Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Junos OS 20.2R1-S1 for QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, EX4650-48Y and QFX5200-48Y
Certificate Number: 2021/135
SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14
NSCIB-CC-2400004-01-CR
name Junos OS 20.2R1-S1 for QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, EX4650-48Y and QFX5200-48Y SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme AU NL
not_valid_after 15.02.2026 30.09.2029
not_valid_before 15.02.2021 30.09.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T017%20Cert%202021_135%20OS.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400004-01-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/T0017-Certification_Report_V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400004-01-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20QFX5120,%20QFX5200,%20QFX5210,%20EX4650%20Junos%2020.2R1%20ST%20v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400004-01-ST_v1.23.pdf
manufacturer Juniper Networks, Inc. A.E.T. Europe B.V.
manufacturer_web https://www.juniper.net/ https://aeteurope.com
security_level {} EAL4+, AVA_VAN.5
dgst 07bffc2fb1a2fbc4 9b4f91dc748da889
heuristics/cert_id Certificate Number: 2021/135 NSCIB-CC-2400004-01-CR
heuristics/cert_lab []
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 20.2 3.0.1.13, 3.0.1.12, 3.0.1.14
heuristics/report_references/directly_referencing {} NSCIB-CC-2300172-01-CR
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1136-2021, BSI-DSZ-CC-1136-V2-2022, BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-1136-V4-2024, NSCIB-CC-2300172-01-CR
heuristics/scheme_data
heuristics/st_references/directly_referencing {} NSCIB-CC-2300172-01-CR
heuristics/st_references/indirectly_referencing {} NSCIB-CC-2300172-01-CR, BSI-DSZ-CC-1136-V4-2024
heuristics/protection_profiles {} d918b28fd7bb5d79, 27abdb9c6ab375a7
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf
pdf_data/cert_filename EFT-T017 Cert 2021_135 OS.pdf NSCIB-CC-2400004-01-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-21-0274076: 1
    • NSCIB-2400004-01: 1
    • NSCIB-CC-2400004-01: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-: 1
    • BSI-CC-PP-0075-: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.E: 1
pdf_data/cert_keywords/eval_facility
  • Riscure:
    • Riscure: 1
pdf_data/cert_keywords/os_name
  • JCOP:
    • JCOP 4: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 18045:2008: 1
pdf_data/cert_metadata
  • /CreationDate: D:20210217171814+10'00'
  • /Creator: ACA75941.dpe.protected.mil.au
  • /ModDate: D:20210217171814+10'00'
  • /Producer: KONICA MINOLTA bizhub C308
  • /Title: SACA75941.d21021717171
  • pdf_file_size_bytes: 108210
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Haak
  • /CreationDate: D:20241013191320+01'00'
  • /Creator: Microsoft® Word 2021
  • /ModDate: D:20241013191320+01'00'
  • /Producer: Microsoft® Word 2021
  • /Title: NSCIB Certificate
  • pdf_file_size_bytes: 89456
  • pdf_hyperlinks: https://www.tuv-nederland.nl/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename T0017-Certification_Report_V1.0.pdf NSCIB-CC-2400004-01-CR.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-2400004-01-CR
    • cert_item: SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14
    • cert_lab: Riscure B.V.
    • developer: A.E.T. Europe B.V
pdf_data/report_keywords/cc_cert_id
  • NL:
    • CC-21-0274076: 1
    • NSCIB-2400004-01: 1
    • NSCIB-CC-2300172-01: 1
    • NSCIB-CC-2400004-01-CR: 13
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL6+: 1
pdf_data/report_keywords/cc_sar
  • AVA:
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.E: 3
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 2
pdf_data/report_keywords/eval_facility
  • Teron:
    • Teron Labs: 4
  • Riscure:
    • Riscure: 5
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
    • SSHv2: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JHAS: 1
    • JIL: 2
    • JIL-AAPS: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 4: 24
pdf_data/report_keywords/standard_id
  • PKCS:
    • PKCS#15: 1
pdf_data/report_metadata
pdf_data/st_filename Juniper QFX5120, QFX5200, QFX5210, EX4650 Junos 20.2R1 ST v1.3.pdf NSCIB-CC-2400004-01-ST_v1.23.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-2300172-01: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-: 1
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0075-2012-MA-01: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 3
    • EAL6: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT: 2
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 17
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP: 28
    • FCS_COP.1: 6
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 7
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT.1.5: 1
    • FCS_SSHS_EXT: 1
    • FCS_SSHS_EXT.1: 6
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 2
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT.1.1: 2
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 2
    • FIA_UAU_EXT.2: 5
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT: 2
    • FIA_UIA_EXT.1: 11
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UID.1: 3
  • FMT:
    • FMT_MOF: 19
    • FMT_MOF.1: 3
    • FMT_MTD: 14
    • FMT_MTD.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 5
    • FMT_SMR.2: 12
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 2
    • FPT_APW_EXT.1: 6
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 5
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM: 3
    • FPT_STM.1: 3
    • FPT_STM_EXT: 2
    • FPT_STM_EXT.1: 2
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL: 2
    • FTA_SSL.3: 8
    • FTA_SSL.4: 6
    • FTA_SSL_EXT: 2
    • FTA_SSL_EXT.1: 7
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 9
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 22
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC.2: 6
    • FTP_TRP: 8
    • FTP_TRP.1: 3
    • FTP_TUD.1: 1
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN: 1
    • FAU_SAS: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 14
    • FCS_CKM.1: 4
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 3
    • FCS_CKM.3: 1
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 1
    • FCS_COP: 11
    • FCS_COP.1: 3
    • FCS_COP.1.1: 2
    • FCS_RNG: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 26
    • FDP_ACC.1: 14
    • FDP_ACF: 26
    • FDP_ACF.1: 20
    • FDP_IFC: 4
    • FDP_IFC.1: 6
    • FDP_IFF: 4
    • FDP_ITC: 6
    • FDP_ITC.1: 6
    • FDP_ITC.2: 3
    • FDP_RIP: 9
    • FDP_RIP.1: 4
    • FDP_RIP.1.1: 1
    • FDP_ROL: 2
    • FDP_SDI: 12
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
    • FDP_UCT: 6
    • FDP_UCT.1: 1
    • FDP_UIT: 1
  • FIA:
    • FIA_AFL: 4
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 2
    • FIA_UAU: 5
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 7
    • FIA_UID.1: 6
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 2
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 1
    • FMT_MSA: 37
    • FMT_MSA.1: 5
    • FMT_MSA.2: 3
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 3
    • FMT_MSA.4.1: 2
    • FMT_MTD: 12
    • FMT_MTD.1: 2
    • FMT_SMF: 10
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR: 6
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 7
    • FPT_EMS.1: 10
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 7
    • FPT_FLS.1: 5
    • FPT_FLS.1.1: 1
    • FPT_PHP: 6
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 4
    • FPT_PHP.3.1: 1
    • FPT_RCV: 1
    • FPT_TDC.1: 1
    • FPT_TST: 2
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 7
    • FTP_ITC.1: 4
    • FTP_TRP.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINSTRATOR: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • A:
    • A.APPLET: 1
    • A.APPS-PROVIDER: 1
    • A.CGA: 4
    • A.CSP: 4
    • A.E: 8
    • A.SCA: 4
    • A.USE_DIAG: 1
    • A.USE_KEYS: 1
    • A.VERIFICATION: 1
    • A.VERIFICATION-AUTHORITY: 1
  • OE:
    • OE.APPLET: 1
    • OE.APPS-PROVIDER: 1
    • OE.CODE-EVIDENCE: 1
    • OE.HID_VAD: 3
    • OE.KEY-CHANGE: 1
    • OE.PROCESS_SEC_IC: 1
    • OE.SECURITY-DOMAINS: 1
    • OE.USE_DIAG: 1
    • OE.USE_KEYS: 1
    • OE.VERIFICATION: 1
    • OE.VERIFICATION-AUTHORITY: 1
  • OSP:
    • OSP.KEY-CHANGE: 1
    • OSP.PROCESS-TOE: 1
    • OSP.SECURE-BOX: 1
    • OSP.SECURITY-DOMAINS: 1
    • OSP.VERIFICATION: 1
  • OT:
    • OT.ALARM: 1
    • OT.APPLI-AUTH: 1
    • OT.ATTACK-COUNTER: 1
    • OT.CARD-CONFIGURATION: 1
    • OT.CARD-MANAGEMENT: 1
    • OT.CIPHER: 1
    • OT.COMM_AUTH: 1
    • OT.COMM_CONFIDENTIALITY: 1
    • OT.COMM_INTEGRITY: 1
    • OT.DOMAIN-RIGHTS: 1
    • OT.EXT-MEM: 1
    • OT.FIREWALL: 1
    • OT.GLOBAL_ARRAYS_CONFID: 1
    • OT.GLOBAL_ARRAYS_INTEG: 1
    • OT.IDENTIFICATION: 1
    • OT.KEY-MNGT: 1
    • OT.NATIVE: 1
    • OT.OBJ-DELETION: 1
    • OT.OPERATE: 1
    • OT.PIN-MNGT: 1
    • OT.REALLOCATION: 1
    • OT.RESOURCES: 1
    • OT.RESTRICTED-MODE: 1
    • OT.RND: 1
    • OT.RNG: 1
    • OT.SCP: 3
    • OT.SEC_BOX_FW: 1
    • OT.SENSITIVE_RESULTS_INTEG: 1
    • OT.SID: 1
    • OT.SID_MODULE: 1
    • OT.TRANSACTION: 1
  • T:
    • T.ATTACK_COUNTER: 1
    • T.COM_EXPLOIT: 1
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.CONFIG: 1
    • T.EXE-CODE: 2
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 2
    • T.INTEG-JCS: 1
    • T.INTEG-JCS-CODE: 1
    • T.LIFE_CYCLE: 1
    • T.MODULE_EXEC: 1
    • T.MODULE_REPLACEMENT: 1
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.OS_OPERATE: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 1
    • T.RND: 1
    • T.SEC_BOX_BORDER: 1
    • T.SID: 2
    • T.UNAUTHORIZED_CARD_MNGT: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • NXP:
    • NXP: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 3
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 4
  • RSA:
    • RSA 2048: 1
  • ECC:
    • ECC:
      • ECC: 8
    • ECDSA:
      • ECDSA: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 4
    • SHA2:
      • SHA-256: 3
      • SHA-384: 4
      • SHA-512: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
    • Key exchange: 1
  • MAC:
    • MAC: 2
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 97
    • SSHv2: 11
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 7
      • TLS1.1: 1
      • TLS1.2: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
  • RNG:
    • RBG: 2
    • RNG: 1
  • RNG:
    • RND: 2
    • RNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 8
    • P-384: 6
    • P-521: 6
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
    • physical tampering: 5
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 2
    • side channel: 1
    • timing attacks: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102-1: 8
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 4: 76
    • JCOP4: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 180-4: 3
    • FIPS 186-4: 2
    • FIPS 197: 2
    • FIPS 198-1: 3
    • FIPS PUB 186-4: 6
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
  • RFC:
    • RFC 3526: 2
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4254: 1
    • RFC 5656: 1
    • RFC 6668: 1
    • RFC3526: 1
    • RFC5656: 1
  • X509:
    • X.509: 3
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • PKCS:
    • PKCS #11: 2
    • PKCS#1: 2
    • PKCS#15: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.1.1: 1
    • Java Card 2.2: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • It first provides a descriptive overview of the TOE and then summarises the items which are out of scope of the TOE. 1.5.1 Overview 5. The Target of Evaluation (TOE) is Juniper Networks, Inc. Junos OS 20: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Arjan Jeckmans
  • /CreationDate: D:20240927164546+02'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /Keywords: for W2010 with macros
  • /MSIP_Label_01058f84-91de-4d5a-b21e-3d9ad6e73d65_Enabled: True
  • /MSIP_Label_01058f84-91de-4d5a-b21e-3d9ad6e73d65_Method: Privileged
  • /MSIP_Label_01058f84-91de-4d5a-b21e-3d9ad6e73d65_SiteId: e0509b6d-dd1e-4bcc-b337-62dfde0e2112
  • /ModDate: D:20240927164546+02'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 919813
  • pdf_hyperlinks: http://www.aeteurope.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 47
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different