This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

FIPS 140-2 certification

Has anyone taken the Nordic LE Secure ECDH key exchange and encryption code though FIPS 140-2 certification and what level was attained? I was tasked with getting to level 1 for our product and wanted to see where others were at with respect to the US Gov encryption standards.

Parents
  • we haven't started it, we are still working on getting the LESC code up and running. Moving from SDK8 to 11 took longer than we expected. I am now getting conflicting information out of Google stating that Android does not support LESC yet, however Nordic is claiming it and I can bond my phone with the Nordic LESC enabled stack. Can someone confirm that it really is working with Android Marshmallow and not degrading to some lower level encryption? I do see the ECDH events firing off in the nordic stack, I just want to make sure that it's actually doing the right thing before we start going down any certification routes.

    Either way I would expect that the stack and SD device itself would want to get the certification independantly of any customer since it's managing all of the security by implementing LESC.

Reply
  • we haven't started it, we are still working on getting the LESC code up and running. Moving from SDK8 to 11 took longer than we expected. I am now getting conflicting information out of Google stating that Android does not support LESC yet, however Nordic is claiming it and I can bond my phone with the Nordic LESC enabled stack. Can someone confirm that it really is working with Android Marshmallow and not degrading to some lower level encryption? I do see the ECDH events firing off in the nordic stack, I just want to make sure that it's actually doing the right thing before we start going down any certification routes.

    Either way I would expect that the stack and SD device itself would want to get the certification independantly of any customer since it's managing all of the security by implementing LESC.

Children
No Data
Related