Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cryptographic Module Validation Program CMVP

Certificate #4178

Details

Module Name
Cellcrypt Core V4 FIPS 140-2 Module
Standard
FIPS 140-2
Status
Historical
 Historical Reason
Moved to historical list due to sunsetting
Overall Level
1
Caveat
When operated in FIPS mode. No assurance of the minimum strength of generated keys.
Security Level Exceptions
  • Roles, Services, and Authentication: Level 2
  • Physical Security: N/A
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Module Type
Software
Embodiment
Multi-Chip Stand Alone
Description
Cellcrypt Core V4 FIPS 140-2 Module is a software library with a C language Application Program Interface (API) used by applications requiring cryptographic services. It is primarily used with Cellcrypt Private Stack and other Cellcrypt applications.
Tested Configuration(s)
  • Android 11 running on Samsung Galaxy S20 with Qualcomm Snapdragon 865 with PAA
  • Android 11 running on Samsung Galaxy S20 with Qualcomm Snapdragon 865 without PAA
  • Android 11 running on Samsung Galaxy Tab Active3 with Samsung Exynos 9810 with PAA
  • Android 11 running on Samsung Galaxy Tab Active3 with Samsung Exynos 9810 without PAA
  • iOS 15 running on Apple iPhone 12 with Apple A14 Bionic with PAA
  • iOS 15 running on Apple iPhone 12 with Apple A14 Bionic without PAA
  • Oracle® ILOM OS v3.0 running on Emulex Pilot-4 Orion mainboard with Oracle® ILOM SP v2 (ARM v5) without PAA
  • Oracle® ILOM OS v3.0 running on Oracle X5-2 server with Oracle® ILOM SP v3 (ARM v7) with PAA
  • Oracle® ILOM OS v3.0 running on Oracle X5-2 server with Oracle® ILOM SP v3 (ARM v7) without PAA
  • Oracle® ILOM OS v4.0 running on AST2400 Server Management Processor with Oracle® ILOM SP v4 (ARM v9) without PAA
  • Oracle® Linux 7.6 64 bit running on Oracle® X7-2 Server with AMD® EPYC® 7551 with PAA
  • Oracle® Linux 7.6 64 bit running on Oracle® X7-2 Server with AMD® EPYC® 7551 without PAA
  • Oracle® Linux 7.6 64 bit running on Oracle® X7-2 Server with Intel® Xeon® Silver 4114 with PAA
  • Oracle® Linux 7.6 64 bit running on Oracle® X7-2 Server with Intel® Xeon® Silver 4114 without PAA
  • Oracle® Solaris 11.4 running on Oracle S7-2L with Oracle® SPARC S7 with PAA
  • Oracle® Solaris 11.4 running on Oracle S7-2L with Oracle® SPARC S7 without PAA
  • Oracle® Solaris 11.4 running on Oracle X5-2 server with Intel Xeon E5-2600 with PAA
  • Oracle® Solaris 11.4 running on Oracle X5-2 server with Intel Xeon E5-2600 without PAA
  • Oracle® ZFS Storage OS 8.8 running on Oracle® ZFS Storage ZS5-2 with Intel Xeon E5 with PAA
  • Oracle® ZFS Storage OS 8.8 running on Oracle® ZFS Storage ZS5-2 with Intel Xeon E5 without PAA
  • Oracle® ZFS Storage OS 8.8 running on Oracle® ZFS Storage ZS5-4 with Intel Xeon E7 with PAA
  • Oracle® ZFS Storage OS 8.8 running on Oracle® ZFS Storage ZS5-4 with Intel Xeon E7 without PAA (single-user mode)
  • Raspbian 11 running on Raspberry Pi 4 with Broadcom BCM2711 Cortex-A72 with PAA
  • Raspbian 11 running on Raspberry Pi 4 with Broadcom BCM2711 Cortex-A72 without PAA
  • RHEL 7.6 running on HPE ProLiant DL360 Gen9 Server with Intel Xeon E5-2680 V4 with PAA
  • RHEL 7.6 running on HPE ProLiant DL360 Gen9 Server with Intel Xeon E5-2680 V4 without PAA
  • Windows 10 running on Microsoft Surface Pro 7 with Intel Core i5-1035G4 with PAA
  • Windows 10 running on Microsoft Surface Pro 7 with Intel Core i5-1035G4 without PAA
Approved Algorithms
AES Certs. #5445, #A1999 and #C1651
CKG vendor affirmed
DRBG Certs. #2129, #A1999 and #C1651
DSA Certs. #1400, #A1999 and #C1651
ECDSA Certs. #1449, #A1999 and #C1651
HMAC Certs. #3603, #A1999 and #C1651
KAS-SSC vendor affirmed
RSA Certs. #2921, #A1999 and #C1651
SHS Certs. #4364, #A1999 and #C1651
Triple-DES Certs. #2735, #A1999 and #C1651
Allowed Algorithms
RSA (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength)
Software Versions
CCoreV4

Vendor

Cellcrypt
Secure Offices, 7467 Ridge Road
Suite 310
Hanover, MD 21076
USA

Mark Currie
[email protected]
Phone: +1 410 850 7305
Rogerio Richa
[email protected]
Phone: +1 410 850 7305

Validation History

Date Type Lab
3/15/2022 Initial Acumen Security