Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Unified Crypto Module
Unified Crypto Module
cert_id 3011 2159
dgst 41c8fa7d060badc5 86748254b6bfcc91
heuristics/algorithms RSA#2209, Triple-DES#2229, DRBG#1225, ECDSA#922, AES#4077, CVL#1084, AES#4079, CVL#899, KBKDF#131, HMAC#2663, SHS#3359, AES#4078 SHS#2074, AES#2026, ECDSA#397, DSA#755, RSA#1249, RNG#1173, RNG#1193, AES#1538, HMAC#1502, AES#2417, Triple-DES#1505
heuristics/extracted_versions 2.2.4 2.1.1
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1084: 2
    • #1225: 2
    • #126: 1
    • #131: 1
    • #2209: 2
    • #2229: 2
    • #2663: 2
    • #3359: 2
    • #34: 1
    • #4077: 2
    • #4078: 1
    • #4079: 1
    • #58: 1
    • #60: 1
    • #62: 1
    • #899: 1
    • #922: 2
  • Cert:
    • #126: 1
    • #34: 1
    • #58: 1
    • #60: 1
    • #62: 1
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES -CBC 256: 2
    • AES – 128, 192: 1
    • AES-256: 1
    • AES2: 1
    • AES22: 1
    • Cert. #4077 AES: 2
    • DRBG 15: 1
    • HMAC SHA-1: 6
    • HMAC SHA-224: 2
    • HMAC SHA-256: 2
    • HMAC SHA-384: 1
    • HMAC SHA-384 KAT 45: 1
    • HMAC SHA-512: 2
    • RSA 29: 1
    • SHA -1: 1
    • SHA 28: 1
    • SHA-1: 15
    • SHA-224: 8
    • SHA-256: 10
    • SHA-384: 8
    • SHA-512: 8
    • SHA-512 Cert. #2663: 2
  • Certlike:
    • AES – 128, 192: 1
    • AES-256: 1
    • AES2: 1
    • AES22: 1
    • DSA30: 1
    • HMAC SHA-1: 6
    • HMAC SHA-1-96: 1
    • HMAC SHA-512: 2
    • HMAC-SHA1: 2
    • HMAC16: 2
    • RSA29: 1
    • SHA-1: 14
    • SHA-1 1502: 1
    • SHA-1 KAT 40: 1
    • SHA-1-96: 1
    • SHA-512: 4
    • SHA-512 1502: 1
    • SHA-512 2074: 1
    • SHA27: 1
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 15
      • AES-: 1
      • AES-256: 1
  • DES:
    • 3DES:
      • TDES: 2
      • Triple-DES: 4
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 19
  • AES_competition:
    • AES:
      • AES: 19
      • AES-256: 1
  • DES:
    • 3DES:
      • Triple-DES: 5
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 19
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 10
    • ECDSA:
      • ECDSA: 11
  • FF:
    • DH:
      • Diffie-Hellman: 22
  • ECC:
    • ECDH:
      • ECDH: 9
    • ECDSA:
      • ECDSA: 9
  • FF:
    • DH:
      • Diffie-Hellman: 23
    • DSA:
      • DSA: 9
pdf_data/keywords/hash_function
  • MD:
    • MD5:
      • MD5: 5
  • SHA:
    • SHA1:
      • SHA-1: 15
    • SHA2:
      • SHA-224: 8
      • SHA-256: 10
      • SHA-384: 8
      • SHA-512: 10
  • MD:
    • MD5:
      • MD5: 5
  • PBKDF:
    • PBKDF: 1
  • SHA:
    • SHA1:
      • SHA-1: 16
    • SHA2:
      • SHA-512: 6
pdf_data/keywords/crypto_protocol
  • SSH:
    • SSH: 67
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 66
      • TLS 1.2: 4
  • SSH:
    • SSH: 64
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 68
      • TLS 1.0: 2
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 31
    • PRNG: 1
  • RNG:
    • RNG: 8
  • PRNG:
    • PRNG: 17
  • RNG:
    • RNG: 25
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 8
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 6
  • ECB:
    • ECB: 8
  • GCM:
    • GCM: 2
  • OFB:
    • OFB: 4
  • CBC:
    • CBC: 9
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 5
pdf_data/keywords/ecc_curve
  • NIST:
    • P-521: 6
  • NIST:
    • P-521: 10
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140-2: 20
    • FIPS 186-2: 1
  • NIST:
    • NIST SP 800-108: 4
    • NIST SP 800-133: 2
    • NIST SP 800-135: 2
    • NIST SP 800-67: 2
    • NIST SP 800-90A: 2
  • FIPS:
    • FIPS 140-2: 19
    • FIPS 186-2: 9
pdf_data/policy_metadata
  • /Author: jschultz
  • /CreationDate: D:20140410152915-04'00'
  • /Creator: PDFCreator Version 1.7.2
  • /Keywords:
  • /ModDate: D:20140522134042-04'00'
  • /Producer: GPL Ghostscript 9.10
  • /Subject:
  • /Title: 1B - Comtech Unified Crypto Module Security Policy
  • pdf_file_size_bytes: 940014
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertSept2017.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0041.pdf
web_data/fw_versions 2, ., 2, ., 4 2, ., 1, ., 1
web_data/historical_reason SP 800-56Arev3 transition RNG SP800-131A Revision 1 Transition
web_data/validation_history
  • date: 07.09.2017
  • lab: CGI Information Systems & Management Consultants Inc
  • validation_type: Initial
  • date: 27.05.2014
  • lab: CGI Information Systems & Management Consultants Inc
  • validation_type: Initial