Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
VMware Java JCE (Java Cryptographic Extension) Module
VMware Java JCE (Java Cryptographic Extension) Module
cert_id 2866 2181
dgst 70eefe232775bb9d c060be6d9bf1df23
heuristics/algorithms HMAC#2721, ECDSA#955, CVL#955, CVL#956, KBKDF#107, DRBG#1261, RSA#2261, CVL#957, Triple-DES#2269, SHS#3417, AES#4153, KTS#2269, DSA#1127, SHA-3#10 KTS#1685, DRBG#446, RSA#1402, Triple-DES#1623, AES#2704, SHS#2271, HMAC#1685, DSA#825, KTS#1623
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1: 1
  • Cert:
    • #1: 1
    • #1623: 1
    • #1685: 2
    • #2704: 1
pdf_data/keywords/fips_security_level
  • Level:
    • Level 1: 5
  • Level:
    • Level 1: 4
pdf_data/keywords/fips_certlike
  • Certlike:
    • Cert # AES: 1
    • DSA6: 1
    • HMAC SHA-512/224: 1
    • HMAC-SHA-256: 2
    • HMAC-SHA256: 2
    • PKCS #1: 2
    • PKCS#1: 4
    • PKCS#12: 4
    • PKCS#5: 4
    • PKCS1: 2
    • SHA-1: 9
    • SHA-2: 2
    • SHA-224: 6
    • SHA-256: 6
    • SHA-3: 3
    • SHA-384: 6
    • SHA-512: 5
    • SHA-512 107: 1
    • SHA3-224: 2
    • SHA3-256: 2
    • SHA3-384: 2
    • SHA3-512: 2
  • Certlike:
    • AES (Cert# 2704: 1
    • AES Cert. #2704: 1
    • AES2: 1
    • DES3: 1
    • DSA6: 1
    • HMAC 2704: 2
    • HMAC Cert. #1685: 4
    • HMAC SHA-1: 1
    • HMAC-SHA-1: 2
    • HMAC-SHA-224: 2
    • HMAC-SHA-256: 2
    • HMAC-SHA-384: 2
    • HMAC-SHA-512: 2
    • HMAC11: 2
    • PKCS18: 2
    • RSA5: 1
    • SHA-1: 6
    • SHA-2: 1
    • SHA-224: 2
    • SHA-256: 2
    • SHA-384: 2
    • SHA-512: 2
    • SHA4: 1
pdf_data/keywords/vendor
  • Microsoft:
    • Microsoft: 3
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 26
    • CAST:
      • CAST5: 1
    • RC:
      • RC2: 1
      • RC4: 1
    • Serpent:
      • Serpent: 1
    • Twofish:
      • Twofish: 1
  • DES:
    • 3DES:
      • TDEA: 7
      • TDES: 1
      • Triple-DES: 24
    • DES:
      • DES: 5
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 5
      • HMAC: 11
      • HMAC-SHA-256: 1
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
    • Camellia:
      • Camellia: 1
    • IDEA:
      • IDEA: 1
    • SEED:
      • SEED: 1
  • AES_competition:
    • AES:
      • AES: 21
    • RC:
      • RC4: 1
  • DES:
    • 3DES:
      • Triple-DES: 20
    • DES:
      • DES: 5
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 9
      • HMAC: 13
      • HMAC-SHA-224: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 12
  • FF:
    • DH:
      • DH: 8
      • Diffie-Hellman: 6
    • DSA:
      • DSA: 15
  • RSA:
    • RSA-OAEP: 1
  • ECC:
    • ECIES:
      • ECIES: 1
  • FF:
    • DSA:
      • DSA: 16
pdf_data/keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • PBKDF:
    • PBKDF: 14
  • RIPEMD:
    • RIPEMD: 1
    • RIPEMD128: 1
    • RIPEMD256: 1
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-2: 2
      • SHA-224: 6
      • SHA-256: 6
      • SHA-384: 6
      • SHA-512: 6
    • SHA3:
      • SHA-3: 3
      • SHA3-224: 2
      • SHA3-256: 2
      • SHA3-384: 2
      • SHA3-512: 2
  • SHAKE:
    • SHAKE128: 1
    • SHAKE256: 2
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-2: 1
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
pdf_data/keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
  • MAC:
    • MAC: 4
  • MAC:
    • MAC: 1
pdf_data/keywords/crypto_protocol
  • IKE:
    • IKEv2: 5
  • SSH:
    • SSH: 5
  • TLS:
    • TLS:
      • TLS: 14
      • TLS 1.2: 1
  • VPN:
    • VPN: 1
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 19
    • PRNG: 1
  • RNG:
    • RNG: 2
  • PRNG:
    • DRBG: 14
  • RNG:
    • RNG: 1
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 4
  • CFB:
    • CFB: 1
  • CTR:
    • CTR: 6
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 10
  • OFB:
    • OFB: 2
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 1
  • CFB:
    • CFB: 2
  • ECB:
    • ECB: 3
  • OFB:
    • OFB: 2
pdf_data/keywords/ecc_curve
  • NIST:
    • B-233: 1
    • B-283: 1
    • B-409: 1
    • B-571: 1
    • K-233: 1
    • K-283: 1
    • K-409: 1
    • K-571: 1
    • P-224: 2
    • P-256: 4
    • P-384: 2
    • P-521: 2
pdf_data/keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/keywords/side_channel_analysis
  • SCA:
    • timing attack: 1
    • timing attacks: 1
pdf_data/keywords/tee_name
  • IBM:
    • SE: 5
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140-2: 20
    • FIPS 180-4: 2
    • FIPS 186-2: 1
    • FIPS 186-3: 1
    • FIPS 186-4: 10
    • FIPS 197: 2
    • FIPS 198-1: 3
    • FIPS 202: 2
    • FIPS PUB 140-2: 1
  • NIST:
    • SP 800-108: 6
    • SP 800-132: 5
    • SP 800-135: 7
    • SP 800-38A: 5
    • SP 800-38B: 2
    • SP 800-38C: 2
    • SP 800-38D: 5
    • SP 800-38F: 5
    • SP 800-56A: 4
    • SP 800-56B: 7
    • SP 800-56C: 3
    • SP 800-67: 5
    • SP 800-89: 1
    • SP 800-90A: 3
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 2
    • PKCS#12: 2
    • PKCS#5: 2
    • PKCS1: 1
  • FIPS:
    • FIPS 140-2: 15
    • FIPS 186-4: 2
  • NIST:
    • SP 800-131A: 1
    • SP 800-90: 4
    • SP 800-90A: 4
  • PKCS:
    • PKCS18: 1
pdf_data/policy_metadata
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys When installed, initialized and configured as specified in the Security Policy Section 3 and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertMar2017.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0042.pdf
web_data/description The VMware Java JCE (Java Cryptographic Extension) Module is a software cryptographic module based on the Legion of the Bouncy Castle Inc. FIPS Java API (BC-FJA) Module (SW Version 1.0.0). The module is a software library that provides cryptographic functions to various VMware applications via a well-defined Java-language application program interface (API). The VMware Java JCE (Java Cryptographic Extension) module is a versatile software library that implements FIPS-140-2 approved cryptographic services for VMware products and platforms.
web_data/exceptions Physical Security: N/A, Physical Security: N/A, Mitigation of Other Attacks: N/A
web_data/sw_versions 2.0 1.0
web_data/tested_conf Java SE Runtime Environment 1.7.0 on NSX Controller 6.3.0 OS on Vmware vSphere Hypervisor (ESXi) 6.0 running on HPE ProLiant DL380 Gen8, Java SE Runtime Environment 1.7.0 on NSX Edge 6.3.0 OS on Vmware vSphere Hypervisor (ESXi) 6.0 running on HPE ProLiant DL380 Gen8, Java SE Runtime Environment 1.7.0 on NSX Manager 6.3.0 OS on Vmware vSphere Hypervisor (ESXi) 6.0 running on HPE ProLiant DL380 Gen8 (single-user mode) VMware vCloud Networking and Security 5.5.0a vShield Manager OS with Sun JRE 6.0 on VMware vSphere Hypervisor (ESXi) 5.5 running on HP ProLiant DL380e Gen8 Server (single-user mode), ,
web_data/validation_history
  • date: 22.03.2017
  • lab: CGI Information Systems & Management Consultants Inc
  • validation_type: Initial
  • date: 20.06.2014
  • lab: CGI Information Systems & Management Consultants Inc
  • validation_type: Initial