Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
REDCOM Encryption 140-2
REDCOM Encryption 140-2
cert_id 3189 3229
dgst ca0f11ca98da8843 fcfe44d0a0769b1a
heuristics/algorithms Triple-DES#2494, CVL#1344, SHS#3849, SHA-3#24, KTS#2494, DRBG#1600, CVL#1345, AES#4702, CVL#1343, ECDSA#1160, RSA#2562, DSA#1244, CVL#1342, HMAC#3114, KBKDF#145 DSA#1404, CVL#1907, SHA-3#47, AES#5457, CVL#1904, RSA#2930, SHS#4377, KTS#2744, ECDSA#1457, KBKDF#216, CVL#1906, CVL#1905, DRBG#2140, Triple-DES#2744
heuristics/module_processed_references/directly_referencing {} 3080
heuristics/module_processed_references/indirectly_referencing {} 3080
heuristics/module_prunned_references {} 3080
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1: 1
    • #1342: 1
    • #1344: 1
    • #1600: 1
    • #3114: 1
  • Cert:
    • #1: 1
    • #1904: 1
    • #1907: 1
    • #2140: 1
    • #3614: 1
pdf_data/keywords/fips_certlike
  • Certlike:
    • AES 128, 192: 2
    • AES-128: 1
    • AES-192: 1
    • AES-256: 1
    • CVL #1342: 1
    • CVL #1344: 1
    • DRBG #1600: 1
    • DRBG 112: 1
    • DSA3: 1
    • HMAC #3114: 2
    • HMAC SHA-512/224: 1
    • HMAC-SHA-256: 2
    • HMAC-SHA256: 2
    • PKCS #1: 2
    • PKCS#1: 4
    • PKCS#12: 4
    • PKCS#5: 4
    • PKCS1: 2
    • SHA- 224: 1
    • SHA-1: 9
    • SHA-2: 2
    • SHA-224: 5
    • SHA-256: 6
    • SHA-3: 3
    • SHA-384: 6
    • SHA-512: 6
    • SHA3- 512: 1
    • SHA3-224: 2
    • SHA3-256: 2
    • SHA3-384: 2
    • SHA3-512: 1
  • Certlike:
    • AES 128, 192: 2
    • AES-128: 1
    • AES-192: 1
    • AES-256: 1
    • CVL #1904: 1
    • CVL #1907: 1
    • DRBG #2140: 1
    • DRBG 112: 1
    • DSA3: 1
    • HMAC #3614: 2
    • HMAC SHA-512/224: 1
    • HMAC-SHA-256: 2
    • HMAC-SHA256: 2
    • PKCS #1: 2
    • PKCS#1: 4
    • PKCS#12: 4
    • PKCS#5: 4
    • PKCS1: 2
    • SHA- 224: 1
    • SHA-1: 9
    • SHA-2: 2
    • SHA-224: 5
    • SHA-256: 6
    • SHA-3: 3
    • SHA-384: 6
    • SHA-512: 6
    • SHA3- 512: 1
    • SHA3-224: 2
    • SHA3-256: 2
    • SHA3-384: 2
    • SHA3-512: 1
pdf_data/keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 29
      • AES-: 1
      • AES-128: 1
      • AES-192: 1
      • AES-256: 1
    • CAST:
      • CAST5: 1
    • RC:
      • RC2: 1
      • RC4: 1
    • Serpent:
      • Serpent: 1
    • Twofish:
      • Twofish: 1
  • DES:
    • 3DES:
      • TDEA: 6
      • TDES: 1
      • Triple-DES: 27
      • TripleDES: 1
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 6
      • HMAC: 13
      • HMAC-SHA-256: 1
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
    • Camellia:
      • Camellia: 1
    • IDEA:
      • IDEA: 1
    • SEED:
      • SEED: 1
  • AES_competition:
    • AES:
      • AES: 29
      • AES-: 1
      • AES-128: 1
      • AES-192: 1
      • AES-256: 1
    • CAST:
      • CAST5: 1
    • RC:
      • RC2: 1
      • RC4: 1
    • Serpent:
      • Serpent: 1
    • Twofish:
      • Twofish: 1
  • DES:
    • 3DES:
      • TDEA: 6
      • TDES: 1
      • Triple-DES: 25
      • TripleDES: 1
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 6
      • HMAC: 13
      • HMAC-SHA-256: 1
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
    • Camellia:
      • Camellia: 1
    • IDEA:
      • IDEA: 1
    • SEED:
      • SEED: 1
pdf_data/keywords/ecc_curve
  • NIST:
    • B-283: 2
    • B-409: 2
    • B-571: 2
    • K-233: 1
    • K-283: 2
    • K-409: 2
    • K-571: 2
    • P-224: 6
    • P-256: 8
    • P-384: 6
    • P-521: 4
  • NIST:
    • B-233: 1
    • B-283: 1
    • B-409: 1
    • B-571: 2
    • K-233: 2
    • K-283: 1
    • K-409: 2
    • K-571: 2
    • P-224: 6
    • P-256: 4
    • P-384: 6
    • P-521: 6
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140: 6
    • FIPS 140-2: 13
    • FIPS 180-4: 2
    • FIPS 186-3: 1
    • FIPS 186-4: 10
    • FIPS 197: 2
    • FIPS 198-1: 3
    • FIPS 202: 2
    • FIPS PUB 140-2: 1
  • NIST:
    • SP 800-108: 6
    • SP 800-132: 5
    • SP 800-133: 1
    • SP 800-135: 7
    • SP 800-20: 1
    • SP 800-38A: 5
    • SP 800-38B: 2
    • SP 800-38C: 2
    • SP 800-38D: 5
    • SP 800-38F: 4
    • SP 800-56A: 4
    • SP 800-56B: 7
    • SP 800-56C: 3
    • SP 800-67: 5
    • SP 800-89: 1
    • SP 800-90A: 3
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 2
    • PKCS#12: 2
    • PKCS#5: 2
    • PKCS1: 1
  • FIPS:
    • FIPS 140: 6
    • FIPS 140-2: 13
    • FIPS 180-4: 2
    • FIPS 186-3: 1
    • FIPS 186-4: 10
    • FIPS 197: 2
    • FIPS 198-1: 3
    • FIPS 202: 2
    • FIPS PUB 140-2: 1
  • NIST:
    • SP 800-108: 6
    • SP 800-132: 5
    • SP 800-133: 1
    • SP 800-135: 7
    • SP 800-20: 1
    • SP 800-38A: 4
    • SP 800-38B: 2
    • SP 800-38C: 2
    • SP 800-38D: 5
    • SP 800-38F: 4
    • SP 800-56A: 5
    • SP 800-56B: 7
    • SP 800-56C: 3
    • SP 800-67: 5
    • SP 800-89: 1
    • SP 800-90A: 4
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 2
    • PKCS#12: 2
    • PKCS#5: 2
    • PKCS1: 1
pdf_data/policy_metadata
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys. This validation entry is a non-security relevant modification to Cert. #3080.
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May2018consolidated.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/JulyConsolidatedCert.pdf
web_data/description REDCOM Encryption 140-2 is a fully FIPS 140-2 validated cryptographic engine for Java and Android based environments. The module delivers core cryptographic functions to these platforms and features robust algorithm support, including Suite B algorithms. REDCOM Encryption 140-2 offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation. **Oracle and Java are registered trademarks of Oracle and/or its affiliates. **Android is a trademark of Google Inc REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.
web_data/mentioned_certs
  • 3080: 1
web_data/tested_conf CentOS 6 and OpenJDK 1.7 running on HP ProLiant DL360 G7 Server using an Intel Xeon X5670 (single-user mode), Android 7.0 on a Samsung Galaxy S8 (single-user mode), Tested as meeting Level 1 Android 6.0 on a Samsung Galaxy S7 edge
web_data/validation_history
  • date: 31.05.2018
  • lab: UL VERIFICATION SERVICES INC
  • validation_type: Initial
  • date: 12.07.2018
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial