Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Oracle Linux 7.6
519-EWA
eTugra SAM v1.4
OCSI/CERT/CCL/01/2023/RC
name Oracle Linux 7.6 eTugra SAM v1.4
category Operating Systems Products for Digital Signatures
scheme CA IT
not_valid_after 19.07.2026 16.04.2029
not_valid_before 19.07.2021 16.04.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/519-EWA%20CT%20v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_FP_etugra_sam_14_v1.0_en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/519-EWA%20CR%20v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_etugra_sam_14_v1.0_en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/519-EWA%20ST%20v4.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_etugra_sam_14_v10.pdf
manufacturer Oracle Corporation E-Tugra EBG Information Technologies and Services Joint Stock Company
manufacturer_web https://www.oracle.com https://e-tugra.com.tr/
security_level {} EAL4+, AVA_VAN.5
dgst 16c96cc56b6d0f5a f4885e7bbdd8eb7d
heuristics/cert_id 519-EWA OCSI/CERT/CCL/01/2023/RC
heuristics/direct_transitive_cves {} CVE-2022-36986, CVE-2022-36997, CVE-2022-42301, CVE-2022-36984, CVE-2022-42299, CVE-2022-42304, CVE-2022-36999, CVE-2022-42307, CVE-2022-36992, CVE-2022-42305, CVE-2022-36988, CVE-2022-37000, CVE-2022-36995, CVE-2022-36996, CVE-2022-36991, CVE-2022-36990, CVE-2022-36985, CVE-2022-36987, CVE-2021-41570, CVE-2022-42300, CVE-2022-42302, CVE-2022-36998, CVE-2022-36989, CVE-2022-42303, CVE-2022-36993, CVE-2022-36994, CVE-2023-28759
heuristics/indirect_transitive_cves {} CVE-2022-36986, CVE-2022-36997, CVE-2022-42301, CVE-2022-36984, CVE-2022-42299, CVE-2022-42304, CVE-2022-36999, CVE-2022-42307, CVE-2022-36992, CVE-2022-42305, CVE-2022-36988, CVE-2022-37000, CVE-2022-36995, CVE-2022-36996, CVE-2022-36991, CVE-2022-36990, CVE-2022-36985, CVE-2022-36987, CVE-2021-41570, CVE-2022-42300, CVE-2022-42302, CVE-2022-36998, CVE-2022-36989, CVE-2022-42303, CVE-2022-36993, CVE-2022-36994, CVE-2023-28759
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 7.6 1.4
heuristics/report_references/directly_referenced_by {} OCSI/CERT/CCL/01/2022/RC
heuristics/report_references/directly_referencing {} OCSI/CERT/CCL/13/2021/RC
heuristics/report_references/indirectly_referenced_by {} OCSI/CERT/CCL/01/2022/RC
heuristics/report_references/indirectly_referencing {} OCSI/CERT/CCL/13/2021/RC
heuristics/scheme_data
  • certification_date: 19.07.2021
  • level: PP_OS_V4.2.1 PP_SSH_EP_v1.0
  • product: Oracle Linux 7.6
  • vendor: Oracle Corporation
  • certification_date: 16.04.2024
  • level: EAL4+
  • report_link_en: https://www.ocsi.gov.it/documenti/certificazioni/eTugra/cr_etugra_sam_14_v1.0_en.pdf
  • report_link_it: https://www.ocsi.gov.it/documenti/certificazioni/eTugra/rc_etugra_sam_14_v.1.0_it.pdf
  • supplier: E-Tugra EBG Information Technologies and Services Joint Stock Company
  • target_link: https://www.ocsi.gov.it/documenti/certificazioni/eTugra/st_etugra_sam_14_v10.pdf
  • title: eTugra SAM v1.4
heuristics/protection_profiles e34797b67a3163c5, 236bced46aeb26ba eabbd431e1f174cd
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ssh_ep_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf
pdf_data/cert_filename 519-EWA CT v1.1.pdf cr_FP_etugra_sam_14_v1.0_en.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 519-EWA: 1
  • IT:
    • OCSI/CERT/CCL/01/2023/RC: 1
    • OCSI/CERT/CCL/13/2021/RC: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL4: 2
    • EAL4+: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
pdf_data/cert_metadata
  • /CreationDate: D:20190122115136-04'00'
  • /Creator: Adobe Illustrator CC 22.0 (Windows)
  • /ModDate: D:20210723190041-04'00'
  • /Producer: Adobe PDF library 15.00
  • /Title: cyber-centre-product-evaluation-certificate-e-bg
  • pdf_file_size_bytes: 1715417
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Tiziano Inzerilli
  • /CreationDate: D:20240419162007+02'00'
  • /ModDate: D:20240419162007+02'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Certification Report "eTugra SAM v1.4".pdf
  • pdf_file_size_bytes: 373181
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 519-EWA CR v1.1.pdf cr_etugra_sam_14_v1.0_en.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 519-EWA: 1
  • IT:
    • OCSI/CERT/CCL/01/2023/RC: 25
    • OCSI/CERT/CCL/13/2021/RC: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4+: 4
    • EAL2: 4
    • EAL4: 10
    • EAL4 augmented: 3
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • O:
    • O.J: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • CCLab:
    • CCLab Software Laboratory: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 3
    • SHA2:
      • SHA2: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 4
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. The user of the OS is not willfully negligent or hostile, and uses the software in: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: OCSI
  • /CreationDate: D:20240416084741+02'00'
  • /Creator: Microsoft® Word per Microsoft 365
  • /ModDate: D:20240416084741+02'00'
  • /Producer: Microsoft® Word per Microsoft 365
  • /Title: Certification Report "eTugra SAM v1.4"
  • pdf_file_size_bytes: 656782
  • pdf_hyperlinks: https://www.sogis.eu/, https://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename 519-EWA ST v4.0.pdf st_etugra_sam_14_v10.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
    • ALC_TSU_EXT: 1
    • ALC_TSU_EXT.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 1
    • AGD_PRE: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 1
  • FCS:
    • FCS_CKM.1: 4
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 1
    • FCS_CKM_EXT.4: 9
    • FCS_CKM_EXT.4.1: 3
    • FCS_CKM_EXT.4.2: 2
    • FCS_COP.1: 26
    • FCS_COP.1.1: 6
    • FCS_DTLS_EXT.1: 1
    • FCS_RBG_EXT.1: 8
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SSHC_EXT.1: 8
    • FCS_SSHC_EXT.1.1: 4
    • FCS_SSHC_EXT.1.2: 3
    • FCS_SSHC_EXT.1.3: 3
    • FCS_SSHC_EXT.1.4: 3
    • FCS_SSHC_EXT.1.5: 3
    • FCS_SSHC_EXT.1.6: 3
    • FCS_SSHC_EXT.1.7: 3
    • FCS_SSHC_EXT.1.8: 3
    • FCS_SSHS_EXT.1: 7
    • FCS_SSHS_EXT.1.1: 4
    • FCS_SSHS_EXT.1.2: 3
    • FCS_SSHS_EXT.1.3: 3
    • FCS_SSHS_EXT.1.4: 5
    • FCS_SSHS_EXT.1.5: 3
    • FCS_SSHS_EXT.1.6: 3
    • FCS_SSHS_EXT.1.7: 3
    • FCS_SSH_EXT.1: 8
    • FCS_SSH_EXT.1.1: 2
    • FCS_STO_EXT.1: 9
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 10
    • FCS_TLSC_EXT.1.1: 4
    • FCS_TLSC_EXT.1.2: 3
    • FCS_TLSC_EXT.1.3: 3
    • FCS_TLSC_EXT.2: 3
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACF_EXT.1: 8
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT.1: 7
    • FDP_IFC_EXT.1.1: 2
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 7
    • FMT_MOF_EXT.1.1: 2
    • FMT_SMF_EXT.1: 7
    • FMT_SMF_EXT.1.1: 4
  • FPT:
    • FPT_ACF_EXT.1: 7
    • FPT_ACF_EXT.1.1: 2
    • FPT_ACF_EXT.1.2: 2
    • FPT_ASLR_EXT.1: 7
    • FPT_ASLR_EXT.1.1: 2
    • FPT_SBOP_EXT.1: 8
    • FPT_SBOP_EXT.1.1: 2
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 3
    • FPT_TUD_EXT.2: 6
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
  • FTP:
    • FTP_ITC_EXT.1: 7
    • FTP_ITC_EXT.1.1: 2
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
  • FCS:
    • FCS_CKM: 25
    • FCS_CKM.1: 17
    • FCS_CKM.2: 6
    • FCS_CKM.4: 29
    • FCS_CKM.4.1: 1
    • FCS_COP: 26
    • FCS_COP.1: 14
    • FCS_RNG: 3
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 91
    • FDP_ACC.1: 43
    • FDP_ACF: 60
    • FDP_ACF.1: 49
    • FDP_ETC: 15
    • FDP_ETC.2: 8
    • FDP_IFC: 29
    • FDP_IFC.1: 24
    • FDP_IFF: 15
    • FDP_IFF.1: 14
    • FDP_ITC: 15
    • FDP_ITC.1: 12
    • FDP_ITC.2: 22
    • FDP_UCT.1: 7
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 11
    • FIA_AFL.1: 1
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_UAU: 15
    • FIA_UAU.1: 5
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 4
    • FIA_UID.1: 5
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
    • FIA_USB.1: 18
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 2
    • FIA_USB.1.3: 1
    • FIA_UTD.1: 1
  • FMT:
    • FMT_MSA: 38
    • FMT_MSA.1: 10
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 26
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.2: 13
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_PHP.1: 11
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 14
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TRP: 2
  • FTP:
    • FTP_ITC: 8
    • FTP_ITC.1: 11
    • FTP_TDC.1: 2
    • FTP_TRP: 24
    • FTP_TRP.1: 15
pdf_data/st_keywords/cc_claims
  • A:
    • A.PLATFORM: 3
    • A.PROPER_ADMIN: 3
    • A.PROPER_USER: 3
  • O:
    • O.ACCOUNTABILITY: 3
    • O.INTEGRITY: 5
    • O.MANAGEMENT: 5
    • O.PROTECTED_COMMS: 5
    • O.PROTECTED_STORAGE: 3
  • OE:
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 2
    • T.LOCAL_ATTACK: 2
    • T.NETWORK_ATTACK: 6
    • T.NETWORK_EAVESDROP: 4
  • A:
    • A.ACCESS_PROTECTED: 4
    • A.AUTH_DATA: 4
    • A.CA: 4
    • A.PRIVILEGED_USER: 4
    • A.SEC_REQ: 4
    • A.SIGNER_AUTHENTICATION_DATA_PROTECTION: 4
    • A.SIGNER_DEVICE: 4
    • A.SIGNER_ENROLMENT: 4
    • A.TSP_AUDITED: 4
  • OE:
    • OE.CA_REQUEST_CERTIFICATE: 4
    • OE.CERTIFICATE_VERFICATION: 2
    • OE.CERTIFICATE_VERIFICATION: 1
    • OE.CRYPTOMODULE_CERTIFIED: 5
    • OE.DELEGATED_AUTHENTICATION: 3
    • OE.DEVICE: 10
    • OE.ENV: 9
    • OE.SIGNER_AUTHENTICATION_DATA: 6
    • OE.SVD_AUTHENTICITY: 5
  • OSP:
    • OSP.CRYPTO: 4
    • OSP.RANDOM: 5
  • OT:
    • OT.AUDIT_PROTECTION: 5
    • OT.CRYPTO: 6
    • OT.DTBSR_INTEGRITY: 4
    • OT.PRIVILEGED_USER_AUTHENTICATION: 6
    • OT.PRIVILEGED_USER_MANAGEMENT: 19
    • OT.PRIVILEGED_USER_PROTECTION: 18
    • OT.RANDOM: 20
    • OT.REFERENCE_SIGNER_AUTHENTICATION_DATA: 7
    • OT.SAD_VERIFICATION: 18
    • OT.SAP: 8
    • OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION: 19
    • OT.SIGNATURE_INTEGRITY: 18
    • OT.SIGNER_KEY_PAIR_GENERATION: 19
    • OT.SIGNER_MANAGEMENT: 5
    • OT.SIGNER_PROTECTION: 20
    • OT.SVD: 4
    • OT.SYSTEM_PROTECTION: 19
  • R:
    • R.AUDIT: 2
    • R.RANDOM: 2
    • R.SAD: 27
    • R.SVD: 42
    • R.TSF_DATA: 11
  • T:
    • T.ADMIN_IMPERSONATION: 8
    • T.AUDIT_ALTERATION: 7
    • T.AUTHENTICATION_SIGNER_IMPERSONATION: 10
    • T.AUTHORISATION_DATA_DISCLOSE: 3
    • T.AUTHORISATION_DATA_UPDATE: 10
    • T.CONTEXT_ALTERATION: 11
    • T.DTBSR_FORGERY: 7
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_: 1
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCL: 2
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED: 3
    • T.ENROLMENT_SIGNER_IMPERSONATION: 10
    • T.MAINTENANCE_AUTHENTICATION_DISCLOSE: 6
    • T.PRIVILEGED_USER_INSERTION: 10
    • T.RANDOM: 9
    • T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_: 1
    • T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DA: 1
    • T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION: 2
    • T.SAD_FORGERY: 6
    • T.SAP_BYPASS: 7
    • T.SAP_REPLAY: 7
    • T.SIGNATURE_FORGERY: 7
    • T.SIGNATURE_REQUEST_DISCLOSURE: 7
    • T.SIGNER_AUTHENTICATION_DATA_MODIFIED: 6
    • T.SVD_FORGERY: 8
pdf_data/st_keywords/vendor
  • Thales:
    • Thales: 4
pdf_data/st_keywords/eval_facility
  • Acumen:
    • Acumen Security: 3
  • CCLab:
    • CCLab Software Laboratory: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 18
  • constructions:
    • MAC:
      • HMAC: 7
      • HMAC-SHA-256: 1
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • HMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 8
    • DSA:
      • DSA: 2
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 6
  • RSA:
    • RSA 2048: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
      • SHA1: 18
    • SHA2:
      • SHA-256: 8
      • SHA-384: 7
      • SHA-512: 7
      • SHA2: 12
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 2
      • SHA224: 2
      • SHA256: 7
      • SHA384: 3
      • SHA512: 5
    • SHA3:
      • SHA-3: 1
      • SHA3-224: 4
      • SHA3-256: 3
      • SHA3-384: 5
      • SHA3-512: 5
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 14
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 5
  • SSH:
    • SSH: 130
    • SSHv2: 2
  • TLS:
    • DTLS:
      • DTLS: 2
    • TLS:
      • TLS: 32
      • TLS 1.2: 3
      • TLS v1.2: 5
  • VPN:
    • VPN: 13
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
  • RNG:
    • RBG: 5
  • RNG:
    • RNG: 9
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 3
  • XTS:
    • XTS: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • secp256r1: 1
    • secp384r1: 1
    • secp521r1: 1
  • Brainpool:
    • brainpoolP224r1: 2
    • brainpoolP256r1: 2
    • brainpoolP256t1: 2
    • brainpoolP320r1: 2
    • brainpoolP320t1: 2
    • brainpoolP384r1: 2
    • brainpoolP384t1: 2
    • brainpoolP512r1: 2
    • brainpoolP512t1: 2
  • NIST:
    • NIST P-256: 2
    • P-256: 2
    • P-384: 2
    • P-521: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 4
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 4
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 4
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 19
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
  • SCA:
    • side-channels: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 186-4: 12
  • NIST:
    • NIST SP 800-38A: 8
    • NIST SP 800-38D: 4
    • NIST SP 800-38E: 4
    • NIST SP 800-56B: 1
    • NIST SP 800-57: 4
  • RFC:
    • RFC 3526: 6
    • RFC 4251: 3
    • RFC 4253: 7
    • RFC 5246: 18
    • RFC 5280: 5
    • RFC 5288: 4
    • RFC 5289: 8
    • RFC 5759: 3
    • RFC 6066: 1
    • RFC 6125: 3
    • RFC 6960: 1
    • RFC 6961: 1
    • RFC 8017: 3
  • X509:
    • X.509: 16
  • BSI:
    • AIS 20: 2
    • AIS 31: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 3
  • FIPS:
    • FIPS 140-3: 1
    • FIPS 186-5: 7
    • FIPS 202: 1
    • FIPS PUB 140-3: 1
    • FIPS PUB 186-5: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 19790: 8
    • ISO/IEC 19790:2012: 1
  • PKCS:
    • PKCS#1: 5
  • RFC:
    • RFC 5639: 4
    • RFC 6151: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
  • OutOfScope:
    • out of scope: 1
    • used to authenticate the signer are managed by the IdP or mobile application via SSA and are thus out of scope of this ST. 145 [selection: [assignment: the rules describing how delegated authentication is: 1
pdf_data/st_metadata
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different