This page was not yet optimized for use on mobile devices.
3e-520 Secure Access Point Cryptographic Module
Certificate #4427
Webpage information ?
Security policy ?
Symmetric Algorithms
AES, AES-, AES-128, AES-256, HMACAsymmetric Algorithms
ECDSA, ECC, DHHash functions
SHA-1, SHA1, SHA-256, SHA3-256, SHA3, SHA3-384, SHA3-512, SHA3-224Schemes
MAC, Key AgreementProtocols
TLS, TLS 1.2, TLSv1.2, IKEv2, IKE, IPsecRandomness
TRNG, DRBGLibraries
OpenSSLElliptic Curves
P-256, P-521, P-384Block cipher modes
ECB, CBC, CTR, GCM, CCMSecurity level
Level 2, Level 1Standards
FIPS 140-2, FIPS 197, FIPS 198-1, FIPS 180-4, FIPS 186-4, FIPS 202, FIPS140-2, RFC 7296, RFC 2818, X.509File metadata
Title | The symmetric keys used for protecting wireless bridging traffic are not listed in the key management tables |
---|---|
Author | 3eti |
Creation date | D:20221004181524-04'00' |
Modification date | D:20221004181524-04'00' |
Pages | 25 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
Heuristics ?
No heuristics are available for this certificate.
References ?
No references are available for this certificate.
Updates ?
-
09.02.2023 The certificate was first processed.
New certificate
A new FIPS 140 certificate with the product name was processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4427,
"dgst": "e49e72095ac9721b",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"SHS#A2152",
"HMAC#A1702",
"DRBG#A1702",
"SHS#A1701",
"ECDSA#A1702",
"KTS#A1702",
"SHS#A1702",
"HMAC#A1701",
"AES#A1701",
"RSA#A1702",
"KBKDF#A1702",
"KAS#A1702",
"KAS-SSC#A1702",
"CVL#A1702",
"AES#A1702"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"5.1",
"1.0"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDSA": {
"ECDSA": 11
}
},
"FF": {
"DH": {
"DH": 6
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"CCM": {
"CCM": 4
},
"CTR": {
"CTR": 4
},
"ECB": {
"ECB": 5
},
"GCM": {
"GCM": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 4
}
},
"crypto_protocol": {
"IKE": {
"IKE": 15,
"IKEv2": 6
},
"IPsec": {
"IPsec": 14
},
"TLS": {
"TLS": {
"TLS": 40,
"TLS 1.2": 2,
"TLSv1.2": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 20,
"P-384": 8,
"P-521": 4
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 1
}
},
"fips_certlike": {
"Certlike": {
"AES (128": 1,
"AES CBC 128/192/256": 2,
"AES key (256": 1,
"AES- GCM (128": 1,
"AES-128": 1,
"AES-196": 1,
"AES-256": 1,
"AES-CBC (256": 1,
"AES-CTR 128": 1,
"HMAC SHA-1": 1,
"HMAC-SHA-1-96": 2,
"SHA-1": 7,
"SHA-256": 1,
"SHA1": 1,
"SHA2- 224": 4,
"SHA2- 256": 3,
"SHA2- 384": 2,
"SHA2- 512": 1,
"SHA2-224": 5,
"SHA2-256": 10,
"SHA2-384": 7,
"SHA2-512": 7,
"SHA2-512 256": 1,
"SHA3": 1,
"SHA3- 224": 1,
"SHA3-224": 1,
"SHA3-256": 2,
"SHA3-384": 2,
"SHA3-512": 1,
"SHA3-512 256": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 1,
"Level 2": 4
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 7,
"SHA1": 1
},
"SHA2": {
"SHA-256": 1
},
"SHA3": {
"SHA3": 1,
"SHA3-224": 1,
"SHA3-256": 2,
"SHA3-384": 2,
"SHA3-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 16
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 32,
"FIPS 180-4": 5,
"FIPS 186-4": 2,
"FIPS 197": 2,
"FIPS 198-1": 2,
"FIPS 202": 2,
"FIPS140-2": 1
},
"RFC": {
"RFC 2818": 1,
"RFC 7296": 2
},
"X509": {
"X.509": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 35,
"AES-": 3,
"AES-128": 1,
"AES-256": 1
}
},
"constructions": {
"MAC": {
"HMAC": 12
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "3eti",
"/CreationDate": "D:20221004181524-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20221004181524-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "The symmetric keys used for protecting wireless bridging traffic are not listed in the key management tables",
"pdf_file_size_bytes": 813596,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://csrc.nist.gov/Projects/cryptographic-module-validation-program/publications",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34311",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34310",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34761"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "6b97516d9d41a5684fb334412ec11158f6f0234f161025722f52545bb4a416a4",
"policy_txt_hash": "705b6609d8c32e1598e681edfbc5534ffbe563809bd7324a157ca4050d8afe14"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "None",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/January 2023_010223_0657_signed.pdf",
"date_sunset": "2026-09-21",
"description": "The 3e-520 Secure Access Point acts as an access point for the universal wireless family of devices from 3eTI. The 520 board is installed inside the wireless devices and provides the cryptographic functionality for the device. The access point allows for wireless clients or wireless bridges to securely connect wirelessly with the module and send encrypted data.",
"embodiment": "Multi-Chip Embedded",
"exceptions": [
"Design Assurance: Level 3",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": "5.1",
"historical_reason": null,
"hw_versions": "1.0",
"level": 2,
"mentioned_certs": {},
"module_name": "3e-520 Secure Access Point Cryptographic Module",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "active",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2023-01-27",
"lab": "GOSSAMER SECURITY SOLUTIONS INC",
"validation_type": "Initial"
}
],
"vendor": "Ultra Intelligence \u0026 Communications",
"vendor_url": "http://www.ultra.group"
}
}