Module Name
Security BuilderĀ® FIPS Module
Historical Reason
Moved to historical list due to sunsetting
Caveat
When operated in FIPS mode. This validation entry is a non-security-relevant modification to Cert. #1729
Security Level Exceptions
Embodiment
Multi-Chip Stand Alone
Description
The Security BuilderĀ® FIPS Module is a standards-based cryptographic toolkit that supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into both mobile and server-based applications. The Security Builder FIPS Module is part of the Certicom Security Architecture, a comprehensive cross-platform security solution which supports multiple cryptographic software and hardware providers with a single common API.
Tested Configuration(s)
- Android 4.0.4 running on an Intel based PC with an Intel Atom Z2460 Processor [2]
- Android 4.4.2 running on an ARM based PC with an ARMv7 Processor [2]
- Android 5.0.1 running on an ARM based PC with an ARMv8 Processor [2]
- CentOS Linux 7.1 64-bit running on an Intel based PC with an Intel Core 2 Duo T9400 Processor without AES-NI [2]
- iOS 6.1.4 running on an Apple iPhone with an ARMv7 Processor [2]
- iOS 6.1.4 running on an Apple iPhone with an ARMv7S Processor [2]
- iOS 8.0 running on an Apple iPhone with an on ARMv8 Processor [2]
- Mac OSX 10.10.4 running on an Apple GPC with an Intel Core i7-3615QM Processor [2]
- Mac OSX 10.11.4 running on an Apple GPC with an Intel Core i7-3615QM Processor [3]
- QNX 6.5 running on an Intel based PC with an Intel Pentium III Processor [1]
- QNX 6.6 running on an ARM based PC with an ARM Cortex A9 MPCore Processor [1]
- RedHat Linux 5.6 running on an Intel based PC with a 32-bit Intel Core i7 Processor [1]
- RedHat Linux 5.6 running on an Intel based PC with a 32-bit Intel Core i7 Processor with AES-NI [1]
- RedHat Linux 5.6 running on an Intel based PC with an Intel Core i5-2300 Processor [1]
- RedHat Linux 5.6 running on an Intel based PC with an Intel Core i5-2300 Processor with AES-NI [1]
- Windows 7 Enterprise 32-bit running on an Intel based PC with an Intel Core Duo Processor without AES-NI [2]
- Windows 7 Enterprise 64-bit running on an Intel based PC with an Intel Core i7-2720QM Processor with AES-NI [2]
- Windows Phone 8.0 running on an ARM based PC with an ARMv7 Processor [2] (single-user mode)
Approved Algorithms
AES |
Certs. #1789, #3029 and #3946 |
CVL |
Certs. #7, #367 and #789 |
DRBG |
Certs. #127, #579 and #1151 |
DSA |
Certs. #563, #891 and #1076 |
ECDSA |
Certs. #242, #553 and #866 |
HMAC |
Certs. #1054, #1914 and #2571 |
KAS |
Certs. #25, #50 and #79 |
RSA |
Certs. #894, #1574 and #2017 |
SHS |
Certs. #1571, #2530 and #3256 |
Triple-DES |
Certs. #1159, #1773 and #2164 |
Allowed Algorithms
RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)
Software Versions
6.0 [1], 6.0.2 [2] and 6.0.3 [3]