name |
Fortinet FortiManager 5.6.6 build 7352 190510 (EAL4+) |
Carte VITALE 2 - Application ADELE : Composant AT90SC24036RCV masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
FR |
status |
active |
archived |
not_valid_after |
29.05.2025 |
01.09.2019 |
not_valid_before |
29.05.2020 |
22.05.2013 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-Diploma.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-INF-3131.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-15fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-15en.pdf |
manufacturer |
Fortinet, Inc. |
MORPHO/Inside Secure |
manufacturer_web |
https://www.fortinet.com/ |
https://www.morpho.com |
security_level |
EAL4+, ALC_FLR.3 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
27ade261a5b0a226 |
c6f1c5409411df59 |
heuristics/cert_id |
2017-48-INF-3131 |
ANSSI-CC-2013/15 |
heuristics/cert_lab |
[] |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
AGD_PRE.1, AVA_VAN.5, ALC_DVS.2, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ADV_FSP.2, ADV_IMP.1 |
heuristics/extracted_versions |
5.6.6 |
1.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2012/08 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2012/08 |
heuristics/scheme_data |
- category: Others
- certification_date: 29.05.2020
- enhanced:
- category: Others
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=939
- certification_date: 29.05.2020
- description: TOE Overview The TOE provides network management to one or more Fortinet network security devices. Authorized administrators are able to configure and manage devices, using functions that include verification and update of firmware and license information. Administrators can create and modify policies and objects and push them to the devices. The TOE is able to retrieve up-to-date antivirus and intrusion prevention signatures from Fortinet’s FortiGuard service to push to the managed devices. The TOE is capable of grouping devices into administrative domains (ADOMs), which simplifies the application of policies, distribution of content security and firmware updates for large implementations. ADOMs are implemented in the evaluated configuration. The TOE has extensive logging capabilities which include the logging of administrative actions and logging of use of the trusted cryptographic channels. The TOE is a software only TOE. It is supported by the FortiManager appliance hardware, which is in the operational environment.
- evaluation_facility: Applus Laboratories
- level: EAL4 + ALC_FLR.3
- manufacturer: Fortinet, Inc.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=940
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=938
- type: Product
- manufacturer: Fortinet, Inc.
- product: Fortinet FortiManager 5.6.6 build 7352 190510 (EAL4+)
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/368-fortinet-fortimanager-5-6-6-build-7352-190510-eal4
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
9863a376f3bb4175, 40002c3611fc465f, 5a24d4633823d877 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc_PP-2009-02en.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0005b.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf |
pdf_data/cert_filename |
2017-48-Diploma.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL4: 2
- EAL4+: 2
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 868949
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2017-48-INF-3131.pdf |
ANSSI-CC_2013-15fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2013/15
- cert_item: Carte VITALE 2 - Application ADELE : Composant AT90SC24036RCV masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1
- cert_item_version: Version système d’exploitation : 1.0.1 Version du correctif : 1
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Morpho 18 Chaussée Jules César, 95520 Osny, France Inside Secure Maxwell Building – Scottish Enterprise Technology Park East Kilbride – Glasgow G75 0QF - Ecosse Commanditaire Morpho 18 Chaussée Jules César, 95520 Osny, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP ESforSSD] certifié par l’ANSSI Protection Profile Embedded software for Smart Secure Devices Basic and Extended configurations – Basic configuration, version 1.0 [BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2012/08: 2
- ANSSI-CC-2012/08-M01: 1
- ANSSI-CC-2013/15: 21
- ANSSI-CC-PP-2009_02: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- BSI:
- BSI-PP- 0005-2002: 1
- BSI-PP- 0006-2002: 1
- BSI-PP- 0035-2007: 1
- BSI-PP-0005-2002: 2
- BSI-PP-0006-2002: 1
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL4: 10
- EAL4+: 11
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_FLR: 3
- ALC_FLR.3: 9
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.4: 1
- FDP:
- FIA:
- FIA_AFL.1: 1
- FIA_UAU.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MTD.1: 1
- FMT_SMR.1: 1
- FPT:
- FTA:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- CEA-LETI:
- CEA - LETI: 1
- CEA-LETI: 2
- CESTI:
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /CreationDate: D:20130523092230+02'00'
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate: D:20130530104902+02'00'
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title:
- pdf_file_size_bytes: 380203
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
2017-48-ST.pdf |
ANSSI-CC-cible_2013-15en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-ESforSSD_Basic: 1
- ANSSI-CC-PP-ESforSSD_Extended: 1
- BSI:
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL4: 2
- EAL4+: 4
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 3
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 15
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FCS:
- FCS_CKM.1: 35
- FCS_CKM.2: 3
- FCS_CKM.4: 18
- FCS_CKM.4.1: 1
- FCS_COP.1: 17
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 4
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UID.1: 9
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 15
- FMT_MSA.1.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITC.1: 8
- FPT_ITC.1.1: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP: 3
- FAU_ARP.1: 2
- FAU_GEN: 1
- FAU_SAA: 3
- FAU_SAA.1: 3
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 3
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 7
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 32
- FDP_ACC.1: 13
- FDP_ACF: 31
- FDP_ACF.1: 49
- FDP_ETC: 3
- FDP_ETC.1: 2
- FDP_ITC: 6
- FDP_ITC.1: 7
- FDP_RIP: 3
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FDP_ROL: 3
- FDP_ROL.1: 3
- FDP_SDI: 9
- FDP_SDI.2: 6
- FDP_UCT: 8
- FDP_UCT.1: 4
- FDP_UIT: 15
- FDP_UIT.1: 10
- FDP_UNO.1: 1
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 3
- FIA_ATD.1.1: 1
- FIA_SOS: 3
- FIA_SOS.2: 3
- FIA_UAU.1: 4
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID: 3
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 3
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 23
- FMT_MSA.1: 8
- FMT_MSA.2: 3
- FMT_MSA.2.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 3
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 5
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_AMT.1: 2
- FPT_EMS: 2
- FPT_FLS: 3
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_ITC: 3
- FPT_ITC.1: 2
- FPT_ITI: 3
- FPT_ITI.1: 2
- FPT_PHP.1: 3
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FPT_TST: 3
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 23
- FTP_ITC.1: 20
- FTP_TRP: 10
- FTP_TRP.1: 6
|
pdf_data/st_keywords/cc_claims |
- A:
- A.DELIVER: 3
- A.LOCATE: 2
- A.MANAGE: 2
- A.NOEVIL: 3
- O:
- O.ACCESS: 9
- O.ADMIN: 9
- O.AUDIT: 11
- O.ENCRYP: 6
- O.IDAUTH: 14
- O.PROTCT: 9
- O.TIME: 11
- OE:
- OE.ADMIN: 10
- OE.PHYCAL: 6
- T:
- T.AUDACC: 3
- T.NOAUTH: 2
- T.PRIVIL: 3
- T.PROCOM: 2
|
- A:
- O:
- OE:
- OE.HI_VAD: 10
- OE.RND: 11
- OE.SVD_AUTH_CGA: 2
- OSP:
- OSP.MANAGEMENT_OF_SECRETS: 1
- T:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 2
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 5
- DHE: 1
- Diffie-Hellman: 4
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- TLS:
- TLS: 8
- TLS 1.1: 2
- TLS 1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- malfunction: 2
- physical tampering: 3
- SCA:
- DPA: 3
- SPA: 3
- physical probing: 2
- side channel: 1
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 186-4: 1
- FIPS PUB 197: 1
- PKCS:
- RFC:
- RFC 2631: 1
- RFC 4346: 1
- RFC 5246: 2
- RFC4346: 1
|
- BSI:
- FIPS:
- FIPS 180-1: 1
- FIPS PUB 46-3: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 608207
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
- /CreationDate: D:20130523094213+02'00'
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate: D:20130530104845+02'00'
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title:
- pdf_file_size_bytes: 1199035
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 107
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |