Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
3e-520 Secure Access Point Cryptographic Module
3e-520 Secure Access Point Cryptographic Module
cert_id 1971 4427
dgst 2b5d2ba5803e6fe3 e49e72095ac9721b
heuristics/algorithms SHS#1807, KTS#2060, HMAC#1253, ECDSA#303, DRBG#822, SHS#1801, KTS#1253, HMAC#1259, AES#2078, RSA#1072, AES#2060, AES#2105, CVL#22 SHS#A1702, SHS#A1701, SHS#A2152, ECDSA#A1702, KAS#A1702, DRBG#A1702, KBKDF#A1702, AES#A1702, HMAC#A1702, AES#A1701, KTS#A1702, HMAC#A1701, KAS-SSC#A1702, CVL#A1702, RSA#A1702
heuristics/extracted_versions 1.0, 5.0 5.1, 1.0
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1072: 1
    • #1253: 2
    • #1259: 1
    • #1801: 1
    • #1807: 1
    • #2060: 3
    • #2078: 1
    • #2105: 1
    • #22: 1
    • #303: 1
    • #822: 1
  • Cert:
    • #1: 1
pdf_data/keywords/fips_security_level
  • Level:
    • Level 2: 3
  • Level:
    • Level 1: 1
    • Level 2: 4
pdf_data/keywords/fips_certlike
  • Certlike:
    • #2078 AES: 1
    • AES #2060: 2
    • AES key (256: 1
    • HMAC #1253: 2
    • HMAC SHA-1: 1
    • HMAC-SHA-1: 2
    • HMAC-SHA-224: 2
    • HMAC-SHA-256: 2
    • HMAC-SHA-384: 2
    • HMAC-SHA-512: 2
    • SHA-1: 3
    • SHA-224: 1
    • SHA-256: 1
    • SHA-384: 1
    • SHA-521: 1
    • SHA1: 1
    • SHA224: 3
    • SHA256: 3
    • SHA384: 3
    • SHA512: 3
  • Certlike:
    • AES (128: 1
    • AES CBC 128/192/256: 2
    • AES key (256: 1
    • AES- GCM (128: 1
    • AES-128: 1
    • AES-196: 1
    • AES-256: 1
    • AES-CBC (256: 1
    • AES-CTR 128: 1
    • HMAC SHA-1: 1
    • HMAC-SHA-1-96: 2
    • SHA-1: 7
    • SHA-256: 1
    • SHA1: 1
    • SHA2- 224: 4
    • SHA2- 256: 3
    • SHA2- 384: 2
    • SHA2- 512: 1
    • SHA2-224: 5
    • SHA2-256: 10
    • SHA2-384: 7
    • SHA2-512: 7
    • SHA2-512 256: 1
    • SHA3: 1
    • SHA3- 224: 1
    • SHA3-224: 1
    • SHA3-256: 2
    • SHA3-384: 2
    • SHA3-512: 1
    • SHA3-512 256: 1
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 30
  • DES:
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CMAC: 1
      • HMAC: 6
      • HMAC-SHA-224: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 35
      • AES-: 3
      • AES-128: 1
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 12
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 7
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 11
  • FF:
    • DH:
      • DH: 6
pdf_data/keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA224: 3
      • SHA256: 3
      • SHA384: 3
      • SHA512: 3
  • SHA:
    • SHA1:
      • SHA-1: 7
      • SHA1: 1
    • SHA2:
      • SHA-256: 1
    • SHA3:
      • SHA3: 1
      • SHA3-224: 1
      • SHA3-256: 2
      • SHA3-384: 2
      • SHA3-512: 2
pdf_data/keywords/crypto_scheme
  • MAC:
    • MAC: 6
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 6
pdf_data/keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 24
  • IKE:
    • IKE: 15
    • IKEv2: 6
  • IPsec:
    • IPsec: 14
  • TLS:
    • TLS:
      • TLS: 40
      • TLS 1.2: 2
      • TLSv1.2: 1
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 11
    • PRNG: 1
  • RNG:
    • RNG: 2
  • PRNG:
    • DRBG: 16
  • TRNG:
    • TRNG: 1
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 4
  • CFB:
    • CFB: 1
  • CTR:
    • CTR: 4
  • ECB:
    • ECB: 4
  • GCM:
    • GCM: 1
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 4
  • CTR:
    • CTR: 4
  • ECB:
    • ECB: 5
  • GCM:
    • GCM: 5
pdf_data/keywords/ecc_curve
  • NIST:
    • P-256: 20
    • P-384: 8
    • P-521: 4
pdf_data/keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
  • OpenSSL:
    • OpenSSL: 4
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140-2: 24
  • RFC:
    • RFC 2818: 1
  • FIPS:
    • FIPS 140-2: 32
    • FIPS 180-4: 5
    • FIPS 186-4: 2
    • FIPS 197: 2
    • FIPS 198-1: 2
    • FIPS 202: 2
    • FIPS140-2: 1
  • RFC:
    • RFC 2818: 1
    • RFC 7296: 2
  • X509:
    • X.509: 3
pdf_data/policy_metadata
  • /Author: 3eti
  • /CreationDate: D:20180301160840-05'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20180301160840-05'00'
  • /Producer: Microsoft® Word 2013
  • /Title: The symmetric keys used for protecting wireless bridging traffic are not listed in the key management tables
  • pdf_file_size_bytes: 1025057
  • pdf_hyperlinks: https://csrc.nist.gov/publications/detail/fips/140/2/final
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When installed, initialized and configured as specified in the Security Policy Section 3.1 None
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0031.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/January 2023_010223_0657_signed.pdf
web_data/date_sunset 21.09.2026
web_data/exceptions Roles, Services, and Authentication: Level 3, Design Assurance: Level 3 Design Assurance: Level 3, Mitigation of Other Attacks: N/A
web_data/fw_versions 5, ., 0 5, ., 1
web_data/historical_reason Moved to historical list due to sunsetting None
web_data/status historical active
web_data/validation_history
  • date: 03.07.2013
  • lab: SAIC-VA
  • validation_type: Initial
  • date: 27.01.2023
  • lab: GOSSAMER SECURITY SOLUTIONS INC
  • validation_type: Initial
web_data/vendor 3e Technologies International, Inc. Ultra Intelligence & Communications
web_data/vendor_url http://www.3eti.com http://www.ultra.group