Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Motorola BoringCrypto Android
Motorola BoringCrypto Android
cert_id 4042 4301
dgst 3df9083769048a26 f66939aed19dcd45
heuristics/algorithms CVL#A1421, Triple-DES#A1421, AES#A1421, DRBG#A1421, KTS#A1421, HMAC#A1421, ECDSA#A1421, SHS#A1421, RSA#A1421 KAS-SSC#A2751, SHS#A2751, DRBG#A2751, Triple-DES#A2751, CVL#A2751, KAS#A2751, AES#A2751, HMAC#A2751, KTS#A2751, ECDSA#A2751, RSA#A2751
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES-256: 1
    • HMAC- SHA-224: 1
    • HMAC-SHA- 256: 2
    • HMAC-SHA-1: 4
    • HMAC-SHA-256: 4
    • HMAC-SHA-384: 2
    • HMAC-SHA-512: 4
    • SHA- 256: 1
    • SHA-1: 2
    • SHA-224: 2
    • SHA-256: 1
    • SHA-384: 1
    • SHA-512: 2
    • SHA2-224: 1
    • SHA2-256: 1
    • SHA2-384: 1
    • SHA2-512: 1
  • Certlike:
    • AES-256: 1
    • HMAC- SHA-224: 1
    • HMAC-SHA- 256: 2
    • HMAC-SHA-1: 4
    • HMAC-SHA-256: 4
    • HMAC-SHA-384: 2
    • HMAC-SHA-512: 4
    • PKCS 1: 2
    • SHA- 256: 1
    • SHA-1: 2
    • SHA-224: 2
    • SHA-256: 1
    • SHA-384: 1
    • SHA-512: 2
pdf_data/keywords/vendor
  • Qualcomm:
    • Qualcomm: 16
  • Qualcomm:
    • Qualcomm: 7
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 18
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 3
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 18
  • FF:
    • DH:
      • DH: 8
      • Diffie-Hellman: 6
pdf_data/keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 10
      • TLS 1.0: 1
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 13
      • TLS 1.0: 1
      • TLS v1.2: 1
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 8
  • PRNG:
    • DRBG: 6
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CFB:
    • CFB: 4
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 2
  • GCM:
    • GCM: 4
  • OFB:
    • OFB: 4
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 1
  • CFB:
    • CFB: 4
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 2
  • GCM:
    • GCM: 5
  • OFB:
    • OFB: 4
pdf_data/keywords/ecc_curve
  • NIST:
    • P-224: 4
    • P-256: 6
    • P-384: 4
    • P-521: 2
  • NIST:
    • Curve P-256: 1
    • P-224: 6
    • P-256: 9
    • P-384: 6
    • P-521: 4
pdf_data/keywords/tee_name
  • IBM:
    • SSC: 2
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140: 4
    • FIPS 140-2: 21
    • FIPS 180-4: 2
    • FIPS 186-4: 3
    • FIPS 197: 2
    • FIPS 198-1: 2
    • FIPS PUB 140-2: 1
  • NIST:
    • NIST SP 800-131A: 1
    • NIST SP 800-133: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-52: 1
    • NIST SP 800-90A: 1
    • SP 800-131A: 1
    • SP 800-133: 1
    • SP 800-135: 2
    • SP 800-38A: 2
    • SP 800-38D: 2
    • SP 800-38F: 2
    • SP 800-56A: 1
    • SP 800-67: 2
    • SP 800-90A: 2
  • RFC:
    • RFC 5246: 2
    • RFC 5288: 1
  • FIPS:
    • FIPS 140: 4
    • FIPS 140-2: 21
    • FIPS 180-4: 2
    • FIPS 186-4: 3
    • FIPS 197: 2
    • FIPS 198-1: 2
    • FIPS PUB 140-2: 1
  • NIST:
    • NIST SP 800-131A: 1
    • NIST SP 800-133: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-52: 1
    • NIST SP 800-90A: 1
    • SP 800-131A: 1
    • SP 800-133: 1
    • SP 800-135: 2
    • SP 800-38A: 2
    • SP 800-38C: 1
    • SP 800-38D: 2
    • SP 800-38F: 2
    • SP 800-56A: 1
    • SP 800-67: 2
    • SP 800-90A: 2
  • PKCS:
    • PKCS 1: 1
  • RFC:
    • RFC 5246: 2
    • RFC 5288: 1
pdf_data/policy_metadata
  • /Author: Ryan Thomas
  • /CreationDate: D:20230105134801-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20230105134801-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 603012
  • pdf_hyperlinks: https://csrc.nist.gov/groups/STM/cmvp/index.html
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
  • /Author: Ryan Thomas
  • /CreationDate: D:20220824194554-07'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220824194554-07'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 559378
  • pdf_hyperlinks: https://csrc.nist.gov/groups/STM/cmvp/index.html
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When installed, initialized and configured as specified in Section 12.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy When operated in FIPS mode. No assurance of the minimum strength of generated keys.
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/October 2021_011121_0730_signed.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2022_031022_0652_signed.pdf
web_data/date_sunset 01.12.2025 21.09.2026
web_data/description Motorola BoringCrypto Android Module on Motorola Mobile devices running Android 11. Motorola BoringCrypto Android module is an open-source, general-purpose cryptographic library which provides FIPS 140-2 approved cryptographic algorithms to serve BoringSSL and other user-space applications.
web_data/sw_versions 7f02881e96e51f1873afcf384d02f782b48967ca dcdc7bbc6e59ac0123407a9dc4d1f43dd0d117cd
web_data/tested_conf Android 11 running on Motorola Edge + with Qualcomm Snapdragon 865 with PAA, Android 11 running on Motorola Edge + with Qualcomm Snapdragon 865 without PAA (single-user mode) Android 12 on Motorola Edge+ (2022) (a.k.a. Motorola Edge+ UW or Motorola edge 30 pro) with Qualcomm Snapdragon 8 gen 1 with PAA, Android 12 on Motorola Edge+ (2022) (a.k.a. Motorola Edge+ UW or Motorola edge 30 pro) with Qualcomm Snapdragon 8 gen 1 without PAA (single-user mode)
web_data/validation_history
  • date: 06.10.2021
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial

  • date: 12.01.2023
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Update
  • date: 15.09.2022
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial

  • date: 07.11.2022
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Update
web_data/vendor Motorola Mobility LLC Motorola Mobility Inc
web_data/vendor_url http://www.motorola.com