| name |
Cisco Prime Infrastructure 3.2 |
Web Bytes Xilnex Framework version 3.0 |
| category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
| scheme |
US |
MY |
| status |
archived |
archived |
| not_valid_after |
30.04.2020 |
16.02.2017 |
| not_valid_before |
30.04.2018 |
16.02.2012 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10860-ci.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10860-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C030-CR-v1a.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10860-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Web%20Bytes%20EAL1%20Security%20Target%20(Xilnex%20Framework)%20v1.1.pdf |
| manufacturer |
Cisco Systems, Inc. |
Web Bytes Sdn Bhd |
| manufacturer_web |
https://www.cisco.com |
https://www.webbytes.com.my |
| security_level |
{} |
EAL1 |
| dgst |
104aa904d58b66ef |
0136a64efd2140e4 |
| heuristics/cert_id |
CCEVS-VR-VID-10860-2018 |
ISCB-5-RPT-C030-CR-v1a |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
cpe:2.3:a:cisco:prime_infrastructure:3.2:fips:*:*:*:*:*:*, cpe:2.3:a:cisco:prime_infrastructure:3.2:device_pack4:*:*:*:*:*:*, cpe:2.3:a:cisco:prime_infrastructure:3.2\(0.0\):*:*:*:*:*:*:*, cpe:2.3:a:cisco:prime_infrastructure:3.2.2:*:*:*:*:*:*:*, cpe:2.3:a:cisco:prime_infrastructure:3.2:device_pack2:*:*:*:*:*:*, cpe:2.3:a:cisco:prime_infrastructure:3.2:device_pack3:*:*:*:*:*:*, cpe:2.3:a:cisco:prime_infrastructure:3.2\(2.0\):*:*:*:*:*:*:*, cpe:2.3:a:cisco:prime_infrastructure:3.2\(1.0\):*:*:*:*:*:*:*, cpe:2.3:a:cisco:prime_infrastructure:3.2:device_pack1:*:*:*:*:*:*, cpe:2.3:a:cisco:prime_infrastructure:3.2:*:*:*:*:*:*:*, cpe:2.3:a:cisco:prime_infrastructure:3.2.1:*:*:*:*:*:*:*, cpe:2.3:a:cisco:prime_infrastructure:3.2_base:*:*:*:*:*:*:*, cpe:2.3:a:cisco:prime_infrastructure:3.2.0:*:*:*:*:*:*:*, cpe:2.3:a:cisco:prime_infrastructure:3.2.0-fips:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2018-0097, CVE-2025-20203, CVE-2021-34733, CVE-2019-1825, CVE-2023-20129, CVE-2019-1824, CVE-2023-20130, CVE-2019-1818, CVE-2023-20257, CVE-2023-20203, CVE-2025-20270, CVE-2023-20222, CVE-2024-20514, CVE-2025-20269, CVE-2025-20120, CVE-2018-0096, CVE-2021-34784, CVE-2019-1819, CVE-2019-15958, CVE-2019-1643, CVE-2017-6782, CVE-2019-1821, CVE-2023-20068, CVE-2018-15379, CVE-2023-20121, CVE-2023-20069, CVE-2018-15432, CVE-2019-1823, CVE-2017-3884, CVE-2023-20271, CVE-2023-20127, CVE-2023-44487, CVE-2022-20657, CVE-2023-20131, CVE-2023-20205, CVE-2022-20656, CVE-2019-1822, CVE-2021-1306, CVE-2017-6662, CVE-2021-1487, CVE-2019-1659, CVE-2018-15433, CVE-2023-20201, CVE-2025-20272, CVE-2023-20260, CVE-2025-20280, CVE-2020-3339, CVE-2023-20258, CVE-2022-20659, CVE-2019-1820 |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
| heuristics/extracted_versions |
3.2 |
3.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10860/
- categories: ['Network Device']
- category: Network Device
- certification_date: 30.04.2018
- evaluation_facility: CGI IT Security Labs
- expiration_date: 30.04.2020
- id: CCEVS-VR-VID10860
- product: Cisco Prime Infrastructure 3.2
- scheme: US
- url: https://www.niap-ccevs.org/products/10860
- vendor: Cisco Systems, Inc.
|
- cert_no: 2012-002-C030
- certification_date: 16.02.2012
- developer: Web Bytes Sdn Bhd
- enhanced:
- assurance_level: EAL1
- category: Other Devices and Systems
- cert_id: C030
- certification_date: 16.02.2012
- developer: Ooi Boon-Sheng Unit 1-2-33, Kompleks Mayang Mall,Jalan Mayang Pasir 1,11950 Bayan Baru,Pulau Pinang MALAYSIA URL: http://www.webbytes.com.myEmail: [email protected]:+ 6012 472 9615Fax:+ 604 611 0162
- expiration_date: 16.02.2017
- mutual_recognition: CCRA
- product: Web Bytes Xilnex Framework version 3.0
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C030/ISCB-5-RPT-C030-CR-v1a.pdf
- scope: Web Bytes Xilnex Framework Version 3.0 is a distribution and synchronization platform which distributes subscribed applications to multiple clients as well performs data synchronisation between all the clients in the same group. The TOE comprises of two primary components as follows: Client Software. The client software that installs directly on each user's PC which operates the daily process and update based on the user activities. Server Software. The server software that extends client software with secure communication, identification and authentication, and data synchronization. The security functions that the TOE provides include the following: Secure Transmission – All communications between the server and the client is through an SSL channel. It protects the user data from disclosure and modification. Access control – The TOE allows users to launch only the applications they subscribed to as well as accessing the database. The TOE will check the user ID and their organization ID to ensure the applications that the user is allowed to run. Identification and Authentication – Users will have to present their credentials to the server for identification and authentication before the user is allowed to launch the applications and access the user data at the backend and at the local cache. Encryption – Username and passwords are always hashed when they are being stored into the database and during authentication. Management – The TOE contains various management functions to ensure efficient and secure management of the TOE. The TOE maintains two roles, users and administrator, to ensure that the functions are restricted to only the TOE administrator.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C030/Web%20Bytes%20EAL1%20Security%20Target%20(Xilnex%20Framework)%20v1.1.pdf
- type: Distribution and synchronization platform
- expiration_date: 16.02.2017
- level: EAL1
- product: Web Bytes Xilnex Framework version 3.0
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/152
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
st_vid10860-ci.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10860-2018: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
- Cisco:
- Cisco: 1
- Cisco Systems: 1
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20180502094021-04'00'
- /ModDate: D:20180502094021-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181723
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
st_vid10860-vr.pdf |
ISCB-5-RPT-C030-CR-v1a.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10860-2018
- cert_item: for Cisco Prime Infrastructure
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10860-2018: 1
|
- MY:
- ISCB-5-RPT-C030-CR-v1a: 29
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_ITT.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
|
| pdf_data/report_keywords/vendor |
- Cisco:
- Cisco: 69
- Cisco Systems: 2
- Cisco Systems, Inc: 3
- Microsoft:
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
- SSH:
- TLS:
- TLS:
- TLS: 1
- TLS 1.2: 1
- TLS v1.2: 1
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename |
st_vid10860-st.pdf |
Web Bytes EAL1 Security Target (Xilnex Framework) v1.1.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 2
- ASE_OBJ.1: 2
- ASE_REQ: 2
- ASE_REQ.1: 2
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG.1: 2
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.2: 7
- FCS_CKM.2.1: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP.1: 21
- FCS_COP.1.1: 4
- FCS_RBG: 1
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHS_EXT.1: 4
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT: 1
- FCS_TLSC_EXT.1: 5
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSS_EXT: 1
- FCS_TLSS_EXT.1: 5
- FCS_TLSS_EXT.1.1: 1
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.1.3: 1
- FIA:
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 10
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FMT:
- FMT_MOF.1: 17
- FMT_MOF.1.1: 4
- FMT_MTD: 3
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 2
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.2: 2
- FCS_CKM.4: 10
- FCS_CKM.4.1: 1
- FCS_COP: 11
- FCS_COP.1: 2
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 3
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 4
- FIA_UAU.2.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 4
- FPT_ITT.1.1: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- OE:
- OE.ADMIN: 1
- OE.CERTIFICATES: 1
- OE.DATABASE: 1
- OE.ENVIRONMENT: 1
- OE.INSTALL: 1
- OE.NETWORK: 1
- OE.PHYSICAL: 1
|
| pdf_data/st_keywords/vendor |
- Cisco:
- Cisco: 29
- Cisco Systems, Inc: 6
- Microsoft:
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- CBC-MAC: 1
- HMAC: 7
- HMAC-SHA-256: 1
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 2
- SHA-384: 2
- SHA-512: 1
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- SSL:
- SSL 2.0: 1
- SSL 3.0: 1
- SSL2.0: 1
- SSL3.0: 1
- TLS:
- TLS: 47
- TLS 1.0: 1
- TLS 1.1: 2
- TLS 1.2: 4
- TLS v1.2: 1
- TLS1.0: 1
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 10
- P-384: 6
- P-521: 6
- secp256r1: 4
- secp384r1: 2
- secp521r1: 3
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 4
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 140-2: 2
- FIPS PUB 186-4: 9
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-56A: 2
- NIST SP 800-56B: 1
- PKCS:
- RFC:
- RFC 2560: 1
- RFC 2818: 2
- RFC 2986: 2
- RFC 3268: 8
- RFC 4253: 1
- RFC 4492: 8
- RFC 5246: 11
- RFC 5280: 3
- RFC 5289: 8
- RFC 6125: 3
- RFC5280: 1
- RFC5759: 1
- X509:
|
- FIPS:
- FIPS 140-1: 1
- FIPS 180-2: 2
- FIPS140-1: 1
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: Rick West
- /CreationDate: D:20180427161501-04'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20180430124859-07'00'
- /Producer: Microsoft® Word 2016
- /Title: 1
- pdf_file_size_bytes: 1360582
- pdf_hyperlinks: http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
- /Author: Mahendra
- /CreationDate: D:20111229110718+08'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20111229110718+08'00'
- /Producer: Microsoft® Word 2010
- /Subject: Security Target
- /Title: Xilnex Framework
- pdf_file_size_bytes: 520561
- pdf_hyperlinks: http://en.wikipedia.org/wiki/Federal_Information_Processing_Standard, http://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology, http://en.wikipedia.org/wiki/Cryptographic_hash_function, http://en.wikipedia.org/wiki/Stream_cipher, http://www.webopedia.com/TERM/E/encryption.html, http://www.webopedia.com/TERM/C/cryptography.html, http://www.webopedia.com/TERM/K/key.html, http://www.webopedia.com/TERM/I/Internet.html, http://www.webopedia.com/TERM/P/protocol.html, http://www.webopedia.com/TERM/N/Netscape.html, http://www.microsoft.com/downloads/details.aspx?FamilyID=9cfb2d51-5ff4-4491-b0e5-b386f32c0992&displaylang=en
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |