Module Name
Avaya BoringCrypto Android
Caveat
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Security Level Exceptions
- Physical Security: N/A
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
Avaya BoringCrypto Android cryptographic module is a library that provides FIPS 140-2 approved cryptographic algorithms for the BoringSSL and other user-space Android applications which require cryptographic functionality.
Tested Configuration(s)
- Android 9 running on Avaya Vantage™ K155 with RockChip 3399 (32-bit core) with PAA
- Android 9 running on Avaya Vantage™ K155 with RockChip 3399 (32-bit core) without PAA
- Android 9 running on Avaya Vantage™ K155 with RockChip 3399 (32-bit vendor) with PAA
- Android 9 running on Avaya Vantage™ K155 with RockChip 3399 (32-bit vendor) without PAA
- Android 9 running on Avaya Vantage™ K155 with RockChip 3399 (64-bit core) with PAA
- Android 9 running on Avaya Vantage™ K155 with RockChip 3399 (64-bit core) without PAA
- Android 9 running on Avaya Vantage™ K155 with RockChip 3399 (64-bit vendor) with PAA
- Android 9 running on Avaya Vantage™ K155 with RockChip 3399 (64-bit vendor) without PAA
- Android 9 running on Avaya Vantage™ K175 with RockChip 3399 (32-bit core) with PAA
- Android 9 running on Avaya Vantage™ K175 with RockChip 3399 (32-bit core) without PAA
- Android 9 running on Avaya Vantage™ K175 with RockChip 3399 (32-bit vendor) with PAA
- Android 9 running on Avaya Vantage™ K175 with RockChip 3399 (32-bit vendor) without PAA
- Android 9 running on Avaya Vantage™ K175 with RockChip 3399 (64-bit core) with PAA
- Android 9 running on Avaya Vantage™ K175 with RockChip 3399 (64-bit core) without PAA
- Android 9 running on Avaya Vantage™ K175 with RockChip 3399 (64-bit vendor) with PAA
- Android 9 running on Avaya Vantage™ K175 with RockChip 3399 (64-bit vendor) without PAA (single-user mode)
FIPS Algorithms
AES |
Cert. #C1910 |
CVL |
Cert. #C1910 |
DRBG |
Cert. #C1910 |
ECDSA |
Cert. #C1910 |
HMAC |
Cert. #C1910 |
KAS-SSC |
vendor affirmed |
KTS |
AES Cert. #C1910; key establishment methodology provides between 128 and 256 bits of encryption strength |
RSA |
Cert. #C1910 |
SHS |
Cert. #C1910 |
Triple-DES |
Cert. #C1910 |
Allowed Algorithms
MD5; NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)