eToken 5100, 5105, 5200 and 5205

Certificate #1883

Webpage information

Status historical
Historical reason Moved to historical list in accordance with SP800-131A Revision 1 Transition (AES/TDES key wrapping)
Validation dates 08.02.2013 , 15.02.2013 , 12.09.2016 , 10.01.2017
Standard FIPS 140-2
Security level 3
Type Hardware
Embodiment Single Chip
Caveat None
Description SafeNet eToken is a portable two-factor USB authenticator with advanced smart card technology. It utilizes certificate based technology to generate and store credentials, such as private keys, passwords and digital certificates inside the protected environment of the smart card chip. To authenticate, users must supply both their personal SafeNet authenticator and password, providing a critical second level of security beyond simple passwords to protect valuable digital business resources.
Version (Hardware) eToken 5100, eToken 5105, eToken 5200 and eToken 5205
Version (Firmware) Athena IDProtect 0106.0113.2109 with SafeNet eToken Applet Suite 1.2.9
Vendor SafeNet, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-128, AES-192, AES-256, TDEA, TDES, CMAC
Asymmetric Algorithms
RSA 1024, RSA 2048, RSA-1024
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC
Randomness
DRBG, RNG
Block cipher modes
ECB, CBC

Vendor
Microsoft

Security level
Level 3, level 2
Side-channel analysis
SPA, DPA, Fault Induction, fault induction

Standards
FIPS 140-2, FIPS180-3, FIPS113, FIPS197, FIPS186-2, FIPS140-2, FIPS186-3, PKCS#1, ISO/IEC 7816-4, SCP03

File metadata

Title Microsoft Word - 002-010823-001 SafeNet eToken Security Policy Rev B.docx
Author cbrych
Creation date D:20130116103630-05'00'
Modification date D:20130207071012-05'00'
Pages 24
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 10.1.3 (Windows)

References

Incoming
  • 3960 - historical - DocuSign HSM Appliance
  • 2860 - historical - DocuSign HSM Appliance
  • 2779 - historical - DocuSign Signature Appliance
  • 3518 - historical - DocuSign Signature Appliance
  • 3141 - historical - DocuSign Signature Appliance
  • 3850 - active - DocuSign Signature Appliance
  • 2590 - historical - CoSign
  • 2665 - historical - DocuSign Signature Appliance

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 1883,
  "dgst": "f804663d999ea924",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "DRBG#98",
        "SHS#1465",
        "RSA#824",
        "Triple-DES MAC#1087",
        "AES#1654",
        "Triple-DES#1087"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.2.9",
        "0106.0113.2109"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2665",
          "2779",
          "3960",
          "3518",
          "2860",
          "2590",
          "3850",
          "3141"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2665",
          "2779",
          "3960",
          "3518",
          "2860",
          "2590",
          "3850",
          "3141"
        ]
      },
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2665",
          "2779",
          "3960",
          "3518",
          "2860",
          "2590",
          "3850",
          "3141"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2665",
          "2779",
          "3960",
          "3518",
          "2860",
          "2590",
          "3850",
          "3141"
        ]
      },
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA 1024": 2,
          "RSA 2048": 1,
          "RSA-1024": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 14
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1087": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES-128": 8,
          "AES-128, 192": 6,
          "AES-192": 4,
          "AES-256": 4,
          "Certificate # DRBG": 1,
          "PKCS#1": 5,
          "RSA 1024": 2,
          "RSA 2048": 1,
          "RSA PKCS#1": 1,
          "SHA-1": 2,
          "SHA-224": 1,
          "SHA-256": 2,
          "SHA-384": 1,
          "SHA-512": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 3": 3,
          "level 2": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 2,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 8
        },
        "RNG": {
          "RNG": 6
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Fault Induction": 2,
          "fault induction": 1
        },
        "SCA": {
          "DPA": 2,
          "SPA": 2
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 41,
          "FIPS113": 2,
          "FIPS140-2": 1,
          "FIPS180-3": 2,
          "FIPS186-2": 2,
          "FIPS186-3": 1,
          "FIPS197": 2
        },
        "ISO": {
          "ISO/IEC 7816-4": 1
        },
        "PKCS": {
          "PKCS#1": 3
        },
        "SCP": {
          "SCP03": 17
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 12,
            "AES-128": 14,
            "AES-192": 4,
            "AES-256": 4
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 12,
            "TDES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 3
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "cbrych",
      "/CreationDate": "D:20130116103630-05\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20130207071012-05\u002700\u0027",
      "/Producer": "Acrobat Distiller 10.1.3 (Windows)",
      "/Title": "Microsoft Word - 002-010823-001 SafeNet eToken Security Policy Rev B.docx",
      "pdf_file_size_bytes": 179459,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "bb7a04ad0af81f649318992e63ef7954e56abd7241ce914b3394ac0e21af757e",
    "policy_txt_hash": "5349b6ded4e406a5627836abaa1e6da5ecdb04f1c507fd6be56205110ea51cb4"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "None",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0026.pdf",
    "date_sunset": null,
    "description": "SafeNet eToken is a portable two-factor USB authenticator with advanced smart card technology. It utilizes certificate based technology to generate and store credentials, such as private keys, passwords and digital certificates inside the protected environment of the smart card chip. To authenticate, users must supply both their personal SafeNet authenticator and password, providing a critical second level of security beyond simple passwords to protect valuable digital business resources.",
    "embodiment": "Single Chip",
    "exceptions": null,
    "fw_versions": "Athena IDProtect 0106.0113.2109 with SafeNet eToken Applet Suite 1.2.9",
    "historical_reason": "Moved to historical list in accordance with SP800-131A Revision 1 Transition (AES/TDES key wrapping)",
    "hw_versions": "eToken 5100, eToken 5105, eToken 5200 and eToken 5205",
    "level": 3,
    "mentioned_certs": {},
    "module_name": "eToken 5100, 5105, 5200 and 5205",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2013-02-08",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2013-02-15",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2016-09-12",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2017-01-10",
        "lab": "CGI Information Systems \u0026 Management Consultants Inc",
        "validation_type": "Update"
      }
    ],
    "vendor": "SafeNet, Inc.",
    "vendor_url": "http://www.safenet-inc.com"
  }
}