Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
The Cryptographic Module for Fognigma is a general purpose cryptographic module integrated in the Fognigma platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information. This module provides the cryptographic services that are used by the Fognigma platform to generate its Virtual Private Network (VPN)
Version
2.0.16
Type
SOFTWARE
Vendor
Berryville Holdings, LLC
2465 Centerville Road
#J17-812
Herndon, VA 20171
USA
Contacts
Cael Jacobs
cael@bvhllc.com
(703) 782-9840
Chava Jurado
chava@bvhllc.com
(703) 782-9840

Validations

Number
Date
Operating Environments
Algorithm Capabilities
DRBG 2301
9/14/2018
    • ARM Cortex-A53 without PAA w/ Raspbian Stretch
    • IntelĀ® Xeon E5 without PAA w/ Ubuntu 16.04
    • ARM Cortex-A53 with PAA w/ Raspbian Stretch
    • IntelĀ® Xeon E5 with PAA w/ Ubuntu 16.04
  • Counter DRBG
    • Prediction Resistance: Yes, No
      • Capabilities:
        • Mode: AES-128
        • Derivation Function Enabled: No
      • Capabilities:
        • Mode: AES-128
        • Derivation Function Enabled: Yes
      • Capabilities:
        • Mode: AES-192
        • Derivation Function Enabled: No
      • Capabilities:
        • Mode: AES-192
        • Derivation Function Enabled: Yes
      • Capabilities:
        • Mode: AES-256
        • Derivation Function Enabled: No
      • Capabilities:
        • Mode: AES-256
        • Derivation Function Enabled: Yes
    Prerequisites:
  • Hash DRBG
    • Prediction Resistance: Yes, No
      • Capabilities:
        • Mode: SHA-1
      • Capabilities:
        • Mode: SHA2-224
      • Capabilities:
        • Mode: SHA2-256
      • Capabilities:
        • Mode: SHA2-384
      • Capabilities:
        • Mode: SHA2-512
    Prerequisites:
  • HMAC DRBG
    • Prediction Resistance: Yes, No
      • Capabilities:
        • Mode: SHA-1
      • Capabilities:
        • Mode: SHA2-224
      • Capabilities:
        • Mode: SHA2-256
      • Capabilities:
        • Mode: SHA2-384
      • Capabilities:
        • Mode: SHA2-512
    Prerequisites: