Module Name
Mobile Application Cryptographic Module
Historical Reason
186-2 transition
Caveat
When operated in FIPS mode. This validation entry is a non-security relevant modification to Cert. #1938. The module generates cryptographic keys whose strengths are modified by available entropy.
Security Level Exceptions
- Physical Security: N/A
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The Silent Circle Mobile Application Cryptographic Module provides cryptographic functions for Silent Circle mobile applications, including Silent Phone Silent Text, Silent World, Silent VPN, and Silent Manager.
Tested Configuration(s)
- Android 4.0 running on a Galaxy Nexus
- iOS 5.1 running on a iPad 3
- iOS 6 running on a iPad 3
- iOS 7 running on a iPad 3 (single-user mode)
Other Algorithms
RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RNG