Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Networks Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3
CCEVS-VR-10452-2012
Hitachi AE450 (HD651450) Smartcard Integrated Circuit Version 01
BSI-DSZ-CC-0191-2002
name Networks Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3 Hitachi AE450 (HD651450) Smartcard Integrated Circuit Version 01
category Boundary Protection Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US DE
not_valid_after 01.11.2014 01.09.2019
not_valid_before 28.06.2012 01.12.2002
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10452-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0191a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10452-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0191b.pdf
manufacturer Juniper Networks, Inc. Hitachi, Ltd.
manufacturer_web https://www.juniper.net/ https://www.hitachi.com/
security_level EAL2+, ALC_FLR.2 ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2
dgst 2874fcfdedc57721 07bd75ba3bb6b50c
heuristics/cert_id CCEVS-VR-10452-2012 BSI-DSZ-CC-0191-2002
heuristics/cert_lab US BSI
heuristics/cpe_matches cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23:-:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r8:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r1:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r21:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r10:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r11:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r4:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23:b:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r9:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24:-:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r14:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r6:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r3:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r27:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r13:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r1:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r12:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r2:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24:b:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r20:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r7:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r10:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r9:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r8:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r5:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r17:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r4:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r26:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r18:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r19:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r17:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r16:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r23:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r21:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r14:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r23b:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r3:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r19:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r2:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r18:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r27:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r12:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r7:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r26:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r15:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r24:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r13:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r16:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r24b:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r11:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r25:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r22:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r5:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r6:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r25:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r22:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r15:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2014-2842, CVE-2015-7750, CVE-2018-0059, CVE-2017-2335, CVE-2015-7756, CVE-2015-7755, CVE-2017-2336, CVE-2018-0014, CVE-2017-2339, CVE-2013-7313, CVE-2017-2337, CVE-2017-2338, CVE-2015-7754, CVE-2016-1268 {}
heuristics/extracted_sars AGD_OPE.1, ALC_DEL.1, AGD_PRE.1, ALC_CMC.2, ADV_FSP.2, ALC_CMS.4, ALC_FLR.2, ADV_ARC.1, ATE_IND.2, AVA_VAN.2, ATE_COV.1, ADV_TDS.1, ATE_FUN.1 AGD_USR.1, ADV_HLD.2, ADV_FSP.2, ATE_DPT.1, AVA_MSU.3, ADV_IMP.2, ALC_LCD.1, ASE_INT.1, ADV_RCR.1, ASE_SRE.1, ATE_IND.2, ADV_SPM.1, ASE_REQ.1, ASE_TSS.1, ASE_PPC.1, ATE_COV.2, ATE_FUN.1, ALC_DVS.2, AVA_SOF.1, ASE_OBJ.1, ALC_TAT.1, AVA_VLA.4, ADV_LLD.1, ASE_ENV.1, AGD_ADM.1, ASE_DES.1
heuristics/extracted_versions 6.3 01
pdf_data/report_filename st_vid10452-vr.pdf 0191a.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-10452-2012
    • cert_item: Juniper Networks Security Appliances
    • cert_lab: US NIAP
  • DE:
    • cert_id: BSI-DSZ-CC-0191-2002
    • cert_item: Hitachi AE450 (HD651450) Smartcard Integrated Circuit Version 01
    • cert_lab: BSI
    • developer: Hitachi Ltd
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-10452-2012: 1
  • DE:
    • BSI-DSZ-CC-0191: 1
    • BSI-DSZ-CC-0191-2002: 22
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 2
    • EAL4: 2
  • EAL:
    • EAL 1: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 13
    • EAL4 augmented: 2
    • EAL4+: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 4
  • ATE:
    • ATE_COV: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 2
    • ACM_CAP: 2
    • ACM_CAP.4: 2
    • ACM_SCP: 2
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 2
    • ADO_IGS: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.2: 3
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 4
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 2
    • ALC_TAT: 2
    • ALC_TAT.1: 2
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 3
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 4
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_COP.1: 1
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC.1: 1
    • FDP_ITT.1: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
    • FPT_SEP.1: 1
  • FRU:
    • FRU_FLT.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.DIRECT: 1
    • A.GENPUR: 1
    • A.LOWEXP: 1
    • A.NOEVIL: 1
    • A.NOREMO: 1
    • A.PHYSEC: 1
    • A.PUBLIC: 1
    • A.REMACC: 1
    • A.SINGEN: 1
  • T:
    • T.ASPOOF: 1
    • T.AUDACC: 1
    • T.AUDFUL: 1
    • T.MEDIAT: 1
    • T.NOAUTH: 1
    • T.OLDINF: 1
    • T.PROCOM: 1
    • T.REPEAT: 1
    • T.REPLAY: 1
    • T.SELPRO: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • Philips:
    • Philips: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • 3DES:
      • Triple-DES: 1
    • DES:
      • DES: 11
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 8
  • VPN:
    • VPN: 8
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 3
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Physical Probing: 1
    • physical probing: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 3
  • RFC:
    • RFC 2404: 1
    • RFC 2406: 1
  • BSI:
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 32: 1
  • FIPS:
    • FIPS PUB 140-2: 1
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC15408: 1999: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 29 November 2002, for the Product Hitachi Single-Chip Microcontroller AE450 (HD651450) Version 01, (confidential document) [9] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
    • AE-4 Series, Guidelines for using the AE450 Rev. 1.1, 22 August 2002, Hitachi, Ltd., (confidential document) [12] Hitachi Single-Chip Microcomputer, AE-4 Series, AE460 (HD651460), AE450 (HD651450), Current: 1
    • AE450]), V1.3, 22 August 2002, (confidential document) [14] Federal Information Processing Standards Publication, Security Requirements for Cryptographic: 1
    • Functions, Rev. 2.2, 11 March 2002, Hitachi, Ltd., (confidential document) [13] Hitachi, Semiconductor Technical Report, Option List for Smart Card Microcomputer (for: 1
    • Security Target, Semiconductor & Integrated Circuits Hitachi, Ltd., Version 1.2, 4 October 2002, (confidential document) [7] AE450 (HD651450) Version 01, Smartcard Security Target, (Public version), Semiconductor &: 1
pdf_data/report_metadata
  • /Author: Mallett, Patrick W.
  • /CreationDate: D:20121005092651
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20121005092651
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 329777
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: BSI
  • /CreationDate: D:20021220103921
  • /Creator: Microsoft Word - 0191a.doc (Kopie)
  • /Keywords: Certification Common Criteria AE450
  • /ModDate: D:20021220105643+01'00'
  • /Producer: Acrobat PDFWriter 4.0 für Windows NT
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0191-2002
  • pdf_file_size_bytes: 182421
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 42
pdf_data/st_filename st_vid10452-st.pdf 0191b.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0002: 5
    • BSI-PP-0002: 75
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL4: 1
  • EAL:
    • EAL4: 6
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.2: 11
    • ADV_TDS: 1
    • ADV_TDS.1: 11
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 8
    • ALC_CMS: 1
    • ALC_CMS.2: 5
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_FLR: 1
    • ALC_FLR.2: 15
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 4
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 7
  • ADO:
    • ADO_DEL: 1
    • ADO_IGS: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 2
    • ADV_LLD: 1
    • ADV_RCR: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 3
  • AGD:
    • AGD_AGM: 1
    • AGD_USR: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.3: 2
    • AVA_SOF: 1
    • AVA_VLA: 1
    • AVA_VLA.4: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 2
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 8
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 1
    • FAU_SAR.3.1: 1
    • FAU_STG: 8
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 18
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 3
    • FDP_IFC.1: 15
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 14
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 2
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP: 3
    • FDP_RIP.1: 1
    • FDP_RIP.2: 2
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 4
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 1
    • FIA_ATD: 4
    • FIA_ATD.1: 3
    • FIA_ATD.1.1: 2
    • FIA_UAU: 8
    • FIA_UAU.1: 2
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 3
    • FIA_UAU.4.1: 1
    • FIA_UID: 4
    • FIA_UID.2: 3
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 4
    • FMT_MOF.1: 2
    • FMT_MOF.1.1: 1
    • FMT_MSA: 4
    • FMT_MSA.3: 3
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 4
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 1
    • FMT_SMR: 4
    • FMT_SMR.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 1
    • FPT_STM: 4
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAS.1: 9
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 15
    • FCS_COP.1.1: 2
    • FCS_RND: 1
    • FCS_RND.1: 8
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 27
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 5
    • FDP_IFC.1: 16
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 1
    • FDP_ITC.1: 12
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 9
    • FDP_ITT.1.1: 1
    • FDP_SDI.1: 1
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 9
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 9
    • FMT_LIM.2.1: 1
    • FMT_MSA.1: 2
    • FMT_MSA.2: 13
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 2
    • FMT_SMR.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 27
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_SEP.1: 8
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FRU:
    • FRU_FLT.1: 1
    • FRU_FLT.2: 12
pdf_data/st_keywords/cc_claims
  • A:
    • A.DIRECT: 2
    • A.GENPUR: 2
    • A.LOWEXP: 2
    • A.NOEVIL: 2
    • A.NOREMO: 2
    • A.PHYSEC: 2
    • A.PUBLIC: 2
    • A.REMACC: 2
    • A.SINGEN: 2
  • O:
    • O.ACCOUN: 1
    • O.ADMTRA: 1
    • O.AUDREC: 1
    • O.ENCRYP: 1
    • O.GUIDAN: 1
    • O.IDAUTH: 1
    • O.INTEGRITY: 4
    • O.LIMEXT: 1
    • O.MEDIAT: 1
    • O.SECFUN: 1
    • O.SECSTA: 1
    • O.SELPRO: 1
    • O.SINUSE: 1
  • T:
    • T.ASPOOF: 1
    • T.AUDACC: 1
    • T.AUDFUL: 1
    • T.MEDIAT: 1
    • T.NOAUTH: 1
    • T.OLDINF: 1
    • T.PROCOM: 1
    • T.REPEAT: 1
    • T.REPLAY: 1
    • T.SELPRO: 1
  • O:
    • O.RND: 3
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 2
  • DES:
    • DES:
      • DES: 41
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 4
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 3
      • SHA256: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 3
  • SSH:
    • SSH: 25
  • VPN:
    • VPN: 76
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 6
    • RNG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • secp256r1: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • FI:
    • DFA: 1
    • Malfunction: 15
    • malfunction: 5
    • physical tampering: 1
  • SCA:
    • DPA: 7
    • Leak-Inherent: 14
    • Physical Probing: 2
    • Physical probing: 1
    • physical probing: 4
  • other:
    • reverse engineering: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 5
    • FIPS 180-2: 1
    • FIPS 186-3: 1
    • FIPS 197: 2
    • FIPS PUB 140-2: 6
  • NIST:
    • SP 800-67: 2
  • RFC:
    • RFC 2404: 1
    • RFC 2406: 2
  • BSI:
    • AIS 31: 1
  • FIPS:
    • FIPS PUB 46-3: 3
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC7816-3: 1
pdf_data/st_metadata
  • /Author: Neal
  • /CreationDate: D:20121005092759
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20121005092759
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target
  • /Title: Security Appliances Security Target
  • pdf_file_size_bytes: 867098
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
  • /Author: Hitachi Ltd.
  • /CreationDate: D:20021205112620+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20030107152605+01'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Security Target AE450-CC-ST-0002 v1.0
  • pdf_file_size_bytes: 334349
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 66
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different