Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CEP10-R, CEP10 VSE and CEP10-C
CEP10-R, CEP10 VSE and CEP10-C
cert_id 1622 1798
dgst 6d7be37d6aa3665d 79b50932dd998d25
heuristics/algorithms Triple-DES#673, AES#1681, HMAC#426, RSA#825, AES#1680, HMAC#984, Triple-DES#1090, SHS#781, RNG#891, RSA#826, DSA#524, SHS#1466, SHS#1467, DSA#523, HMAC#983, AES#779, RNG#892, Triple-DES#1089 SHS#1697, Triple-DES#673, Triple-DES#1258, DSA#615, HMAC#426, RSA#998, AES#1932, RNG#1017, HMAC#1166, AES#779
heuristics/extracted_versions 1.6 2.1
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1: 2
    • #2: 2
  • Cert:
    • #1: 1
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES 168: 1
    • AES, 24: 1
    • AES-256: 1
    • AES-CBC (128: 1
    • AES-CBC (192: 1
    • AES-CBC (256: 1
    • HMAC SHA-1: 2
    • HMAC- SHA-1: 1
    • HMAC-SHA- 384: 4
    • HMAC-SHA-1: 16
    • HMAC-SHA-224: 8
    • HMAC-SHA-256: 10
    • HMAC-SHA-384: 8
    • HMAC-SHA-512: 4
    • HMAC-SHA-512 426: 2
    • HMAC-SHA-512 983: 2
    • HMAC-SHA-512 984: 2
    • SHA-1: 18
    • SHA-224: 7
    • SHA-256: 9
    • SHA-384: 9
    • SHA-512: 5
    • SHA-512 1466: 1
    • SHA-512 1467: 1
    • SHA-512 825: 1
    • SHA-512 826: 1
  • Certlike:
    • AES 128 and 256: 1
    • AES 128, 192: 1
    • AES 256: 1
    • AES-CBC (128: 1
    • AES-CBC (192: 1
    • AES-CBC (256: 1
    • HMAC SHA-1: 1
    • HMAC-SHA- 384: 2
    • HMAC-SHA-1: 17
    • HMAC-SHA-1 (160: 1
    • HMAC-SHA-1, 32: 2
    • HMAC-SHA-2: 8
    • HMAC-SHA-224: 4
    • HMAC-SHA-256: 8
    • HMAC-SHA-256 426: 2
    • HMAC-SHA-384: 4
    • HMAC-SHA-512: 2
    • HMAC-SHA-512 1166: 2
    • SHA-1: 9
    • SHA-2: 1
    • SHA-224: 3
    • SHA-256: 5
    • SHA-384: 4
    • SHA-512: 3
    • SHA-512 1697: 1
    • SHA-512 998: 1
pdf_data/keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 26
      • AES-256: 1
  • DES:
    • 3DES:
      • Triple-DES: 10
    • DES:
      • DES: 14
  • constructions:
    • MAC:
      • CMAC: 1
      • HMAC: 6
      • HMAC-SHA-224: 4
      • HMAC-SHA-256: 6
      • HMAC-SHA-384: 3
      • HMAC-SHA-512: 6
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
  • AES_competition:
    • AES:
      • AES: 20
  • DES:
    • 3DES:
      • Triple-DES: 8
    • DES:
      • DES: 10
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-224: 2
      • HMAC-SHA-256: 6
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 3
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 6
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 5
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 3
pdf_data/keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA-1: 18
    • SHA2:
      • SHA-224: 7
      • SHA-256: 9
      • SHA-384: 9
      • SHA-512: 9
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-2: 1
      • SHA-224: 3
      • SHA-256: 5
      • SHA-384: 4
      • SHA-512: 5
pdf_data/keywords/crypto_scheme
  • AEAD:
    • AEAD: 1
  • KA:
    • Key agreement: 2
  • KEX:
    • Key Exchange: 3
  • MAC:
    • MAC: 1
  • KA:
    • Key agreement: 1
  • KEX:
    • Key Exchange: 3
  • MAC:
    • MAC: 1
pdf_data/keywords/crypto_protocol
  • IKE:
    • IKE: 6
    • IKEv2: 1
  • IPsec:
    • IPsec: 2
  • SSH:
    • SSH: 2
  • TLS:
    • TLS:
      • TLS: 2
      • TLS 1.0: 1
  • VPN:
    • VPN: 1
  • IKE:
    • IKE: 7
  • SSH:
    • SSH: 2
  • TLS:
    • TLS:
      • TLS: 2
      • TLS 1.0: 1
pdf_data/keywords/randomness
  • RNG:
    • RNG: 8
  • RNG:
    • RNG: 9
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 3
  • OFB:
    • OFB: 2
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 1
  • OFB:
    • OFB: 1
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140-2: 15
    • FIPS 186-2: 5
    • FIPS PUB 140-2: 1
  • RFC:
    • RFC 2401: 1
    • RFC 2406: 1
    • RFC 4306: 1
    • RFC 4718: 1
    • RFC 5996: 1
  • FIPS:
    • FIPS 140-2: 15
    • FIPS PUB 140-2: 1
  • RFC:
    • RFC 2401: 1
    • RFC 2406: 1
pdf_data/policy_metadata
  • /Author: marc.boire
  • /CreationDate: D:20110831141554
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20110831141554
  • /Producer: GPL Ghostscript 8.15
  • /Title: Microsoft Word - TID-23-0003-2349-3CM1-Certes_Net-110809-V1_sp.doc
  • pdf_file_size_bytes: 1233945
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /Author: Knigh
  • /CreationDate: D:20120828150814Z
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20120906113018-04'00'
  • /Producer: GPL Ghostscript 8.15
  • /Title: Microsoft Word - CEP10_2-1FIPS_SecurityPolicy
  • pdf_file_size_bytes: 2327159
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0010.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0021.pdf
web_data/description The Certes Networks CEP encryptors are high performance, integrated encryption appliances that offers full line rate Ethernet Frame encryption for 10Mbps Ethernet transports. Housed in a tamper evident chassis, the Certes Networks CEP10-R and CEP10 VSE has two functional 10BaseT Ethernet ports used for traffic. Traffic on the CEP's local port is received from and transmitted to the trusted network in the clear, while traffic on the CEP's remote port has security processing applied to it. Security processing can be data confidentiality, data integrity and data authentication. The Certes Networks CEP VSE encryptors are a family of high performance network encryption appliances that offer full line rate multi-layer encryption at speeds from 10 Mbps up to 10 Gbps for Ethernet, IP, and MPLS networks. The CEP VSE family can be centrally managed with the simple drag-and-drop interface of Certes TrustNet Manager. TrustNet Manager provides centralized policy and key management, logging and auditing for the entire network. The CEP10 VSE provides data confidentiality, data integrity and data authentication for network traffic at bit rates from 3 Mbps to 50 Mbps.
web_data/fw_versions 1, ., 6 2, ., 1
web_data/validation_history
  • date: 24.10.2011
  • lab: CGI Information Systems & Management Consultants Inc
  • validation_type: Initial
  • date: 06.09.2012
  • lab: CGI Information Systems & Management Consultants Inc
  • validation_type: Initial