Samsung BoringCrypto Android

Certificate #5012

Webpage information

Status active
Validation dates 29.04.2025 , 19.09.2025
Sunset date 22-07-2029
Standard FIPS 140-3
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat No assurance of the minimum strength of generated SSPs (e.g., keys). When operated in approved mode.
Exceptions
  • Physical security: N/A
  • Non-invasive security: N/A
  • Mitigation of other attacks: N/A
Description A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.
Tested configurations
  • Android 13 running on A52 on Snapdragon 750G with PAA
  • Android 13 running on A52 on Snapdragon 750G without PAA
  • Android 13 running on A53 on Exynos 1280 with PAA
  • Android 13 running on A53 on Exynos 1280 without PAA
  • Android 13 running on A71 5G (US) on Snapdragon 765G with PAA
  • Android 13 running on A71 5G (US) on Snapdragon 765G without PAA
  • Android 13 running on Galaxy S20+ 5G SM-G986B/DS on Exynos 990 with PAA
  • Android 13 running on Galaxy S20+ 5G SM-G986B/DS on Exynos 990 without PAA
  • Android 13 running on Galaxy S20+ 5G SM-G986U on Snapdragon 865 with PAA
  • Android 13 running on Galaxy S20+ 5G SM-G986U on Snapdragon 865 without PAA
  • Android 13 running on Galaxy S21+ 5G SM-G996B/DS on Exynos 2100 with PAA
  • Android 13 running on Galaxy S21+ 5G SM-G996B/DS on Exynos 2100 without PAA
  • Android 13 running on Galaxy S21+ 5G SM-G996U on Snapdragon 888 with PAA
  • Android 13 running on Galaxy S21+ 5G SM-G996U on Snapdragon 888 without PAA
  • Android 13 running on Galaxy S22 Ultra SM-S908B on Exynos 2200 with PAA
  • Android 13 running on Galaxy S22 Ultra SM-S908B on Exynos 2200 without PAA
  • Android 13 running on S22 on Snapdragon 8 Gen1 with PAA
  • Android 13 running on S22 on Snapdragon 8 Gen1 without PAA
  • Android 13 running on S23 on Snapdragon 8 Gen2 with PAA
  • Android 13 running on S23 on Snapdragon 8 Gen2 without PAA
  • Android 13 running on Tab Active3 on Exynos 9810 with PAA
  • Android 13 running on Tab Active3 on Exynos 9810 without PAA
  • Android 13 running on TAB S9 FE on Exynos 1380 with PAA
  • Android 13 running on TAB S9 FE on Exynos 1380 without PAA
  • Android 13 running on XCover, G715FN on Exynos 9611 with PAA
  • Android 13 running on XCover, G715FN on Exynos 9611 without PAA
  • Android 13 running on XCover6 Pro on Snapdragon 778G with PAA
  • Android 13 running on XCover6 Pro on Snapdragon 778G without PAA
  • Android 13 running on Z Flip 4 F721U on Snapdragon 8+ Gen1 with PAA
  • Android 13 running on Z Flip 4 F721U on Snapdragon 8+ Gen1 without PAA
  • Android 13 running on Z-FLIP on Snapdragon 855+ with PAA
  • Android 13 running on Z-FLIP on Snapdragon 855+ without PAA
Vendor Samsung Electronics Co., Ltd.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-256, CAST, DES, Triple-DES, HMAC
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, MD4, MD5
Schemes
MAC, Key Agreement
Protocols
SSL, TLS, TLS 1.2, TLS v1.2
Randomness
DRBG
Libraries
BoringSSL
Elliptic Curves
P-224, P-256, P-384, P-521
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM

Trusted Execution Environments
PSP
Vendor
Samsung

Security level
Level 1

Standards
FIPS 140-3, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 180-4, FIPS PUB 140-3, NIST SP 800-52, NIST SP 800-38D, SP 800-38A, SP 800-38C, SP 800-38D, SP 800-38F, SP 800-52, SP 800-56A, SP 800-90A, SP 800-131A, SP 800-133, SP 800-135, PKCS 1, RFC 5288, RFC 5246, ISO/IEC 24759, ISO/IEC 19790

File metadata

Author Scott Ehrlich
Creation date D:20250918121843-07'00'
Modification date D:20250918121843-07'00'
Pages 29
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

References

Outgoing
  • 3285 - historical - Unisys OS 2200 Cryptographic Library

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 5012,
  "dgst": "ddd180a4466685b2",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "HMAC-SHA2-256A3285",
        "HMAC-SHA2-224A3285",
        "RSA SigVer (FIPS186-4)A3285",
        "ECDSA KeyGen (FIPS186-4)A3285",
        "SHA2-512/256A3285",
        "AES-KWPA3285",
        "SHA2-512A3285",
        "AES-CBCA3285",
        "HMAC-SHA-1A3285",
        "AES-ECBA3285",
        "Counter DRBGA3285",
        "AES-CCMA3285",
        "RSA SigGen (FIPS186-4)A3285",
        "ECDSA SigVer (FIPS186-4)A3285",
        "AES-GCMA3285",
        "AES-KWA3285",
        "RSA KeyGen (FIPS186-4)A3285",
        "ECDSA KeyVer (FIPS186-4)A3285",
        "SHA-1A3285",
        "HMAC-SHA2-384A3285",
        "SHA2-256A3285",
        "HMAC-SHA2-512A3285",
        "ECDSA SigGen (FIPS186-4)A3285",
        "KDF TLSA3285",
        "KAS-ECC-SSC Sp800-56Ar3A3285",
        "AES-CTRA3285",
        "SHA2-224A3285",
        "SHA2-384A3285"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "3285"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "3285"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "3285"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDSA": {
            "ECDSA": 23
          }
        },
        "FF": {
          "DH": {
            "DH": 9,
            "Diffie-Hellman": 1
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 7
        },
        "CCM": {
          "CCM": 5
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 5
        },
        "ECB": {
          "ECB": 5
        },
        "GCM": {
          "GCM": 6
        },
        "OFB": {
          "OFB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "BoringSSL": {
          "BoringSSL": 1
        }
      },
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 20,
            "TLS 1.2": 3,
            "TLS v1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 7
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-224": 4,
          "P-256": 10,
          "P-384": 2,
          "P-521": 4
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#3285": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES-256": 1,
          "AES-GCM IV4": 1,
          "HMAC-SHA-1": 6,
          "PAA 10": 1,
          "PAA 11": 1,
          "PAA 12": 1,
          "PAA 13": 1,
          "PAA 14": 1,
          "PAA 15": 1,
          "PAA 16": 1,
          "PAA 18": 1,
          "PAA 19": 1,
          "PAA 2": 1,
          "PAA 20": 1,
          "PAA 21": 1,
          "PAA 22": 1,
          "PAA 23": 1,
          "PAA 24": 1,
          "PAA 25": 1,
          "PAA 26": 1,
          "PAA 27": 1,
          "PAA 28": 1,
          "PAA 29": 1,
          "PAA 3": 1,
          "PAA 30": 1,
          "PAA 31": 1,
          "PAA 32": 1,
          "PAA 4": 1,
          "PAA 5": 1,
          "PAA 6": 1,
          "PAA 7": 1,
          "PAA 8": 1,
          "PAA 9": 1,
          "PKCS 1": 2,
          "SHA-1": 2,
          "SHA-13": 1,
          "SHA2- 384": 2,
          "SHA2-224": 2,
          "SHA2-256": 5,
          "SHA2-384": 1,
          "SHA2-512": 5
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 4
          },
          "MD5": {
            "MD5": 5
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 13
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-3": 12,
          "FIPS 180-4": 2,
          "FIPS 186-4": 3,
          "FIPS 197": 5,
          "FIPS 198-1": 2,
          "FIPS PUB 140-3": 1
        },
        "ISO": {
          "ISO/IEC 19790": 2,
          "ISO/IEC 24759": 2
        },
        "NIST": {
          "NIST SP 800-38D": 1,
          "NIST SP 800-52": 1,
          "SP 800-131A": 1,
          "SP 800-133": 1,
          "SP 800-135": 1,
          "SP 800-38A": 1,
          "SP 800-38C": 1,
          "SP 800-38D": 1,
          "SP 800-38F": 1,
          "SP 800-52": 1,
          "SP 800-56A": 1,
          "SP 800-90A": 1
        },
        "PKCS": {
          "PKCS 1": 1
        },
        "RFC": {
          "RFC 5246": 1,
          "RFC 5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 21,
            "AES-256": 1
          },
          "CAST": {
            "CAST": 3
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 3
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 5
          }
        }
      },
      "tee_name": {
        "AMD": {
          "PSP": 3
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 11
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Scott Ehrlich",
      "/CreationDate": "D:20250918121843-07\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20250918121843-07\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 655600,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.acumensecurity.net/",
          "https://git-scm.com/download/linux",
          "https://boringssl.googlesource.com/boringssl",
          "https://boringssl.googlesource.com/boringssl.git/+/refs/heads/fips-20220613/crypto/fipsmodule/FIPS.md",
          "https://ci.android.com/builds/submitted/8918218/aosp_arm64-userdebug/latest/manifest_8918218.xml",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "e58ab3a6c8d3d859245904daa1f1184dcf5417a41dbb0eb784f8cdfe1c5e7ee2",
    "policy_txt_hash": "77a8db7b01e5c891804da52c506e2de51d83f6da7633613008f8bd80ea834081"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "No assurance of the minimum strength of generated SSPs (e.g., keys). When operated in approved mode.",
    "certificate_pdf_url": null,
    "date_sunset": "2029-07-22",
    "description": "A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical security: N/A",
      "Non-invasive security: N/A",
      "Mitigation of other attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Samsung BoringCrypto Android",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-3",
    "status": "active",
    "sw_versions": "2022061300",
    "tested_conf": [
      "Android 13 running on A52 on Snapdragon 750G with PAA",
      "Android 13 running on A52 on Snapdragon 750G without PAA",
      "Android 13 running on A53 on Exynos 1280 with PAA",
      "Android 13 running on A53 on Exynos 1280 without PAA",
      "Android 13 running on A71 5G (US) on Snapdragon 765G with PAA",
      "Android 13 running on A71 5G (US) on Snapdragon 765G without PAA",
      "Android 13 running on Galaxy S20+ 5G SM-G986B/DS on Exynos 990 with PAA",
      "Android 13 running on Galaxy S20+ 5G SM-G986B/DS on Exynos 990 without PAA",
      "Android 13 running on Galaxy S20+ 5G SM-G986U on Snapdragon 865 with PAA",
      "Android 13 running on Galaxy S20+ 5G SM-G986U on Snapdragon 865 without PAA",
      "Android 13 running on Galaxy S21+ 5G SM-G996B/DS on Exynos 2100 with PAA",
      "Android 13 running on Galaxy S21+ 5G SM-G996B/DS on Exynos 2100 without PAA",
      "Android 13 running on Galaxy S21+ 5G SM-G996U on Snapdragon 888 with PAA",
      "Android 13 running on Galaxy S21+ 5G SM-G996U on Snapdragon 888 without PAA",
      "Android 13 running on Galaxy S22 Ultra SM-S908B on Exynos 2200 with PAA",
      "Android 13 running on Galaxy S22 Ultra SM-S908B on Exynos 2200 without PAA",
      "Android 13 running on S22 on Snapdragon 8 Gen1 with PAA",
      "Android 13 running on S22 on Snapdragon 8 Gen1 without PAA",
      "Android 13 running on S23 on Snapdragon 8 Gen2 with PAA",
      "Android 13 running on S23 on Snapdragon 8 Gen2 without PAA",
      "Android 13 running on Tab Active3 on Exynos 9810 with PAA",
      "Android 13 running on Tab Active3 on Exynos 9810 without PAA",
      "Android 13 running on TAB S9 FE on Exynos 1380 with PAA",
      "Android 13 running on TAB S9 FE on Exynos 1380 without PAA",
      "Android 13 running on XCover, G715FN on Exynos 9611 with PAA",
      "Android 13 running on XCover, G715FN on Exynos 9611 without PAA",
      "Android 13 running on XCover6 Pro on Snapdragon 778G with PAA",
      "Android 13 running on XCover6 Pro on Snapdragon 778G without PAA",
      "Android 13 running on Z Flip 4 F721U on Snapdragon 8+ Gen1 with PAA",
      "Android 13 running on Z Flip 4 F721U on Snapdragon 8+ Gen1 without PAA",
      "Android 13 running on Z-FLIP on Snapdragon 855+ with PAA",
      "Android 13 running on Z-FLIP on Snapdragon 855+ without PAA"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2025-04-29",
        "lab": "Acumen Security",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2025-09-19",
        "lab": "Acumen Security",
        "validation_type": "Update"
      }
    ],
    "vendor": "Samsung Electronics Co., Ltd.",
    "vendor_url": "https://www.samsung.com"
  }
}