cert_id |
2758 |
2485 |
dgst |
9250b95a524a0cd0 |
9d1ef11e7923e54a |
heuristics/algorithms |
CVL#833, ECDSA#878, RSA#2041, SHS#3284, DRBG#1172, KTS#2184, Triple-DES#2184 |
Triple-DES#1783, SHS#2557, RSA#1585, DRBG#608 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
3.0, 3.1 |
3.0 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
- Cert:
- #1: 3
- #1172: 1
- #2041: 2
- #2184: 4
- #3284: 1
- #833: 1
- #878: 2
|
- Cert:
- #1: 3
- #1585: 2
- #1783: 4
- #2557: 1
- #608: 1
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- #2041 RSA: 1
- Certificate RSA: 1
- PKCS #1: 5
- PKCS#1: 1
- PKCS1: 4
- RSA 2048: 1
- RSA PKCS #1: 1
- RSA PKCS#1: 1
- RSA PKCS1: 4
- SHA-1: 4
- SHA-1 80: 1
- SHA-256: 2
- SHA-384: 2
- SHA-512: 1
- SHA-512 256: 1
- SHA1: 1
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
- Certlike:
- #1585 RSA: 1
- Certificate RSA: 1
- PKCS #1: 5
- PKCS#1: 1
- PKCS1: 4
- RSA 2048: 1
- RSA PKCS #1: 1
- RSA PKCS#1: 1
- RSA PKCS1: 4
- SHA-1: 3
- SHA-1 80: 1
- SHA-256: 2
- SHA-384: 2
- SHA-512: 1
- SHA-512 256: 1
- SHA1: 1
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- DES:
- 3DES:
- TDEA: 1
- TDES: 15
- Triple-DES: 38
- DES:
- constructions:
|
- DES:
- 3DES:
- TDEA: 1
- TDES: 14
- Triple-DES: 45
- DES:
- constructions:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
- FI:
- SCA:
- DPA: 5
- SPA: 5
- timing attacks: 1
|
- FI:
- SCA:
- DPA: 2
- SPA: 2
- timing attacks: 1
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 20
- FIPS 180-4: 1
- FIPS 186-4: 6
- FIPS PUB 140-2: 1
- FIPS140-2: 1
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 7816: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 7816-4: 1
- NIST:
- NIST SP 800-38B: 1
- NIST SP 800-38F: 1
- NIST SP 800-67: 1
- NIST SP 800-90: 1
- NIST SP 800-90A: 6
- SP 800-57: 1
- SP 800-90A: 1
- PKCS:
- PKCS #1: 3
- PKCS#1: 1
- PKCS1: 4
- RFC:
|
- FIPS:
- FIPS 140-2: 20
- FIPS 180-4: 1
- FIPS 186-4: 3
- FIPS PUB 140-2: 1
- FIPS140-2: 1
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 7816: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 7816-4: 1
- NIST:
- NIST SP 800-38B: 1
- NIST SP 800-38F: 1
- NIST SP 800-67: 1
- NIST SP 800-90: 1
- NIST SP 800-90A: 5
- SP 800-57: 1
- PKCS:
- PKCS #1: 3
- PKCS#1: 1
- PKCS1: 4
- RFC:
- X509:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: TL
- /CreationDate: D:20160921094301-04'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160921094301-04'00'
- /Producer: Microsoft® Word 2010
- /Subject: Chunghwa HICOS Smart Card Security Policy
- /Title: Non-Proprietary Security Policy
- pdf_file_size_bytes: 530283
- pdf_hyperlinks: http://www.nist.gov/cmvp, http://csrc.nist.gov/groups/STM/cmvp/index.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
- /Author: TL
- /CreationDate: D:20151202070824-05'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20151202070824-05'00'
- /Producer: Microsoft® Word 2010
- /Subject: Chunghwa HICOS Smart Card Security Policy
- /Title: Non-Proprietary Security Policy
- pdf_file_size_bytes: 511678
- pdf_hyperlinks: http://www.nist.gov/cmvp, http://csrc.nist.gov/groups/STM/cmvp/index.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
With tamper evident seals as indicated in the Security Policy. No assurance of the minimum strength of generated keys |
With tamper evident seals and security devices installed as indicated in the Security Policy. No assurance of the minimum strength of generated keys |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertSept2016.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertDec2015.pdf |
web_data/date_sunset |
|
|
web_data/description |
The HiKey token modules are multi-chip standalone implementations of a cryptographic module. The Hikey token modules are USB tokens that adhere to ISO/IEC specifications for Integrated Circuit Chip (ICC) based identification cards. |
The HiKey token modules are multi-chip standalone implementations of a cryptographic module. The Hikey token modules are USB tokens that adhere to ISO/IEC specifications for Integrated Circuit Chip (ICC) based identification cards. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Roles, Services, and Authentication: Level 3, EMI/EMC: Level 3, Design Assurance: Level 3, |
Cryptographic Module Ports and Interfaces: Level 3, Roles, Services, and Authentication: Level 3, EMI/EMC: Level 3, Design Assurance: Level 3 |
web_data/fw_versions |
H, i, K, e, y, , C, O, S, , V, 3, ., 1 |
H, i, K, e, y, , C, O, S, , V, 3, ., 0 |
web_data/historical_reason |
Moved to historical list due to sunsetting |
SP 800-131A transition which disallows key wrapping not compliant to SP 800-38F. |
web_data/hw_versions |
H, i, K, e, y, 3, ., 0, -, B, K |
H, i, K, e, y, 3, ., 0, -, B, K |
web_data/level |
2 |
2 |
web_data/mentioned_certs |
|
|
web_data/module_name |
HiKey PKI Token |
HiKey PKI Token |
web_data/module_type |
Hardware |
Hardware |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
None |
None |
web_data/tested_conf |
[] |
[] |
web_data/validation_history |
- date: 26.09.2016
- lab: CGI Information Systems & Management Consultants Inc
- validation_type: Initial
|
- date: 14.12.2015
- lab: CGI Information Systems & Management Consultants Inc
- validation_type: Initial
|
web_data/vendor |
Chunghwa Telecom Co., Ltd. |
Chunghwa Telecom Co., Ltd. |
web_data/vendor_url |
http://www.cht.com.tw |
http://www.cht.com.tw |