This page was not yet optimized for use on mobile devices.
Purity Encryption Module
Certificate #4937
Webpage information ?
Security policy ?
Symmetric Algorithms
AES, AES-256, HMAC, HMAC-SHA-256Hash functions
SHA-256, SHA256Randomness
DRBGBlock cipher modes
ECB, CTRSecurity level
Level 1Standards
FIPS 140-3, FIPS 197, FIPS 198-1, FIPS 180-4, SP 800-38A, SP 800-38F, ISO/IEC 24759File metadata
Author | Anantha Kandiah |
---|---|
Creation date | D:20241024102805+10'00' |
Modification date | D:20241024102805+10'00' |
Pages | 18 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
References
Outgoing- 260 - historical - Encryption Services Module
Heuristics ?
No heuristics are available for this certificate.
References ?
Updates ?
-
24.02.2025 The certificate data changed.
Certificate changed
The web extraction data was updated.
- The exceptions property was updated.
-
27.01.2025 The certificate was first processed.
New certificate
A new FIPS 140 certificate with the product name Purity Encryption Module was processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4937,
"dgst": "d21cea57447c0fff",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"SHA2-256A4396",
"AES-ECBA4396",
"AES-CTRA4396",
"Counter DRBGA4396",
"AES-KWA4396",
"HMAC-SHA2-256A4396"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"260"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"260"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"260"
]
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {},
"certification_process": {},
"cipher_mode": {
"CTR": {
"CTR": 4
},
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#260": 1
}
},
"fips_certlike": {
"Certlike": {
"AES-256": 1,
"HMAC SHA256": 1,
"HMAC-SHA- 256": 2,
"HMAC-SHA-256": 2,
"HMAC-SHA256": 1,
"HMAC-SHA256 KAT (512": 1,
"SHA-256": 4,
"SHA256": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 4,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 20
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-3": 8,
"FIPS 180-4": 1,
"FIPS 197": 2,
"FIPS 198-1": 1
},
"ISO": {
"ISO/IEC 24759": 2
},
"NIST": {
"SP 800-38A": 1,
"SP 800-38F": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 31,
"AES-256": 1
}
},
"constructions": {
"MAC": {
"HMAC": 4,
"HMAC-SHA-256": 1
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Anantha Kandiah",
"/CreationDate": "D:20241024102805+10\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20241024102805+10\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 371447,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "2052bc56cec2c1b95e3f517ceb655ca13bc1ff7fe6e10bb0f823f649c262c75b",
"policy_txt_hash": "8842620f81325fe4b9335d1d0f2ad6648ba1fc8c00f469f5196c7f7507af6582"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "No assurance of the minimum strength of generated SSPs (e.g., keys); No assurance of minimum security of SSPs (e.g., keys, bit strings) that are externally loaded, or of SSPs established with externally loaded SSPs.",
"certificate_pdf_url": null,
"date_sunset": "2030-01-05",
"description": "Purity Encryption Module is a standalone cryptographic module for the Purity Operating Environment for FlashArray (Purity//FA). Purity//FA powers Pure Storage\u0027s FlashArray family of products which provide economical all-flash storage. Purity Encryption Module enables FlashArray to support always-on, inline encryption of data with an internal key management scheme that requires no user intervention.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical security: N/A",
"Non-invasive security: N/A",
"Mitigation of other attacks: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Purity Encryption Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": "FA-1.5",
"tested_conf": [
"Purity OS 6.4 running on FlashArray X20R3 with Intel Xeon Silver 4210R with PAA",
"Purity OS 6.4 running on FlashArray X20R3 with Intel Xeon Silver 4210R without PAA"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2025-01-06",
"lab": "Teron Labs",
"validation_type": "Initial"
}
],
"vendor": "Pure Storage, Inc.",
"vendor_url": "https://www.purestorage.com"
}
}