name |
CertAgent v7.0 |
V3Pro2004 and AhnLab Policy Center 3.0 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
US |
KR |
status |
archived |
archived |
not_valid_after |
01.06.2020 |
01.06.2019 |
not_valid_before |
01.06.2018 |
17.09.2007 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10815-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10815-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-73-EN.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10815-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-73-ST-EN.pdf |
manufacturer |
Information Security Corporation |
AhnLab, Inc. |
manufacturer_web |
https://www.infoseccorp.com |
https://www.ahnlab.com/ |
security_level |
{} |
EAL4 |
dgst |
100a380dc0573e9f |
a8f7a4c49c242ddc |
heuristics/cert_id |
CCEVS-VR-10815-2018 |
KECS-ISIS-0073-2007 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_PRE.1, ADV_FSP.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.2, AGD_OPE.1, ALC_CMC.2 |
ATE_IND.2, ALC_DVS.1, ADV_FSP.2, ATE_FUN.1, ADV_SPM.1, ATE_COV.2, AGD_USR.1, ADV_LLD.1, ADV_RCR.1, AGD_ADM.1, ALC_TAT.1, AVA_MSU.2, ADV_HLD.2, AVA_VLA.2, ALC_LCD.1, ATE_DPT.1, AVA_SOF.1, ADV_IMP.1 |
heuristics/extracted_versions |
7.0 |
3.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
3e51a98255611123 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ca_v2.1.pdf |
{} |
pdf_data/cert_filename |
st_vid10815-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10815-2018: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180720095316-04'00'
- /ModDate: D:20180720095316-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181220
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid10815-vr.pdf |
ISIS-73-EN.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-10815-2018
- cert_item: Information Security Corporation (ISC) CertAgent v 7.0
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- T:
- T.PRIVILEGED_USER_ERR: 1
- T.TSF_FAILURE: 1
- T.UNAUTHENTICATED_TR: 1
- T.UNAUTHORIZED_ACCES: 1
- T.UNAUTHORIZED_UPDAT: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
- T.WEAK_CRYPTO: 1
|
- A:
- A.AVCONFILICT: 1
- A.CERT: 1
- A.GUARD: 1
- A.INTERNALENTITY: 1
- A.NO_EVIL: 1
- A.PHYSICAL: 1
- A.SAFEITENTITY: 1
- A.TIMESTAMP: 1
- O:
- O.ADMIN_ROLE: 1
- O.ALARM: 1
- O.AUDIT: 1
- O.INA: 1
- O.MANAGE: 1
- O.SECURE_UPDATE: 1
- O.SELF_PROTECTION: 1
- O.STRENGTHENOS: 1
- O.TSFDATA_PROTECT: 1
- O.VIRUS: 1
- OE:
- OE.AUDIT_SEARCH: 1
- OE.AUDIT_STORAGE: 1
- OE.AVCONFLICT: 1
- OE.CERT: 1
- OE.DOM_SEPARATION: 1
- OE.GUARD: 1
- OE.INTERNALENTITY: 1
- OE.NO_BYPASS: 1
- OE.NO_EVIL: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFO: 1
- OE.SAFEITENTITY: 1
- OE.TIMESTAMP: 1
- OE.TOE_ACCESS: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- PKCS:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- If the administrator does not set the V3 security lock with Policy Agent in passive mode, it is out of scope of the evaluation because it is not enterprise environment, the TOE operating environment: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20180720095228-04'00'
- /ModDate: D:20180720095228-04'00'
- pdf_file_size_bytes: 706014
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: KYH
- /CreationDate: D:20071203103449+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20071203103449+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: ISIS-73-EN.hwp
- pdf_file_size_bytes: 330437
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
pdf_data/st_filename |
st_vid10815-st.pdf |
ISIS-73-ST-EN.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.1: 3
- ALC_CMC.2: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 4
- ATE:
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 2
- ACM_SCP.2: 3
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.2: 2
- ADV_HLD.2: 2
- ADV_IMP.1: 2
- ADV_LLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 2
- ALC:
- ALC_DVS.1: 2
- ALC_LCD.1: 2
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 3
- ATE_FUN.1: 2
- ATE_IND.2: 3
- AVA:
- AVA_MSU.2: 4
- AVA_SOF.1: 2
- AVA_VLA.2: 3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ADP_EXT.1: 9
- FAU_ADP_EXT.1.1: 1
- FAU_GCR_EXT.1: 5
- FAU_GCR_EXT.1.1: 1
- FAU_GEN.1: 4
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 2
- FAU_GEN.2: 4
- FAU_GEN.2.1: 2
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.3: 5
- FAU_SAR_EXT.1.1: 1
- FAU_SCR_EXT.1: 5
- FAU_SEL.1: 7
- FAU_SEL.1.1: 1
- FAU_STG.4: 6
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FCO:
- FCO_NRO_EXT.2: 5
- FCO_NRO_EXT.2.1: 2
- FCO_NRO_EXT.2.2: 3
- FCO_NRO_EXT.2.3: 1
- FCO_NRO_EXT.2.4: 1
- FCO_NRO_EXT.2.5: 1
- FCS:
- FCS_CDP_EXT.1: 10
- FCS_CDP_EXT.1.1: 2
- FCS_CKM: 1
- FCS_CKM.1: 24
- FCS_CKM.1.1: 4
- FCS_CKM.2: 18
- FCS_CKM_EXT.1: 13
- FCS_CKM_EXT.1.1: 7
- FCS_CKM_EXT.4: 12
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 2
- FCS_CKM_EXT.5: 14
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.8: 10
- FCS_CKM_EXT.8.1: 1
- FCS_CKM_EXT.8.2: 1
- FCS_CKM_EXT.8.3: 1
- FCS_COP.1: 83
- FCS_COP.1.1: 6
- FCS_RBG_EXT.1: 29
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RGB_EXT.1: 2
- FCS_STG_EXT.1: 9
- FCS_STG_EXT.1.1: 2
- FCS_TLSS_EXT.1: 13
- FCS_TLSS_EXT.1.1: 1
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.1.3: 1
- FCS_TLSS_EXT.2: 11
- FCS_TLSS_EXT.2.1: 1
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FCS_TLSS_EXT.2.4: 1
- FCS_TLSS_EXT.2.5: 2
- FDP:
- FDP_CER_EXT.1: 12
- FDP_CER_EXT.1.1: 1
- FDP_CER_EXT.1.2: 1
- FDP_CER_EXT.1.3: 1
- FDP_CER_EXT.2: 9
- FDP_CER_EXT.2.1: 1
- FDP_CER_EXT.3: 9
- FDP_CER_EXT.3.1: 1
- FDP_CRL_EXT.1: 9
- FDP_CRL_EXT.1.1: 1
- FDP_CSI_EXT.1: 9
- FDP_CSI_EXT.1.1: 1
- FDP_CSI_EXT.1.2: 1
- FDP_OCSP_EXT.1: 1
- FDP_OCSP_EXT.1.1: 1
- FDP_RIP.1: 4
- FDP_RIP.1.1: 1
- FDP_STG_EXT.1: 9
- FDP_STG_EXT.1.1: 1
- FIA:
- FIA_ENR_EXT.1: 5
- FIA_ENR_EXT.1.1: 1
- FIA_ESTS_EXT.1: 10
- FIA_ESTS_EXT.1.1: 1
- FIA_ESTS_EXT.1.2: 1
- FIA_ESTS_EXT.1.3: 1
- FIA_ESTS_EXT.1.4: 1
- FIA_EST_EXT.1: 1
- FIA_UAU_EXT.1: 10
- FIA_UAU_EXT.1.1: 1
- FIA_UIA_EXT.1: 11
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 1
- FIA_UIA_EXT.1.3: 1
- FMT:
- FMT_MOF.1: 30
- FMT_MOF.1.1: 5
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 6
- FMT_SMR.2: 13
- FMT_SMR.2.1: 2
- FPT:
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_KST_EXT.1: 6
- FPT_KST_EXT.1.1: 2
- FPT_KST_EXT.2: 13
- FPT_RCV.1: 8
- FPT_RCV.1.1: 1
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 1
- FPT_SKY_EXT.2: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TST_EXT.2: 8
- FPT_TST_EXT.2.1: 1
- FPT_TST_EXT.2.2: 1
- FPT_TUD_EXT.1: 9
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.1.4: 1
- FTA:
- FTA_SSL.3: 11
- FTA_SSL.4: 10
- FTA_SSL_EXT.1: 1
- FTA_TAB.1: 7
- FTP:
- FTP_ITC.1: 9
- FTP_ITC.1.2: 1
- FTP_TRP.1: 9
- FTP_TRP.1.1: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_APR.1: 2
- FAU_ARP.1: 10
- FAU_ARP.1.1: 1
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAA.1: 13
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 20
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.2: 12
- FAU_SAR.2.1: 1
- FAU_SAR.3: 13
- FAU_SAR.3.1: 2
- FAU_SSA.1: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 11
- FAU_STG.4.1: 1
- FDP:
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 10
- FIA_SOS.1.1: 1
- FIA_UAU.1: 6
- FIA_UAU.2: 16
- FIA_UAU.2.1: 2
- FIA_UAU.6: 14
- FIA_UAU.6.1: 2
- FIA_UID.1: 8
- FIA_UID.2: 18
- FIA_UID.2.1: 2
- FMT:
- FMT_MOF.1: 27
- FMT_MOF.1.1: 1
- FMT_MTD.1: 32
- FMT_MTD.1.1: 1
- FMT_MTD.2: 12
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_SMF.1: 31
- FMT_SMF.1.1: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 10
- FPT_AMT.1.1: 1
- FPT_ITI.1: 10
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_ITT.1: 16
- FPT_ITT.1.1: 2
- FPT_SSL.3: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.1: 5
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.3: 15
- FTA_SSL.3.1: 1
- FTA_SSL.4: 14
- FTA_SSL.4.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 2
- A.TRUSTED_ADMIN: 2
- O:
- O.AUDIT_LOSS_RESPONSE: 3
- O.AUDIT_PROTECTION: 3
- O.CERTIFICATES: 2
- O.CONFIGURATION_MANAGEMENT: 2
- O.DISPLAY_BANNER: 2
- O.INTEGRITY_PROTECTION: 2
- O.NON_REPUDIATION: 2
- O.PROTECTED_COMMUNICATIONS: 3
- O.RECOVERY: 1
- O.RESIDUAL_INFORMATION_CLEARING: 2
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 2
- O.TOE_ADMINISTRATION: 3
- O.TSF_SELF_TEST: 2
- O.VERIFIABLE_UPDATES: 3
- OE:
- OE.AUDIT_GENERATION: 3
- OE.AUDIT_RETENTION: 3
- OE.AUDIT_REVIEW: 3
- OE.AUDIT_STORAGE: 3
- OE.CERT_REPOSITORY: 2
- OE.CRYPTOGRAPHY: 3
- OE.KEY_ARCHIVAL: 3
- OE.NO_GENERAL_PURPOSE: 2
- OE.PHYSICAL: 2
- OE.PUBLIC_KEY_PROTECTION: 1
- OE.SESSION_PROTECTION_LOCAL: 3
- OE.TOE_ADMINISTRATION: 4
- OE.TRUSTED_ADMIN: 3
- OE.TRUSTED_PLATFORM: 2
- T:
- T.PRIVILEGED_USER_ERROR: 2
- T.TSF_FAILURE: 2
- T.UNAUTHENTICATED_TRANSACTIONS: 2
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_UPDATE: 2
- T.UNDETECTED_ACTIONS: 2
- T.USER_DATA_REUSE: 2
- T.WEAK_CRYPTO: 2
|
- A:
- A.AVCONFLICT: 3
- A.CERT: 3
- A.GUARD: 3
- A.INTERNALENTITY: 3
- A.NO_EVIL: 3
- A.PHISICAL: 2
- A.SAFEITENTITY: 3
- A.TIMESTAMP: 3
- O:
- O.ADMIN_ROLE: 5
- O.ALARM: 6
- O.AUDIT: 10
- O.AUIDT: 2
- O.INA: 16
- O.MANAGE: 14
- O.SECURE_UPDATE: 6
- O.SELF_PROTECTION: 5
- O.STRENGTHENOS: 5
- O.TSFDATA_PROTECT: 8
- O.VIRUS: 10
- OE:
- OE.AUDIT_SEARCH: 5
- OE.AUDIT_STORAGE: 7
- OE.AVCONFLICT: 3
- OE.CERT: 3
- OE.DOM_SEPARATION: 5
- OE.GAURD: 1
- OE.GUARD: 2
- OE.INTERNALENTITY: 3
- OE.NO_BYPASS: 5
- OE.NO_EVIL: 3
- OE.PHISICAL: 2
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFO: 2
- OE.SAFEITENTITY: 4
- OE.TIMESTAMP: 7
- OE.TOE_ACCESS: 13
- T:
- T.AUDIT_COMPROMISE: 8
- T.DOWN_INTERFERENCE: 3
- T.MASQUERADE: 5
- T.RESIDUAL_DATA: 3
- T.TRANS_DESTORY: 3
- T.TSF_COMPROMISE: 9
- T.UNATTEND_SESS: 5
- T.UNIDENTIFIED_ACTIONS: 5
- T.VIRUS: 4
|
pdf_data/st_keywords/vendor |
- Gemalto:
- Microsoft:
- Thales:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- RSA:
- RSA-2048: 1
- RSA-3072: 9
- RSA-4096: 5
- RSA-8192: 3
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 10
- SHA-384: 12
- SHA-512: 11
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- SSL 1.0: 1
- SSL 2.0: 3
- SSL 3.0: 1
- TLS:
- TLS: 85
- TLS 1.0: 3
- TLS 1.1: 6
- TLS v1.1: 1
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 15
- P-384: 15
- P-521: 11
- curve P-256: 1
- curve P-384: 1
- curve P-521: 1
- secp256r1: 3
- secp384r1: 3
- secp521r1: 3
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 7
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 14-2: 1
- FIPS 140-2: 4
- FIPS 180-4: 1
- FIPS 186-4: 4
- FIPS 197: 1
- FIPS 198-1: 1
- FIPS PUB 186-4: 6
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-57: 2
- PKCS:
- PKCS #11: 3
- PKCS#11: 138
- PKCS#12: 1
- PKCS12: 1
- RFC:
- RFC 2818: 1
- RFC 2898: 2
- RFC 2986: 2
- RFC 4346: 2
- RFC 4492: 3
- RFC 5280: 11
- RFC 5652: 4
- RFC 6960: 7
- RFC 7030: 12
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- java:
- java.lang: 1
- java.util: 1
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 98 APC uses SMS for notification on the situation that authorized administrator is set. This is out of scope because additional contract with a mobile service provider is necessary for this function. APC: 1
- 99 APC creates reports with pre-defined formats and audit records. This function is out of scope since it is independent with generating and storing audit records. AhnLab, Korea 24/109 APC: 1
- files for support of V3+ Neo. Since the operating system of the TOE is Windows XP, This is out of scope. 91 The following functions are out of scope for policy server. Hierarchical Domain Management : 1
- out of scope: 6
- system in case that the system has been registered on the APC. 101 The following functions are out of scope for policy agent. User Information Input 102 An additional feature for the Policy Agent user: 1
- updates itself by the policy server’s command. 2.2.3 Out of Coverage 88 The following functions are out of scope of V3 Run as a Update Server 89 Without APC, V3 runs as an update server for the other V3s. V3 +: 1
|
pdf_data/st_metadata |
|
- /Author: KYH
- /CreationDate: D:20071203103747+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20071203103747+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: Microsoft Word - ISIS-73-ST_EN.doc
- pdf_file_size_bytes: 796288
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 109
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |