Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Motorola Solutions Cryptographic Software Module
Motorola Solutions Cryptographic Software Module
cert_id 4871 4111
dgst 07bf8720bc0c7b4e 1f58dbec71994620
heuristics/algorithms AES-GCMA3497, ECDSA SigGen (FIPS186-4)A3497, AES-ECBA3497, SHA2-256A3497, SHA2-384A3497, AES-OFBA3497, HMAC-SHA2-256A3497, SHA2-512A3497, AES-KWA3497, AES-CBCA3497, PBKDFA3497, ECDSA SigVer (FIPS186-4)A3497, Counter DRBGA3497, HMAC-SHA2-512A3497, ECDSA KeyGen (FIPS186-4)A3497, KAS-ECC Sp800-56Ar3A3497, HMAC-SHA2-384A3497 KTS#A1096, PBKDF#A1096, AES#A1096, KAS-ECC#A1096, ECDSA#A1096, SHS#A1096, DRBG#A1096, HMAC#A1096
heuristics/extracted_versions 6, 8700, 12600 -
pdf_data/keywords/fips_security_level
  • Level:
    • Level 1: 3
  • Level:
    • Level 1: 4
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES-256: 8
    • SHA2- 256: 1
    • SHA2- 384: 1
    • SHA2- 512: 1
    • SHA2-256: 6
    • SHA2-384: 2
    • SHA2-512: 6
  • Certlike:
    • AES [197: 1
    • AES-256: 6
    • AES256: 3
    • HMAC SHA384: 1
    • HMAC-SHA-384: 3
    • HMAC-SHA-384 (1024: 1
    • HMAC-SHA384: 2
    • SHA-256: 1
    • SHA-384: 1
    • SHA-512: 1
    • SHA2-384: 1
    • SHA384: 1
    • SHS [180: 1
pdf_data/keywords/vendor
  • Microsoft:
    • Microsoft: 11
  • Microsoft:
    • Microsoft: 1
  • NXP:
    • NXP: 1
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 35
      • AES-: 4
      • AES-256: 8
    • CAST:
      • CAST: 41
  • DES:
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 8
  • AES_competition:
    • AES:
      • AES: 14
      • AES-256: 6
      • AES256: 3
  • DES:
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CMAC: 1
      • HMAC: 5
      • HMAC-SHA-384: 2
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 15
    • ECDSA:
      • ECDSA: 28
  • FF:
    • DH:
      • Diffie-Hellman: 2
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 13
    • ECDSA:
      • ECDSA: 17
  • FF:
    • DH:
      • Diffie-Hellman: 4
pdf_data/keywords/hash_function
  • PBKDF:
    • PBKDF: 16
  • PBKDF:
    • PBKDF: 11
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
      • SHA384: 1
pdf_data/keywords/crypto_scheme
  • MAC:
    • MAC: 11
  • MAC:
    • MAC: 10
pdf_data/keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 6
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 11
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 10
  • GCM:
    • GCM: 14
  • OFB:
    • OFB: 10
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 4
  • GCM:
    • GCM: 6
  • OFB:
    • OFB: 4
pdf_data/keywords/ecc_curve
  • NIST:
    • P-384: 8
  • NIST:
    • P-384: 12
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140-3: 13
    • FIPS 180-4: 2
    • FIPS 186-4: 1
    • FIPS 197: 2
    • FIPS 198-1: 1
    • FIPS PUB 140-3: 1
  • ISO:
    • ISO/IEC 19790:2012 7: 1
    • ISO/IEC 24759: 2
  • NIST:
    • NIST SP 800-132: 1
    • SP 800-132: 4
    • SP 800-133: 1
    • SP 800-38A: 4
    • SP 800-38D: 1
    • SP 800-38F: 6
  • FIPS:
    • FIPS 140-2: 13
    • FIPS PUB 140-2: 1
    • FIPS140-2: 1
  • NIST:
    • NIST SP 800-132: 1
    • SP 800-132: 3
    • SP 800-38F: 2
    • SP 800-90A: 4
  • RFC:
    • RFC2246: 1
    • RFC5246: 1
pdf_data/policy_metadata
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat Interim validation. When operated in approved mode. No assurance of the minimum strength of generated SSPs (e.g. keys). When operated in FIPS mode. No assurance of the minimum strength of generated keys.
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2021_020122_0905_signed.pdf
web_data/date_sunset 06.11.2026 21.09.2026
web_data/description The Motorola Solutions Cryptographic Software Module is a software-hybrid based cryptographic module that provides cryptographic services to applications that support the APCO Project 25 standard and run on a General-Purpose Computer (GPC) hardware platform that supports processor algorithm acceleration. The Motorola Solutions Cryptographic Software Module is a software based cryptographic module that provides cryptographic services to applications running on a General-Purpose Computer (GPC) hardware platform and supports the APCO Project 25 standard.
web_data/exceptions Non-invasive security: N/A, Mitigation of other attacks: N/A, Documentation requirements: N/A, Cryptographic module security policy: N/A Physical Security: N/A, Mitigation of Other Attacks: N/A, ,
web_data/hw_versions I, n, t, e, l, , C, o, r, e, , i, 7, -, 8, 7, 0, 0, , (, 6, , c, o, r, e, ), ;, , I, n, t, e, l, , i, 5, -, 1, 2, 6, 0, 0 []
web_data/module_type Software-Hybrid Software
web_data/standard FIPS 140-3 FIPS 140-2
web_data/sw_versions R01.15.00 R01.11.00
web_data/tested_conf Windows 10 Enterprise running on HP Z2 Mini G9 Workstation with Intel i5-12600 with PAA, Windows 10 Enterprise running on Motorola Command Central HUB with Intel Core i7-8700 with PAA Red Hat OpenShift 4 on Red Hat UBI 8 running on a HPE ProLiant DL20 Gen10 with Intel Xeon E-2236 with AES-NI (single-user mode), Red Hat OpenShift 4 on Red Hat UBI 8 running on a HPE ProLiant DL20 Gen10 with Intel Xeon E-2236 without AES-NI (single-user mode)
web_data/validation_history
  • date: 07.11.2024
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial
  • date: 20.12.2021
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial
web_data/vendor_url http://www.motorolasolutions.com