Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Check Point Software Blades R7x
CCEVS-VR-10387-2012
IAIK-JCE CC Core 3.15
JISEC-CC-CRP-C0107
name Check Point Software Blades R7x IAIK-JCE CC Core 3.15
category Boundary Protection Devices and Systems Products for Digital Signatures
scheme US JP
not_valid_after 31.12.2014 07.10.2013
not_valid_before 26.11.2012 27.06.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10387-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0107_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10387-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0107_est.pdf
manufacturer Check Point Software Technologies Ltd. Stiftung Secure Information and Communication Technologies SIC
manufacturer_web https://www.checkpoint.com/ https://jce.iaik.tugraz.at/
security_level EAL4+, ALC_FLR.3 EAL3
dgst 2abffef5c9de3bae ee01e752b230504e
heuristics/cert_id CCEVS-VR-10387-2012 JISEC-CC-CRP-C0107
heuristics/cert_lab US []
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1
heuristics/extracted_versions - 3.15
heuristics/scheme_data
  • category: Firewall, Virtual Private Network, Wireless Monitoring
  • certification_date: 26.11.2012
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 26.11.2014
  • id: CCEVS-VR-VID10387
  • product: Check Point Software Blades R7x
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10387
  • vendor: Check Point Software Technologies Ltd
  • cert_id: JISEC-CC-CRP-C0107
  • certification_date: 01.06.2007
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0107_eimg.pdf
    • description: PRODUCT DESCRIPTION The IAIK-JCE CC Core is a set of APIs and implementations of cryptographic functionality. Including: - hash functions - signature schemes - block ciphers - stream ciphers - asymmetric ciphers - message authentication codes - random number generators It supplements the security functionality of the default Java Runtime Environment. The IAIK-JCE CC Core is delivered to the customer as part of the IAIK-JCE toolkit, which extends the CC Core by additional algorithms, features and protocols.
    • evaluation_facility: TÜV Informationstechnik GmbH Evaluation Body for IT-Security
    • product: IAIK-JCE CC Core
    • product_type: IT Product (cryptographic library)
    • report_link: https://www.ipa.go.jp/en/security/c0107_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0107_est.pdf
    • toe_version: 3.15
    • vendor: Stiftung Secure Information and Communication Technologies SIC
  • expiration_date: 01.10.2013
  • supplier: Stiftung Secure Information and Communication Technologies SIC
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0107_it6096.html
  • toe_overseas_name: IAIK-JCE CC Core 3.15
heuristics/protection_profiles f0acae5742fb48a1, 168a407fba56140a, 44cdd911811b36d2 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_fw_tf_br_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_FW_AL_BR_V1.0.pdf {}
pdf_data/report_filename st_vid10387-vr.pdf c0107_erpt.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-10387-2012
    • cert_item: Check Point Software Blades R7x
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-10387-2012: 1
  • JP:
    • CRP-C0107-01: 1
    • Certification No. C0107: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 2
    • EAL4: 4
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.LOCATE: 1
    • A.NOEVIL: 1
    • A.SINGEN: 1
  • T:
    • T.ASPOOF: 1
    • T.AUDFUL: 1
    • T.AUMACC: 1
    • T.COMDIS: 1
    • T.COMINT: 1
    • T.FACCNT: 1
    • T.FALACT: 1
    • T.FALASC: 1
    • T.FALREC: 1
    • T.FAULT: 1
    • T.IMPCON: 1
    • T.INADVE: 1
    • T.INFLUX: 1
    • T.LOSSOF: 1
    • T.MEDIAT: 1
    • T.MISACT: 1
    • T.MISUSE: 1
    • T.NACCESS: 1
    • T.NMODIFY: 1
    • T.NOAUTH: 1
    • T.NOHALT: 1
    • T.OLDINF: 1
    • T.PRIVIL: 1
    • T.PROCOM: 1
    • T.REPEAT: 1
    • T.REPLAY: 1
    • T.SELPRO: 1
    • T.TUSAGE: 1
  • O:
    • O.MAC: 3
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 5
    • RC:
      • RC2: 3
  • DES:
    • 3DES:
      • Triple-DES: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 4
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 1024: 1
    • RSA-OAEP: 1
    • RSA-PSS: 1
pdf_data/report_keywords/hash_function
  • RIPEMD:
    • RIPEMD-160: 4
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-256: 7
      • SHA-384: 6
      • SHA-512: 7
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 4
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 2
  • TLS:
    • SSL:
      • SSL: 4
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 15
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CFB:
    • CFB: 1
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 1
  • OFB:
    • OFB: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 2
    • FIPS 197: 1
    • FIPS PUB 140-1: 1
  • BSI:
    • AIS 20: 1
    • AIS20: 1
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 46-3: 2
    • FIPS PUB 180-1: 5
    • FIPS PUB 180-2: 11
    • FIPS PUB 197: 3
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 10118-3: 4
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • PKCS:
    • PKCS#1: 2
  • RFC:
    • RFC 2268: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • secret. A.KeyManagement The IT-Environment is responsible for key management. Key management is out of scope of the TOE. O.PrivateKey and O.SecretKey, needed for computation of O.CipherText, O.MAC and O: 1
pdf_data/report_metadata
  • /Author: NIAP CCEVS
  • /CreationDate: D:20121130103410
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20121130103410
  • /Producer: Microsoft® Office Word 2007
  • /Title: VID 10375 VR
  • pdf_file_size_bytes: 401523
  • pdf_hyperlinks: http://www.niap-ccevs.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
  • /CreationDate: D:20080207191148+09'00'
  • /ModDate: D:20080207191148+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 132396
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename st_vid10387-st.pdf c0107_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL4: 10
  • EAL:
    • EAL 3: 2
    • EAL3: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 7
    • ADV_FSP.1: 1
    • ADV_FSP.2: 3
    • ADV_FSP.4: 6
    • ADV_IMP.1: 5
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 8
  • AGD:
    • AGD_OPE.1: 6
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 4
    • ALC_FLR.2: 1
    • ALC_FLR.3: 9
    • ALC_LCD.1: 4
    • ALC_TAT.1: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_COV.2: 4
    • ATE_DPT.1: 2
    • ATE_FUN.1: 8
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
  • ACM:
    • ACM_CAP.3: 4
    • ACM_SCP.1: 3
  • ADO:
    • ADO_DEL.1: 4
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 11
    • ADV_HLD.1: 3
    • ADV_HLD.2: 3
    • ADV_RCR.1: 4
  • AGD:
    • AGD_ADM.1: 8
    • AGD_USR.1: 6
  • ALC:
    • ALC_DVS.1: 5
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.1: 1
    • ATE_FUN.1: 6
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 4
    • AVA_SOF.1: 2
    • AVA_VLA.1: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 29
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 9
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 4
    • FAU_STG.2: 16
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 2
    • FAU_STG.2.3: 1
    • FAU_STG.3: 7
    • FAU_STG.3.1: 1
    • FAU_STG.4: 13
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 27
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 20
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 15
    • FCS_CKM.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 70
    • FCS_COP.1.1: 8
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC: 4
    • FDP_IFC.1: 44
    • FDP_IFC.1.1: 6
    • FDP_IFF: 10
    • FDP_IFF.1: 51
    • FDP_IFF.1.1: 6
    • FDP_IFF.1.2: 6
    • FDP_IFF.1.3: 6
    • FDP_IFF.1.4: 4
    • FDP_IFF.1.5: 3
    • FDP_IFF.1.6: 2
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
    • FDP_RIP: 2
    • FDP_RIP.1: 4
    • FDP_RIP.2: 10
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 10
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_ATD.1: 15
    • FIA_ATD.1.1: 3
    • FIA_SOS.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 8
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 24
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
    • FIA_UID: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 16
    • FIA_UID.2.1: 1
    • FIA_USB: 2
    • FIA_USB.1: 14
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 22
    • FMT_MOF.1.1: 1
    • FMT_MSA: 8
    • FMT_MSA.1: 23
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 17
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 19
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 2
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_ITA.1: 1
    • FPT_ITC.1: 1
    • FPT_ITI.1: 1
    • FPT_ITT.1: 10
    • FPT_ITT.1.1: 1
    • FPT_RVM: 1
    • FPT_SEP: 1
    • FPT_STM.1: 12
    • FPT_STM.1.1: 4
    • FPT_TRC.1: 9
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT.2: 9
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 12
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FCS:
    • FCS_CKM: 87
    • FCS_CKM.1: 4
    • FCS_CKM.2: 9
    • FCS_CKM.4: 26
    • FCS_CKM.4.1: 2
    • FCS_COP: 123
    • FCS_COP.1: 9
    • FCS_RND: 21
    • FCS_RND.1: 5
    • FCS_RND.1.1: 1
    • FCS_RND.1.2: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC.1: 2
    • FDP_ITC: 13
    • FDP_ITC.1: 41
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 22
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 2
  • FMT:
    • FMT_MSA: 6
    • FMT_MSA.2: 32
    • FMT_MSA.3: 2
  • FPT:
    • FPT_TST: 2
    • FPT_TST.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.LOCATE: 4
    • A.NOEVIL: 3
    • A.PHYSEC: 2
    • A.SINGEN: 6
  • D:
    • D.INFO: 10
    • D.PACKET: 9
    • D.PACKETS: 1
  • O:
    • O.ACCESS: 3
    • O.ACCOUN: 7
    • O.AUDITS: 3
    • O.AUDREC: 11
    • O.CREDEN: 1
    • O.DAC: 1
    • O.EADMIN: 4
    • O.EAL: 2
    • O.ENCRYP: 9
    • O.EXPORT: 2
    • O.FAULT: 7
    • O.GENPUR: 1
    • O.GUIDANCE: 1
    • O.IDANLZ: 10
    • O.IDAUTH: 19
    • O.IDSCAN: 1
    • O.IDSENS: 8
    • O.INTEGR: 8
    • O.LIMEXT: 8
    • O.MEDIAT: 10
    • O.MEDIATE: 1
    • O.OFLOWS: 9
    • O.PROTCT: 10
    • O.RESPON: 8
    • O.SECFUN: 13
    • O.SECSTA: 8
    • O.SELPRO: 8
    • O.SINUSE: 5
    • O.VPN: 9
  • OE:
    • OE.AUDIT_PROTECTION: 1
    • OE.AUDIT_SORT: 1
    • OE.CREDEN: 3
    • OE.IDAUTH: 9
    • OE.INSTAL: 2
    • OE.PERSON: 2
    • OE.PHYCAL: 2
    • OE.SINGEN: 8
    • OE.TIME: 1
    • OE.VPN: 8
  • T:
    • T.ASPOOF: 1
    • T.AUDACC: 1
    • T.AUDFUL: 1
    • T.COMDIS: 1
    • T.COMINT: 3
    • T.FACCNT: 1
    • T.FALACT: 3
    • T.FALASC: 3
    • T.FALREC: 1
    • T.FAULT: 3
    • T.IMPCON: 1
    • T.INADVE: 3
    • T.INFLUX: 3
    • T.LOSSOF: 3
    • T.LOWEXP: 3
    • T.MEDIAT: 4
    • T.MISACT: 1
    • T.MISUSE: 1
    • T.NACCESS: 4
    • T.NMODIFY: 1
    • T.NOAUTH: 5
    • T.NOHALT: 1
    • T.OLDINF: 1
    • T.PRIVIL: 3
    • T.PROCOM: 3
    • T.REPEAT: 1
    • T.REPLAY: 3
    • T.SCNCFG: 1
    • T.SCNMLC: 1
    • T.SCNVUL: 1
    • T.SELPRO: 3
    • T.TUSAGE: 3
  • A:
    • A.XXX: 1
  • O:
    • O.MAC: 8
    • O.XXX: 1
  • OE:
    • OE.XXX: 1
  • OT:
    • OT.XXX: 1
  • T:
    • T.XXX: 1
pdf_data/st_keywords/vendor
  • Broadcom:
    • Broadcom: 2
  • Microsoft:
    • Microsoft: 7
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 16
      • AES-128: 1
  • DES:
    • DES:
      • DES: 14
  • constructions:
    • MAC:
      • CMAC: 1
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 7
    • RC:
      • RC2: 7
  • DES:
    • 3DES:
      • Triple-DES: 3
      • TripleDES: 1
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 8
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 8
  • RSA:
    • RSA 1024: 1
    • RSA-OAEP: 1
    • RSA-PSS: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-256: 9
  • RIPEMD:
    • RIPEMD-160: 11
  • SHA:
    • SHA1:
      • SHA-1: 28
    • SHA2:
      • SHA-256: 17
      • SHA-384: 14
      • SHA-512: 17
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • KEX:
    • Key Exchange: 3
  • MAC:
    • MAC: 4
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 22
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 49
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSH: 4
  • TLS:
    • SSL:
      • SSL: 53
    • TLS:
      • TLS: 32
      • TLS v1.0: 1
      • TLSv1.0: 10
  • VPN:
    • VPN: 336
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
    • PRNG: 1
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CBC:
    • CBC: 2
  • CFB:
    • CFB: 2
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 2
  • OFB:
    • OFB: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_3DES_EDE_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • SCA:
    • side channel: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
  • FIPS:
    • FIPS 140-2: 10
    • FIPS 180-3: 1
    • FIPS 197: 3
    • FIPS PUB 140-1: 1
    • FIPS PUB 140-2: 9
    • FIPS PUB 180-3: 2
    • FIPS PUB 197: 3
    • FIPS PUB 198: 3
    • FIPS PUB 46-3: 4
    • FIPS140: 1
    • FIPS180-3: 1
    • FIPS197: 1
    • FIPS198: 1
    • FIPS46-3: 1
  • NIST:
    • NIST SP 800-67: 2
    • NIST SP 800-90: 3
    • SP 800-67: 3
    • SP 800-90: 5
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 3
    • PKCS#12: 1
  • RFC:
    • RFC 0854: 1
    • RFC 0959: 1
    • RFC 1305: 1
    • RFC 1334: 1
    • RFC 1777: 2
    • RFC 1778: 1
    • RFC 1994: 1
    • RFC 2104: 3
    • RFC 2246: 3
    • RFC 2284: 1
    • RFC 2401: 1
    • RFC 2404: 3
    • RFC 2406: 4
    • RFC 2409: 5
    • RFC 2616: 1
    • RFC 2631: 3
    • RFC 2661: 1
    • RFC 2716: 1
    • RFC 2821: 1
    • RFC 2865: 1
    • RFC 3193: 1
    • RFC 3526: 4
    • RFC 3947: 1
    • RFC 3948: 1
    • RFC 5114: 4
    • RFC 792: 1
    • RFC0854: 1
    • RFC0959: 2
    • RFC1305: 2
    • RFC1334: 2
    • RFC1777: 1
    • RFC1778: 1
    • RFC1994: 1
    • RFC2104: 1
    • RFC2246: 3
    • RFC2284: 1
    • RFC2401: 2
    • RFC2404: 1
    • RFC2406: 1
    • RFC2409: 2
    • RFC2616: 1
    • RFC2631: 1
    • RFC2661: 2
    • RFC2716: 2
    • RFC2821: 2
    • RFC2865: 1
    • RFC3193: 2
    • RFC3526: 1
    • RFC3947: 2
    • RFC3948: 2
    • RFC5114: 1
  • BSI:
    • AIS 20: 1
    • AIS 31: 2
    • AIS20: 7
    • AIS31: 1
  • FIPS:
    • FIPS 46-3: 4
    • FIPS PUB 180-1: 11
    • FIPS PUB 180-2: 29
    • FIPS PUB 186-2: 2
    • FIPS PUB 197: 5
    • FIPS PUB 46-3: 3
  • ISO:
    • ISO/IEC 10118-3: 8
  • PKCS:
    • PKCS#1: 14
    • PKCS#11: 1
  • RFC:
    • RFC 2104: 5
    • RFC 2268: 5
    • RFC2104: 1
    • RFC2268: 1
  • X509:
    • X.509: 1
pdf_data/st_keywords/javacard_packages
  • java:
    • java.security: 6
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Key Management. The IT-Environment is responsible for key management. Key management is out of scope of the TOE. O.PrivateKey and O.SecretKey, needed for computation of O.CipherText, O.MAC and O: 1
    • its own key pad for entering this authentication data. Displaying data to be signed or verified is out of scope of the TOE. • Conventional Signatures. The TOE is used without hardware support to create: 1
    • out of scope: 3
    • several algorithms that can be used for data encryption and decryption. Key management is out of scope of the TOE. The application provides the keys to the TOE. The TOE does not modify the keys it gets: 1
pdf_data/st_metadata
  • /Author: Nir Naaman
  • /Classification: NoClassification
  • /ClassificationDisplay: [No Classification] 3rd party or non-work related
  • /ClassificationEntries: 1
  • /Classification_1: XXZreXVmd3RXZVBjf2p2ZW5tSmiViG85JnSLg4qHOyyVISYkIICLnUSCjZNLMSgnUihEXw==
  • /Company: Check Point Software Technologies Ltd.
  • /CreationDate: D:20121127171748+02'00'
  • /Creator: Acrobat PDFMaker 7.0.5 for Word
  • /Keywords: Information flow control, firewall, proxy server, traffic filter, remote access, VPN, SSL VPN, IPSec, IPS, intrusion detection
  • /ModDate: D:20121127171854+02'00'
  • /OS: Check Point SecurePlatform
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Revision: 1.2
  • /Subject: Security Target
  • /TOE: Check Point Software Blades R7x
  • /Title: Software Blades
  • /cp_sk: sk77840
  • /cp_version: R7x
  • /documentDate: 11/8/2012
  • /longDate: November 8, 2012
  • /lqminfo: 4
  • /lqmsess: 1e390c24-5a22-474b-a7d8-73e646d7bb31
  • /smartconsole_version: R71
  • pdf_file_size_bytes: 1383207
  • pdf_hyperlinks: http://www.checkpoint.com/3rd_party_copyright.html, http://www.checkpoint.com/copyright.html
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 173
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different