
When operated in FIPS mode with module Amazon Linux 2 NSS Cryptographic Module validated to FIPS 140-2 under Cert. #3646 operating in FIPS mode
|
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2023_101023_1100 signed (2).pdf
|
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2020_011020_0703.pdf
|
web_data/date_sunset |
2025-09-13
|
None
|
web_data/description |
The Linux kernel Crypto API implemented in the Amazon Linux 2 provides services operating inside the Linux kernel with various ciphers, message digests and an approved random number generator.
|
The Linux kernel Crypto API implemented in the Amazon Linux 2 provides services operating inside the Linux kernel with various ciphers, message digests and an approved random number generator.
|
web_data/embodiment |
Multi-Chip Stand Alone
|
Multi-Chip Stand Alone
|
web_data/exceptions |
Physical Security: N/A, Mitigation of Other Attacks: N/A |
Physical Security: N/A, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
None
|
None
|
web_data/historical_reason |
None
|
Moved to historical list due to dependency on certificate #3646
|
web_data/hw_versions |
None
|
None
|
web_data/level |
1
|
1
|
web_data/mentioned_certs |
|
|
web_data/module_name |
Amazon Linux 2 Kernel Crypto API Cryptographic Module
|
Amazon Linux 2 Kernel Crypto API Cryptographic Module
|
web_data/module_type |
Software
|
Software
|
web_data/revoked_link |
None
|
None
|
web_data/revoked_reason |
None
|
None
|
web_data/standard |
FIPS 140-2
|
FIPS 140-2
|
web_data/status |
active
|
historical
|
web_data/sw_versions |
1.0
|
1.0
|
web_data/vendor |
Amazon Web Services, Inc.
|
Amazon Web Services, Inc.
|
web_data/vendor_url |
http://www.aws.amazon.com
|
http://www.aws.amazon.com
|
pdf_data/keywords/asymmetric_crypto/ECC/ECC/ECC |
1
|
4
|
pdf_data/keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
7
|
16
|
pdf_data/keywords/certification_process |
|
|
pdf_data/keywords/cipher_mode/CBC |
|
|
pdf_data/keywords/cipher_mode/CCM |
|
|
pdf_data/keywords/cipher_mode/CTR/CTR |
7
|
8
|
pdf_data/keywords/cipher_mode/ECB |
|
|
pdf_data/keywords/cipher_mode/GCM |
|
|
pdf_data/keywords/cipher_mode/OFB |
|
|
pdf_data/keywords/cipher_mode/XTS |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/crypto_scheme/MAC/MAC |
8
|
6
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/eval_facility/atsec/atsec |
40
|
35
|
pdf_data/keywords/fips_cert_id/Cert |
|
|
pdf_data/keywords/fips_certlike/Certlike |
- HMAC-SHA-1:
6
- HMAC 128:
2
- HMAC-SHA-2: 2
- SHA2-384:
10
- SHA3-256:
5
- SHA-1:
6
- SHA2-224:
5
- SHA2-256:
10
- SHA2-512:
7
- SHA3- 384: 1
- SHA3-512:
4
- SHA2-512 112:
2
- SHA3-224:
3
- SHA3-384:
3
- SHA2-512 2048 and 3072:
1
- SHA-3:
1
- PKCS#1:
4
- AES128:
1
- AES192:
1
- AES256:
1
- AES-128/256:
1
- Cert# AES:
1
- Cert# HMAC: 1
|
- HMAC-SHA-1:
4
- HMAC 128:
2
- SHA3-512:
5
- SHA-1:
6
- SHA2-224:
5
- SHA2-256:
10
- SHA2-384:
9
- SHA2-512:
7
- SHA3-256:
2
- SHA3-384:
4
- SHA2-512 112:
2
- SHA3-224:
3
- SHA3- 256: 2
- SHA2-512 2048 and 3072:
1
- SHA-3:
1
- PKCS#1:
4
- AES128:
1
- AES192:
1
- AES256:
1
- AES-128/256:
1
- Cert# AES:
1
- Cert# RSA: 1
|
pdf_data/keywords/fips_certlike/Certlike/AES-128/256 |
1
|
1
|
pdf_data/keywords/fips_certlike/Certlike/AES128 |
1
|
1
|
pdf_data/keywords/fips_certlike/Certlike/AES192 |
1
|
1
|
pdf_data/keywords/fips_certlike/Certlike/AES256 |
1
|
1
|
pdf_data/keywords/fips_certlike/Certlike/Cert# AES |
1
|
1
|
pdf_data/keywords/fips_certlike/Certlike/HMAC 128 |
2
|
2
|
pdf_data/keywords/fips_certlike/Certlike/HMAC-SHA-1 |
6
|
4
|
pdf_data/keywords/fips_certlike/Certlike/PKCS#1 |
4
|
4
|
pdf_data/keywords/fips_certlike/Certlike/SHA-1 |
6
|
6
|
pdf_data/keywords/fips_certlike/Certlike/SHA-3 |
1
|
1
|
pdf_data/keywords/fips_certlike/Certlike/SHA2-224 |
5
|
5
|
pdf_data/keywords/fips_certlike/Certlike/SHA2-256 |
10
|
10
|
pdf_data/keywords/fips_certlike/Certlike/SHA2-384 |
10
|
9
|
pdf_data/keywords/fips_certlike/Certlike/SHA2-512 |
7
|
7
|
pdf_data/keywords/fips_certlike/Certlike/SHA2-512 112 |
2
|
2
|
pdf_data/keywords/fips_certlike/Certlike/SHA2-512 2048 and 3072 |
1
|
1
|
pdf_data/keywords/fips_certlike/Certlike/SHA3-224 |
3
|
3
|
pdf_data/keywords/fips_certlike/Certlike/SHA3-256 |
5
|
2
|
pdf_data/keywords/fips_certlike/Certlike/SHA3-384 |
3
|
4
|
pdf_data/keywords/fips_certlike/Certlike/SHA3-512 |
4
|
5
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/keywords/hash_function/SHA/SHA3/SHA-3 |
1
|
1
|
pdf_data/keywords/hash_function/SHA/SHA3/SHA3 |
1
|
1
|
pdf_data/keywords/hash_function/SHA/SHA3/SHA3-224 |
4
|
4
|
pdf_data/keywords/hash_function/SHA/SHA3/SHA3-256 |
5
|
2
|
pdf_data/keywords/hash_function/SHA/SHA3/SHA3-384 |
3
|
4
|
pdf_data/keywords/hash_function/SHA/SHA3/SHA3-512 |
4
|
5
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/standard_id/FIPS/FIPS 140 |
2
|
2
|
pdf_data/keywords/standard_id/FIPS/FIPS 140-2 |
51
|
47
|
pdf_data/keywords/standard_id/FIPS/FIPS PUB 140-2 |
1
|
1
|
pdf_data/keywords/standard_id/FIPS/FIPS140-2 |
1
|
1
|
pdf_data/keywords/standard_id/FIPS/FIPS180-4 |
2
|
2
|
pdf_data/keywords/standard_id/FIPS/FIPS186-4 |
2
|
2
|
pdf_data/keywords/standard_id/FIPS/FIPS197 |
7
|
7
|
pdf_data/keywords/standard_id/FIPS/FIPS198-1 |
3
|
3
|
pdf_data/keywords/standard_id/FIPS/FIPS202 |
1
|
1
|
pdf_data/keywords/standard_id/NIST |
- SP 800-90A:
1
- NIST SP 800-90A:
2
|
- SP 800-90A:
1
- NIST SP 800-90A:
2
|
pdf_data/keywords/standard_id/PKCS |
|
|
pdf_data/keywords/standard_id/X509 |
|
|
pdf_data/keywords/symmetric_crypto/AES_competition |
- AES:
- AES:
33
- AES128:
1
- AES192:
1
- AES256:
1
- AES-:
2
|
- AES:
- AES:
33
- AES128:
1
- AES192:
1
- AES256:
1
- AES-:
2
|
pdf_data/keywords/symmetric_crypto/DES/3DES/TDEA |
1
|
1
|
pdf_data/keywords/symmetric_crypto/DES/3DES/TDES |
1
|
1
|
pdf_data/keywords/symmetric_crypto/DES/3DES/Triple-DES |
16
|
17
|
pdf_data/keywords/symmetric_crypto/DES/DES/DES |
3
|
1
|
pdf_data/keywords/symmetric_crypto/constructions/MAC/CBC-MAC |
3
|
1
|
pdf_data/keywords/symmetric_crypto/constructions/MAC/CMAC |
9
|
9
|
pdf_data/keywords/symmetric_crypto/constructions/MAC/HMAC |
21
|
21
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/policy_metadata |
- pdf_file_size_bytes:
580218
- pdf_is_encrypted:
False
- pdf_number_of_pages:
37
- /Title:
FIPS 140-2 Non-Proprietary Security Policy
- /Author:
Marcos Portnoi
- /Creator:
Microsoft Word
- /CreationDate:
D:20231010222151+00'00'
- /ModDate:
D:20231010222151+00'00'
- pdf_hyperlinks:
http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4565, http://www.chronox.de/crypto-API/crypto/architecture.html, http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf, http://www.ietf.org/rfc/rfc3447.txt, http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf, http://csrc.nist.gov/publications/nistpubs/800-67-Rev1/SP-800-67-Rev1.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf, http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf, http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf, http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf
|
- pdf_file_size_bytes:
614732
- pdf_is_encrypted:
False
- pdf_number_of_pages:
33
- /Title:
FIPS 140-2 Non-Proprietary Security Policy
- /Author:
Marcos Portnoi
- /Creator:
Microsoft® Office Word 2007
- /CreationDate:
D:20200809111903-05'00'
- /ModDate:
D:20200809111903-05'00'
- /Producer: Microsoft® Office Word 2007
- pdf_hyperlinks:
http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, https://csrc.nist.gov/projects/cryptographic-module-validation-program/Certificate/3646, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf, http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf, http://www.ietf.org/rfc/rfc3447.txt, http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf, http://csrc.nist.gov/publications/nistpubs/800-67-Rev1/SP-800-67-Rev1.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf, http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf, http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf, http://www.chronox.de/crypto-API/crypto/architecture.html
|
pdf_data/policy_metadata//Author |
Marcos Portnoi
|
Marcos Portnoi
|
pdf_data/policy_metadata//CreationDate |
D:20231010222151+00'00'
|
D:20200809111903-05'00'
|
pdf_data/policy_metadata//Creator |
Microsoft Word
|
Microsoft® Office Word 2007
|
pdf_data/policy_metadata//ModDate |
D:20231010222151+00'00'
|
D:20200809111903-05'00'
|
pdf_data/policy_metadata//Title |
FIPS 140-2 Non-Proprietary Security Policy
|
FIPS 140-2 Non-Proprietary Security Policy
|
pdf_data/policy_metadata/pdf_file_size_bytes |
580218
|
614732
|
pdf_data/policy_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/policy_metadata/pdf_number_of_pages |
37
|
33
|
state/module_download_ok |
True
|
True
|
state/module_extract_ok |
True
|
True
|
state/policy_convert_garbage |
False
|
False
|
state/policy_convert_ok |
True
|
True
|
state/policy_download_ok |
True
|
True
|
state/policy_extract_ok |
True
|
True
|
state/policy_pdf_hash |
4fee5789c8fa2c3fb737149f772e97396ef6b733f06f2f9d4323a8bc88264943
|
dcd7d9d120841b9e3dcc1b593e8b0e0476ec2d43a4de2a550c0275bebf3e9e82
|
state/policy_txt_hash |
985d1b80ac12cbd099ba8982679e2f95deccc8787f23edf5a4f1f629677a08b7
|
ab4c003f6443255979098734f80774e91df31d178d577c4227715b7102161c73
|
heuristics/cpe_matches |
cpe:2.3:o:amazon:linux_2:-:*:*:*:*:*:*:* |
cpe:2.3:o:amazon:linux_2:-:*:*:*:*:*:*:* |
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
2 |
2 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/module_processed_references/directly_referenced_by |
None
|
None
|
heuristics/module_processed_references/directly_referencing |
4565 |
3646 |
heuristics/module_processed_references/indirectly_referenced_by |
None
|
None
|
heuristics/module_processed_references/indirectly_referencing |
4565 |
3646 |
heuristics/module_prunned_references |
4565 |
3646 |
heuristics/policy_processed_references/directly_referenced_by |
None
|
None
|
heuristics/policy_processed_references/directly_referencing |
4565 |
3646 |
heuristics/policy_processed_references/indirectly_referenced_by |
None
|
None
|
heuristics/policy_processed_references/indirectly_referencing |
4565 |
3646 |
heuristics/policy_prunned_references |
4565 |
3646 |
heuristics/related_cves |
None
|
None
|
heuristics/verified_cpe_matches |
None
|
None
|
dgst |
8c285e204e44251d
|
ace104f589733dc0
|