U.S. flag   An official website of the United States government

Cryptographic Module Validation Program CMVP

Certificate #2640

Details

Module Name
nShield F3 6000e, nShield F3 1500e, nShield F3 500e, nShield F3 10e, nShield F3 6000e for nShield Connect, nShield F3 1500e for nShield Connect and nShield F3 500e for nShield Connect
Standard
FIPS 140-2
Status
Historical
 Historical Reason
SP 800-131A transition which disallows key wrapping not compliant to SP 800-38F.
Validation Dates
05/13/2016;01/29/2020
Overall Level
3
Caveat
When operated in FIPS mode and initialized to Overall Level 3 per Security Policy. The protocol TLS shall not be used when operated in FIPS mode
Security Level Exceptions
  • Mitigation of Other Attacks: N/A
Module Type
Hardware
Embodiment
Multi-Chip Embedded
Description
The nShield modules: nShield F3 10e, nShield F3 500e, nShield F3 1500e, nShield F3 6000e, nShield F3 500e for nShield Connect, nShield F3 1500e for nShield Connect, nShield F3 6000e for nShield Connect are tamper evident and tamper responsive Hardware Security Modules which provide support for the widest range of cryptographic algorithms, application programming interfaces (APIs) and host operating systems, enabling the devices to be used with virtually any business application. The units are identical in operation and only vary in the processing speed.
Tested Configuration(s)
  • N/A
FIPS Algorithms
AES Cert. #3419
CVL Certs. #516 and #532
DRBG Cert. #824
DSA Cert. #963
ECDSA Cert. #686
HMAC Cert. #2177
KBKDF Cert. #57
KTS AES Cert. #3419; key establishment methodology provides between 128 and 256 bits of encryption strength
RSA Cert. #1751
SHS Cert. #2825
Triple-DES Cert. #1930
Triple-DES MAC Triple-DES Cert. #1930, vendor affirmed
Other Algorithms
ARC4; Aria; Camellia; CAST-256; DES; Diffie-Hellman (CVL Cert. #515, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #515, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); ECMQV (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); El-Gamal; HAS-160; HMAC-MD5; HMAC-RIPEMD160; HMAC-Tiger; KCDSA; MD5; NDRNG; RIPEMD-160; RSA (encrypt/decrypt); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); SEED; Tiger; TLS KDF (non-compliant); Triple-DES (Cert. #1930, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
Hardware Versions
nC4033E-6K0, nC4033E-1K5, nC4033E-500, nC4033E-010, nC4033E-6K0N, nC4033E-1K5N and nC4033E-500N, Build Standard N
Firmware Versions
2.61.2-3

Vendor

nCipher Security Limited
One Station Square
Suite 710
Cambridge, FL CB1 2GA
United Kingdom

sales@ncipher.com
sales@ncipher.com

Lab

Computer Sciences Corporation
NVLAP Code: 200996-0