Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Security Builder® FIPS Java Module
Security Builder® FIPS Java Module
cert_id 1637 792
dgst 274e64235a5fb959 74332c78b10e3ee5
heuristics/algorithms AES#1411, DSA#455, RSA#687, ECDSA#179, Triple-DES#964, HMAC#832, KAS#8, DRBG#52, RNG#773, SHS#1281 RSA#191, ECDSA#41, AES#469, DSA#193, SHS#537, HMAC#227, Triple-DES#485, RNG#254
heuristics/policy_processed_references/directly_referenced_by 2327 {}
heuristics/policy_processed_references/indirectly_referenced_by 4564, 2327, 2544 {}
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1: 7
    • #1281: 5
    • #1411: 1
    • #179: 1
    • #455: 1
    • #52: 1
    • #687: 2
    • #773: 1
    • #8: 3
    • #832: 5
    • #964: 1
  • Cert:
    • #1: 7
    • #191: 1
    • #193: 1
    • #227: 5
    • #254: 1
    • #41: 1
    • #469: 1
    • #485: 1
    • #537: 5
pdf_data/keywords/fips_security_level
  • Level:
    • Level 1: 4
  • Level:
    • Level 1: 5
pdf_data/keywords/fips_certlike
  • Certlike:
    • #179 RSA: 1
    • #687 RSA: 1
    • #773 DRBG: 1
    • DSA 11: 1
    • Diffie-Hellman 2: 1
    • Diffie-Hellman 3: 1
    • HMAC- SHA-1: 1
    • HMAC-SHA-1: 2
    • HMAC-SHA-224: 4
    • HMAC-SHA-256: 2
    • HMAC-SHA-384: 4
    • HMAC-SHA-512: 4
    • HMAC-SHA256: 2
    • PKCS #1: 10
    • RSA 2: 1
    • RSA PKCS #1: 4
    • SHA-1: 3
    • SHA-224: 2
    • SHA-256: 2
    • SHA-384: 2
    • SHA-512: 2
  • Certlike:
    • #41 RSA: 1
    • DSA 11: 1
    • HMAC- SHA-384: 1
    • HMAC-SHA-1: 4
    • HMAC-SHA-224: 4
    • HMAC-SHA-256: 2
    • HMAC-SHA-384: 2
    • HMAC-SHA-512: 4
    • HMAC-SHA256: 2
    • PKCS #1: 11
    • RSA 2: 1
    • RSA PKCS #1: 3
    • SHA- 512: 1
    • SHA-1: 2
    • SHA-224: 2
    • SHA-256: 2
    • SHA-384: 3
    • SHA-512: 1
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • DES:
    • 3DES:
      • Triple-DES: 6
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CMAC: 3
      • HMAC: 2
      • HMAC-SHA-224: 2
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 6
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-224: 2
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 2
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 7
    • ECIES:
      • ECIES: 2
  • FF:
    • DH:
      • Diffie-Hellman: 18
    • DSA:
      • DSA: 10
  • ECC:
    • ECDH:
      • ECDH: 7
    • ECDSA:
      • ECDSA: 9
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 9
pdf_data/keywords/hash_function
  • MD:
    • MD4:
      • MD4: 1
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 3
      • SHA-512: 1
pdf_data/keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RNG: 10
  • RNG:
    • RNG: 10
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 6
  • GCM:
    • GCM: 3
  • CBC:
    • CBC: 5
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 5
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140-2: 12
    • FIPS 180-2: 5
    • FIPS 186-2: 3
    • FIPS 197: 1
    • FIPS 198: 5
    • FIPS 46-3: 1
    • FIPS PUB 140-2: 6
  • NIST:
    • NIST SP 800-56A: 4
    • NIST SP 800-56B: 2
    • NIST SP 800-90: 3
  • PKCS:
    • PKCS #1: 7
  • RFC:
    • RFC 1115: 1
    • RFC 1321: 1
    • RFC 2104: 1
    • RFC 2268: 1
  • FIPS:
    • FIPS 140-2: 13
    • FIPS 180-2: 5
    • FIPS 186-2: 3
    • FIPS 197: 1
    • FIPS 198: 5
    • FIPS 46-3: 1
    • FIPS PUB 140-2: 5
  • PKCS:
    • PKCS #1: 7
  • RFC:
    • RFC 1115: 1
    • RFC 1321: 1
    • RFC 2104: 1
    • RFC 2268: 1
pdf_data/policy_metadata
  • /CreationDate: D:20120802160344-04'00'
  • /Creator: dvips(k) 5.98 Copyright 2009 Radical Eye Software
  • /ModDate: D:20120802160344-04'00'
  • /Producer: GPL Ghostscript 9.05
  • /Title: SBFIPSJModule2SecurityPolicy.dvi
  • pdf_file_size_bytes: 88641
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
  • /CreationDate: D:20070910084928
  • /Creator: dvips(k) 5.86 Copyright 1999 Radical Eye Software
  • /ModDate: D:20070910084928
  • /Producer: GNU Ghostscript 8.01
  • /Title: SBFIPSJModule2SecurityPolicy.dvi
  • pdf_file_size_bytes: 97375
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0011.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt792.pdf
web_data/description The Security Builder FIPS Java Module is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications. The Security Builder FIPS Java Module is intended for use by developers who want government level security and can also be used in conjunction with other Certicom developer toolkits including Security Builder PKI and Security Builder SSL. The Security Builder® FIPS Java Module is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications. The Security Builder® FIPS Java Module is intended for use by developers who want government level security and can also be used in conjunction with other Certicom developer toolkits including Security Builder® PKI and Security Builder® SSL.
web_data/sw_versions 2.8 and 2.8.7 2.1
web_data/tested_conf Red Hat Linux AS 5.5, 32-bit, Red Hat Linux AS 5.5, 64-bit, Solaris 10, 64-bit, Sun Java Runtime Environments (JRE) 1.5.0 and 1.6.0 running on Solaris 10, 32-bit, Windows 2008 Server, 64-bit (single-user mode), Windows Vista, 32-bit, Windows Vista, 64-bit and Solaris 10 32-bit with 32 bit SPARC processor (single-user mode), Red Hat Linux Application Server 3.0 32-bit, Red Hat Linux Application Server 4.0 64-bit, Solaris 9 32-bit, Solaris 9 64-bit, Sun Java Runtime Environment (JRE) 1.3.1, 1.4.2 and 1.5.0 running on Windows XP 32-bit, Windows XP 64-bit
web_data/validation_history
  • date: 16.11.2011
  • lab: EWA CANADA
  • validation_type: Initial

  • date: 24.08.2012
  • lab: EWA CANADA
  • validation_type: Update
  • date: 26.06.2007
  • lab: DOMUS
  • validation_type: Initial

  • date: 20.07.2007
  • lab:
  • validation_type: Update