Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Trend Micro NSS Crypto Module
Trend Micro NSS Crypto Module
cert_id 3613 4164
dgst 40d2273d85cf40f0 690b51acbaa9c5ed
heuristics/algorithms DSA#1003, CVL#626, AES#3607, CVL#627, AES#3609, SHS#2966, HMAC#2301, Triple-DES#2008, RSA#2034, ECDSA#740, RSA#1854, DSA#1002, HMAC#2300, SHS#2967, Triple-DES#2007, DRBG#937, AES#3605, DRBG#936, AES#3606, RSA#1855, RSA#2035, ECDSA#739 AES#C794, SHS#C786, DSA#C786, AES#C786, KTS#C786, KTS#C794, CVL#C786, HMAC#C786, DRBG#C786, RSA#C786, ECDSA#C786, Triple-DES#C786
heuristics/module_processed_references/directly_referencing 2997 3616
heuristics/module_processed_references/indirectly_referencing 2997, 2711 3616
heuristics/module_prunned_references 2997 3616
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1: 1
    • #11: 6
  • Cert:
    • #1: 3
    • #11: 5
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES 123: 1
    • AES 128, 192: 1
    • DRBG 256: 1
    • DSA 2048: 1
    • DSA1: 1
    • HMAC- SHA-224: 1
    • HMAC-SHA- 256: 2
    • HMAC-SHA-1: 2
    • HMAC-SHA-384: 2
    • HMAC-SHA-512: 2
    • PKCS #1: 2
    • PKCS #11: 10
    • PKCS#1: 2
    • PKCS#11: 2
    • PKCS#5: 2
    • RSA 2048: 2
    • SHA- 256: 1
    • SHA- 512: 1
    • SHA-1: 4
    • SHA-224: 4
    • SHA-256: 5
    • SHA-384: 3
    • SHA-512: 2
  • Certlike:
    • # C786: 1
    • HMAC-SHA-1: 4
    • HMAC-SHA-224: 2
    • HMAC-SHA-256: 4
    • HMAC-SHA-384: 2
    • HMAC-SHA-512: 4
    • PKCS #1: 6
    • PKCS #11: 6
    • PKCS 11: 2
    • PKCS#1: 2
    • PKCS#11: 2
    • PKCS#5: 2
    • SHA- 384: 1
    • SHA-1: 5
    • SHA-224: 9
    • SHA-256: 20
    • SHA-384: 13
    • SHA-512: 15
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 23
      • AES-: 3
    • RC:
      • RC2: 9
      • RC4: 9
      • RC5: 9
  • DES:
    • 3DES:
      • TDEA: 6
      • TDES: 1
      • Triple-DES: 16
    • DES:
      • DES: 11
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • HMAC: 7
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • miscellaneous:
    • Camellia:
      • Camellia: 9
    • SEED:
      • SEED: 9
  • AES_competition:
    • AES:
      • AES: 27
    • RC:
      • RC2: 6
      • RC4: 6
      • RC5: 6
  • DES:
    • 3DES:
      • TDEA: 5
      • TDES: 1
      • Triple-DES: 22
    • DES:
      • DES: 7
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • HMAC: 15
      • HMAC-SHA-224: 2
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 1
  • miscellaneous:
    • Camellia:
      • Camellia: 6
    • SEED:
      • SEED: 6
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 12
  • FF:
    • DH:
      • Diffie-Hellman: 23
    • DSA:
      • DSA: 25
  • RSA:
    • RSA 2048: 2
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • Diffie-Hellman: 11
    • DSA:
      • DSA: 20
pdf_data/keywords/hash_function
  • MD:
    • MD5:
      • MD5: 10
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 4
      • SHA-256: 5
      • SHA-384: 3
      • SHA-512: 2
  • MD:
    • MD5:
      • MD5: 7
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-224: 10
      • SHA-256: 19
      • SHA-384: 14
      • SHA-512: 14
pdf_data/keywords/crypto_scheme
  • KA:
    • Key Agreement: 9
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 4
    • Key agreement: 2
  • MAC:
    • MAC: 1
pdf_data/keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 22
      • TLS 1.2: 1
  • TLS:
    • TLS:
      • TLS: 19
      • TLS v1.2: 1
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 22
  • PRNG:
    • DRBG: 28
  • RNG:
    • RNG: 1
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 3
  • ECB:
    • ECB: 4
  • GCM:
    • GCM: 8
  • OFB:
    • OFB: 1
  • CBC:
    • CBC: 7
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 3
  • ECB:
    • ECB: 6
  • GCM:
    • GCM: 7
  • OFB:
    • OFB: 1
pdf_data/keywords/ecc_curve
  • NIST:
    • P-256: 10
    • P-384: 6
    • P-521: 8
  • NIST:
    • P-256: 12
    • P-384: 14
    • P-521: 14
pdf_data/keywords/crypto_library
  • NSS:
    • NSS: 58
  • NSS:
    • NSS: 52
pdf_data/keywords/side_channel_analysis
  • SCA:
    • Timing Attacks: 1
    • Timing attack: 1
    • Timing attacks: 1
    • timing attacks: 2
  • SCA:
    • Timing Attacks: 1
    • Timing attack: 1
    • Timing attacks: 1
    • timing attacks: 1
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140: 6
    • FIPS 140-2: 16
    • FIPS 180-4: 2
    • FIPS 186-4: 4
    • FIPS 197: 2
    • FIPS 198-1: 2
    • FIPS PUB 140-2: 1
  • NIST:
    • SP 800-135: 1
    • SP 800-38A: 2
    • SP 800-38D: 2
    • SP 800-38F: 1
    • SP 800-56A: 1
    • SP 800-56B: 3
    • SP 800-67: 2
    • SP 800-89: 1
    • SP 800-90A: 2
  • PKCS:
    • PKCS #1: 1
    • PKCS #11: 5
    • PKCS#1: 1
    • PKCS#11: 1
    • PKCS#5: 1
  • FIPS:
    • FIPS 140: 6
    • FIPS 140-2: 21
    • FIPS 180-4: 2
    • FIPS 186-4: 5
    • FIPS 197: 2
    • FIPS 198-1: 2
    • FIPS PUB 140-2: 1
  • NIST:
    • NIST SP 800-131A: 1
    • NIST SP 800-90A: 13
    • SP 800-133: 2
    • SP 800-135: 1
    • SP 800-38A: 2
    • SP 800-38D: 1
    • SP 800-38F: 5
    • SP 800-56A: 3
    • SP 800-67: 2
    • SP 800-90A: 5
  • PKCS:
    • PKCS #1: 3
    • PKCS #11: 3
    • PKCS 11: 1
    • PKCS#1: 1
    • PKCS#11: 1
    • PKCS#5: 1
pdf_data/policy_metadata
  • /CreationDate: D:20201202223428Z00'00'
  • /Creator: Word
  • /ModDate: D:20201202223428Z00'00'
  • /Producer: macOS Version 10.15.6 (Build 19G73) Quartz PDFContext
  • /Title: Microsoft Word - Trend NSS FIPS 140 Security Policy v1-2.docx
  • pdf_file_size_bytes: 1057594
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. This validation entry is a non-security relevant modification to Cert. #2997 When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. This validation entry is a non-security relevant modification to Cert. #3616
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/Jan2020ConsolidatedCert.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/February 2022_010322_0121_Signed.pdf
web_data/exceptions Roles, Services, and Authentication: Level 2, Physical Security: N/A, Design Assurance: Level 2 Roles, Services, and Authentication: Level 2, Physical Security: N/A, Design Assurance: Level 3
web_data/historical_reason Moved to historical list due to sunsetting SP 800-56Arev3 transition
web_data/mentioned_certs
  • 2997: 1
  • 3616: 1
web_data/sw_versions 4.0 5.0
web_data/tested_conf Red Hat Enterprise Linux 7.1 running on HP ProLiant DL380p Gen8 with an Intel ® Xeon ® E5-2600 v2 with PAA, Red Hat Enterprise Linux 7.1 running on HP ProLiant DL380p Gen8 with an Intel ® Xeon ® E5-2600 v2 without PAA (single-user mode), , Oracle Linux 7.6 64 bit running on an Oracle Server X7-2 with an Intel(R) Xeon(R) Silver 4114 with PAA, Oracle Linux 7.6 64 bit running on an Oracle Server X7-2 with an Intel(R) Xeon(R) Silver 4114 without PAA, Oracle Linux 7.6 64 bit running on an Oracle X7-2 Server with an AMD(R) EPYC(R) 7551 with PAA, Oracle Linux 7.6 64 bit running on an Oracle X7-2 Server with an AMD(R) EPYC(R) 7551 without PAA (single user mode)
web_data/validation_history
  • date: 31.01.2020
  • lab: ÆGISOLVE
  • validation_type: Initial
  • date: 24.02.2022
  • lab: LEIDOS CSTL
  • validation_type: Initial
web_data/vendor Trend Micro, Inc. Trend Micro Inc.