Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
128 Technology Cryptographic Module
128 Technology Cryptographic Module
cert_id 2961 3305
dgst 9fbba4a59829746f cfe0815a32292cc3
heuristics/algorithms Triple-DES#1420, CVL#44, ECDSA#368, DRBG#281, RSA#1166, SHS#1954, AES#2273, DSA#709, HMAC#1391 ECDSA#1185, AES#4750, Triple-DES#2524, DRBG#1631, RSA#2594, SHS#3893, DSA#1273, HMAC#3164
heuristics/module_processed_references/directly_referencing 2038 {}
heuristics/module_processed_references/indirectly_referencing 2038 {}
heuristics/module_prunned_references 2038 {}
heuristics/policy_processed_references/directly_referenced_by 2912 {}
heuristics/policy_processed_references/indirectly_referenced_by 2912 {}
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1: 1
  • Cert:
    • #1: 2
pdf_data/keywords/fips_certlike
  • Certlike:
    • Certificate AES: 1
    • Certificate RSA: 1
    • DSA 2: 1
    • HMAC SHA- 224: 1
    • HMAC SHA- 256: 1
    • HMAC SHA-1: 1
    • HMAC SHA-384: 1
    • HMAC SHA-512: 1
    • HMAC- SHA-384: 1
    • HMAC-SHA-1: 2
    • HMAC-SHA-224: 2
    • HMAC-SHA-256: 2
    • HMAC-SHA-512 1391: 2
    • HMAC-SHA1: 10
    • HMAC-SHA224: 2
    • HMAC-SHA256: 2
    • HMAC-SHA384: 2
    • HMAC-SHA512: 2
    • PKCS #1: 2
    • PKCS1: 4
    • SHA- 224: 1
    • SHA- 256: 1
    • SHA- 512: 1
    • SHA-1: 17
    • SHA-2: 9
    • SHA-224: 3
    • SHA-256: 3
    • SHA-384: 5
    • SHA-512: 2
    • SHA-512 1954: 1
  • Certlike:
    • Certificate AES: 1
    • Certificate RSA: 1
    • HMAC SHA- 224: 1
    • HMAC SHA- 256: 1
    • HMAC SHA-1: 1
    • HMAC SHA-384: 1
    • HMAC SHA-512: 1
    • HMAC- SHA-384: 1
    • HMAC-SHA-1: 2
    • HMAC-SHA-224: 2
    • HMAC-SHA-256: 2
    • HMAC-SHA-512 3164: 2
    • HMAC-SHA1: 10
    • HMAC-SHA224: 2
    • HMAC-SHA256: 2
    • HMAC-SHA384: 2
    • HMAC-SHA512: 2
    • PKCS #1: 4
    • PKCS#1: 2
    • PKCS1: 6
    • SHA- 224: 1
    • SHA- 256: 1
    • SHA- 512: 1
    • SHA-1: 21
    • SHA-1 2: 1
    • SHA-2: 12
    • SHA-224: 2
    • SHA-256: 3
    • SHA-384: 5
    • SHA-512: 1
    • SHA-512 3893: 1
    • SHA512: 1
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • Triple-DES: 7
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CMAC: 4
      • HMAC: 15
      • HMAC-SHA-224: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 13
  • DES:
    • 3DES:
      • Triple-DES: 8
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CMAC: 6
      • HMAC: 13
      • HMAC-SHA-224: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-512: 1
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 13
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 12
  • FF:
    • DH:
      • DH: 1
    • DSA:
      • DSA: 13
pdf_data/keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 17
    • SHA2:
      • SHA-2: 9
      • SHA-224: 3
      • SHA-256: 3
      • SHA-384: 5
      • SHA-512: 3
  • SHA:
    • SHA1:
      • SHA-1: 22
    • SHA2:
      • SHA-2: 12
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 5
      • SHA-512: 2
      • SHA512: 1
pdf_data/keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 1
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 3
pdf_data/keywords/randomness
  • DUAL_EC:
    • DUAL_EC_DRBG: 1
  • PRNG:
    • DRBG: 9
    • PRNG: 1
  • RNG:
    • RNG: 3
  • DUAL_EC:
    • DUAL_EC_DRBG: 1
  • PRNG:
    • DRBG: 15
    • PRNG: 1
  • RNG:
    • RNG: 3
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 2
  • OFB:
    • OFB: 1
  • XTS:
    • XTS: 1
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 4
  • OFB:
    • OFB: 1
  • XTS:
    • XTS: 1
pdf_data/keywords/ecc_curve
  • NIST:
    • B-163: 4
    • B-233: 5
    • B-283: 4
    • B-409: 5
    • B-571: 5
    • K-163: 4
    • K-233: 5
    • K-283: 5
    • K-409: 5
    • K-571: 4
    • P-192: 6
    • P-224: 10
    • P-256: 10
    • P-384: 10
    • P-521: 10
  • NIST:
    • B-163: 4
    • B-233: 4
    • B-283: 5
    • B-409: 4
    • B-571: 6
    • K-163: 4
    • K-233: 5
    • K-283: 6
    • K-409: 4
    • K-571: 4
    • P-192: 6
    • P-224: 12
    • P-256: 12
    • P-384: 8
    • P-521: 12
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140: 3
    • FIPS 140-2: 17
    • FIPS 186-2: 6
    • FIPS 186-4: 6
  • NIST:
    • NIST SP 800-131A: 2
    • SP 800-90: 2
  • PKCS:
    • PKCS #1: 1
    • PKCS1: 2
  • FIPS:
    • FIPS 140: 3
    • FIPS 140-2: 19
    • FIPS 186-2: 6
    • FIPS 186-4: 6
  • NIST:
    • NIST SP 800-131A: 2
    • SP 800-90: 1
    • SP 800-90A: 1
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
    • PKCS1: 3
  • RFC:
    • RFC 5246: 1
    • RFC5288: 2
    • RFC5289: 2
pdf_data/policy_metadata
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. This validation entry is a non-security relevant modification to Cert. #2038. When operated in FIPS mode. No assurance of the minimum strength of generated keys.
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertJuly2017.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertOct2018.pdf
web_data/date_sunset 15.10.2025
web_data/description The 128T Networking Platform is a software-based, distributed routing and network services solution. The 128T Networking Platform uses Secure Vector Routing to simplify network architectures and provide fine-grained, end-to-end control and visibility. 128T runs on general-purpose computer and allows a wide range of deployment models - from remote branch offices to high-capacity network edges to hyper-scale data centers. The platform enables greater security and agility by distributing intelligence throughout the network - without disrupting your existing network infrastructure. The 128 Tech The 128T Networking Platform is a software-based, distributed routing and network services solution. The 128T Networking Platform uses Secure Vector Routing to simplify network architectures and provide fine-grained, end-to-end control and visibility. 128T runs on general-purpose computer and allows a wide range of deployment models - from remote branch offices to high-capacity network edges to hyper-scale data centers. The platform enables greater security and agility by distributing intelligence throughout the network - without disrupting your existing network infrastructure.
web_data/historical_reason 186-2 transition None
web_data/mentioned_certs
  • 2038: 1
web_data/status historical active
web_data/sw_versions 2.1 2.2
web_data/tested_conf CentOS 6.3 on a Dell OptiPlex 755, Red Hat Enterprise Linux 6.3 on a Dell OptiPlex 755 (single-user mode), SUSE Linux Enterprise 11 SP2 on a Dell OptiPlex 755 CentOS 7.3 on a Dell Optiplex 755 (single-user mode), None, None
web_data/validation_history
  • date: 18.07.2017
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial
  • date: 18.10.2018
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial
web_data/vendor_url https://www.128technology.com http://www.128technology.com