Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Trend Micro Java Crypto Module
Trend Micro Java Crypto Module
cert_id 3140 4368
dgst 3a892eea646c4e4f b97e72f065b8e7ce
heuristics/algorithms SHA-3#24, ECDSA#1160, Triple-DES#2494, CVL#1972, HMAC#3684, CVL#1342, ECDSA#1487, CVL#1344, KBKDF#233, CVL#1973, CVL#1974, SHA-3#49, DSA#1417, AES#4702, KTS#2785, AES#5532, DRBG#1600, RSA#2562, CVL#1345, CVL#1975, Triple-DES#2785, SHS#4439, DSA#1244, RSA#2966, HMAC#3114, DRBG#2190, KTS#2494, CVL#1343, SHS#3849, KBKDF#145 DSA#A2720, KBKDF#A2720, RSA#A2720, AES#A2720, DRBG#A2720, KTS#A2720, HMAC#A2720, Triple-DES#A2720, CVL#A2720, SHA-3#A2720, ECDSA#A2720, SHA-3-Customized#A2720, SHS#A2720
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1: 1
    • #1342: 1
    • #1344: 1
    • #1600: 1
    • #1972: 1
    • #2190: 1
    • #3114: 1
    • #3684: 1
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES 128, 192: 2
    • AES-128: 1
    • AES-192: 1
    • AES-256: 1
    • CVL #1342: 1
    • CVL #1344: 1
    • DRBG #1600: 1
    • DRBG 112: 1
    • DSA2: 1
    • HMAC #3114: 1
    • HMAC #3114 and #3684: 1
    • HMAC SHA-512/224: 1
    • HMAC-SHA-256: 2
    • HMAC-SHA256: 2
    • PKCS #1: 2
    • PKCS#1: 4
    • PKCS#12: 4
    • PKCS#5: 4
    • PKCS1: 2
    • SHA- 224: 1
    • SHA-1: 9
    • SHA-2: 2
    • SHA-224: 5
    • SHA-256: 6
    • SHA-3: 3
    • SHA-384: 6
    • SHA-512: 6
    • SHA3- 512: 1
    • SHA3-224: 2
    • SHA3-256: 2
    • SHA3-384: 2
    • SHA3-512: 1
  • Certlike:
    • AES (128: 1
    • AES9: 1
    • DRBG 112: 1
    • DRBG 15: 1
    • DRBG14: 1
    • DSA3: 1
    • Diffie-Hellman (160: 1
    • Diffie-Hellman (2048: 1
    • HMAC-SHA-1: 2
    • HMAC-SHA-224: 2
    • HMAC-SHA-256: 8
    • HMAC-SHA-384: 2
    • HMAC-SHA-512: 2
    • HMAC-SHA-512/224: 2
    • HMAC-SHA-512/256: 2
    • PKCS 1: 6
    • PKCS#1: 4
    • PKCS#12: 4
    • PKCS#5: 4
    • SHA- 224: 1
    • SHA- 256: 1
    • SHA-1: 9
    • SHA-2: 3
    • SHA-224: 3
    • SHA-256: 5
    • SHA-3: 5
    • SHA-384: 4
    • SHA-512: 6
    • SHA-5128: 1
    • SHA3: 1
    • SHA3-224: 1
    • SHA3-256: 2
    • SHA3-384: 1
    • SHA3-512: 1
pdf_data/keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 29
      • AES-: 1
      • AES-128: 1
      • AES-192: 1
      • AES-256: 1
    • CAST:
      • CAST5: 1
    • RC:
      • RC2: 1
      • RC4: 1
    • Serpent:
      • Serpent: 1
    • Twofish:
      • Twofish: 1
  • DES:
    • 3DES:
      • TDEA: 6
      • TDES: 1
      • Triple-DES: 26
      • TripleDES: 1
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 5
      • HMAC: 13
      • HMAC-SHA-256: 1
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
    • Camellia:
      • Camellia: 1
    • IDEA:
      • IDEA: 1
    • SEED:
      • SEED: 1
  • AES_competition:
    • AES:
      • AES: 44
    • CAST:
      • CAST5: 1
    • RC:
      • RC2: 1
      • RC4: 1
    • Serpent:
      • Serpent: 1
    • Twofish:
      • Twofish: 1
  • DES:
    • 3DES:
      • TDEA: 6
      • TDES: 2
      • Triple-DES: 31
    • DES:
      • DES: 5
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 9
      • HMAC: 16
      • HMAC-SHA-224: 1
      • HMAC-SHA-256: 4
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
      • KMAC: 1
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
    • Camellia:
      • Camellia: 1
    • IDEA:
      • IDEA: 1
    • SEED:
      • SEED: 1
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 13
  • FF:
    • DH:
      • DH: 9
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 16
  • RSA:
    • RSA-OAEP: 1
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 11
    • EdDSA:
      • EdDSA: 2
  • FF:
    • DH:
      • DH: 8
      • Diffie-Hellman: 6
    • DSA:
      • DSA: 17
  • RSA:
    • RSA-OAEP: 1
pdf_data/keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • PBKDF:
    • PBKDF: 14
  • RIPEMD:
    • RIPEMD: 1
    • RIPEMD-160: 1
    • RIPEMD128: 1
    • RIPEMD256: 1
    • RIPEMD320: 1
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-2: 2
      • SHA-224: 5
      • SHA-256: 6
      • SHA-384: 6
      • SHA-512: 6
    • SHA3:
      • SHA-3: 3
      • SHA3-224: 2
      • SHA3-256: 2
      • SHA3-384: 2
      • SHA3-512: 1
  • SHAKE:
    • SHAKE128: 2
    • SHAKE256: 2
  • MD:
    • MD5:
      • MD5: 4
  • PBKDF:
    • PBKDF: 19
  • RIPEMD:
    • RIPEMD: 1
    • RIPEMD128: 1
    • RIPEMD160: 1
    • RIPEMD256: 1
    • RIPEMD320: 1
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-2: 3
      • SHA-224: 3
      • SHA-256: 5
      • SHA-384: 4
      • SHA-512: 6
    • SHA3:
      • SHA-3: 5
      • SHA3: 1
      • SHA3-224: 1
      • SHA3-256: 2
      • SHA3-384: 1
      • SHA3-512: 1
  • SHAKE:
    • SHAKE128: 1
    • SHAKE256: 2
  • scrypt:
    • scrypt: 1
pdf_data/keywords/crypto_scheme
  • KA:
    • Key Agreement: 7
  • MAC:
    • MAC: 4
  • KA:
    • Key Agreement: 8
  • MAC:
    • MAC: 4
pdf_data/keywords/crypto_protocol
  • IKE:
    • IKEv2: 5
  • SSH:
    • SSH: 5
  • TLS:
    • TLS:
      • TLS: 14
      • TLS 1.2: 1
  • IKE:
    • IKEv2: 7
  • SSH:
    • SSH: 7
  • TLS:
    • TLS:
      • TLS: 18
      • TLS 1.2: 1
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 24
    • PRNG: 1
  • RNG:
    • RNG: 2
  • PRNG:
    • DRBG: 48
    • PRNG: 1
  • RNG:
    • RNG: 2
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 4
  • CFB:
    • CFB: 1
  • CTR:
    • CTR: 6
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 11
  • OFB:
    • OFB: 2
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 5
  • CFB:
    • CFB: 1
  • CTR:
    • CTR: 10
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 15
  • OFB:
    • OFB: 2
pdf_data/keywords/ecc_curve
  • NIST:
    • B-283: 2
    • B-409: 2
    • B-571: 2
    • K-233: 1
    • K-283: 2
    • K-409: 2
    • K-571: 2
    • P-224: 6
    • P-256: 8
    • P-384: 6
    • P-521: 4
  • Edwards:
    • Ed25519: 1
    • Ed448: 1
  • NIST:
    • B-163: 1
    • B-233: 5
    • B-283: 5
    • B-409: 4
    • B-571: 5
    • K-163: 1
    • K-233: 5
    • K-283: 5
    • K-409: 5
    • K-571: 4
    • P-192: 2
    • P-224: 10
    • P-256: 12
    • P-384: 10
    • P-521: 8
pdf_data/keywords/tee_name
  • IBM:
    • SE: 2
  • IBM:
    • SE: 1
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140: 6
    • FIPS 140-2: 13
    • FIPS 180-4: 2
    • FIPS 186-3: 1
    • FIPS 186-4: 10
    • FIPS 197: 2
    • FIPS 198-1: 3
    • FIPS 202: 2
    • FIPS PUB 140-2: 1
  • NIST:
    • SP 800-108: 6
    • SP 800-132: 5
    • SP 800-133: 1
    • SP 800-135: 7
    • SP 800-20: 1
    • SP 800-38A: 5
    • SP 800-38B: 2
    • SP 800-38C: 2
    • SP 800-38D: 5
    • SP 800-38F: 4
    • SP 800-56A: 4
    • SP 800-56B: 7
    • SP 800-56C: 3
    • SP 800-67: 5
    • SP 800-89: 1
    • SP 800-90A: 3
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 2
    • PKCS#12: 2
    • PKCS#5: 2
    • PKCS1: 1
  • FIPS:
    • FIPS 140: 8
    • FIPS 140-2: 15
    • FIPS 180-4: 2
    • FIPS 186-2: 2
    • FIPS 186-4: 10
    • FIPS 197: 5
    • FIPS 198-1: 3
    • FIPS 202: 2
    • FIPS PUB 140-2: 1
  • NIST:
    • NIST SP 800-90C: 1
    • SP 800-108: 9
    • SP 800-132: 5
    • SP 800-133: 2
    • SP 800-135: 7
    • SP 800-185: 2
    • SP 800-38A: 7
    • SP 800-38B: 3
    • SP 800-38C: 4
    • SP 800-38D: 5
    • SP 800-38F: 5
    • SP 800-56A: 2
    • SP 800-56B: 9
    • SP 800-56C: 7
    • SP 800-67: 5
    • SP 800-89: 1
    • SP 800-90A: 5
  • PKCS:
    • PKCS 1: 3
    • PKCS#1: 2
    • PKCS#12: 2
    • PKCS#5: 2
  • RFC:
    • RFC 7914: 1
pdf_data/keywords/javacard_api_const
  • curves:
    • X25519: 1
    • X448: 1
pdf_data/policy_metadata
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys When installed, initialized and configured as specified in the Security Policy Section 3 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy.
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPSConsolidatedCertFeb2018.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/November 2022_051222_0640_signed.pdf
web_data/date_sunset 22.11.2024
web_data/description The Trend Micro Java Crypto Module provides FIPS-approved cryptographic algorithms for Trend Micro products including Trend Micro Deep Security The Trend Micro Java Crypto Module provides FIPS Approved cryptographic algorithms for Trend Micro products including Trend Micro Deep Security.
web_data/historical_reason Moved to historical list due to sunsetting None
web_data/status historical active
web_data/sw_versions 1.0 3.0.2.1
web_data/tested_conf CentOS 6 and OpenJDK 1.7 running on HP ProLiant DL360 G7 Server using an Intel Xeon X5670, Red Hat Enterprise Linux 7 with Java SE 8 running on a Dell OptiPlex 755 with an Intel i7 (single-user mode), Windows Server 2012 R2 with Java SE 8 running on a Dell OptiPlex 755 with an Intel i7 VMware Photon OS 2.0 with JDK 11 on Vmware ESXi 6.7 running on Dell PowerEdge R830 with Intel Xeon E5 (single-user mode), None, None
web_data/validation_history
  • date: 26.02.2018
  • lab: UL VERIFICATION SERVICES INC
  • validation_type: Initial
  • date: 16.11.2022
  • lab: ÆGISOLVE
  • validation_type: Initial