cert_id |
3273 |
2038 |
dgst |
a16c79f3a7142b2b |
b20a51d1d0cd4d4e |
heuristics/algorithms |
ECDSA#A4863, DRBG#A4863, Triple-DES#A4863, SHS#A4863, DSA#A4863, RSA#A4863, HMAC#A4863, AES#A4863 |
AES#A4873, ECDSA#A4873, Triple-DES#A4873, SHS#A4873, DRBG#A4873, DSA#A4873, HMAC#A4873, RSA#A4873 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
3366, 3978, 4260, 4106, 4071, 3881, 3470, 4252, 4122, 3974, 4104, 3635, 3915, 4121, 4165, 3694, 4182, 4089, 3381, 3625, 3993, 3595, 3475 |
3130, 3018, 2658, 2815, 3107, 3338, 2872, 2961, 2878, 2689, 2918, 3224, 2623, 3125, 2577, 3212, 3159, 2951, 2725, 3328, 2939, 3118, 3055, 3151, 3054, 3230 |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
3366, 3978, 4260, 4106, 4071, 3881, 3470, 4252, 4122, 3974, 4104, 3635, 3915, 4121, 4165, 3694, 4182, 4089, 3381, 3625, 3993, 3595, 3475 |
3130, 3018, 2658, 2815, 3107, 3338, 2872, 2961, 2878, 2689, 2918, 3224, 2623, 3125, 2577, 3212, 3159, 2951, 2725, 3328, 2939, 3118, 3055, 3151, 3054, 3230 |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES GCM 256: 2
- HMAC SHA- 224: 1
- HMAC SHA- 256: 1
- HMAC SHA-1: 1
- HMAC SHA-384: 1
- HMAC SHA-512: 1
- HMAC-SHA-1: 12
- HMAC-SHA-224: 2
- HMAC-SHA-256: 4
- HMAC-SHA-384: 2
- HMAC-SHA-512: 4
- PKCS #1: 2
- PKCS#1: 4
- PKCS1: 6
- RSA 2048: 2
- SHA- 224: 1
- SHA- 256: 2
- SHA-1: 23
- SHA-1 2: 1
- SHA-2: 11
- SHA-224: 2
- SHA-256: 3
- SHA-384: 4
- SHA-512: 5
- SHS3: 1
|
- Certlike:
- AES GCM 256: 2
- HMAC SHA- 224: 1
- HMAC SHA- 256: 1
- HMAC SHA-1: 1
- HMAC SHA-384: 1
- HMAC SHA-512: 1
- HMAC-SHA-1: 12
- HMAC-SHA-224: 2
- HMAC-SHA-256: 4
- HMAC-SHA-384: 2
- HMAC-SHA-512: 4
- PKCS #1: 2
- PKCS#1: 4
- PKCS1: 6
- RSA 2048: 2
- SHA- 224: 1
- SHA- 256: 2
- SHA-1: 24
- SHA-2: 11
- SHA-224: 2
- SHA-256: 3
- SHA-384: 4
- SHA-512: 5
- SHS3: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- CMAC: 9
- HMAC: 17
- HMAC-SHA-224: 2
- HMAC-SHA-256: 1
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CMAC: 9
- HMAC: 17
- HMAC-SHA-224: 2
- HMAC-SHA-256: 1
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 11
- SHA-224: 2
- SHA-256: 3
- SHA-384: 4
- SHA-512: 5
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 11
- SHA-224: 2
- SHA-256: 3
- SHA-384: 4
- SHA-512: 5
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
pdf_data/keywords/ecc_curve |
- NIST:
- B-163: 3
- B-233: 5
- B-283: 7
- B-409: 5
- B-571: 7
- K-163: 3
- K-233: 6
- K-283: 7
- K-409: 7
- K-571: 7
- P-192: 10
- P-224: 12
- P-256: 14
- P-384: 14
- P-521: 10
|
- NIST:
- B-163: 3
- B-233: 5
- B-283: 7
- B-409: 5
- B-571: 7
- K-163: 3
- K-233: 6
- K-283: 7
- K-409: 7
- K-571: 7
- P-192: 10
- P-224: 12
- P-256: 14
- P-384: 14
- P-521: 10
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140: 6
- FIPS 140-2: 21
- FIPS 180-4: 2
- FIPS 186-2: 6
- FIPS 186-4: 7
- FIPS 197: 2
- FIPS 198-1: 2
- FIPS PUB 140-2: 1
- NIST:
- NIST SP 800-131A: 2
- SP 800-133: 1
- SP 800-38: 1
- SP 800-38B: 1
- SP 800-38C: 1
- SP 800-38D: 1
- SP 800-67: 2
- SP 800-90A: 3
- PKCS:
- PKCS #1: 1
- PKCS#1: 2
- PKCS1: 3
- RFC:
- RFC 5246: 1
- RFC5288: 2
- RFC5289: 2
|
- FIPS:
- FIPS 140: 6
- FIPS 140-2: 21
- FIPS 180-4: 2
- FIPS 186-2: 6
- FIPS 186-4: 7
- FIPS 197: 2
- FIPS 198-1: 2
- FIPS PUB 140-2: 1
- NIST:
- NIST SP 800-131A: 2
- SP 800-133: 1
- SP 800-38: 1
- SP 800-38B: 1
- SP 800-38C: 1
- SP 800-38D: 1
- SP 800-67: 2
- SP 800-90A: 3
- PKCS:
- PKCS #1: 1
- PKCS#1: 2
- PKCS1: 3
- RFC:
- RFC 5246: 1
- RFC5288: 2
- RFC5289: 2
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
|
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode. No assurance of the minimum strength of generated keys. |
When operated in FIPS mode. The module makes no assurance of the minimum strength of random strings and generated keys. |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertAug2018.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0035.pdf |
web_data/date_sunset |
15.10.2025 |
08.03.2026 |
web_data/description |
SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing. |
SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A, Mitigation of Other Attacks: N/A |
[] |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
None |
None |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
CryptoComply for Server |
CryptoComply for Server |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
active |
active |
web_data/sw_versions |
2.2.2 |
2.1.2 |
web_data/tested_conf |
CentOS 7 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 with PAA, CentOS 7 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 without PAA, FreeBSD 13 on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 without PAA, FreeBSD 13 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 with PAA, macOS 13 (Ventura) running on a Mac Mini M2 with an Apple M2, Windows Server 2022 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 with PAA, Windows Server 2022 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 without PAA (single user mode) |
CentOS 7 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 with PAA, CentOS 7 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 without PAA, macOS 13 (Ventura) running on a Mac Mini M2 with an Apple M2, Windows Server 2022 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 with PAA, Windows Server 2022 running on a Dell PowerEdge R830 with an Intel Xeon E5-4667v4 without PAA (single-user mode), None, None |
web_data/validation_history |
- date: 29.08.2018
- lab: ACUMEN SECURITY, LLC
- validation_type: Initial
- date: 16.10.2020
- lab: ACUMEN SECURITY, LLC
- validation_type: Update
- date: 02.03.2021
- lab: ACUMEN SECURITY, LLC
- validation_type: Update
- date: 12.09.2022
- lab: ACUMEN SECURITY, LLC
- validation_type: Update
- date: 06.10.2022
- lab: ACUMEN SECURITY, LLC
- validation_type: Update
- date: 01.11.2022
- lab: ACUMEN SECURITY, LLC
- validation_type: Update
- date: 16.04.2024
- lab: EWA CANADA
- validation_type: Update
|
- date: 15.11.2013
- lab: EWA CANADA
- validation_type: Initial
- date: 23.01.2014
- lab: EWA CANADA
- validation_type: Update
- date: 20.02.2014
- lab: EWA CANADA
- validation_type: Update
- date: 25.01.2016
- lab:
- validation_type: Update
- date: 05.02.2016
- lab: ACUMEN SECURITY, LLC
- validation_type: Update
- date: 29.03.2018
- lab: ACUMEN SECURITY, LLC
- validation_type: Update
- date: 24.07.2020
- lab: ÆGISOLVE
- validation_type: Update
|
web_data/vendor |
SafeLogic Inc. |
SafeLogic Inc. |
web_data/vendor_url |
http://www.safelogic.com/ |
http://www.safelogic.com |