cert_id |
3992 |
3848 |
dgst |
94c8e9960b7d3483 |
ae6ce4a7288056e4 |
heuristics/algorithms |
SHS#A486, RSA#A487, ECDSA#A1152, ECDSA#A485, ECDSA#A486, DSA#A487, SHA-3#A487, SHS#A1152, DSA#A1152, KTS#A1152, KTS#A486, ECDSA#A487, SHS#A488, HMAC#A488, HMAC#A1152, SHS#A485, DRBG#A485, Triple-DES#A482, SHA-3#A482, ECDSA#A482, SHS#A482, HMAC#A485, RSA#A482, KTS#A485, DRBG#A1152, DSA#A486, RSA#A1152, DRBG#A486, HMAC#A484, SHA-3#A1152, DSA#A482, AES#A1152, AES#A486, AES#A482, DRBG#A487, HMAC#A482, RSA#A486, HMAC#A486, DRBG#A482, RSA#A485, SHS#A484, AES#A485, DSA#A485, HMAC#A487, KTS#A482 |
HMAC#A118, KTS#A118, SHS#A118, Triple-DES#A118, ECDSA#A118, AES#A118, SHA-3#A118, RSA#A118, DRBG#A118, DSA#A118 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES-128: 1
- AES-192: 1
- AES-256: 1
- HMAC SHA-1 112: 1
- HMAC-SHA-1: 2
- HMAC-SHA-224: 2
- HMAC-SHA-256: 4
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
- PKCS#1: 3
- RSA 2048: 1
- RSA PKCS#1: 1
- SHA- 256: 1
- SHA-1: 15
- SHA-1 112: 1
- SHA-224: 18
- SHA-256: 28
- SHA-3: 2
- SHA-384: 18
- SHA-512: 13
- SHA-512 112: 1
- SHA-512 2048: 4
- SHA3-224: 3
- SHA3-256: 4
- SHA3-384: 4
- SHA3-512: 4
|
- Certlike:
- AES-128: 1
- AES-192: 1
- AES-256: 1
- HMAC SHA-1: 1
- HMAC-SHA-1: 2
- HMAC-SHA-224: 2
- HMAC-SHA-256: 4
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
- PKCS#1: 3
- RSA PKCS#1: 1
- SHA- 256: 1
- SHA-1: 15
- SHA-224: 18
- SHA-256: 28
- SHA-3: 2
- SHA-384: 18
- SHA-512: 13
- SHA-512 112: 1
- SHA-512 2048: 4
- SHA3-224: 3
- SHA3-256: 4
- SHA3-384: 4
- SHA3-512: 4
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 31
- AES-128: 1
- AES-192: 1
- AES-256: 1
- CAST:
- RC:
- Serpent:
- DES:
- 3DES:
- TDEA: 1
- TDES: 1
- Triple-DES: 28
- DES:
- constructions:
- MAC:
- CMAC: 11
- HMAC: 20
- HMAC-SHA-224: 1
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
- djb:
- miscellaneous:
|
- AES_competition:
- AES:
- AES: 27
- AES-128: 1
- AES-192: 1
- AES-256: 1
- CAST:
- RC:
- Serpent:
- DES:
- 3DES:
- TDEA: 1
- TDES: 1
- Triple-DES: 26
- DES:
- constructions:
- MAC:
- CMAC: 11
- HMAC: 20
- HMAC-SHA-224: 1
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
- djb:
- miscellaneous:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- BLAKE:
- MD:
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 18
- SHA-256: 28
- SHA-384: 18
- SHA-512: 18
- SHA3:
- SHA-3: 2
- SHA3-224: 3
- SHA3-256: 4
- SHA3-384: 4
- SHA3-512: 4
- Streebog:
- Whirpool:
|
- BLAKE:
- MD:
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 18
- SHA-256: 28
- SHA-384: 18
- SHA-512: 18
- SHA3:
- SHA-3: 2
- SHA3-224: 3
- SHA3-256: 4
- SHA3-384: 4
- SHA3-512: 4
- Streebog:
- Whirpool:
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- OFB:
- XEX:
- XTS:
|
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- OFB:
- XEX:
- XTS:
|
pdf_data/keywords/ecc_curve |
- Curve:
- Edwards:
- NIST:
- P-192: 4
- P-224: 6
- P-256: 8
- P-384: 6
- P-521: 6
|
- Curve:
- Edwards:
- NIST:
- P-192: 2
- P-224: 2
- P-256: 8
- P-384: 6
- P-521: 6
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
- SCA:
- Timing Attacks: 2
- timing attacks: 1
|
- SCA:
- Timing Attacks: 2
- timing attacks: 1
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 42
- FIPS 186-4: 1
- FIPS PUB 140-2: 1
- FIPS180-4: 3
- FIPS186-4: 5
- FIPS197: 2
- FIPS198-1: 3
- FIPS202: 2
- NIST:
- PKCS:
- RFC:
- RFC4253: 1
- RFC5246: 1
- RFC7296: 1
|
- FIPS:
- FIPS 140-2: 39
- FIPS 186-4: 1
- FIPS PUB 140-2: 1
- FIPS180-4: 2
- FIPS186-4: 5
- FIPS197: 2
- FIPS198-1: 2
- FIPS202: 2
- NIST:
- PKCS:
- RFC:
- RFC4253: 1
- RFC5246: 1
- RFC7296: 1
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: Traci Porter
- /CreationDate: D:20211123133519-06'00'
- /Creator: Writer
- /Keywords: FIPS 140-2
- /Producer: OpenOffice 4.1.10
- /Title: FIPS 140-2 Non-Proprietary Security Policy
- pdf_file_size_bytes: 406021
- pdf_hyperlinks: https://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, https://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf, https://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, https://www.ietf.org/rfc/rfc3447.txt, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38b.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-67r2.pdf, https://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf, http://csrc.nist.gov/
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
- /Author: Traci Porter
- /CreationDate: D:20211123133318-06'00'
- /Creator: Writer
- /Keywords: FIPS 140-2
- /Producer: OpenOffice 4.1.10
- /Title: FIPS 140-2 Non-Proprietary Security Policy
- pdf_file_size_bytes: 395132
- pdf_hyperlinks: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38b.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-67r1.pdf, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf, http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf, http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://www.ietf.org/rfc/rfc3447.txt, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf, http://csrc.nist.gov/, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode and installed, initialized and configured as specified in section 9 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy. |
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/July 2021_020821_0740_signed.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/March 2021_010421_0724_signed.pdf |
web_data/date_sunset |
21.07.2026 |
14.03.2026 |
web_data/description |
SUSE Libgcrypt is a general purpose cryptographic library based on the code from GnuPG. |
SUSE Libgcrypt is a general purpose cryptographic library based on the code from GnuPG. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A |
Physical Security: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
None |
None |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
SUSE Linux Enterprise Server libgcrypt Cryptographic Module |
SUSE Linux Enterprise Server libgcrypt Cryptographic Module |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
active |
active |
web_data/sw_versions |
3.1 |
3.0 |
web_data/tested_conf |
SUSE Linux Enterprise Server 15 SP2 running on Dell EMC PowerEdge 640 with Intel Cascade Lake Xeon Gold 6234 with PAA, SUSE Linux Enterprise Server 15 SP2 running on Dell EMC PowerEdge 640 with Intel Cascade Lake Xeon Gold 6234 without PAA, SUSE Linux Enterprise Server 15 SP2 running on Gigabyte R181-T90 with Cavium ThunderX2 CN9975 ARMv8 with PAA, SUSE Linux Enterprise Server 15 SP2 running on Gigabyte R181-T90 with Cavium ThunderX2 CN9975 ARMv8 without PAA (single-user mode), SUSE Linux Enterprise Server 15 SP2 running on IBM System Z/15 with IBM z15 |
SUSE Linux Enterprise Server 15 SP0 running on Dell EMC PowerEdge 640 with Intel Cascade Lake Xeon Gold 6234 (single-user mode), , , , |
web_data/validation_history |
- date: 22.07.2021
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
- date: 28.11.2021
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Update
|
- date: 15.03.2021
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
- date: 28.11.2021
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Update
|
web_data/vendor |
SUSE, LLC |
SUSE, LLC |
web_data/vendor_url |
http://www.suse.com |
http://www.suse.com |