U.S. flag   An unofficial archive of your favorite United States government website
This is an archive
(replace .gov by .rip)

Cryptographic Module Validation Program CMVP

Certificate #3419

Details

Module Name
Mojo Access Point
Standard
FIPS 140-2
Status
Active
Sunset Date
3/26/2024
Validation Dates
03/27/2019
Overall Level
2
Caveat
When operated in FIPS mode and the tamper evident seals installed as indicated in the security policy
Security Level Exceptions
  • Mitigation of Other Attacks: N/A
Module Type
Hardware
Embodiment
Multi-Chip Stand Alone
Description
The module performs wireless access point (AP) function. It facilitates client devices to access network resources over secure wireless links conforming to IEEE 802.11 protocol, also referred to as WiFi.
Tested Configuration(s)
  • N/A
FIPS Algorithms
AES Certs. #5158, #5412, #5449 and #5473
CKG vendor affirmed
CVL Certs. #1672 and #1673
DRBG Cert. #1936
HMAC Cert. #3419
KBKDF Certs. #174, #219 and #220
KTS AES Cert. #5158 and HMAC Cert. #3419; key establishment methodology provides 128 bits of encryption strength
KTS AES Cert. #5473; key establishment methodology provides 128 bits of encryption strength
RSA Cert. #2774
SHS Cert. #4165
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #1673, key agreement; key establishment methodology provides 128 bits of encryption strength); MD5; NDRNG
Hardware Versions
C-120 and C-130 with Tamper Evident Seal Kit: C-TPL-A
Firmware Versions
8.2.1

Vendor

Mojo Networks, Inc.
339 N. Bernardo Avenue
Suite 200
Mountain View, CA 94043
USA

Hemant Chaskar
Hemant.Chaskar@arista.com
Phone: 650-961-1111
Fax: 650-961-1169

Lab

CYGNACOM SOLUTIONS INC
NVLAP Code: 200002-0