This page was not yet optimized for use on mobile
devices.
Key Variable Loader (KVL) 5000 PIKE2
Certificate #3756
Webpage information
Security policy
Symmetric Algorithms
AES, AES128, AES256, AES-128, AES-256, DES, HMAC, CMACAsymmetric Algorithms
ECDSAHash functions
SHA-256, SHA-384Schemes
MACRandomness
DRBG, RNGElliptic Curves
P-384Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCMSecurity level
Level 3, level 2, Level 2Standards
FIPS 140-2, FIPS140-2, FIPS PUB 140-2, SP 800-90A, SP 800-38FFile metadata
| Subject | FIPS 140-2 Security Policy Template |
|---|---|
| Author | Brandon Stegall |
| Creation date | D:20201130150306-08'00' |
| Modification date | D:20201130150330-08'00' |
| Pages | 21 |
| Creator | Acrobat PDFMaker 17 for Word |
| Producer | Adobe PDF Library 15.0 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3756,
"dgst": "e9cfd9f31e4566c2",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"AES#C909",
"SHS#1345",
"AES#C930",
"KTS#C931",
"DRBG#C949",
"AES#C908",
"ECDSA#183",
"AES#C931"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"50.05.01",
"50.07.01",
"01.00.01",
"01.00.00"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 8
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 7
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 5
},
"ECB": {
"ECB": 7
},
"GCM": {
"GCM": 10
},
"OFB": {
"OFB": 12
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 5
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-384": 6
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES [197": 4,
"AES-128": 2,
"AES-256": 4,
"AES128": 1,
"AES256": 13,
"SHA(384": 1,
"SHA-256": 4,
"SHA-384": 2,
"SHS [180": 1
}
},
"fips_security_level": {
"Level": {
"Level 2": 2,
"Level 3": 2,
"level 2": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 4,
"SHA-384": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 21
},
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 13,
"FIPS PUB 140-2": 1,
"FIPS140-2": 1
},
"NIST": {
"SP 800-38F": 1,
"SP 800-90A": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 22,
"AES-128": 2,
"AES-256": 4,
"AES128": 1,
"AES256": 13
}
},
"DES": {
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 1
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Brandon Stegall",
"/Company": "Microsoft",
"/CreationDate": "D:20201130150306-08\u002700\u0027",
"/Creator": "Acrobat PDFMaker 17 for Word",
"/ModDate": "D:20201130150330-08\u002700\u0027",
"/Producer": "Adobe PDF Library 15.0",
"/SourceModified": "D:20201130230024",
"/Subject": "FIPS 140-2 Security Policy Template",
"pdf_file_size_bytes": 648703,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"file://pismo.infogard.local/QDC/FIPS_140/Programs/Motorola/4372_KVL_5000/01_Validation/Documentation/to_CMVP_V1.2_Rd.1/1e%20-%20KVL5000_Security_Policy_V1_0%20-%2020191212_redlined_JD_PP_JD.docx#_Toc53671178",
"file://pismo.infogard.local/QDC/FIPS_140/Programs/Motorola/4372_KVL_5000/01_Validation/Documentation/to_CMVP_V1.2_Rd.1/1e%20-%20KVL5000_Security_Policy_V1_0%20-%2020191212_redlined_JD_PP_JD.docx#_Toc53671180",
"https://csrc.nist.gov/groups/STM/cmvp/validation.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "4093b254848e55bd95e5cfeb052537d6affb13dd0b6b8fa132da5572674f19b6",
"policy_txt_hash": "ec840269dc85a0d16de707c2c7692fcfc03c566744547086c2b9d689cd688e1f"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2020_040121_1006_signed.pdf",
"date_sunset": null,
"description": "The Key Variable Loader (KVL) 5000 PIKE2 provides security services for the KVL 5000. The KVL 5000 is a portable key distribution device that consists of KVL Host Application processor and KVL 5000 PIKE2 Hardware Security Module (HSM). The KVL 5000 allows programmers to generate, transport, and load encryption keys, securely and efficiently into secure communication products thereby enabling secure encrypted communications.",
"embodiment": "Single Chip",
"exceptions": [
"Cryptographic Module Specification: Level 3",
"Roles, Services, and Authentication: Level 3",
"Physical Security: Level 3",
"EMI/EMC: Level 3",
"Design Assurance: Level 3",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": "Base FW R50.05.01 or R50.07.01 with or without AES128 R01.00.01, AES256 R01.00.01, and/or ADP/DES/DES-OFB/DES-XL/DVI-XL/DVP-XL R01.00.00",
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": "P/N 51009397004",
"level": 2,
"mentioned_certs": {},
"module_name": "Key Variable Loader (KVL) 5000 PIKE2",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2020-12-03",
"lab": "UL Verification Services, Inc.",
"validation_type": "Initial"
}
],
"vendor": "Motorola Solutions, Inc.",
"vendor_url": "http://www.motorolasolutions.com"
}
}