Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Junos OS 20.2R1-S1 for QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, EX4650-48Y and QFX5200-48Y
Certificate Number: 2021/135
ACOS-IDv2.0 SSCD (A) CL-TC-Comm (v2.0 SSCD (A))
ANSSI-CC-2022/20
name Junos OS 20.2R1-S1 for QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, EX4650-48Y and QFX5200-48Y ACOS-IDv2.0 SSCD (A) CL-TC-Comm (v2.0 SSCD (A))
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme AU FR
not_valid_after 15.02.2026 07.06.2027
not_valid_before 15.02.2021 07.06.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T017%20Cert%202021_135%20OS.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2022_20.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/T0017-Certification_Report_V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_20fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20QFX5120,%20QFX5200,%20QFX5210,%20EX4650%20Junos%2020.2R1%20ST%20v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_20en.pdf
manufacturer Juniper Networks, Inc. Austria Card plastikkarten und Ausweissysteme Gmbh
manufacturer_web https://www.juniper.net/ https://www.austriacard.at/
security_level {} ALC_FLR.1, ATE_DPT.2, AVA_VAN.5, ALC_CMS.5, EAL4+, ALC_DVS.2, ALC_TAT.2
dgst 07bffc2fb1a2fbc4 61a79deadb29fbcd
heuristics/cert_id Certificate Number: 2021/135 ANSSI-CC-2022/20
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 AGD_PRE.1, ALC_FLR.1, ATE_DPT.2, ALC_CMS.5, ASE_COMP.1, ADV_FSP.4, AVA_VAN.5, ALC_DVS.2, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ADV_FUN.1, ALC_TAT.2, ADV_IMP.1
heuristics/extracted_versions 20.2 2.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2022/65
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1110-V4-2021, ANSSI-CC-2022/08, ANSSI-CC-2022/07
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2022/65
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, ANSSI-CC-2022/08, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1110-2019, ANSSI-CC-2022/07, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0891-V2-2016
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1110-V4-2021
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1110-V4-2021
heuristics/protection_profiles {} d9553e7194783182, d918b28fd7bb5d79, 4a814d0e3c9f9082, 1f7ea2e05de5b88b, 27abdb9c6ab375a7
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf
pdf_data/cert_filename EFT-T017 Cert 2021_135 OS.pdf certificat-cc-2022_20.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2022/20: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0072-2012: 1
    • BSI-CC-PP- 0076-2013: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_CMS.5: 1
    • ALC_DVS.2: 1
    • ALC_FLR.1: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_DPT.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • Serma:
    • SERMA: 2
pdf_data/cert_metadata
  • /CreationDate: D:20210217171814+10'00'
  • /Creator: ACA75941.dpe.protected.mil.au
  • /ModDate: D:20210217171814+10'00'
  • /Producer: KONICA MINOLTA bizhub C308
  • /Title: SACA75941.d21021717171
  • pdf_file_size_bytes: 108210
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: mflament
  • /CreationDate: D:20220613141106+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20220613141106+02'00'
  • /Producer: Acrobat Distiller 21.0 (Windows)
  • /Title: Microsoft Word - certificat-CC-2022_20
  • pdf_file_size_bytes: 1554648
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename T0017-Certification_Report_V1.0.pdf anssi-cc-2022_20fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1110-V4-2021: 1
  • FR:
    • ANSSI-CC-2022/07: 1
    • ANSSI-CC-2022/08: 2
    • ANSSI-CC-2022/20: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 2
    • BSI-CC-PP-0071-2012: 2
    • BSI-CC-PP-0072-2012: 2
    • BSI-CC-PP-0075-2012: 2
    • BSI-CC-PP-0076-2013: 2
    • BSI-PP-0084-2014: 1
  • other:
    • PP-SSCD-: 1
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
    • PP-SSCD-Part4: 2
    • PP-SSCD-Part5: 1
    • PP-SSCD-Part6: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMS.5: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_DPT.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 1
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • Teron:
    • Teron Labs: 4
  • CESTI:
    • CESTI: 1
  • Serma:
    • SERMA: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
    • SSHv2: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
  • /Author: mflament
  • /CreationDate: D:20220613140948+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20220613140948+02'00'
  • /Producer: Acrobat Distiller 21.0 (Windows)
  • /Title: Microsoft Word - ANSSI-CC-2022_20fr
  • pdf_file_size_bytes: 307737
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename Juniper QFX5120, QFX5200, QFX5210, EX4650 Junos 20.2R1 ST v1.3.pdf anssi-cible-cc-2022_20en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1110-V4-2021: 2
    • BSI-DSZ-CC-S-0153: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0059-2009-MA-01: 1
    • BSI-CC-PP- 0084-2014: 1
    • BSI-CC-PP-0055-2009: 1
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0059-2009-MA-01: 2
    • BSI-CC-PP-0068: 3
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0071: 2
    • BSI-CC-PP-0072: 2
    • BSI-CC-PP-0075: 3
    • BSI-CC-PP-0076: 2
    • BSI-CC-PP-0084-2014: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6+: 1
    • EAL4: 16
    • EAL4 augmented: 3
    • EAL4+: 1
    • EAL6: 2
    • EAL6 augmented: 2
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 7
    • ADV_FSP.4: 3
    • ADV_FUN.1: 3
    • ADV_IMP.1: 6
    • ADV_TDS.3: 6
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMS.5: 7
    • ALC_DVS.2: 7
    • ALC_FLR.1: 8
    • ALC_TAT.2: 7
  • ASE:
    • ASE_CCL: 2
    • ASE_COMP.1: 1
    • ASE_ECD: 2
    • ASE_INT: 2
    • ASE_REQ: 2
    • ASE_SPD: 3
    • ASE_TSS: 2
  • ATE:
    • ATE_DPT.1: 1
    • ATE_DPT.2: 8
  • AVA:
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT: 2
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 17
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP: 28
    • FCS_COP.1: 6
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 7
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT.1.5: 1
    • FCS_SSHS_EXT: 1
    • FCS_SSHS_EXT.1: 6
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 2
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT.1.1: 2
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 2
    • FIA_UAU_EXT.2: 5
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT: 2
    • FIA_UIA_EXT.1: 11
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UID.1: 3
  • FMT:
    • FMT_MOF: 19
    • FMT_MOF.1: 3
    • FMT_MTD: 14
    • FMT_MTD.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 5
    • FMT_SMR.2: 12
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 2
    • FPT_APW_EXT.1: 6
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 5
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM: 3
    • FPT_STM.1: 3
    • FPT_STM_EXT: 2
    • FPT_STM_EXT.1: 2
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL: 2
    • FTA_SSL.3: 8
    • FTA_SSL.4: 6
    • FTA_SSL_EXT: 2
    • FTA_SSL_EXT.1: 7
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 9
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 22
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC.2: 6
    • FTP_TRP: 8
    • FTP_TRP.1: 3
    • FTP_TUD.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM: 55
    • FCS_CKM.1: 14
    • FCS_CKM.2: 7
    • FCS_CKM.4: 29
    • FCS_CKM.4.1: 1
    • FCS_COP: 62
    • FCS_COP.1: 12
    • FCS_ITC: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 59
    • FDP_ACC.1: 36
    • FDP_ACF: 44
    • FDP_ACF.1: 31
    • FDP_AFC: 1
    • FDP_DAU: 9
    • FDP_DAU.1: 2
    • FDP_DAU.2: 2
    • FDP_IFC.1: 21
    • FDP_ITC: 11
    • FDP_ITC.1: 19
    • FDP_ITC.2: 10
    • FDP_ITT.1: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_SDI: 19
    • FDP_SDI.1: 3
    • FDP_SDI.2: 5
    • FDP_UCT: 9
    • FDP_UCT.1: 3
    • FDP_UIT: 6
    • FDP_UIT.1: 3
  • FIA:
    • FIA_AFL: 15
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 2
    • FIA_API: 4
    • FIA_API.1: 11
    • FIA_API.1.1: 3
    • FIA_UAU.1: 17
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 20
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 72
    • FMT_MSA.1: 14
    • FMT_MSA.2: 6
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 21
    • FMT_MSA.4: 2
    • FMT_MTD: 14
    • FMT_MTD.1: 3
    • FMT_SMF.1: 32
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 36
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 31
    • FPT_EMS.1: 11
    • FPT_EMS.1.1: 2
    • FPT_EMS.1.2: 2
    • FPT_FLS: 1
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 16
    • FPT_PHP.3.1: 2
    • FPT_TST: 1
    • FPT_TST.1: 12
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ICT: 3
    • FTP_ITC: 51
    • FTP_ITC.1: 16
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINSTRATOR: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • A:
    • A.CGA: 4
    • A.CSP: 4
    • A.SCA: 4
  • OE:
    • OE.HID_VAD: 12
    • OE.HI_VAD: 1
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 12
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 3
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 20
  • DES:
    • 3DES:
      • 3DES: 4
      • TDES: 6
      • Triple-DES: 1
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 4
  • RSA:
    • RSA 2048: 1
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 4
    • SHA2:
      • SHA-256: 3
      • SHA-384: 4
      • SHA-512: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
    • Key exchange: 1
  • MAC:
    • MAC: 2
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 97
    • SSHv2: 11
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 7
      • TLS1.1: 1
      • TLS1.2: 1
  • PACE:
    • PACE: 35
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
  • RNG:
    • RBG: 2
    • RNG: 1
  • RNG:
    • RND: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 4
  • CBC:
    • CBC: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 8
    • P-384: 6
    • P-521: 6
  • NIST:
    • NIST P-256: 1
    • NIST P-384: 1
    • NIST P-521: 1
    • P-256: 1
    • P-384: 1
    • P-521: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 2
    • fault injection: 1
    • malfunction: 3
    • physical tampering: 6
  • SCA:
    • DPA: 1
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 1
    • timing attacks: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03111: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 180-4: 3
    • FIPS 186-4: 2
    • FIPS 197: 2
    • FIPS 198-1: 3
    • FIPS PUB 186-4: 6
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
  • RFC:
    • RFC 3526: 2
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4254: 1
    • RFC 5656: 1
    • RFC 6668: 1
    • RFC3526: 1
    • RFC5656: 1
  • X509:
    • X.509: 3
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS 197: 1
    • FIPS PUB 180-4: 3
    • FIPS PUB 186-4: 1
  • ICAO:
    • ICAO: 3
  • ISO:
    • ISO/IEC 10116:2006: 1
    • ISO/IEC 15408: 2
    • ISO/IEC 18013: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 7816-4: 1
    • ISO/IEC 7816-8: 1
    • ISO/IEC 7816-9: 1
    • ISO/IEC14443: 2
    • ISO/IEC7816-3: 1
  • PKCS:
    • PKCS#3: 2
  • RFC:
    • RFC 5639: 1
    • RFC-5639: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • It first provides a descriptive overview of the TOE and then summarises the items which are out of scope of the TOE. 1.5.1 Overview 5. The Target of Evaluation (TOE) is Juniper Networks, Inc. Junos OS 20: 1
    • out of scope: 1
  • OutOfScope:
    • antenna and card body / booklet are irrelevant for the secure operation of the TOE and therefore out of scope. 2.3.6 TOE Components The TOE consists of the following components: Category Definition Secure Chip: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Austria Card Ges.m.b.H. - Thomas Aichinger
  • /CreationDate: D:20220511135157+02'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20220511135157+02'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: ACOS-IDv2.0 SSCD
  • /Title: Security Target
  • pdf_file_size_bytes: 3190425
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 94
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different