intCertNum |
1878 |
strVendorName |
Mocana Corporation |
strURL |
http://www.mocana.com |
strAddress1 |
350 Sansome Street |
strAddress2 |
Suite 1010 |
strAddress3 |
|
strCity |
San Francisco |
strStateProv |
CA |
strPostalCode |
94104 |
strCountry |
94104 |
strContact |
James Blaisdell |
strEmail |
fips@mocana.com |
strPhone |
415-617-0055 |
strFax |
415-617-0056 |
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
1878 |
strModuleName |
Mocana Cryptographic Suite B Module |
strPartNumber |
Software Versions: 5.5f and 5.5.1f |
memModuleNotes |
When operated in FIPS mode |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
|
strModuleType |
Software |
strValidationDate |
01/31/2013;03/28/2013;01/23/2014;04/03/2014;11/25/2014;02/20/2015;07/06/2015;04/12/2016;07/08/2016 |
intOverallLevel |
1 |
memIndividualLevelNotes |
;;-Operational Environment: Android 2.2 running on a LG Optimus 3D (LG-P920); Android 2.3 running on a LG G2X (LG-P999); Android 4.0 running on a Samsung Nexus-S (GT-I9023); Android 4.1 running on a LG Optimus 3D (LG-P920); Ubuntu Linux 32 bit running on a Dell Dimension 9200; Ubuntu Linux 64 bit running on a Dell Dimension 9200; Android 4.3 running on Asus TF 700 Tablet; Android 4.4 running on Nexus 7 Tablet; VxWorks 6.8 running on Avaya ERS 4850; Mentor Embedded Linux 4.0 running on an Avaya VSP 4450; Honeywell Xenon RTOS running on Honeywell 1902 Scanner; Android 6.0 32-bit running on Nexus 7 Tablet; Android 6.0 64-bit running on Galaxy S6 (single-user mode) |
strFIPSAlgorithms |
AES (Certs. #2039, #2272 and #2741); Triple-DES (Certs. #1316 and #1650); SHS (Certs. #1785 and #2313); HMAC (Certs. #1238 and #1718); RSA (Certs. #1059 and #1437); DSA (Certs. #647 and #840); ECDSA (Certs. #298 and #479); DRBG (Certs. #201 and #460) |
strOtherAlgorithms |
Diffie-Hellman (key agreement: key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; Blowfish; ARC2; ARC4; MD2; MD4; MD5; HMAC-MD5; AES EAX (non-compliant); AES XCBC (non-compliant); RSA (encrypt/decrypt); RNG; Dual EC DRBG |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
The Mocana Cryptographic Module is the engine of Mocana's Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com. |
intModuleCount |
1 |
memAdditionalNotes |
03/28/13: Updated security policy. 01/23/14: Added SW 5.5.1f, AES 2741, Triple-DES 1650, SHS 2313, HMAC 1718, RSA 1437, DSA 840, ECDSA 479, RNG 1266, DRBG 460, added OE Android 4.3 running on ARMv7 and updated the security policy. 02/20/14: Updated security policy. 04/03/14: Added OE Android 4.4 running on Nexus 7 Tablet, VxWorks 6.8 running on Avaya ERS 4850 and updated the security policy. 11/25/14: Updated security policy. 02/20/15: Added OE Mentor Embedded Linux 4.0 running on an Avaya VSP 4450 and updated the security policy. 07/06/15: Updated security policy. RNG moved from approved to non-approved. The module implements an approved DRBG for key generation in approved mode. The SP has been updated to reflect these changes. |
strFirstValidtionDate |
01/31/13 00:00:00 |
strLabName |
InfoGard |
strValidationYear |
2013 |