This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Proofpoint Cryptographic Module for Java |
Proofpoint Cryptographic Module for Java |
|
---|---|---|
cert_id | 3372 | 4371 |
dgst | 36684976be1f529e | fcc0df4b4cc5b195 |
heuristics/algorithms | Triple-DES#2494, CVL#1344, SHS#3849, SHA-3#24, KTS#2494, DRBG#1600, CVL#1345, AES#4702, CVL#1343, ECDSA#1160, RSA#2562, DSA#1244, CVL#1342, HMAC#3114, KBKDF#145 | SHA-3-Customized#A2720, AES#A2720, SHS#A2720, HMAC#A2720, KBKDF#A2720, CVL#A2720, ECDSA#A2720, SHA-3#A2720, Triple-DES#A2720, RSA#A2720, DSA#A2720, KTS#A2720, DRBG#A2720 |
heuristics/module_processed_references/directly_referencing | 3080 | {} |
heuristics/module_processed_references/indirectly_referencing | 3080 | {} |
heuristics/module_prunned_references | 3080 | {} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_certlike |
|
|
pdf_data/keywords/symmetric_crypto |
|
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/hash_function |
|
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/standard_id |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/policy_metadata |
|
|
state/policy_pdf_hash | Different | Different |
state/policy_txt_hash | Different | Different |
web_data/caveat | When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys. This validation entry is a non-security relevant modification to Cert. #3080. | When installed, initialized and configured as specified in the Security Policy Section 3 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. |
web_data/certificate_pdf_url | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FebConsolidated.pdf | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/November 2022_051222_0640_signed.pdf |
web_data/date_sunset | 22.02.2025 | |
web_data/description | The module is a cryptographic component to be used by the various Proofpoint security products. The module is designed to meet Level 1 requirements of FIPS 140-2 standard. The module is a cryptographic library that provides a variety of cryptographic services including SSH, HTTPs etc. . | The Proofpoint Cryptographic Module for Java is a cryptographic component to be used by the various Proofpoint security products. The module is designed to meet Level 1 requirements of FIPS 140-2 standard. The module is a cryptographic library that provides a variety of cryptographic services including SSH, HTTPS, etc. |
web_data/historical_reason | Moved to historical list due to sunsetting | |
web_data/mentioned_certs |
|
|
web_data/status | historical | active |
web_data/sw_versions | 2.1 | 3.0.2.1 |
web_data/tested_conf | CentOS 6 and OpenJDK 1.7 running on HP ProLiant DL360 G7 Server using an intel Xeon X5670 (single-user mode) | VMware Photon OS 2.0 with JDK 11 on Vmware ESXi 6.7 running on Dell PowerEdge R830 with Intel Xeon E5 (single-user mode) |
web_data/validation_history |
|
|