Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SUSE Linux Enterprise Server libgcrypt Cryptographic Module
SUSE Linux Enterprise Server libgcrypt Cryptographic Module
cert_id 3992 3848
dgst 94c8e9960b7d3483 ae6ce4a7288056e4
heuristics/algorithms SHS#A486, RSA#A487, ECDSA#A1152, ECDSA#A485, ECDSA#A486, DSA#A487, SHA-3#A487, SHS#A1152, DSA#A1152, KTS#A1152, KTS#A486, ECDSA#A487, SHS#A488, HMAC#A488, HMAC#A1152, SHS#A485, DRBG#A485, Triple-DES#A482, SHA-3#A482, ECDSA#A482, SHS#A482, HMAC#A485, RSA#A482, KTS#A485, DRBG#A1152, DSA#A486, RSA#A1152, DRBG#A486, HMAC#A484, SHA-3#A1152, DSA#A482, AES#A1152, AES#A486, AES#A482, DRBG#A487, HMAC#A482, RSA#A486, HMAC#A486, DRBG#A482, RSA#A485, SHS#A484, AES#A485, DSA#A485, HMAC#A487, KTS#A482 HMAC#A118, KTS#A118, SHS#A118, Triple-DES#A118, ECDSA#A118, AES#A118, SHA-3#A118, RSA#A118, DRBG#A118, DSA#A118
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES-128: 1
    • AES-192: 1
    • AES-256: 1
    • HMAC SHA-1 112: 1
    • HMAC-SHA-1: 2
    • HMAC-SHA-224: 2
    • HMAC-SHA-256: 4
    • HMAC-SHA-384: 2
    • HMAC-SHA-512: 2
    • PKCS#1: 3
    • RSA 2048: 1
    • RSA PKCS#1: 1
    • SHA- 256: 1
    • SHA-1: 15
    • SHA-1 112: 1
    • SHA-224: 18
    • SHA-256: 28
    • SHA-3: 2
    • SHA-384: 18
    • SHA-512: 13
    • SHA-512 112: 1
    • SHA-512 2048: 4
    • SHA3-224: 3
    • SHA3-256: 4
    • SHA3-384: 4
    • SHA3-512: 4
  • Certlike:
    • AES-128: 1
    • AES-192: 1
    • AES-256: 1
    • HMAC SHA-1: 1
    • HMAC-SHA-1: 2
    • HMAC-SHA-224: 2
    • HMAC-SHA-256: 4
    • HMAC-SHA-384: 2
    • HMAC-SHA-512: 2
    • PKCS#1: 3
    • RSA PKCS#1: 1
    • SHA- 256: 1
    • SHA-1: 15
    • SHA-224: 18
    • SHA-256: 28
    • SHA-3: 2
    • SHA-384: 18
    • SHA-512: 13
    • SHA-512 112: 1
    • SHA-512 2048: 4
    • SHA3-224: 3
    • SHA3-256: 4
    • SHA3-384: 4
    • SHA3-512: 4
pdf_data/keywords/eval_facility
  • atsec:
    • atsec: 33
  • atsec:
    • atsec: 30
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 31
      • AES-128: 1
      • AES-192: 1
      • AES-256: 1
    • CAST:
      • CAST5: 2
    • RC:
      • RC2: 2
      • RC4: 2
    • Serpent:
      • Serpent: 2
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 1
      • Triple-DES: 28
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CMAC: 11
      • HMAC: 20
      • HMAC-SHA-224: 1
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • djb:
    • ChaCha:
      • ChaCha20: 2
    • Poly:
      • Poly1305: 2
    • Salsa:
      • Salsa20: 2
  • miscellaneous:
    • Camellia:
      • Camellia: 2
    • IDEA:
      • IDEA: 1
    • SEED:
      • SEED: 2
  • AES_competition:
    • AES:
      • AES: 27
      • AES-128: 1
      • AES-192: 1
      • AES-256: 1
    • CAST:
      • CAST5: 2
    • RC:
      • RC2: 2
      • RC4: 2
    • Serpent:
      • Serpent: 2
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 1
      • Triple-DES: 26
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CMAC: 11
      • HMAC: 20
      • HMAC-SHA-224: 1
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • djb:
    • ChaCha:
      • ChaCha20: 2
    • Poly:
      • Poly1305: 2
    • Salsa:
      • Salsa20: 2
  • miscellaneous:
    • Camellia:
      • Camellia: 2
    • IDEA:
      • IDEA: 1
    • SEED:
      • SEED: 2
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 24
    • EdDSA:
      • EdDSA: 2
  • FF:
    • DSA:
      • DSA: 29
  • RSA:
    • RSA 2048: 1
  • ECC:
    • ECDSA:
      • ECDSA: 23
    • EdDSA:
      • EdDSA: 2
  • FF:
    • DSA:
      • DSA: 29
pdf_data/keywords/hash_function
  • BLAKE:
    • Blake2: 2
  • MD:
    • MD4:
      • MD4: 2
    • MD5:
      • MD5: 2
  • PBKDF:
    • PBKDF: 8
    • PBKDF2: 1
  • SHA:
    • SHA1:
      • SHA-1: 16
    • SHA2:
      • SHA-224: 18
      • SHA-256: 28
      • SHA-384: 18
      • SHA-512: 18
    • SHA3:
      • SHA-3: 2
      • SHA3-224: 3
      • SHA3-256: 4
      • SHA3-384: 4
      • SHA3-512: 4
  • Streebog:
    • Streebog: 1
  • Whirpool:
    • Whirpool: 2
  • BLAKE:
    • Blake2: 2
  • MD:
    • MD4:
      • MD4: 2
    • MD5:
      • MD5: 2
  • PBKDF:
    • PBKDF: 8
    • PBKDF2: 1
  • SHA:
    • SHA1:
      • SHA-1: 15
    • SHA2:
      • SHA-224: 18
      • SHA-256: 28
      • SHA-384: 18
      • SHA-512: 18
    • SHA3:
      • SHA-3: 2
      • SHA3-224: 3
      • SHA3-256: 4
      • SHA3-384: 4
      • SHA3-512: 4
  • Streebog:
    • Streebog: 1
  • Whirpool:
    • Whirpool: 2
pdf_data/keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 7
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 8
pdf_data/keywords/ecc_curve
  • Curve:
    • Curve25519: 1
  • Edwards:
    • Ed25519: 1
  • NIST:
    • P-192: 4
    • P-224: 6
    • P-256: 8
    • P-384: 6
    • P-521: 6
  • Curve:
    • Curve25519: 1
  • Edwards:
    • Ed25519: 1
  • NIST:
    • P-192: 2
    • P-224: 2
    • P-256: 8
    • P-384: 6
    • P-521: 6
pdf_data/keywords/crypto_library
  • libgcrypt:
    • libgcrypt: 39
  • libgcrypt:
    • libgcrypt: 37
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140-2: 42
    • FIPS 186-4: 1
    • FIPS PUB 140-2: 1
    • FIPS180-4: 3
    • FIPS186-4: 5
    • FIPS197: 2
    • FIPS198-1: 3
    • FIPS202: 2
  • NIST:
    • SP 800-57: 1
  • PKCS:
    • PKCS#1: 2
  • RFC:
    • RFC4253: 1
    • RFC5246: 1
    • RFC7296: 1
  • FIPS:
    • FIPS 140-2: 39
    • FIPS 186-4: 1
    • FIPS PUB 140-2: 1
    • FIPS180-4: 2
    • FIPS186-4: 5
    • FIPS197: 2
    • FIPS198-1: 2
    • FIPS202: 2
  • NIST:
    • SP 800-57: 1
  • PKCS:
    • PKCS#1: 2
  • RFC:
    • RFC4253: 1
    • RFC5246: 1
    • RFC7296: 1
pdf_data/policy_metadata
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode and installed, initialized and configured as specified in section 9 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy. When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/July 2021_020821_0740_signed.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/March 2021_010421_0724_signed.pdf
web_data/date_sunset 21.07.2026 14.03.2026
web_data/sw_versions 3.1 3.0
web_data/tested_conf SUSE Linux Enterprise Server 15 SP2 running on Dell EMC PowerEdge 640 with Intel Cascade Lake Xeon Gold 6234 with PAA, SUSE Linux Enterprise Server 15 SP2 running on Dell EMC PowerEdge 640 with Intel Cascade Lake Xeon Gold 6234 without PAA, SUSE Linux Enterprise Server 15 SP2 running on Gigabyte R181-T90 with Cavium ThunderX2 CN9975 ARMv8 with PAA, SUSE Linux Enterprise Server 15 SP2 running on Gigabyte R181-T90 with Cavium ThunderX2 CN9975 ARMv8 without PAA (single-user mode), SUSE Linux Enterprise Server 15 SP2 running on IBM System Z/15 with IBM z15 SUSE Linux Enterprise Server 15 SP0 running on Dell EMC PowerEdge 640 with Intel Cascade Lake Xeon Gold 6234 (single-user mode), , , ,
web_data/validation_history
  • date: 22.07.2021
  • lab: ATSEC INFORMATION SECURITY CORP
  • validation_type: Initial

  • date: 28.11.2021
  • lab: ATSEC INFORMATION SECURITY CORP
  • validation_type: Update
  • date: 15.03.2021
  • lab: ATSEC INFORMATION SECURITY CORP
  • validation_type: Initial

  • date: 28.11.2021
  • lab: ATSEC INFORMATION SECURITY CORP
  • validation_type: Update