Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cisco Adaptive Security Appliances Cryptographic Module
Cisco Adaptive Security Appliances Cryptographic Module
cert_id 3286 2979
dgst 617c14bb6cfaff0a eedaf2856c6f433b
heuristics/algorithms HMAC#1514, SHS#4012, RSA#2678, SHS#2737, Triple-DES#1513, HMAC#3272, DRBG#1337, ECDSA#1254, Triple-DES#1321, CVL#1008, AES#2444, AES#4266, DRBG#332, AES#2472, SHS#2091, AES#4905, Triple-DES#2307, SHS#3512, RSA#2297, AES#3301, CVL#1521, DRBG#336, Triple-DES#1881, DRBG#1735, Triple-DES#2559, HMAC#1247, HMAC#2811, DRBG#819, HMAC#2095, SHS#1794, AES#2050 HMAC#1514, DRBG#1328, CVL#1002, AES#4249, SHS#2737, Triple-DES#1513, DRBG#1337, ECDSA#989, Triple-DES#1321, CVL#1008, RSA#2298, AES#2444, Triple-DES#2304, AES#4266, DRBG#332, AES#2472, SHS#2091, Triple-DES#2307, SHS#3512, RSA#2297, AES#3301, DRBG#336, Triple-DES#1881, SHS#3486, HMAC#2787, HMAC#1247, HMAC#2811, ECDSA#995, DRBG#819, HMAC#2095, SHS#1794, AES#2050
heuristics/extracted_versions 9.8 9.6
heuristics/module_processed_references/directly_referencing 3261 2960
heuristics/module_processed_references/indirectly_referencing 3261 2960
heuristics/module_prunned_references 3261 2960
heuristics/policy_processed_references/directly_referencing 3261 2960
heuristics/policy_processed_references/indirectly_referencing 3261 2960
heuristics/policy_prunned_references 3261 2960
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1: 2
    • #1008: 2
    • #1521: 1
    • #3261: 2
  • Cert:
    • #1: 2
    • #2960: 2
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES 128/192/256: 4
    • AES-256: 6
    • Diffie-Hellman (CVL Cert. #1008: 2
    • Diffie-Hellman (CVL Cert. #1521: 1
    • HMAC- SHA256/384: 1
    • HMAC-SHA-1: 6
    • HMAC-SHA-1 160: 2
    • HMAC-SHA-256: 4
    • HMAC-SHA-384: 4
    • HMAC-SHA-512: 4
    • HMAC-SHA1: 4
    • RSA 2048: 7
    • SHA-1: 2
    • SHA-256: 2
    • SHA-384: 1
    • SHA-512: 8
    • SHA–384: 1
  • Certlike:
    • AES-GCM 192: 1
    • AES256: 1
    • HMAC SHA-1 160: 2
    • HMAC-SHA-1: 4
    • HMAC-SHA-256: 4
    • HMAC-SHA-384: 4
    • HMAC-SHA-512: 4
    • HMAC-SHA1: 4
    • RSA 2048: 5
    • SHA-1: 2
    • SHA-1 160: 2
    • SHA-256: 2
    • SHA-384: 1
    • SHA-512: 8
    • SHA–384: 1
pdf_data/keywords/vendor
  • Cisco:
    • Cisco: 31
    • Cisco Systems: 4
    • Cisco Systems, Inc: 37
  • Cisco:
    • Cisco: 23
    • Cisco Systems: 4
    • Cisco Systems, Inc: 47
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
      • AES-256: 6
    • RC:
      • RC4: 4
  • DES:
    • 3DES:
      • Triple-DES: 12
    • DES:
      • DES: 7
  • constructions:
    • MAC:
      • HMAC: 5
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 10
      • AES256: 1
    • RC:
      • RC4: 4
  • DES:
    • 3DES:
      • Triple-DES: 7
    • DES:
      • DES: 10
  • constructions:
    • MAC:
      • HMAC: 12
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 16
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 15
  • RSA:
    • RSA 2048: 7
    • RSA-2048: 1
  • ECC:
    • ECDSA:
      • ECDSA: 16
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 11
  • RSA:
    • RSA 2048: 5
    • RSA-2048: 1
pdf_data/keywords/hash_function
  • MD:
    • MD5:
      • MD5: 8
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 8
  • MD:
    • MD5:
      • MD5: 16
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 8
pdf_data/keywords/crypto_protocol
  • IKE:
    • IKE: 37
    • IKEv2: 9
  • IPsec:
    • IPsec: 19
  • SSH:
    • SSH: 20
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 44
      • TLS 1.2: 1
      • TLS v1.2: 1
      • TLSv1.2: 8
  • VPN:
    • VPN: 10
  • IKE:
    • IKE: 37
    • IKEv2: 8
  • IPsec:
    • IPsec: 21
  • SSH:
    • SSH: 17
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 39
      • TLSv1.0: 1
  • VPN:
    • VPN: 11
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 68
  • PRNG:
    • DRBG: 55
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 9
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 2
pdf_data/keywords/ecc_curve
  • NIST:
    • P-256: 6
    • P-384: 2
    • P-521: 2
  • NIST:
    • P-256: 4
    • P-384: 2
    • P-521: 4
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140: 2
    • FIPS 140-2: 20
    • FIPS 186-4: 4
    • FIPS PUB 140-2: 1
  • NIST:
    • SP 800-52: 2
    • SP 800-90A: 7
  • RFC:
    • RFC 4253: 2
    • RFC 5246: 2
    • RFC 5288: 2
    • RFC 6071: 1
    • RFC 7296: 2
  • FIPS:
    • FIPS 140: 2
    • FIPS 140-2: 17
    • FIPS PUB 140-2: 1
  • NIST:
    • SP 800-90A: 3
  • RFC:
    • RFC 5288: 2
    • RFC 6071: 1
pdf_data/keywords/certification_process
  • OutOfScope:
    • of the TEL as depicted below and any additional requirement per the site security policy which are out of scope of this Security Policy. The Crypto Officer shall inspect the seals for evidence of tamper as: 1
    • out of scope: 1
  • OutOfScope:
    • of the TEL as depicted below and any additional requirement per the site security policy which are out of scope of this Security Policy. To seal the system, apply tamper-evidence labels as depicted in the: 1
    • out of scope: 1
pdf_data/policy_metadata
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode and with the tamper evident seals and opacity shields installed as indicated in the Security Policy. This module contains the embedded module Cisco Firepower Cryptographic Module validated to FIPS 140-2 under Cert. #3261 operating in FIPS mode When operated in FIPS mode and with the tamper evident seals and opacity shields installed as indicated in the Security Policy. This module contains the embedded module Cisco Firepower Cryptographic Module validated to FIPS 140-2 under Cert. #2960 operating in FIPS mode
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/SeptConsolidated2018.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/AugConsolidatedCert.pdf
web_data/fw_versions 9, ., 8 9, ., 6
web_data/hw_versions [, A, S, A, , 5, 5, 0, 6, -, X, ,, , A, S, A, , 5, 5, 0, 6, H, -, X, ,, , A, S, A, , 5, 5, 0, 6, W, -, X, ], , w, i, t, h, , [, 1, ], [, 2, ], ,, , A, S, A, , 5, 5, 0, 8, -, X, , w, i, t, h, , [, 1, ], [, 3, ], ,, , A, S, A, , 5, 5, 1, 6, -, X, , w, i, t, h, , [, 1, ], [, 4, ], ,, , a, n, d, , [, A, S, A, , 5, 5, 2, 5, -, X, ,, , A, S, A, , 5, 5, 4, 5, -, X, ,, , A, S, A, , 5, 5, 5, 5, -, X, ], , w, i, t, h, , [, 1, ], ;, , F, I, P, S, , K, i, t, :, , [, A, I, R, -, A, P, -, F, I, P, S, K, I, T, =, ], [, 1, ], ,, , [, A, S, A, 5, 5, 0, 6, -, F, I, P, S, -, K, I, T, =, ], [, 2, ], ,, , [, A, S, A, 5, 5, 0, 8, -, F, I, P, S, -, K, I, T, =, ], [, 3, ], , o, r, , [, A, S, A, 5, 5, 1, 6, -, F, I, P, S, -, K, I, T, =, ], [, 4, ], None, None, None, None, None, None, None, None, None, None, None, None, None, None, None, None, None, None, None, None, None, None, None, None, None, None A, S, A, , 5, 5, 0, 6, -, X, [, 1, ], ,, , A, S, A, , 5, 5, 0, 6, H, -, X, [, 1, ], ,, , A, S, A, , 5, 5, 0, 6, W, -, X, [, 1, ], ,, , A, S, A, , 5, 5, 0, 8, -, X, [, 2, ], [, 3, ], ,, , A, S, A, , 5, 5, 1, 2, -, X, [, 2, ], ,, , A, S, A, , 5, 5, 1, 5, -, X, [, 5, ], ,, , A, S, A, , 5, 5, 1, 6, -, X, [, 2, ], [, 4, ], ,, , A, S, A, , 5, 5, 2, 5, -, X, [, 5, ], ,, , A, S, A, , 5, 5, 4, 5, -, X, [, 5, ], ,, , A, S, A, , 5, 5, 5, 5, -, X, [, 5, ], , w, i, t, h, , [, A, S, A, 5, 5, 0, 6, -, F, I, P, S, -, K, I, T, =, ], [, 1, ], ,, , [, A, S, A, 5, 5, 0, 0, X, -, F, I, P, S, -, K, I, T, =, ], [, 2, ], ,, , [, A, S, A, 5, 5, 0, 8, -, F, I, P, S, -, K, I, T, =, ], [, 3, ], ,, , [, A, S, A, 5, 5, 1, 6, -, F, I, P, S, -, K, I, T, =, ], [, 4, ], , o, r, , [, C, I, S, C, O, -, F, I, P, S, -, K, I, T, =, ], [, 5, ]
web_data/mentioned_certs
  • 3261: 1
  • 2960: 1
web_data/validation_history
  • date: 17.09.2018
  • lab: GOSSAMER SECURITY SOLUTIONS INC
  • validation_type: Initial
  • date: 01.08.2017
  • lab: GOSSAMER SECURITY SOLUTIONS INC
  • validation_type: Initial