U.S. flag   An unofficial archive of your favorite United States government website
This is an archive
(replace .gov by .rip)

Cryptographic Module Validation Program CMVP

Certificate #3152

Details

Module Name
BC-FJA (Bouncy Castle FIPS Java API)
Standard
FIPS 140-2
Status
Active
Sunset Date
3/14/2023
Validation Dates
03/15/2018;04/02/2019;04/09/2019;07/23/2020
Overall Level
1
Caveat
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys
Security Level Exceptions
  • Physical Security: N/A
Module Type
Software
Embodiment
Multi-Chip Stand Alone
Description
The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well. The module is designed to integrate with the associated Bouncy Castle APIs including those for TLS, X.509, CMS, S/MIME, TSP, PKIX, and OpenPGP.
Tested Configuration(s)
  • Linux 3.10 on Java SE Runtime Environment v8 (1.8.0) running on NetScout PowerEdge R730 with an Intel Xeon Processor E5-2697 v3
  • Linux 3.10 on Java SE Runtime Environment v8 (1.8.0) running on NetScout PowerEdge R740 with an Intel Xeon Processor Silver 4110
  • Lollipop Android 5.1 on Android 5 Java ART running on Zebra TC75 Touch Computer with a Qualcomm MS8960 Pro
  • Marshmallow Android 6.0 on Android 6 Java ART running on Zebra TC51-HC Touch Computer with a Qualcomm MSM8956
  • Microsoft Windows Server 2016 ESXi 6.7 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon 6126
  • Oreo Android 8.1 on Android 8 Java ART running on Zebra TC52 Touch Computer with a Qualcomm SD660
  • Photon OS 2.0 on VMware ESXi 6.7 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon 6126
  • Red Hat Enterprise Linux (RHEL) 7.3 on VMware ESXi 5.5 and Java SE Runtime Environment v7 (1.7.0) running on HP ProLiant DL360 G7 Server with an Intel Xeon X5670
  • Red Hat Enterprise Linux (RHEL) 7.3 on VMware ESXi 5.5 and Java SE Runtime Environment v8 (1.8.0) running on HP ProLiant DL360 G7 Server with an Intel Xeon X5670
  • Ubuntu 16.04 on VMware ESXi 6.7 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon Processor 6126
  • Ubuntu 16.04 on VMware ESXi 7.0 on Java SE Runtime Environment v8 (1.8.0) running on Dell PowerEdge R740 with an Intel Xeon Gold 6126
  • Ubuntu 18.04 on VMware ESXi 7.0 on Java SE Runtime Environment v11 (1.11.0) running on Dell PowerEdge R740 with an Intel Xeon Gold 6126 (single-user mode)
FIPS Algorithms
AES Cert. #4759
CKG vendor affirmed
CVL Certs. #1398, #1399, #1400, #1401 and #1402
DRBG Cert. #1636
DSA Cert. #1279
ECDSA Cert. #1191
HMAC Cert. #3170
KAS Cert. #135
KAS SP 800-56Arev2, vendor affirmed
KBKDF Cert. #153
KTS AES Cert. #4759; key establishment methodology provides between 128 and 256 bits of encryption strength
KTS SP800-56B, vendor affirmed
KTS Triple-DES Cert. #2529; key establishment methodology provides 112 bits of encryption strength
PBKDF vendor affirmed
RSA Cert. #2602
SHA-3 Cert. #38
SHS Cert. #3901
Triple DES Cert. #2529
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); MD5; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength)
Software Versions
1.0.1

Vendor

Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia

David Hook
dgh@bouncycastle.org
Phone: +61438170390
Fax: n/a
Jon Eaves
jon@bouncycastle.org
Phone: +61417502969
Fax: n/a

Lab

UL VERIFICATION SERVICES INC
NVLAP Code: 100432-0