U.S. flag   An unofficial archive of your favorite United States government website
This is an archive
(replace .gov by .rip)

Cryptographic Module Validation Program CMVP

Certificate #3218

Details

Module Name
Mojo AirTight Sensor
Standard
FIPS 140-2
Status
Active
Sunset Date
7/2/2023
Validation Dates
07/03/2018
Overall Level
2
Caveat
When operated in FIPS mode and with tamper evident seals installed as indicated in the security policy. When operated only on the specific platforms specified on the certificate.
Security Level Exceptions
  • Mitigation of Other Attacks: N/A
Module Type
Firmware
Embodiment
Multi-Chip Stand Alone
Description
The module performs wireless intrusion detection and prevention. It monitors radio channels to ensure conformance of wireless activity to security policy. It mitigates various types of wireless security violations such as rogue wireless networks, unauthorized wireless connections, network mis-configurations and denial of service attacks.
Tested Configuration(s)
  • Mojo AirTight Sensor (Hardware Versions: C-120 and C-130 with C-TPL-A) with Linux OS version 3.4.103
FIPS Algorithms
AES Cert. #5158
CKG vendor affirmed
CVL Certs. #1672 and #1673
DRBG Cert. #1936
HMAC Cert. #3419
KBKDF Cert. #174
KTS AES Cert. #5158 and HMAC Cert. #3419; key establishment methodology provides 128 bits of encryption strength
RSA Cert. #2774
SHS Cert. #4165
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #1673, key agreement; key establishment methodology provides 128 bits of encryption strength); MD5; NDRNG
Firmware Versions
8.2.1

Vendor

Mojo Networks, Inc.
339 N. Bernardo Avenue
Suite 200
Mountain View, CA 94043
USA

Hemant Chaskar
Hemant.Chaskar@mojonetworks.com
Phone: 650-961-1111
Fax: 650-961-1169

Lab

CYGNACOM SOLUTIONS INC
NVLAP Code: 200002-0