Certificate 1878 - Mocana Cryptographic Suite B Module
intCertNum 1878
strVendorName Mocana Corporation
strURL http://www.mocana.com
strAddress1 350 Sansome Street
strAddress2 Suite 1010
strAddress3
strCity San Francisco
strStateProv CA
strPostalCode 94104
strCountry 94104
strContact James Blaisdell
strEmail fips@mocana.com
strPhone 415-617-0055
strFax 415-617-0056
strContact2
strEmail2
strFax2
strPhone2
intCertNum 1878
strModuleName Mocana Cryptographic Suite B Module
strPartNumber Software Versions: 5.5f and 5.5.1f
memModuleNotes When operated in FIPS mode
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf]
strPURL
strModuleType Software
strValidationDate 01/31/2013;03/28/2013;01/23/2014;04/03/2014;11/25/2014;02/20/2015;07/06/2015;04/12/2016;07/08/2016
intOverallLevel 1
memIndividualLevelNotes ;;-Operational Environment: Android 2.2 running on a LG Optimus 3D (LG-P920); Android 2.3 running on a LG G2X (LG-P999); Android 4.0 running on a Samsung Nexus-S (GT-I9023); Android 4.1 running on a LG Optimus 3D (LG-P920); Ubuntu Linux 32 bit running on a Dell Dimension 9200; Ubuntu Linux 64 bit running on a Dell Dimension 9200; Android 4.3 running on Asus TF 700 Tablet; Android 4.4 running on Nexus 7 Tablet; VxWorks 6.8 running on Avaya ERS 4850; Mentor Embedded Linux 4.0 running on an Avaya VSP 4450; Honeywell Xenon RTOS running on Honeywell 1902 Scanner; Android 6.0 32-bit running on Nexus 7 Tablet; Android 6.0 64-bit running on Galaxy S6 (single-user mode)
strFIPSAlgorithms AES (Certs. #2039, #2272 and #2741);
Triple-DES (Certs. #1316 and #1650);
SHS (Certs. #1785 and #2313);
HMAC (Certs. #1238 and #1718);
RSA (Certs. #1059 and #1437);
DSA (Certs. #647 and #840);
ECDSA (Certs. #298 and #479);
DRBG (Certs. #201 and #460)
strOtherAlgorithms Diffie-Hellman (key agreement: key establishment methodology provides 112 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
RSA (key wrapping;
key establishment methodology provides between 112 and 128 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
EC Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
DES;
Blowfish;
ARC2;
ARC4;
MD2;
MD4;
MD5;
HMAC-MD5;
AES EAX (non-compliant);
AES XCBC (non-compliant);
RSA (encrypt/decrypt);
RNG;
Dual EC DRBG
strConfiguration Multi-chip standalone
memModuleDescription The Mocana Cryptographic Module is the engine of Mocana's Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.
intModuleCount 1
memAdditionalNotes 03/28/13: Updated security policy.
01/23/14: Added SW 5.5.1f, AES 2741, Triple-DES 1650, SHS 2313, HMAC 1718, RSA 1437, DSA 840, ECDSA 479, RNG 1266, DRBG 460, added OE Android 4.3 running on ARMv7 and updated the security policy.
02/20/14: Updated security policy.
04/03/14: Added OE Android 4.4 running on Nexus 7 Tablet, VxWorks 6.8 running on Avaya ERS 4850 and updated the security policy.
11/25/14: Updated security policy.
02/20/15: Added OE Mentor Embedded Linux 4.0 running on an Avaya VSP 4450 and updated the security policy.
07/06/15: Updated security policy.
RNG moved from approved to non-approved. The module implements an approved DRBG for key generation in approved mode. The SP has been updated to reflect these changes.
strFirstValidtionDate 01/31/13 00:00:00
strLabName InfoGard
strValidationYear 2013