This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
RSA Archer Suite v6.7 ISCB-5-RPT-C113-CR-v1 |
Common Criteria Protection Profile for Application Firmware of Secure Smartcard Reader for National Electronic Identity Verification System None |
|
---|---|---|
name | RSA Archer Suite v6.7 | Common Criteria Protection Profile for Application Firmware of Secure Smartcard Reader for National Electronic Identity Verification System |
category | Other Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | MY | TR |
status | active | archived |
not_valid_after | 15.10.2025 | 03.12.2018 |
not_valid_before | 15.10.2020 | 03.12.2015 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C113-CERTIFICATE-v1%20signed.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C113-CR-V1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KEC%20PP%20Certification%20Report.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RSA%20Archer%206.7_ST_v1.0_09-29-2020.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Protection%20Profile%20for%20Secure%20Smartcard%20Reader%20Application%20Firmware_v2.5.pdf |
manufacturer | RSA Security LLC | TÜBİTAK BİLGEM UEKAE |
manufacturer_web | https://rsa.com | https://www.uekae.tubitak.gov.tr |
security_level | EAL2+, ALC_FLR.2 | EAL4+, ALC_DVS.2 |
dgst | 15b820d1481c0d81 | 8555499546529d0c |
heuristics/cert_id | ISCB-5-RPT-C113-CR-v1 | |
heuristics/cpe_matches | cpe:2.3:a:rsa:archer:6.7:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2022-30585, CVE-2020-5335, CVE-2020-29537, CVE-2020-29538, CVE-2022-26951, CVE-2020-5337, CVE-2020-5333, CVE-2020-5334, CVE-2022-26947, CVE-2022-26950, CVE-2020-5331, CVE-2022-37317, CVE-2022-26949, CVE-2020-5332, CVE-2021-33615, CVE-2020-5336, CVE-2020-29536, CVE-2020-29535, CVE-2021-38362, CVE-2021-29253, CVE-2021-29252, CVE-2021-33616, CVE-2021-41594, CVE-2022-30584, CVE-2022-26948 | {} |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 | ALC_DVS.2, AVA_VAN.5 |
heuristics/extracted_versions | 6.7 | - |
pdf_data/cert_filename | ISCB-5-CERT-C113-CERTIFICATE-v1 signed.pdf | |
pdf_data/cert_keywords/cc_cert_id | ||
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | ISCB-5-RPT-C113-CR-V1.pdf | KEC PP Certification Report.pdf |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | RSA Archer 6.7_ST_v1.0_09-29-2020.pdf | Protection Profile for Secure Smartcard Reader Application Firmware_v2.5.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |