This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Poly Crypto Module for Java |
Poly Crypto Module for Java |
|
---|---|---|
cert_id | 4314 | 4102 |
dgst | 6a2383b4296f4b0c | d5c4f67a138cbcbc |
heuristics/algorithms | SHA-3-Customized#A2720, SHA3#A2720, AES#A2720, SHS#A2720, HMAC#A2720, KBKDF#A2720, CVL#A2720, ECDSA#A2720, Triple-DES#A2720, RSA#A2720, DSA#A2720, KTS#A2720, DRBG#A2720 | Triple-DES#2494, CVL#1344, SHS#3849, SHA-3#24, KTS#2494, DRBG#1600, CVL#1345, AES#4702, CVL#1343, ECDSA#1160, RSA#2562, DSA#1244, CVL#1342, HMAC#3114, KBKDF#145 |
heuristics/module_processed_references/directly_referencing | {} | 3080 |
heuristics/module_processed_references/indirectly_referencing | {} | 3080 |
heuristics/module_prunned_references | {} | 3080 |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_certlike |
|
|
pdf_data/keywords/symmetric_crypto |
|
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/hash_function |
|
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/standard_id |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/policy_metadata |
|
|
state/policy_pdf_hash | Different | Different |
state/policy_txt_hash | Different | Different |
web_data/caveat | When installed, initialized and configured as specified in the Security Policy Section 3 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy | When operated in FIPS mode. No assurance of the minimum strength of generated keys. This validation entry is a non-security relevant modification to Cert. #3080 |
web_data/certificate_pdf_url | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/October 2022_021122_1233_signed.pdf | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2021_020122_0905_signed.pdf |
web_data/date_sunset | 22.02.2025 | |
web_data/description | Poly Crypto Module for Java is a standards-based "Drop-in Compliance" cryptographic engine for servers and appliances. The module delivers core cryptographic functions to mobile platforms and features robust algorithm support, including Suite B algorithms. Poly Crypto Module for Java offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation. | Poly Unified Communications Cryptographic Module for Java is a standards-based "Drop-in Compliance" cryptographic engine for servers and appliances. The module delivers core cryptographic functions to mobile platforms and features robust algorithm support, including Suite B algorithms. Poly Unified Communications Cryptographic Module for Java offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation. |
web_data/historical_reason | Moved to historical list due to sunsetting | |
web_data/mentioned_certs |
|
|
web_data/status | active | historical |
web_data/sw_versions | 3.0.2.1 | 3.0.1 |
web_data/tested_conf | VMware Photon OS 2.0 with JDK 11 on VMware ESXi 6.7 running on Dell PowerEdge R830 with Intel Xeon E5 (single-user mode) | CentOS 6 and OpenJDK 1.7 running on HP ProLiant DL360 G7 Server using an Intel Xeon X5670 (single-user mode) |
web_data/validation_history |
|
|
web_data/vendor_url | http://www.poly.com | https://www.poly.com/ |