Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cryptographic Module Validation Program CMVP

Certificate #3419

Details

Module Name
Mojo Access Point
Standard
FIPS 140-2
Status
Historical
 Historical Reason
SP 800-56Arev3 transition
 Transitional Note
Pending SP 800-56Arev3 transition revalidation
Overall Level
2
Caveat
When operated in FIPS mode and the tamper evident seals installed as indicated in the security policy
Security Level Exceptions
  • Mitigation of Other Attacks: N/A
Module Type
Hardware
Embodiment
Multi-Chip Stand Alone
Description
The module performs wireless access point (AP) function. It facilitates client devices to access network resources over secure wireless links conforming to IEEE 802.11 protocol, also referred to as WiFi.
Tested Configuration(s)
  • N/A
Approved Algorithms
AES Certs. #5158, #5412, #5449 and #5473
CKG vendor affirmed
CVL Certs. #1672 and #1673
DRBG Cert. #1936
HMAC Cert. #3419
KBKDF Certs. #174, #219 and #220
KTS AES Cert. #5158 and HMAC Cert. #3419; key establishment methodology provides 128 bits of encryption strength
KTS AES Cert. #5473; key establishment methodology provides 128 bits of encryption strength
RSA Cert. #2774
SHS Cert. #4165
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #1673, key agreement; key establishment methodology provides 128 bits of encryption strength); MD5; NDRNG
Hardware Versions
C-120 and C-130 with Tamper Evident Seal Kit: C-TPL-A
Firmware Versions
8.2.1

Vendor

Mojo Networks, Inc.
339 N. Bernardo Avenue
Suite 200
Mountain View, CA 94043
USA

Hemant Chaskar
Hemant.Chaskar@arista.com
Phone: 650-961-1111
Fax: 650-961-1169

Validation History

Date Type Lab
3/27/2019 Initial CYGNACOM SOLUTIONS INC