This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Aegis Secure Key 3.0 Cryptographic Module |
Aegis Secure Key 3.0 Cryptographic Module |
|
---|---|---|
cert_id | 2376 | 2834 |
dgst | c181bc1cc850429b | c60e2531069d7600 |
heuristics/algorithms | DRBG#260, AES#2235, SHS#1911 | AES#2235, ECDSA#919, SHS#1911, AES#4032, KAS#86, DRBG#260 |
heuristics/extracted_versions | 3.0, 6.5.1, 6.5 | 3.0, 7.1, 7.8, 7.7 |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_certlike |
|
|
pdf_data/keywords/symmetric_crypto |
|
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/hash_function |
|
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/standard_id |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
|
|
state/policy_pdf_hash | Different | Different |
state/policy_txt_hash | Different | Different |
web_data/caveat | None | When installed, initialized and configured as specified in Section 11.1 of the Security Policy |
web_data/certificate_pdf_url | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0053.pdf | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertFeb2017.pdf |
web_data/description | The Aegis Secure Key 3.0 is a USB 3.0 portable encrypted memory key. Completely contained within a small footprint/boundary, the module is designed to allow simple, software free integration into various secure storage systems requiring a FIPS 140-2 validated encryption boundary. | The Apricorn Aegis Secure Key 3.0 is a hardware encrypted USB 3.1 memory key. Its software free design allows interface to any host that supports USB and mass storage. Authentication is performed via the embedded keypad and all critical security parameters (PINs, encryption keys, etc) never leave the device boundary for improved security. The device supports 1 administrator and 1 user and offers a variety of features including programmable brute force, recovery PINs, 7-16 digit PINs, auto lock, read only modes, and is compatible with Apricorn’s Aegis Configurator |
web_data/fw_versions | 6, ., 5, , a, n, d, , 6, ., 5, ., 1, , , , , , , , , , , , | 7, ., 1, , [, A, ], ,, , 7, ., 7, , [, B, ], ,, , 7, ., 8, , [, C, ] |
web_data/hw_versions | R, e, v, D, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | R, e, v, D, , {, A, S, K, 3, -, 8, G, B, , (, 8, G, B, ), , [, A, ,, , B, ,, , C, ], ,, , A, S, K, 3, -, 1, 6, G, B, , (, 1, 6, G, B, ), , [, A, ,, , B, ,, , C, ], ,, , A, S, K, 3, -, 3, 0, G, B, , (, 3, 0, G, B, ), , [, A, ,, , B, ,, , C, ], ,, , A, S, K, 3, -, 6, 0, G, B, , (, 6, 0, G, B, ), , [, A, ,, , B, ,, , C, ], ,, , A, S, K, 3, -, 1, 2, 0, G, B, , (, 1, 2, 0, G, B, ), , [, A, ,, , B, ,, , C, ], ,, , A, S, K, 3, -, 2, 4, 0, G, B, , (, 2, 4, 0, G, B, ), , [, A, ,, , B, ,, , C, ], ,, , A, S, K, 3, -, 4, 8, 0, G, B, , (, 4, 8, 0, G, B, ), , [, A, ,, , B, ,, , C, ], } |
web_data/validation_history |
|
|