Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cryptographic Module Validation Program CMVP

Certificate #4178

Details

Module Name
Cellcrypt Core V4 FIPS 140-2 Module
Standard
FIPS 140-2
Status
Historical
 Historical Reason
Moved to historical list due to sunsetting
Overall Level
1
Caveat
When operated in FIPS mode. No assurance of the minimum strength of generated keys.
Security Level Exceptions
  • Roles, Services, and Authentication: Level 2
  • Physical Security: N/A
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Module Type
Software
Embodiment
Multi-Chip Stand Alone
Description
Cellcrypt Core V4 FIPS 140-2 Module is a software library with a C language Application Program Interface (API) used by applications requiring cryptographic services. It is primarily used with Cellcrypt Private Stack and other Cellcrypt applications.
Tested Configuration(s)
  • Android 11 running on Samsung Galaxy S20 with Qualcomm Snapdragon 865 with PAA
  • Android 11 running on Samsung Galaxy S20 with Qualcomm Snapdragon 865 without PAA
  • Android 11 running on Samsung Galaxy Tab Active3 with Samsung Exynos 9810 with PAA
  • Android 11 running on Samsung Galaxy Tab Active3 with Samsung Exynos 9810 without PAA
  • iOS 15 running on Apple iPhone 12 with Apple A14 Bionic with PAA
  • iOS 15 running on Apple iPhone 12 with Apple A14 Bionic without PAA
  • Oracle® ILOM OS v3.0 running on Emulex Pilot-4 Orion mainboard with Oracle® ILOM SP v2 (ARM v5) without PAA
  • Oracle® ILOM OS v3.0 running on Oracle X5-2 server with Oracle® ILOM SP v3 (ARM v7) with PAA
  • Oracle® ILOM OS v3.0 running on Oracle X5-2 server with Oracle® ILOM SP v3 (ARM v7) without PAA
  • Oracle® ILOM OS v4.0 running on AST2400 Server Management Processor with Oracle® ILOM SP v4 (ARM v9) without PAA
  • Oracle® Linux 7.6 64 bit running on Oracle® X7-2 Server with AMD® EPYC® 7551 with PAA
  • Oracle® Linux 7.6 64 bit running on Oracle® X7-2 Server with AMD® EPYC® 7551 without PAA
  • Oracle® Linux 7.6 64 bit running on Oracle® X7-2 Server with Intel® Xeon® Silver 4114 with PAA
  • Oracle® Linux 7.6 64 bit running on Oracle® X7-2 Server with Intel® Xeon® Silver 4114 without PAA
  • Oracle® Solaris 11.4 running on Oracle S7-2L with Oracle® SPARC S7 with PAA
  • Oracle® Solaris 11.4 running on Oracle S7-2L with Oracle® SPARC S7 without PAA
  • Oracle® Solaris 11.4 running on Oracle X5-2 server with Intel Xeon E5-2600 with PAA
  • Oracle® Solaris 11.4 running on Oracle X5-2 server with Intel Xeon E5-2600 without PAA
  • Oracle® ZFS Storage OS 8.8 running on Oracle® ZFS Storage ZS5-2 with Intel Xeon E5 with PAA
  • Oracle® ZFS Storage OS 8.8 running on Oracle® ZFS Storage ZS5-2 with Intel Xeon E5 without PAA
  • Oracle® ZFS Storage OS 8.8 running on Oracle® ZFS Storage ZS5-4 with Intel Xeon E7 with PAA
  • Oracle® ZFS Storage OS 8.8 running on Oracle® ZFS Storage ZS5-4 with Intel Xeon E7 without PAA (single-user mode)
  • Raspbian 11 running on Raspberry Pi 4 with Broadcom BCM2711 Cortex-A72 with PAA
  • Raspbian 11 running on Raspberry Pi 4 with Broadcom BCM2711 Cortex-A72 without PAA
  • RHEL 7.6 running on HPE ProLiant DL360 Gen9 Server with Intel Xeon E5-2680 V4 with PAA
  • RHEL 7.6 running on HPE ProLiant DL360 Gen9 Server with Intel Xeon E5-2680 V4 without PAA
  • Windows 10 running on Microsoft Surface Pro 7 with Intel Core i5-1035G4 with PAA
  • Windows 10 running on Microsoft Surface Pro 7 with Intel Core i5-1035G4 without PAA
Approved Algorithms
AES Certs. #5445, #A1999 and #C1651
CKG vendor affirmed
DRBG Certs. #2129, #A1999 and #C1651
DSA Certs. #1400, #A1999 and #C1651
ECDSA Certs. #1449, #A1999 and #C1651
HMAC Certs. #3603, #A1999 and #C1651
KAS-SSC vendor affirmed
RSA Certs. #2921, #A1999 and #C1651
SHS Certs. #4364, #A1999 and #C1651
Triple-DES Certs. #2735, #A1999 and #C1651
Allowed Algorithms
RSA (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength)
Software Versions
CCoreV4

Vendor

Cellcrypt
Secure Offices, 7467 Ridge Road
Suite 310
Hanover, MD 21076
USA

Mark Currie
mark.currie@cellcrypt.com
Phone: +1 410 850 7305
Rogerio Richa
rogerio.richa@cellcrypt.com
Phone: +1 410 850 7305

Validation History

Date Type Lab
3/15/2022 Initial ACUMEN SECURITY, LLC