Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cryptographic Module Validation Program CMVP

Certificate #3790

Details

Module Name
Cisco FIPS Object Module
Standard
FIPS 140-2
Status
Historical
 Historical Reason
SP 800-56Arev3 transition
Overall Level
1
Caveat
When installed, initialized and configured as specified in the Security Policy Section 3 and operated in FIPS mode. No assurance of the minimum strength of generated keys
Security Level Exceptions
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Module Type
Firmware
Embodiment
Multi-Chip Stand Alone
Description
The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco's networking and collaboration products. The module provides FIPS 140 validated cryptographic algorithms for services such as IPSEC, SRTP, SSH, TLS, 802.1x, etc. The module does not directly implement any of these protocols, instead it provides the cryptographic primitives and functions to allow a developer to implement the various protocols.
Tested Configuration(s)
  • Cisco ASA 5555 with Linux 4.1 with Intel Xeon X3460 without PAA
  • Cisco Catalyst 9200 with Linux 4.4 with ARM 8 Cortex-A53 AArch64 without PAA
  • Cisco Catalyst 9300 with Linux 4.4 with Intel Xeon D-1526 with PAA
  • Cisco Firepower 9300 with Linux 4.1 with Intel Xeon E5-2658 with PAA
  • Cisco ISR 4351 with Linux 4.4 with Intel Atom C2758 with PAA
  • Cisco ISR 4451 with Linux 4.4 with Intel Xeon E3-1105C with PAA
  • Cisco Nexus 3172 with Linux 4.1 with Intel Pentium B 925C with PAA
  • Cisco UCS M5 with Linux 4.18 with Intel Xeon Gold 6128 with PAA
  • Evaluation board with Linux 2.6 with Cavium Octeon CN5230 without PAA
Approved Algorithms
AES Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114
CKG vendor affirmed
CVL Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114
DRBG Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114
DSA Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114
ECDSA Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114
HMAC Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114
KBKDF Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114
RSA Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114
SHA-3 Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114
SHS Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114
Triple-DES Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114
Allowed Algorithms
Diffie-Hellman (CVL Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114, key agreement; key establishment methodology provides between 112 and 219 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #A105, #A106, #A108, #A109, #A110, #A111, #A112, #A113 and #A114, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 132 bits of encryption strength)
Firmware Versions
7.2

Vendor

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team
certteam@cisco.com

Validation History

Date Type Lab
1/6/2021 Initial ACUMEN SECURITY, LLC