Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Zscaler Java Crypto Module
Zscaler Java Crypto Module
cert_id 3188 4369
dgst 5d1a8659abe2b8e0 c09a11d9c224480e
heuristics/algorithms Triple-DES#2494, CVL#1344, SHS#3849, SHA-3#24, KTS#2494, DRBG#1600, CVL#1345, AES#4702, CVL#1343, ECDSA#1160, RSA#2562, DSA#1244, CVL#1342, HMAC#3114, KBKDF#145 SHA-3-Customized#A2720, AES#A2720, SHS#A2720, HMAC#A2720, KBKDF#A2720, CVL#A2720, ECDSA#A2720, SHA-3#A2720, Triple-DES#A2720, RSA#A2720, DSA#A2720, KTS#A2720, DRBG#A2720
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1: 1
    • #1342: 1
    • #1344: 1
    • #1600: 1
    • #3114: 1
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES 128, 192: 2
    • AES-128: 1
    • AES-192: 1
    • AES-256: 1
    • CVL #1342: 1
    • CVL #1344: 1
    • DRBG #1600: 1
    • DRBG 112: 1
    • DSA3: 1
    • HMAC #3114: 2
    • HMAC SHA-512/224: 1
    • HMAC-SHA-256: 2
    • HMAC-SHA256: 2
    • PKCS #1: 2
    • PKCS#1: 4
    • PKCS#12: 4
    • PKCS#5: 4
    • PKCS1: 2
    • SHA- 224: 1
    • SHA-1: 9
    • SHA-2: 2
    • SHA-224: 5
    • SHA-256: 6
    • SHA-3: 3
    • SHA-384: 6
    • SHA-512: 6
    • SHA3- 512: 1
    • SHA3-224: 2
    • SHA3-256: 2
    • SHA3-384: 2
    • SHA3-512: 1
  • Certlike:
    • AES (128: 1
    • AES9: 1
    • DRBG 112: 1
    • DRBG 15: 1
    • DRBG14: 1
    • DSA3: 1
    • Diffie-Hellman (160: 1
    • Diffie-Hellman (2048: 1
    • HMAC-SHA-1: 2
    • HMAC-SHA-224: 2
    • HMAC-SHA-256: 8
    • HMAC-SHA-384: 2
    • HMAC-SHA-512: 2
    • HMAC-SHA-512/224: 2
    • HMAC-SHA-512/256: 2
    • PKCS 1: 6
    • PKCS#1: 4
    • PKCS#12: 4
    • PKCS#5: 4
    • SHA- 224: 1
    • SHA- 256: 1
    • SHA-1: 9
    • SHA-2: 3
    • SHA-224: 3
    • SHA-256: 5
    • SHA-3: 5
    • SHA-384: 4
    • SHA-512: 6
    • SHA-5128: 1
    • SHA3: 1
    • SHA3-224: 1
    • SHA3-256: 2
    • SHA3-384: 1
    • SHA3-512: 1
pdf_data/keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 29
      • AES-: 1
      • AES-128: 1
      • AES-192: 1
      • AES-256: 1
    • CAST:
      • CAST5: 1
    • RC:
      • RC2: 1
      • RC4: 1
    • Serpent:
      • Serpent: 1
    • Twofish:
      • Twofish: 1
  • DES:
    • 3DES:
      • TDEA: 6
      • TDES: 1
      • Triple-DES: 27
      • TripleDES: 1
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 6
      • HMAC: 13
      • HMAC-SHA-256: 1
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
    • Camellia:
      • Camellia: 1
    • IDEA:
      • IDEA: 1
    • SEED:
      • SEED: 1
  • AES_competition:
    • AES:
      • AES: 44
    • CAST:
      • CAST5: 1
    • RC:
      • RC2: 1
      • RC4: 1
    • Serpent:
      • Serpent: 1
    • Twofish:
      • Twofish: 1
  • DES:
    • 3DES:
      • TDEA: 6
      • TDES: 2
      • Triple-DES: 31
    • DES:
      • DES: 5
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 9
      • HMAC: 16
      • HMAC-SHA-224: 1
      • HMAC-SHA-256: 4
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
      • KMAC: 1
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
    • Camellia:
      • Camellia: 1
    • IDEA:
      • IDEA: 1
    • SEED:
      • SEED: 1
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 13
  • FF:
    • DH:
      • DH: 9
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 16
  • RSA:
    • RSA-OAEP: 1
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 11
    • EdDSA:
      • EdDSA: 2
  • FF:
    • DH:
      • DH: 8
      • Diffie-Hellman: 6
    • DSA:
      • DSA: 17
  • RSA:
    • RSA-OAEP: 1
pdf_data/keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • PBKDF:
    • PBKDF: 14
  • RIPEMD:
    • RIPEMD: 1
    • RIPEMD-160: 1
    • RIPEMD128: 1
    • RIPEMD256: 1
    • RIPEMD320: 1
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-2: 2
      • SHA-224: 5
      • SHA-256: 6
      • SHA-384: 6
      • SHA-512: 6
    • SHA3:
      • SHA-3: 3
      • SHA3-224: 2
      • SHA3-256: 2
      • SHA3-384: 2
      • SHA3-512: 1
  • SHAKE:
    • SHAKE128: 2
    • SHAKE256: 2
  • MD:
    • MD5:
      • MD5: 4
  • PBKDF:
    • PBKDF: 19
  • RIPEMD:
    • RIPEMD: 1
    • RIPEMD128: 1
    • RIPEMD160: 1
    • RIPEMD256: 1
    • RIPEMD320: 1
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-2: 3
      • SHA-224: 3
      • SHA-256: 5
      • SHA-384: 4
      • SHA-512: 6
    • SHA3:
      • SHA-3: 5
      • SHA3: 1
      • SHA3-224: 1
      • SHA3-256: 2
      • SHA3-384: 1
      • SHA3-512: 1
  • SHAKE:
    • SHAKE128: 1
    • SHAKE256: 2
  • scrypt:
    • scrypt: 1
pdf_data/keywords/crypto_scheme
  • KA:
    • Key Agreement: 7
  • MAC:
    • MAC: 4
  • KA:
    • Key Agreement: 8
  • MAC:
    • MAC: 4
pdf_data/keywords/crypto_protocol
  • IKE:
    • IKEv2: 5
  • SSH:
    • SSH: 5
  • TLS:
    • TLS:
      • TLS: 14
      • TLS 1.2: 1
  • IKE:
    • IKEv2: 7
  • SSH:
    • SSH: 7
  • TLS:
    • TLS:
      • TLS: 18
      • TLS 1.2: 1
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 24
    • PRNG: 1
  • RNG:
    • RNG: 2
  • PRNG:
    • DRBG: 48
    • PRNG: 1
  • RNG:
    • RNG: 2
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 4
  • CFB:
    • CFB: 1
  • CTR:
    • CTR: 6
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 11
  • OFB:
    • OFB: 2
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 5
  • CFB:
    • CFB: 1
  • CTR:
    • CTR: 10
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 15
  • OFB:
    • OFB: 2
pdf_data/keywords/ecc_curve
  • NIST:
    • B-283: 2
    • B-409: 2
    • B-571: 2
    • K-233: 1
    • K-283: 2
    • K-409: 2
    • K-571: 2
    • P-224: 6
    • P-256: 8
    • P-384: 6
    • P-521: 4
  • Edwards:
    • Ed25519: 1
    • Ed448: 1
  • NIST:
    • B-163: 1
    • B-233: 5
    • B-283: 5
    • B-409: 4
    • B-571: 5
    • K-163: 1
    • K-233: 5
    • K-283: 5
    • K-409: 5
    • K-571: 4
    • P-192: 2
    • P-224: 10
    • P-256: 12
    • P-384: 10
    • P-521: 8
pdf_data/keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140: 6
    • FIPS 140-2: 12
    • FIPS 180-4: 2
    • FIPS 186-3: 1
    • FIPS 186-4: 10
    • FIPS 197: 2
    • FIPS 198-1: 3
    • FIPS 202: 2
    • FIPS PUB 140-2: 1
  • NIST:
    • SP 800-108: 6
    • SP 800-132: 5
    • SP 800-133: 1
    • SP 800-135: 7
    • SP 800-20: 1
    • SP 800-38A: 5
    • SP 800-38B: 2
    • SP 800-38C: 2
    • SP 800-38D: 5
    • SP 800-38F: 4
    • SP 800-56A: 4
    • SP 800-56B: 7
    • SP 800-56C: 3
    • SP 800-67: 5
    • SP 800-89: 1
    • SP 800-90A: 3
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 2
    • PKCS#12: 2
    • PKCS#5: 2
    • PKCS1: 1
  • FIPS:
    • FIPS 140: 8
    • FIPS 140-2: 15
    • FIPS 180-4: 2
    • FIPS 186-2: 2
    • FIPS 186-4: 10
    • FIPS 197: 5
    • FIPS 198-1: 3
    • FIPS 202: 2
    • FIPS PUB 140-2: 1
  • NIST:
    • NIST SP 800-90C: 1
    • SP 800-108: 9
    • SP 800-132: 5
    • SP 800-133: 2
    • SP 800-135: 7
    • SP 800-185: 2
    • SP 800-38A: 7
    • SP 800-38B: 3
    • SP 800-38C: 4
    • SP 800-38D: 5
    • SP 800-38F: 5
    • SP 800-56A: 2
    • SP 800-56B: 9
    • SP 800-56C: 7
    • SP 800-67: 5
    • SP 800-89: 1
    • SP 800-90A: 5
  • PKCS:
    • PKCS 1: 3
    • PKCS#1: 2
    • PKCS#12: 2
    • PKCS#5: 2
  • RFC:
    • RFC 7914: 1
pdf_data/keywords/javacard_api_const
  • curves:
    • X25519: 1
    • X448: 1
pdf_data/policy_metadata
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys When installed, initialized and configured as specified in the Security Policy Section 3 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy.
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May2018consolidated.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/November 2022_051222_0640_signed.pdf
web_data/date_sunset 22.02.2025
web_data/historical_reason Moved to historical list due to sunsetting
web_data/status historical active
web_data/sw_versions 2.1 3.0.2.1
web_data/tested_conf CentOS 6 and OpenJDK 1.7 running on HP ProLiant DL360 G7 Server using an Intel Xeon X5670 (single-user mode) VMware Photon OS 2.0 with JDK 11 on Vmware ESXi 6.7 running on Dell PowerEdge R830 with Intel Xeon E5 (single-user mode)
web_data/validation_history
  • date: 31.05.2018
  • lab: UL VERIFICATION SERVICES INC
  • validation_type: Initial
  • date: 16.11.2022
  • lab: ÆGISOLVE
  • validation_type: Initial