Key Variable Loader (KVL) 5000 PIKE2

Certificate #3756

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 03.12.2020
Standard FIPS 140-2
Security level 2
Type Hardware
Embodiment Single Chip
Caveat When operated in FIPS mode
Exceptions
  • Cryptographic Module Specification: Level 3
  • Roles, Services, and Authentication: Level 3
  • Physical Security: Level 3
  • EMI/EMC: Level 3
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Description The Key Variable Loader (KVL) 5000 PIKE2 provides security services for the KVL 5000. The KVL 5000 is a portable key distribution device that consists of KVL Host Application processor and KVL 5000 PIKE2 Hardware Security Module (HSM). The KVL 5000 allows programmers to generate, transport, and load encryption keys, securely and efficiently into secure communication products thereby enabling secure encrypted communications.
Version (Hardware) P/N 51009397004
Version (Firmware) Base FW R50.05.01 or R50.07.01 with or without AES128 R01.00.01, AES256 R01.00.01, and/or ADP/DES/DES-OFB/DES-XL/DVI-XL/DVP-XL R01.00.00
Vendor Motorola Solutions, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES128, AES256, AES-128, AES-256, DES, HMAC, CMAC
Asymmetric Algorithms
ECDSA
Hash functions
SHA-256, SHA-384
Schemes
MAC
Randomness
DRBG, RNG
Elliptic Curves
P-384
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM

Security level
Level 3, level 2, Level 2

Standards
FIPS 140-2, FIPS140-2, FIPS PUB 140-2, SP 800-90A, SP 800-38F

File metadata

Subject FIPS 140-2 Security Policy Template
Author Brandon Stegall
Creation date D:20201130150306-08'00'
Modification date D:20201130150330-08'00'
Pages 21
Creator Acrobat PDFMaker 17 for Word
Producer Adobe PDF Library 15.0

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3756,
  "dgst": "e9cfd9f31e4566c2",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "AES#C909",
        "SHS#1345",
        "AES#C930",
        "KTS#C931",
        "DRBG#C949",
        "AES#C908",
        "ECDSA#183",
        "AES#C931"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "50.05.01",
        "50.07.01",
        "01.00.01",
        "01.00.00"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 8
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 7
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 5
        },
        "ECB": {
          "ECB": 7
        },
        "GCM": {
          "GCM": 10
        },
        "OFB": {
          "OFB": 12
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 5
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-384": 6
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES [197": 4,
          "AES-128": 2,
          "AES-256": 4,
          "AES128": 1,
          "AES256": 13,
          "SHA(384": 1,
          "SHA-256": 4,
          "SHA-384": 2,
          "SHS [180": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 2,
          "Level 3": 2,
          "level 2": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 4,
            "SHA-384": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 21
        },
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 13,
          "FIPS PUB 140-2": 1,
          "FIPS140-2": 1
        },
        "NIST": {
          "SP 800-38F": 1,
          "SP 800-90A": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 22,
            "AES-128": 2,
            "AES-256": 4,
            "AES128": 1,
            "AES256": 13
          }
        },
        "DES": {
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1,
            "HMAC": 1
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Brandon Stegall",
      "/Company": "Microsoft",
      "/CreationDate": "D:20201130150306-08\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 17 for Word",
      "/ModDate": "D:20201130150330-08\u002700\u0027",
      "/Producer": "Adobe PDF Library 15.0",
      "/SourceModified": "D:20201130230024",
      "/Subject": "FIPS 140-2 Security Policy Template",
      "pdf_file_size_bytes": 648703,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "file://pismo.infogard.local/QDC/FIPS_140/Programs/Motorola/4372_KVL_5000/01_Validation/Documentation/to_CMVP_V1.2_Rd.1/1e%20-%20KVL5000_Security_Policy_V1_0%20-%2020191212_redlined_JD_PP_JD.docx#_Toc53671178",
          "file://pismo.infogard.local/QDC/FIPS_140/Programs/Motorola/4372_KVL_5000/01_Validation/Documentation/to_CMVP_V1.2_Rd.1/1e%20-%20KVL5000_Security_Policy_V1_0%20-%2020191212_redlined_JD_PP_JD.docx#_Toc53671180",
          "https://csrc.nist.gov/groups/STM/cmvp/validation.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "4093b254848e55bd95e5cfeb052537d6affb13dd0b6b8fa132da5572674f19b6",
    "policy_txt_hash": "ec840269dc85a0d16de707c2c7692fcfc03c566744547086c2b9d689cd688e1f"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2020_040121_1006_signed.pdf",
    "date_sunset": null,
    "description": "The Key Variable Loader (KVL) 5000 PIKE2 provides security services for the KVL 5000. The KVL 5000 is a portable key distribution device that consists of KVL Host Application processor and KVL 5000 PIKE2 Hardware Security Module (HSM). The KVL 5000 allows programmers to generate, transport, and load encryption keys, securely and efficiently into secure communication products thereby enabling secure encrypted communications.",
    "embodiment": "Single Chip",
    "exceptions": [
      "Cryptographic Module Specification: Level 3",
      "Roles, Services, and Authentication: Level 3",
      "Physical Security: Level 3",
      "EMI/EMC: Level 3",
      "Design Assurance: Level 3",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "Base FW R50.05.01 or R50.07.01 with or without AES128 R01.00.01, AES256 R01.00.01, and/or ADP/DES/DES-OFB/DES-XL/DVI-XL/DVP-XL R01.00.00",
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": "P/N 51009397004",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "Key Variable Loader (KVL) 5000 PIKE2",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2020-12-03",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Motorola Solutions, Inc.",
    "vendor_url": "http://www.motorolasolutions.com"
  }
}