Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Module Validation Program

Certificate #2964

Details

Module Name
BoringCrypto
Standard
FIPS 140-2
Status
Active
Sunset Date
7/18/2022
Validation Dates
7/19/2017
Overall Level
1
Caveat
When installed, initialized and configured as specified in Section 12.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Security Level Exceptions
  • Physical Security: N/A
  • Mitigation of Other Attacks: N/A
Module Type
Software
Embodiment
Multi-Chip Stand Alone
Description
A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.
Tested Configuration(s)
  • Ubuntu Linux 14.04 LTS running on Intel Xeon E5 without PAA (clang Compiler Version 4.0.0)
  • Ubuntu Linux 15.04 running on POWER8 without PAA (clang Compiler Version 4.0.0)
  • Ubuntu Linux 16.04 running on Intel Xeon E5 with PAA (clang Compiler Version 4.0.0)
  • Ubuntu Linux 17.04 running on POWER8 with PAA (clang Compiler Version 4.0.0)
  • Ubuntu Linux 17.04 running on POWER9 with PAA (clang Compiler Version 4.0.0) (single-user mode)
FIPS Algorithms
AES Cert. #4558
CVL Cert. #1240
DRBG Cert. #1507
ECDSA Cert. #1112
HMAC Cert. #3011
KTS AES Cert. #4558; key establishment methodology provides between 128 and 256 bits of encryption strength
RSA Cert. #2485
SHS Cert. #3736
Triple-DES Cert. #2428
Allowed Algorithms
NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)
Software Versions
24e5886c0edfc409c8083d10f9f1120111efd6f5

Vendor

Google, Inc.
1600 Amphitheatre Parkway
Mountain View, CA 94043
USA

Adam Langley
security@chromium.org

Lab

ACUMEN SECURITY, LLC
NVLAP Code: 201029-0