Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SBC 5110 and 5210 Session Border Controllers
SBC 5110 and 5210 Session Border Controllers
cert_id 2608 2184
dgst 32ea6aa8091a36e8 8e4e975f902448d8
heuristics/algorithms HMAC#2223, SHS#2874, Triple-DES#1962, HMAC#2222, CVL#556, Triple-DES#1961, ECDSA#708, AES#3481, CVL#555, AES#3480, SHS#2875, RSA#1787, DRBG#859, CVL#554 CVL#124, SHS#2216, Triple-DES#1586, RSA#1354, CVL#125, AES#2643, AES#2644, SHS#2218, DRBG#412, HMAC#1635, RSA#1353, SHS#2217, HMAC#1636
heuristics/extracted_versions 5.0 4.0
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1787: 2
    • #1961: 1
    • #1962: 1
    • #2222: 1
    • #2223: 1
    • #2874: 1
    • #2875: 1
    • #3480: 1
    • #3481: 3
    • #554: 1
    • #555: 1
    • #556: 3
    • #708: 1
    • #859: 1
  • Cert:
    • #1: 1
    • #124: 1
    • #125: 1
    • #1353: 1
    • #1354: 2
    • #1586: 1
    • #1635: 1
    • #1636: 1
    • #2216: 1
    • #2217: 1
    • #2218: 1
    • #2643: 1
    • #2644: 1
    • #412: 1
pdf_data/keywords/fips_certlike
  • Certlike:
    • #1787 RSA: 1
    • #2223 RSA: 1
    • #2875 HMAC: 1
    • #3481 AES: 2
    • #556 CVL: 3
    • AES 128: 2
    • AES encrypt KAT55: 1
    • AES29: 1
    • CVL40: 1
    • HMAC SHA 256: 1
    • HMAC SHA-1: 2
    • HMAC SHA-224: 1
    • HMAC SHA-256: 1
    • HMAC SHA-384: 1
    • HMAC SHA-512: 1
    • HMAC-SHA-1-96: 2
    • SHA 256: 1
    • SHA-1: 6
    • SHA-2: 3
    • SHA-224: 3
    • SHA-256: 4
    • SHA-384: 3
    • SHA-512: 3
  • Certlike:
    • #1354 RSA: 1
    • #1635 RSA: 1
    • #2217 HMAC: 1
    • #412 CVL: 1
    • AES 128: 1
    • AES encrypt KAT53: 1
    • AES-CBC 128: 1
    • AES29: 1
    • HMAC SHA- 512: 1
    • HMAC SHA-1: 2
    • HMAC SHA-224: 1
    • HMAC SHA-256: 1
    • HMAC SHA-384: 1
    • HMAC-SHA-1-96: 2
    • HMAC-SHA-256: 2
    • HMAC34: 2
    • PKCS35: 1
    • RSA PKCS35: 1
    • SHA- 512: 1
    • SHA-1: 6
    • SHA-1 - #1636: 1
    • SHA-2: 3
    • SHA-224: 3
    • SHA-256: 4
    • SHA-384: 3
    • SHA-512: 1
    • SHA-512 #2216: 1
    • SHA33 -1 - #2218: 1
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • 3DES:
      • Triple-DES: 8
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 16
  • AES_competition:
    • AES:
      • AES: 8
  • DES:
    • 3DES:
      • Triple-DES: 4
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 12
      • HMAC-SHA-256: 1
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 10
  • FF:
    • DH:
      • DH: 4
      • Diffie-Hellman: 12
    • DSA:
      • DSA: 2
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • DH: 4
      • Diffie-Hellman: 11
    • DSA:
      • DSA: 2
pdf_data/keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-2: 3
      • SHA-224: 3
      • SHA-256: 4
      • SHA-384: 3
      • SHA-512: 3
  • MD:
    • MD5:
      • MD5: 3
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-2: 3
      • SHA-224: 3
      • SHA-256: 4
      • SHA-384: 3
      • SHA-512: 2
pdf_data/keywords/crypto_protocol
  • IKE:
    • IKE: 1
    • IKEv1: 1
  • IPsec:
    • IPsec: 3
  • SSH:
    • SSH: 32
  • TLS:
    • TLS:
      • TLS: 24
  • IKE:
    • IKE: 1
    • IKEv1: 1
  • IPsec:
    • IPsec: 3
  • SSH:
    • SSH: 25
  • TLS:
    • TLS:
      • TLS: 18
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 13
  • RNG:
    • RNG: 1
  • PRNG:
    • DRBG: 11
  • RNG:
    • RNG: 1
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 5
  • CFB:
    • CFB: 2
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 5
  • CBC:
    • CBC: 4
  • CFB:
    • CFB: 2
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 1
pdf_data/keywords/ecc_curve
  • NIST:
    • B-163: 3
    • K-163: 3
    • P-192: 6
  • NIST:
    • B-163: 1
    • P-192: 2
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140-2: 20
    • FIPS 186-4: 1
  • NIST:
    • SP 800-135: 4
    • SP 800-90A: 8
  • FIPS:
    • FIPS 140-2: 20
  • NIST:
    • NIST SP 800-131A: 1
    • SP 800-90A: 9
  • PKCS:
    • PKCS35: 1
pdf_data/policy_metadata
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When installed, initialized and configured as specified in the Security Policy Section 3 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy When installed, initialized and configured as specified in the Security Policy Section 3 and operated in FIPS mode
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertApril2016.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0042.pdf
web_data/fw_versions 5, ., 0 4, ., 0
web_data/validation_history
  • date: 05.04.2016
  • lab: EWA CANADA
  • validation_type: Initial
  • date: 25.06.2014
  • lab: EWA CANADA
  • validation_type: Initial