Skyhigh Security OpenSSL Module

Certificate #4439

Webpage information ?

Status active
Validation dates 15.02.2023
Sunset date 21-09-2026
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. No assurance of the minimum strength of generated keys
Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Description The Skyhigh Security OpenSSL Module provides FIPS validated cryptographic services for Skyhigh Security products.
Tested configurations
  • macOS 12.2.1 running on Apple MacBook Pro with Intel ® Core ™ i7-7920HQ with PAA
  • macOS 12.2.1 running on Apple MacBook Pro with Intel ® Core ™ i7-7920HQ without PAA
  • McAfee Linux 3.8.0 on VMware ESXi 6.7.0 running on Intel (R) Taylor Pass 2U Xeon (R) DP Quad Board Server with Intel ® Xeon ® E5-2699 with PAA
  • McAfee Linux 3.8.0 on Vmware ESXi 6.7.0 running on Intel ® Taylor Pass 2U Xeon® DP Quad Board Server with Intel ® Xeon ® E5-2699 without PAA
  • SUSE Linux 15 SP3 Enterprise on Vmware ESXi 6.7.0 running on Intel ® Taylor Pass 2U Xeon ® DP Quad Board Server with Intel ® Xeon ® E5-2699 with PAA
  • SUSE Linux 15 SP3 Enterprise on Vmware ESXi 6.7.0 running on Intel ® Taylor Pass 2U Xeon DP Quad Board Server with Intel ® Xeon ® E5-2699 without PAA (single-user mode)
  • Ubuntu 20.04.03 LTS running on Dell PowerEdge R720xd with Intel ® Xeon ® E5-2620 with PAA
  • Ubuntu 20.04.03 LTS running on Dell PowerEdge R720xd with Intel ® Xeon ® E5-2620 without PAA
  • Windows 10 Enterprise 20H2 32-bit running on HP EliteBook 860 G3 with Intel ® Core ™ i5-6300U with PAA
  • Windows 10 Enterprise 20H2 32-bit running on HP EliteBook 860 G3 with Intel ® Core ™ i5-6300U without PAA
  • Windows Server 2019 H2 64-bit on Vmware ESXi 6.7.0 running on Intel ® Taylor Pass 2U Xeon ® DP Quad Board Server with Intel ® Xeon ® E5-2699 with PAA
  • Windows Server 2019 H2 64-bit on Vmware ESXi 6.7.0 running on Intel ® Taylor Pass 2U Xeon ® DP Quad Board Server with Intel ® Xeon ® E5-2699 without PAA
Vendor Skyhigh Security
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Document information ?

Security policy

Symmetric Algorithms
AES, AES-128, AES-192, AES-256, RC2, RC4, RC5, DES, HMAC, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-512, HMAC-SHA-384, CMAC, CBC-MAC
Asymmetric Algorithms
ECDSA, ECC, DHE, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA-224, SHA-256, SHA-512, SHA3, SHA3-224, SHA3-256, SHA3-512, SHA-3, MD4, MD5, RIPEMD, PBKDF
Schemes
MAC, Key Agreement
Protocols
SSH, TLS, TLS v1.0, TLS 1.3, TLS v1.3, TLSv1.2, TLSv1.3
Randomness
DRBG, RNG
Libraries
OpenSSL
Elliptic Curves
P-224, P-384, P-521, P-256, B-233, B-283, B-409, B-571, K-283, K-409, K-571
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XEX, XTS

Trusted Execution Environments
SSC

Security level
Level 1

Standards
FIPS 140-2, FIPS 197, FIPS 186-4, FIPS 180-4, FIPS 202, FIPS 198-1, FIPS140-2, FIPS PUB 140-2, SP 800-90A, SP 800-38E, PKCS#1, RFC-8446, RFC-3961, RFC5288, RFC-5288

File metadata

Author: Richard Wang
Creation date: D:20230210145141-05'00'
Modification date: D:20230210145141-05'00'
Pages: 22
Creator: Microsoft® Word 2016
Producer: Microsoft® Word 2016

References

Heuristics ?

No heuristics are available for this certificate.

References ?

No references are available for this certificate.

Updates ?

  • 12.03.2023 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The certificate_pdf_url property was set to https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/February 2023_010323_0649.pdf.
  • 26.02.2023 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4439,
  "dgst": "8ee3d6eae3069ec5",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "RSA#A3012",
        "DSA#A2366",
        "KAS-SSC#A2366",
        "ECDSA#A2366",
        "CVL#A2366",
        "KAS#A2366",
        "AES#A2366",
        "HMAC#A2366",
        "RSA#A2366",
        "DRBG#A2366",
        "SHA-3#A2366",
        "AES#A3012",
        "PBKDF#A2366",
        "KTS#A2366",
        "SHS#A2366"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDSA": {
            "ECDSA": 17
          }
        },
        "FF": {
          "DH": {
            "DH": 4,
            "DHE": 1,
            "Diffie-Hellman": 19
          },
          "DSA": {
            "DSA": 20
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CCM": {
          "CCM": 6
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 12
        },
        "OFB": {
          "OFB": 2
        },
        "XEX": {
          "XEX": 2
        },
        "XTS": {
          "XTS": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 5
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 9
        },
        "TLS": {
          "TLS": {
            "TLS": 18,
            "TLS 1.3": 1,
            "TLS v1.0": 1,
            "TLS v1.3": 1,
            "TLSv1.2": 1,
            "TLSv1.3": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-233": 3,
          "B-283": 3,
          "B-409": 3,
          "B-571": 3,
          "K-283": 3,
          "K-409": 3,
          "K-571": 3,
          "P-224": 12,
          "P-256": 6,
          "P-384": 8,
          "P-521": 12
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES GCM (128": 1,
          "AES-128": 2,
          "AES-192": 2,
          "AES-256": 2,
          "HMAC (128": 1,
          "HMAC SHA-256": 2,
          "HMAC-SHA- 384": 2,
          "HMAC-SHA-1": 4,
          "HMAC-SHA-224": 4,
          "HMAC-SHA-256": 4,
          "HMAC-SHA-384": 2,
          "HMAC-SHA-512": 2,
          "HMAC-SHA-512 112": 2,
          "PAA 2": 1,
          "PAA 3": 1,
          "PAA 4": 1,
          "PAA 5": 1,
          "PAA 6": 1,
          "PKCS#1": 6,
          "SHA- 1": 1,
          "SHA-1": 12,
          "SHA-224": 1,
          "SHA-256": 4,
          "SHA-3": 1,
          "SHA-512": 2,
          "SHA2- 224": 1,
          "SHA2- 256": 2,
          "SHA2- 384": 6,
          "SHA2- 512": 4,
          "SHA2-224": 10,
          "SHA2-256": 14,
          "SHA2-384": 10,
          "SHA2-512": 11,
          "SHA3": 1,
          "SHA3- 384": 1,
          "SHA3-224": 1,
          "SHA3-256": 2,
          "SHA3-512": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 2
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 2
          },
          "MD5": {
            "MD5": 3
          }
        },
        "PBKDF": {
          "PBKDF": 13
        },
        "RIPEMD": {
          "RIPEMD": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 12
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 4,
            "SHA-512": 2
          },
          "SHA3": {
            "SHA-3": 1,
            "SHA3": 1,
            "SHA3-224": 1,
            "SHA3-256": 2,
            "SHA3-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 11
        },
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 7,
          "FIPS 180-4": 2,
          "FIPS 186-4": 17,
          "FIPS 197": 8,
          "FIPS 198-1": 3,
          "FIPS 202": 2,
          "FIPS PUB 140-2": 1,
          "FIPS140-2": 2
        },
        "NIST": {
          "SP 800-38E": 1,
          "SP 800-90A": 5
        },
        "PKCS": {
          "PKCS#1": 3
        },
        "RFC": {
          "RFC-3961": 4,
          "RFC-5288": 2,
          "RFC-8446": 2,
          "RFC5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 32,
            "AES-128": 2,
            "AES-192": 2,
            "AES-256": 2
          },
          "RC": {
            "RC2": 2,
            "RC4": 1,
            "RC5": 1
          }
        },
        "DES": {
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1,
            "CMAC": 8,
            "HMAC": 30,
            "HMAC-SHA-224": 2,
            "HMAC-SHA-256": 2,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 2
          }
        }
      },
      "tee_name": {
        "IBM": {
          "SSC": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Richard Wang",
      "/CreationDate": "D:20230210145141-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20230210145141-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "pdf_file_size_bytes": 562400,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.skyhighsecurity.com/",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=14867",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35622"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 22
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "1b508e06578a91f2d0c77b8c1d0bc39c678800bd5e1866a5db54a65eab265ede",
    "policy_txt_hash": "7dd125e7aa935f6617078f83f417097358643be979976ecc4d1e93e821b0adf9"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. No assurance of the minimum strength of generated keys",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/February 2023_010323_0649.pdf",
    "date_sunset": "2026-09-21",
    "description": "The Skyhigh Security OpenSSL Module provides FIPS validated cryptographic services for Skyhigh Security products.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Skyhigh Security OpenSSL Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": "1.1.1v",
    "tested_conf": [
      "macOS 12.2.1 running on Apple MacBook Pro with Intel \u00ae Core \u2122 i7-7920HQ with PAA",
      "macOS 12.2.1 running on Apple MacBook Pro with Intel \u00ae Core \u2122 i7-7920HQ without PAA",
      "McAfee Linux 3.8.0 on VMware ESXi 6.7.0 running on Intel (R) Taylor Pass 2U Xeon (R) DP Quad Board Server with Intel \u00ae Xeon \u00ae E5-2699 with PAA",
      "McAfee Linux 3.8.0 on Vmware ESXi 6.7.0 running on Intel \u00ae Taylor Pass 2U Xeon\u00ae DP Quad Board Server with Intel \u00ae Xeon \u00ae E5-2699 without PAA",
      "SUSE Linux 15 SP3 Enterprise on Vmware ESXi 6.7.0 running on Intel \u00ae Taylor Pass 2U Xeon \u00ae DP Quad Board Server with Intel \u00ae Xeon \u00ae E5-2699 with PAA",
      "SUSE Linux 15 SP3 Enterprise on Vmware ESXi 6.7.0 running on Intel \u00ae Taylor Pass 2U Xeon DP Quad Board Server with Intel \u00ae Xeon \u00ae E5-2699 without PAA (single-user mode)",
      "Ubuntu 20.04.03 LTS running on Dell PowerEdge R720xd with Intel \u00ae Xeon \u00ae E5-2620 with PAA",
      "Ubuntu 20.04.03 LTS running on Dell PowerEdge R720xd with Intel \u00ae Xeon \u00ae E5-2620 without PAA",
      "Windows 10 Enterprise 20H2 32-bit running on HP EliteBook 860 G3 with Intel \u00ae Core \u2122 i5-6300U with PAA",
      "Windows 10 Enterprise 20H2 32-bit running on HP EliteBook 860 G3 with Intel \u00ae Core \u2122 i5-6300U without PAA",
      "Windows Server 2019 H2 64-bit on Vmware ESXi 6.7.0 running on Intel \u00ae Taylor Pass 2U Xeon \u00ae DP Quad Board Server with Intel \u00ae Xeon \u00ae E5-2699 with PAA",
      "Windows Server 2019 H2 64-bit on Vmware ESXi 6.7.0 running on Intel \u00ae Taylor Pass 2U Xeon \u00ae DP Quad Board Server with Intel \u00ae Xeon \u00ae E5-2699 without PAA"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2023-02-15",
        "lab": "GOSSAMER SECURITY SOLUTIONS INC",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Skyhigh Security",
    "vendor_url": "http://www.skyhighsecurity.com"
  }
}