IOS Common Cryptographic Module (IC2M)

Certificate #1940

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 30.04.2013
Standard FIPS 140-2
Security level 1
Type Firmware
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode
Exceptions
  • Tested: Cisco Catalyst 2960 with IOS 15.0SE
  • Cisco 3925 ISR with IOS 15.2
  • Cisco 2811 ISR with IOS 15.2
Description The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.
Version (Firmware) Rel 1(1.0.0), Rel 1(1.0.1) and Rel 1(1.0.2)
Vendor Cisco Systems, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, RC2, RC4, DES, Triple-DES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, MD5
Schemes
Key agreement
Randomness
DRBG, RNG
Elliptic Curves
P-256, P-384, P-192, P-521
Block cipher modes
GCM

Vendor
Cisco Systems, Inc, Cisco Systems, Cisco

Security level
Level 1, level 1

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 198, SP 800-90

File metadata

Title Microsoft Word - IC2M Security Policy.docx
Author wangzhi
Creation date D:20130418081219-04'00'
Modification date D:20130418081219-04'00'
Pages 12
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 8.0.0 (Windows)

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 1940,
  "dgst": "d0ab864a17dbd8a0",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "Triple-DES#1360",
        "ECDSA#322",
        "RSA#1100",
        "DRBG#237",
        "SHS#1859",
        "CVL#30",
        "HMAC#1304",
        "Triple-DES#1358",
        "Triple-DES#1359",
        "SHS#1858",
        "AES#2134",
        "AES#2136"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0.2",
        "1.0.1",
        "1.0.0"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 5
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 4
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "GCM": {
          "GCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-192": 2,
          "P-256": 4,
          "P-384": 4,
          "P-521": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#30": 2
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 2134 and 2136": 1,
          "DRBG 237": 1,
          "Diffie-Hellman (CVL Cert. #30": 2,
          "HMAC SHA-1": 1,
          "HMAC SHA-256": 1,
          "HMAC- SHA-1": 1,
          "HMAC-SHA-1": 4,
          "HMAC-SHA-256": 2,
          "HMAC-SHA-384": 2,
          "HMAC-SHA-512": 2,
          "RSA 1100": 1,
          "SHA-1": 4,
          "SHA-1, 256": 1,
          "SHA-256": 3,
          "SHA-384": 2,
          "SHA-512": 2,
          "SHS 1304": 1,
          "SHS 1858 and 1859": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 4,
          "level 1": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-256": 3,
            "SHA-384": 2,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 12
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 14,
          "FIPS 198": 1,
          "FIPS PUB 140-2": 1
        },
        "NIST": {
          "SP 800-90": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7
          },
          "RC": {
            "RC2": 1,
            "RC4": 1
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 7
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 5,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 1
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 7,
          "Cisco Systems": 3,
          "Cisco Systems, Inc": 9
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "wangzhi",
      "/CreationDate": "D:20130418081219-04\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20130418081219-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.0.0 (Windows)",
      "/Title": "Microsoft Word - IC2M Security Policy.docx",
      "pdf_file_size_bytes": 537007,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 12
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "309e653e2053d9bc20d63d00ff06c0d8ee5eeaf1cf3de5515e70030441762337",
    "policy_txt_hash": "0daf1318fbc26af847bbb330e3e7c452872c70dc0049f5b0ead68ea47e592c7d"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0028.pdf",
    "date_sunset": null,
    "description": "The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Tested: Cisco Catalyst 2960 with IOS 15.0SE",
      "Cisco 3925 ISR with IOS 15.2",
      "Cisco 2811 ISR with IOS 15.2"
    ],
    "fw_versions": "Rel 1(1.0.0), Rel 1(1.0.1) and Rel 1(1.0.2)",
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "IOS Common Cryptographic Module (IC2M)",
    "module_type": "Firmware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2013-04-30",
        "lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Cisco Systems, Inc.",
    "vendor_url": "http://www.cisco.com"
  }
}