Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Module Validation Program CMVP

Certificate #3635

Details

Module Name
Crown Sterling Cryptographic Module
Standard
FIPS 140-2
Status
Active
Sunset Date
2/4/2021
Validation Dates
03/23/2020;05/07/2020;05/08/2020
Overall Level
1
Caveat
When operated in FIPS mode. No assurance of the minimum strength of generated keys. This validation entry is a non-security relevant modification to Cert. #3273.
Security Level Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Module Type
Software
Embodiment
Multi-Chip Stand Alone
Description
The Crown Sterling Cryptographic Module is a standards-based “Drop-in Compliance” cryptographic engine for servers, desktops, and digital device appliances. The module delivers core cryptographic functions to platforms and features robust algorithm support, including some Suite B algorithms. Crown Sterling Cryptographic Module offloads functions for secure key management, data integrity, data at rest encryption, data in motion encryption, and secure communication to a trusted implementations.
Tested Configuration(s)
  • CentOS 7.3 on a Dell Optiplex 755 (single-user mode)
FIPS Algorithms
AES Cert. #4750
CVL Cert. #1387
DRBG Cert. #1631
DSA Cert. #1273
ECDSA Cert. #1185
HMAC Cert. #3164
RSA Cert. #2594
SHS Cert. #3893
Triple-DES Cert. #2524
Allowed Algorithms
EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)
Software Versions
1.0

Vendor

Crown Sterling Limited, LLC
4040 MacArthur Blvd., Suite 200
Newport Beach, CA 92660
USA

Crown Sterling Support team
Support@crownsterling.io
Phone: 949-260-1700

Lab

ÆGISOLVE
NVLAP Code: 200802-0