name |
Cisco Integrated Services Routers (ISR) 4000 Family v3.13.2 |
MaskTech ePP Applet on Secora ID S v1.1 |
category |
Boundary Protection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
NL |
status |
archived |
active |
not_valid_after |
03.09.2020 |
18.10.2027 |
not_valid_before |
03.09.2015 |
18.10.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-333%20CT%20v1.0e.docx |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-22-0299277-cert.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-333%20CR%20v1.2e.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0299277-cr-1.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-333%20ST%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0299277-stlite-1.2.pdf |
manufacturer |
Cisco Systems, Inc. |
MaskTech International GmbH |
manufacturer_web |
https://www.cisco.com |
https://www.masktech.de/ |
security_level |
{} |
EAL5, ALC_DVS.2, AVA_VAN.5 |
dgst |
0b4f7e68b62c924f |
0fddd321be6a5a6c |
heuristics/cert_id |
383-4-333 |
NSCIB-CC-0299277-CR |
heuristics/cert_lab |
CANADA |
|
heuristics/cpe_matches |
cpe:2.3:h:cisco:router_4000:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2000-0345 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
3.13.2 |
1.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V5-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1110-V5-2022, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
bb67fb1b4f10e7a5, ac9abe3d5c5a31f0 |
60455fc9564e2545, 184ca3dbcac741fa, b380aabf93b29692 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-06fr.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf |
pdf_data/cert_filename |
383-4-333 CT v1.0e.docx |
nscib-cc-22-0299277-cert.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055-2009: 2
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL7: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_DVS.2: 2
- ALC_FLR.3: 2
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: kruitr
- /CreationDate: D:20221029174923+02'00'
- /Creator: Bullzip PDF Printer (11.0.0.2588)
- /ModDate: D:20221029175011+02'00'
- /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
- /Title: Microsoft Word - NSCIB-CC-22-0299277-Cert.docx
- pdf_file_size_bytes: 275349
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
383-4-333 CR v1.2e.pdf |
nscib-cc-0299277-cr-1.0.pdf |
pdf_data/report_frontpage |
- NL:
- CA:
- cert_id: 383-4-333-CR
- cert_lab: CANADA
|
- NL:
- cert_id: NSCIB-CC-0299277-CR
- cert_item: MaskTech ePP Applet on Secora™ ID S v1.1
- cert_lab: SGS Brightsight B.V.
- developer: MaskTech International GmbH
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1110-V5-2022: 2
- NL:
- NSCIB-CC-0299277-CR: 13
- NSCIB-CC-21-175887-CR3: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-CC-PP-0056-V2-: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 2
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 2
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_DVS.2: 4
- ALC_FLR.1: 1
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 4
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM_EXT.4: 1
- FCS_RBG_EXT.1: 1
- FCS_SSH_EXT.1: 1
- FCS_TLS_EXT.1: 1
- FIA:
- FIA_PMG_EXT.1: 1
- FIA_PSK_EXT.1: 1
- FIA_UAU_EXT.2: 1
- FIA_UIA_EXT.1: 1
- FPT:
- FPT_APW_EXT.1: 1
- FPT_SKP_EXT.1: 1
- FPT_TST_EXT.1: 1
- FPT_TUD_EXT.1: 1
- FTA:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Cisco:
- Cisco: 35
- Cisco Systems, Inc: 16
|
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 2
|
pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 2
- SGS Brightsight: 2
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- SCA:
- other:
- JIL: 2
- JIL-AAPS: 1
- JIL-AM: 1
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- BSI-DSZ- CC- 1110-V5-2022, ETR for Composite evaluation (EFC), TÜV Informationstechnik GmbH (confidential document) [HW-ST] Public Security Target BSI-DSZ-CC-1110-V5-2022, Version 2.0, 2022-03-28, “Public Security: 1
|
pdf_data/report_metadata |
- /Author: Clark, Cory P.
- /CR version: 1.2
- /Company: CSEC-CSTC
- /Conformance Claim: Conformance Claim (EAL number augmented?)
- /CreationDate: D:20151218101539-05'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Developer name: Cisco Systems, Inc.
- /Document number: 383-4-333-CR
- /ETR title, version, date: Cisco Integrated Services Routers (ISR) 4000 Family (4321, 4331 and 4351) Common Criteria NDPP Evaluation Technical Report (ETR) v0.7, 3 September 2015
- /Evaluation completion date: 03 September 2015
- /ModDate: D:20151218101543-05'00'
- /Producer: Adobe PDF Library 11.0
- /ST Title: Security Target for Cisco Integrated Services Routers (ISR) 4000 Family v1.0, 10 December 2015
- /SourceModified: D:20151218150617
- /TOE name and version: Cisco Integrated Services Routers (ISR) 4000 Family v3.13.2
- /TOE short name: Cisco ISR v3.13.2
- /Title: 383-4-XXX CR vxe
- pdf_file_size_bytes: 230822
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
|
pdf_data/st_filename |
383-4-333 ST v1.0.pdf |
nscib-cc-0299277-stlite-1.2.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-S-0183-2021: 1
- BSI-DSZ-CC-S-0189-2021: 1
- BSI-DSZ-CC-S-0207-2021: 1
- FR:
- ANSSI-CC-PP-2010/03-M01: 1
- NL:
- CC-22-175887: 4
- NSCIB-CC-299277: 1
- NSCIB-CC-299278: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-CC-PP-0056-2009: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 12
- EAL4 augmented: 6
- EAL5: 13
- EAL5 augmented: 6
- EAL6: 4
- EAL6 augmented: 4
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 2
- ADV_FSP.5: 1
- ADV_IMP.1: 3
- ADV_INT.2: 1
- ADV_TDS.3: 2
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.2: 16
- ALC_FLR.1: 1
- ALC_LCD.1: 2
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_DPT.2: 2
- ATE_DPT.3: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 8
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 5
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 2
- FCS_CKM_EXT.4: 5
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 17
- FCS_COP.1.1: 7
- FCS_RBG_EXT.1: 6
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT.1: 4
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FDP:
- FDP_RIP.2: 4
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT.1: 3
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 4
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.1.2: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 1
- FAU_SAS: 3
- FAU_SAS.1: 5
- FAU_SAS.1.1: 1
- FCO:
- FCS:
- FCS_CKM: 20
- FCS_CKM.1: 22
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM.3: 1
- FCS_CKM.4: 24
- FCS_CKM.4.1: 1
- FCS_COP: 64
- FCS_COP.1: 30
- FCS_RND: 1
- FCS_RND.1: 6
- FCS_RND.1.1: 1
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 10
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF: 11
- FDP_ACF.1: 24
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 2
- FDP_IFC.1: 4
- FDP_IFF: 2
- FDP_ITC: 3
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_RIP: 8
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_ROL: 2
- FDP_SDI.2: 1
- FDP_UCT: 6
- FDP_UCT.1: 6
- FDP_UCT.1.1: 1
- FDP_UIT: 8
- FDP_UIT.1: 8
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 3
- FIA:
- FIA_ACC.1.1: 1
- FIA_AFL: 4
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 8
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_ATD: 1
- FIA_UAU: 47
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 4
- FIA_UAU.4: 11
- FIA_UAU.4.1: 2
- FIA_UAU.5: 15
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UID: 13
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 5
- FIA_USB: 1
- FMT:
- FMT_LIM: 12
- FMT_LIM.1: 17
- FMT_LIM.1.1: 2
- FMT_LIM.2: 16
- FMT_LIM.2.1: 3
- FMT_MSA: 11
- FMT_MSA.3: 2
- FMT_MTD: 80
- FMT_MTD.1: 16
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_SMF: 7
- FMT_SMF.1: 35
- FMT_SMF.1.1: 1
- FMT_SMR: 24
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS.1: 5
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 3
- FPT_FLS: 7
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FPT_RCV: 1
- FPT_TDC.1: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 8
- FTP_ITC.1: 7
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.ADDRESS_FILTERING: 1
- O.AUTHENTICATION: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.DISPLAY_BANNER: 1
- O.FAIL_SECURE: 1
- O.PORT_FILTERING: 1
- O.PROTECTED_COMMUNICATIONS: 1
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- OE:
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.DATA_INTEGRITY: 1
- T.NETWORK_DISCLOSURE: 1
- T.NETWORK_MISUSE: 1
- T.REPLAY_ATTACK: 1
- T.TSF_FAILURE: 2
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
- O:
- O.ALARM: 1
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 1
- O.COMMUNICATION: 1
- O.DELETION: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.GLOBAL_ARRAYS_INTEG: 1
- O.INSTALL: 1
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.SCP: 4
- O.SID: 1
- O.TRANSACTION: 1
- OE:
- OE.APPLET: 2
- OE.CODE-EVIDENCE: 2
- OE.VERIFICATION: 5
|
pdf_data/st_keywords/vendor |
- Cisco:
- Cisco: 48
- Cisco Systems, Inc: 4
|
- Infineon:
- Infineon: 5
- Infineon Technologies AG: 13
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 12
- AES-: 1
- AES128: 2
- AES256: 2
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 6
- TDEA: 1
- TDES: 4
- Triple-DES: 10
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 2
- SHA-384: 1
- SHA-512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 40
- IKEv1: 10
- IKEv2: 9
- IPsec:
- SSH:
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- SCA:
- physical probing: 2
- side channel: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 13
- EF.DG1: 19
- EF.DG13: 1
- EF.DG14: 2
- EF.DG15: 2
- EF.DG16: 18
- EF.DG2: 8
- EF.DG3: 15
- EF.DG4: 17
- EF.DG5: 7
- EF.SOD: 15
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-009-001: 1
- CCMB-2012-009-004: 1
- FIPS:
- FIPS 140-2: 5
- FIPS 180-3: 1
- FIPS 186-3: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 2
- FIPS PUB 186-2: 4
- FIPS PUB 186-3: 12
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 2
- NIST SP 800-56A: 1
- NIST SP 800-56B: 1
- SP 800-90: 3
- SP 900-90A: 1
- RFC:
- RFC 2460: 2
- RFC 2560: 1
- RFC 2986: 1
- RFC 3602: 1
- RFC 4106: 1
- RFC 4109: 1
- RFC 4253: 1
- RFC 4301: 1
- RFC 4303: 1
- RFC 4868: 2
- RFC 4945: 1
- RFC 5280: 3
- RFC 5759: 1
- RFC 6379: 1
- RFC 768: 2
- RFC 791: 2
- RFC 793: 2
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 9797: 2
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-67: 1
- RFC:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- to the plastic travel document is achieved by physical and organizational security measures being out of scope of the TOE. In the context of this Security Target the MRTD functionality is provided by the: 1
|
pdf_data/st_metadata |
|
- /Author: MaskTech International GmbH
- /CreationDate: D:20220923164121+02'00'
- /Creator: LaTeX with hyperref
- /Keywords: Common Criteria, CC, Machine Readable Travel Document, MRTD, EAC with PACE, ePass, EAL4 +, EAL5 +
- /ModDate: D:20220923164121+02'00'
- /PTEX.Fullbanner: This is pdfTeX, Version 3.14159265-2.6-1.40.20 (TeX Live 2019/Cygwin) kpathsea version 6.3.1
- /Producer: pdfTeX-1.40.20
- /Subject: Common Criteria Certification
- /Title: Security Target – MaskTech ePP Applet on Secora™ ID S v1.1– Public version
- /Trapped: /False
- pdf_file_size_bytes: 613317
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 107
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |