Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cryptographic Module Validation Program CMVP

Certificate #792

Details

Module Name
Security Builder® FIPS Java Module
Standard
FIPS 140-2
Status
Historical
 Historical Reason
RNG SP800-131A Revision 1 Transition
Overall Level
1
Caveat
When operated in FIPS mode
Module Type
Software
Embodiment
Multi-chip standalone
Description
The Security Builder® FIPS Java Module is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications. The Security Builder® FIPS Java Module is intended for use by developers who want government level security and can also be used in conjunction with other Certicom developer toolkits including Security Builder® PKI and Security Builder® SSL.
Tested Configuration(s)
  • and Solaris 10 32-bit with 32 bit SPARC processor (single-user mode)
  • Red Hat Linux Application Server 3.0 32-bit
  • Red Hat Linux Application Server 4.0 64-bit
  • Solaris 9 32-bit
  • Solaris 9 64-bit
  • Sun Java Runtime Environment (JRE) 1.3.1, 1.4.2 and 1.5.0 running on Windows XP 32-bit
  • Windows XP 64-bit
Approved Algorithms
AES Cert. #469
DSA Cert. #193
ECDSA Cert. #41
HMAC Cert. #227
RNG Cert. #254
RSA Cert. #191
SHS Cert. #537
Triple-DES Cert. #485
Other Algorithms
ARC2; ARC4; MD2; MD5; HMAC-MD5; DES; DESX; Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC MQV (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
Software Versions
2.1

Vendor

Certicom Corp.
5520 Explorer Drive
4th Floor
Mississauga, Ontario L4W 5L1
Canada

sales@certicom.com
sales@certicom.com
Phone: 905-507-4220
Fax: 905-507-4230

Validation History

Date Type Lab
6/26/2007 Initial DOMUS
7/20/2007 Update
10/12/2007 Update
3/6/2009 Update