Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Senetas CN 9000 Series Ethernet Encryptors v5.5.0
647-LSS
Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252))
ANSSI-CC-2023/17
name Senetas CN 9000 Series Ethernet Encryptors v5.5.0 Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252))
category Boundary Protection Devices and Systems Mobility
scheme CA FR
not_valid_after 25.03.2030 27.03.2028
not_valid_before 25.03.2025 27.03.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/647-LSS%20CT%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_17.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/647-LSS%20CR%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_17fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/647-LSS%20ST%20v1.6.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_17en.pdf
manufacturer Senetas Corporation Ltd, Distributed by Thales SA (SafeNet) Apple Inc.
manufacturer_web https://www.senetas.com/ https://www.apple.com/
security_level EAL2+, ALC_FLR.2 ALC_FLR.3, ADV_FSP.3, EAL2+
dgst 16c27ef58ce2612f cb2e15c281fc9c89
heuristics/cert_id 647-LSS ANSSI-CC-2023/17
heuristics/cpe_matches {} cpe:2.3:o:apple:watchos:8.5:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2022-32875, CVE-2025-24137, CVE-2023-32428, CVE-2023-40448, CVE-2024-23288, CVE-2024-23207, CVE-2024-40812, CVE-2024-54505, CVE-2023-32391, CVE-2024-44171, CVE-2023-27928, CVE-2023-32416, CVE-2025-31226, CVE-2024-23225, CVE-2022-26702, CVE-2024-54497, CVE-2023-32354, CVE-2023-42846, CVE-2023-42946, CVE-2022-46695, CVE-2024-27816, CVE-2024-40813, CVE-2023-40417, CVE-2024-44254, CVE-2023-42823, CVE-2024-40857, CVE-2022-42813, CVE-2022-32907, CVE-2023-27931, CVE-2024-44233, CVE-2022-48618, CVE-2022-46690, CVE-2024-54499, CVE-2024-44232, CVE-2022-32866, CVE-2022-32932, CVE-2024-27820, CVE-2024-54512, CVE-2024-54526, CVE-2023-42890, CVE-2022-32899, CVE-2024-27826, CVE-2023-32402, CVE-2023-38580, CVE-2023-38596, CVE-2024-23218, CVE-2022-32888, CVE-2023-32423, CVE-2024-23206, CVE-2023-38136, CVE-2022-26768, CVE-2023-37450, CVE-2024-54500, CVE-2023-40452, CVE-2023-40395, CVE-2023-40429, CVE-2023-23499, CVE-2024-54560, CVE-2024-54510, CVE-2024-40793, CVE-2023-41984, CVE-2023-32404, CVE-2024-23287, CVE-2022-32815, CVE-2024-44296, CVE-2024-54534, CVE-2024-54479, CVE-2024-54468, CVE-2024-54508, CVE-2024-23296, CVE-2024-23286, CVE-2023-42970, CVE-2021-36690, CVE-2023-32389, CVE-2023-32441, CVE-2024-44274, CVE-2025-31217, CVE-2023-38604, CVE-2023-40432, CVE-2023-32390, CVE-2023-34352, CVE-2022-32824, CVE-2023-42949, CVE-2023-42947, CVE-2023-42898, CVE-2022-32947, CVE-2022-42852, CVE-2022-32858, CVE-2023-23517, CVE-2024-27811, CVE-2022-37434, CVE-2025-31205, CVE-2022-42837, CVE-2022-26700, CVE-2023-32388, CVE-2024-40788, CVE-2022-32913, CVE-2023-42888, CVE-2025-43200, CVE-2024-44185, CVE-2023-38594, CVE-2024-44273, CVE-2023-41174, CVE-2022-32924, CVE-2023-42852, CVE-2022-32825, CVE-2024-44170, CVE-2023-32412, CVE-2023-40412, CVE-2023-32433, CVE-2024-23208, CVE-2022-26757, CVE-2022-32813, CVE-2023-41071, CVE-2024-27851, CVE-2024-54467, CVE-2023-32403, CVE-2022-26711, CVE-2023-40408, CVE-2022-32814, CVE-2025-24123, CVE-2022-42859, CVE-2023-42862, CVE-2022-32883, CVE-2024-54551, CVE-2022-42808, CVE-2023-23535, CVE-2025-31233, CVE-2024-40776, CVE-2024-54501, CVE-2024-44239, CVE-2022-32845, CVE-2023-27933, CVE-2023-41976, CVE-2024-27810, CVE-2024-23282, CVE-2025-24085, CVE-2024-40777, CVE-2024-23204, CVE-2024-40780, CVE-2022-42863, CVE-2025-31239, CVE-2024-44194, CVE-2022-32820, CVE-2024-40782, CVE-2023-42866, CVE-2023-32425, CVE-2022-26765, CVE-2024-40805, CVE-2023-41254, CVE-2024-40789, CVE-2024-27805, CVE-2024-40850, CVE-2024-54513, CVE-2024-23231, CVE-2025-31241, CVE-2025-24162, CVE-2023-41073, CVE-2023-40456, CVE-2024-44255, CVE-2024-44234, CVE-2022-46691, CVE-2022-46692, CVE-2022-32940, CVE-2023-42878, CVE-2023-28191, CVE-2023-38611, CVE-2023-42848, CVE-2022-40304, CVE-2024-23239, CVE-2023-27954, CVE-2023-40528, CVE-2025-31215, CVE-2022-42866, CVE-2024-54658, CVE-2022-32908, CVE-2024-44191, CVE-2023-38572, CVE-2024-23250, CVE-2023-32409, CVE-2025-24131, CVE-2023-40396, CVE-2023-32373, CVE-2024-54538, CVE-2025-24117, CVE-2022-32821, CVE-2023-23504, CVE-2024-23210, CVE-2022-32911, CVE-2023-40413, CVE-2024-27834, CVE-2024-44282, CVE-2024-54518, CVE-2022-26764, CVE-2022-32835, CVE-2023-41070, CVE-2022-42801, CVE-2022-42811, CVE-2025-31203, CVE-2022-26709, CVE-2023-42865, CVE-2023-32396, CVE-2022-42867, CVE-2025-31251, CVE-2024-27821, CVE-2022-42864, CVE-2023-32394, CVE-2023-23511, CVE-2024-40836, CVE-2025-24111, CVE-2024-44169, CVE-2023-40420, CVE-2024-40779, CVE-2023-41997, CVE-2022-26714, CVE-2024-44240, CVE-2024-44176, CVE-2025-31221, CVE-2023-40400, CVE-2024-44269, CVE-2024-23284, CVE-2023-40520, CVE-2023-36495, CVE-2024-40787, CVE-2024-44244, CVE-2022-46694, CVE-2023-32413, CVE-2023-41068, CVE-2023-27932, CVE-2024-27823, CVE-2023-28202, CVE-2023-27929, CVE-2022-32914, CVE-2023-32384, CVE-2024-54486, CVE-2023-40409, CVE-2023-38606, CVE-2025-24184, CVE-2023-32424, CVE-2024-44302, CVE-2023-38593, CVE-2024-27814, CVE-2023-32372, CVE-2024-40824, CVE-2024-23289, CVE-2024-27880, CVE-2023-35993, CVE-2023-40399, CVE-2025-31206, CVE-2022-42799, CVE-2023-27937, CVE-2023-40419, CVE-2022-32826, CVE-2022-32817, CVE-2023-32392, CVE-2022-26766, CVE-2023-41982, CVE-2025-31212, CVE-2023-23502, CVE-2024-54478, CVE-2024-27828, CVE-2023-23527, CVE-2024-27801, CVE-2023-27956, CVE-2023-32432, CVE-2024-23278, CVE-2023-32398, CVE-2023-42953, CVE-2024-40835, CVE-2022-2294, CVE-2025-31223, CVE-2024-27884, CVE-2024-23235, CVE-2024-23246, CVE-2023-40410, CVE-2024-27815, CVE-2022-32787, CVE-2024-44183, CVE-2025-24126, CVE-2023-41074, CVE-2023-42893, CVE-2022-32816, CVE-2025-24161, CVE-2023-32408, CVE-2025-24223, CVE-2024-54541, CVE-2024-23251, CVE-2023-38598, CVE-2024-23213, CVE-2025-24251, CVE-2022-32894, CVE-2025-31222, CVE-2023-38595, CVE-2025-31209, CVE-2024-23226, CVE-2023-32434, CVE-2022-32944, CVE-2023-39434, CVE-2024-23271, CVE-2022-32903, CVE-2024-23212, CVE-2022-46689, CVE-2024-23223, CVE-2024-27840, CVE-2024-23297, CVE-2023-42936, CVE-2023-42839, CVE-2022-42823, CVE-2023-42875, CVE-2024-44297, CVE-2024-54525, CVE-2022-22675, CVE-2025-24129, CVE-2022-26716, CVE-2022-32889, CVE-2024-23254, CVE-2024-44155, CVE-2022-32793, CVE-2024-44192, CVE-2025-31219, CVE-2022-32810, CVE-2024-23265, CVE-2025-24189, CVE-2023-23512, CVE-2024-23291, CVE-2022-26710, CVE-2025-24163, CVE-2023-40427, CVE-2024-54527, CVE-2024-40818, CVE-2022-42803, CVE-2023-23505, CVE-2025-24149, CVE-2024-23280, CVE-2024-54502, CVE-2024-40784, CVE-2023-32734, CVE-2023-41988, CVE-2024-27859, CVE-2022-46700, CVE-2024-40785, CVE-2023-38565, CVE-2022-32792, CVE-2023-32420, CVE-2022-32840, CVE-2023-42957, CVE-2023-32361, CVE-2023-28185, CVE-2024-44225, CVE-2024-40799, CVE-2023-23524, CVE-2023-23537, CVE-2022-32847, CVE-2024-27806, CVE-2024-54494, CVE-2024-40815, CVE-2023-40414, CVE-2023-32381, CVE-2023-34425, CVE-2022-32928, CVE-2025-24107, CVE-2023-27963, CVE-2023-38599, CVE-2025-24158, CVE-2023-27969, CVE-2022-48503, CVE-2023-41990, CVE-2023-23496, CVE-2024-44278, CVE-2023-38600, CVE-2022-23308, CVE-2022-46705, CVE-2023-32400, CVE-2024-54522, CVE-2022-26726, CVE-2023-28181, CVE-2024-44212, CVE-2022-42849, CVE-2023-35074, CVE-2024-27856, CVE-2022-48610, CVE-2023-42834, CVE-2023-38133, CVE-2024-54517, CVE-2023-23519, CVE-2023-41061, CVE-2024-40806, CVE-2023-23500, CVE-2024-27800, CVE-2024-54543, CVE-2022-42795, CVE-2022-32891, CVE-2022-46696, CVE-2023-27961, CVE-2022-32844, CVE-2023-42942, CVE-2022-32788, CVE-2022-42825, CVE-2023-42937, CVE-2023-32368, CVE-2022-42817, CVE-2025-24160, CVE-2023-42950, CVE-2024-23217, CVE-2024-40822, CVE-2024-44285, CVE-2022-32854, CVE-2022-46699, CVE-2024-0258, CVE-2022-42842, CVE-2023-42849, CVE-2023-40424, CVE-2024-54542, CVE-2022-26981, CVE-2024-23290, CVE-2024-44198, CVE-2022-32841, CVE-2022-42845, CVE-2023-27930, CVE-2022-42865, CVE-2024-23263, CVE-2025-24086, CVE-2024-44215, CVE-2023-35984, CVE-2023-32393, CVE-2022-26717, CVE-2022-42824, CVE-2022-32879, CVE-2022-42798, CVE-2025-31238, CVE-2024-44144, CVE-2023-38590, CVE-2023-42899, CVE-2023-28204, CVE-2022-40303, CVE-2022-32898, CVE-2023-41968, CVE-2024-54535, CVE-2024-40795, CVE-2023-32352, CVE-2025-31204, CVE-2023-23503, CVE-2023-42914, CVE-2022-32864, CVE-2022-32925, CVE-2022-42843, CVE-2024-27804, CVE-2022-26706, CVE-2023-27942, CVE-2024-23201, CVE-2024-54514, CVE-2022-32881, CVE-2024-27863, CVE-2022-32926, CVE-2023-35990, CVE-2022-26771, CVE-2025-31257, CVE-2023-40454, CVE-2022-1622, CVE-2025-31262, CVE-2023-40447, CVE-2023-32407, CVE-2023-32399, CVE-2025-24159, CVE-2022-26763, CVE-2023-23518, CVE-2022-32857, CVE-2023-38592, CVE-2024-54530, CVE-2024-44187, CVE-2024-40829, CVE-2024-27808, CVE-2023-32417, CVE-2025-31208, CVE-2024-27832, CVE-2024-40809, CVE-2024-27838, CVE-2024-23293, CVE-2023-41065, CVE-2023-40403, CVE-2022-32819, CVE-2023-32445, CVE-2025-24144, CVE-2025-24124, CVE-2022-32832, CVE-2022-43454, CVE-2024-40774, CVE-2024-23215, CVE-2022-26719, CVE-2023-32438, CVE-2024-54523, CVE-2022-32823, CVE-2022-32923, CVE-2024-23211, CVE-2024-44290, CVE-2023-32376, CVE-2023-32357, CVE-2022-32790, CVE-2022-42800, CVE-2023-42883, CVE-2022-46698, CVE-2023-41981, CVE-2024-27830, CVE-2022-32839, CVE-2022-46693, CVE-2022-32870
heuristics/extracted_sars AGD_OPE.1, ASE_ECD.1, ADV_FSP.2, ALC_DEL.1, ALC_CMS.2, ADV_ARC.1, ATE_COV.1, AVA_VAN.2, ASE_SPD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ATE_IND.2, ADV_TDS.1, ASE_TSS.1, ATE_FUN.1, AGD_PRE.1, ALC_CMC.2, ALC_FLR.2 AGD_OPE.1, ASE_ECD.1, ADV_FSP.3, ALC_DEL.1, ALC_CMS.2, ADV_ARC.1, ATE_COV.1, AVA_VAN.2, ASE_SPD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ATE_IND.2, ADV_TDS.1, ALC_FLR.3, ASE_TSS.1, ATE_FUN.1, AGD_PRE.1, ALC_CMC.2
heuristics/extracted_versions 5.5.0 8.5.1
heuristics/scheme_data
  • certification_date: 25.03.2025
  • level: EAL 2+ (ALC_FLR.2)
  • product: Senetas CN 9000 Series Ethernet Encryptors v5.5.0 Senetas CN 9000 Series Ethernet Encryptors v5.5.1 (June 2025)
  • vendor: Senetas Corporation Ltd., distributed by Thales SA (Safenet)
maintenance_updates
pdf_data/cert_filename 647-LSS CT v1.0.pdf certificat-cc-2023_17.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 647-LSS: 1
  • FR:
    • ANSSI-CC-2023/17: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2+: 1
  • EAL:
    • EAL2: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_keywords/vendor
  • Thales:
    • Thales SA: 1
pdf_data/cert_keywords/eval_facility
  • Lightship:
    • Lightship Security: 1
pdf_data/cert_metadata
  • /Author: Clark, Cory P.
  • /Comments:
  • /Company: CSEC-CSTC
  • /CreationDate: D:20250331163040-04'00'
  • /Creator: Acrobat PDFMaker 25 for Word
  • /Keywords:
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: 03c3dcc6-6bfd-4194-a625-fb83b8d0389e
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2023-05-16T11:46:20Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250331163041-04'00'
  • /Producer: Adobe PDF Library 25.1.211
  • /SourceModified:
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 367156
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 647-LSS CR v1.0.pdf anssi-cc-2023_17fr.pdf
pdf_data/report_frontpage
  • FR:
  • CA:
  • FR:
  • CA:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/17: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2+: 1
  • EAL:
    • EAL2: 3
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.2: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 2
pdf_data/report_keywords/vendor
  • Thales:
    • Thales: 2
    • Thales SA: 2
pdf_data/report_keywords/eval_facility
  • Lightship:
    • Lightship Security: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_library
  • Generic:
    • Crypto Library v5.5.0: 1
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
  • /Author: Clark, Cory P.
  • /Company: CSEC-CSTC
  • /ContentTypeId: 0x01010079E4DFC5E31A0F4FA8ED3514A1970A59
  • /CreationDate: D:20250331162937-04'00'
  • /Creator: Acrobat PDFMaker 25 for Word
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: f4235719-a1a3-4fb4-8b18-a47ac84bac11
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2022-07-20T10:41:47Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250331162946-04'00'
  • /Producer: Adobe PDF Library 25.1.211
  • /SourceModified:
  • pdf_file_size_bytes: 538550
  • pdf_hyperlinks: https://web.nvd.nist.gov/view/vuln/search, https://www.cisa.gov/known-exploited-vulnerabilities-catalog, mailto:[email protected], https://openssl-library.org/news/vulnerabilities-1.1.1/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename 647-LSS ST v1.6.pdf anssi-cible-cc-2023_17en.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL2+: 2
  • EAL:
    • EAL 2: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 2
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.3: 3
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FCS:
    • FCS_CKM: 69
    • FCS_CKM.1: 16
    • FCS_CKM.2: 6
    • FCS_CKM.4: 16
    • FCS_COP: 63
    • FCS_COP.1: 7
    • FCS_SMC_EXT: 1
    • FCS_SMC_EXT.1: 12
    • FCS_SMC_EXT.1.1: 2
  • FDP:
    • FDP_ACC.1: 4
    • FDP_DAU.1: 6
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_IFC: 12
    • FDP_IFC.1: 8
    • FDP_IFF: 12
    • FDP_IFF.1: 12
    • FDP_IFF.1.3: 1
    • FDP_ITC.1: 13
    • FDP_ITC.2: 19
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_UCT.1: 6
    • FDP_UCT.1.1: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC: 13
    • FTP_ITC.1: 8
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 11
    • FDP_ACC.2: 4
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 16
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 7
    • FDP_ETC.2: 2
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_IFC.1: 8
    • FDP_ITC: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 8
    • FIA_AFL.1: 5
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 12
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 8
    • FPT_RPL.1: 6
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.NET_LOCATION: 3
    • A.PHYSICAL: 2
  • D:
    • D.MASTER_KEY: 1
  • O:
    • O.ADMIN_AUTH: 4
    • O.AUDIT: 7
    • O.DATA_PROTECTION: 7
    • O.DEVICE_AUTH: 4
    • O.MGMT_PROTECT: 7
    • O.SECURE_STATE: 4
  • OE:
    • OE.PERSONNEL: 3
    • OE.PHYSICAL: 3
    • OE.SETUP: 3
  • T:
    • T.ADMIN_ATTACK: 2
    • T.DATA_ACCESS: 3
    • T.ROGUE_DEVICE: 3
  • A:
    • A.CDCVM: 3
    • A.DEVICE_AUTH: 3
    • A.IPHONE_USER: 3
    • A.PERSO: 3
  • D:
    • D.OS: 16
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • OT:
    • OT.-: 1
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIMMING: 2
    • T.USURP: 2
pdf_data/st_keywords/vendor
  • Thales:
    • Thales: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 21
  • constructions:
    • MAC:
      • HMAC: 2
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 3
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 20
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 6
  • RSA:
    • RSA-OAEP: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 5
      • SHA-384: 3
      • SHA-512: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 9
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 31
    • SSHv2: 2
  • TLS:
    • TLS:
      • TLS: 22
      • TLS v1.2: 2
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/st_keywords/cipher_mode
  • CFB:
    • CFB: 2
  • CTR:
    • CTR: 5
  • GCM:
    • GCM: 5
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-256: 4
    • P-256: 10
    • P-384: 12
    • P-521: 14
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 3
    • FIPS PUB 197: 3
    • FIPS PUB 198-1: 1
  • NIST:
    • NIST SP 800-56B: 1
  • PKCS:
    • PKCS#1: 1
    • PKCS#3: 2
  • RFC:
    • RFC2574: 1
  • X509:
    • X.509: 10
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 140-3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • to return to its User. Note: Defending against device re-use after phys- ical compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker: 1
pdf_data/st_metadata
  • /Author: Lachlan Turner
  • /CreationDate: D:20250321121532-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20250321121532-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: CN 9000 Series Ethernet Encryptors v5.5.0
  • /Title: Senetas
  • pdf_file_size_bytes: 797624
  • pdf_hyperlinks: https://support.senetas.com/, http://www.lightshipsec.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 50
state/cert/convert_garbage True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/extract_ok True False
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different