Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2
ISCB-5-RPT-C055-CR-v1
TCOS Passport Version 2.1 Release 3/P60D144
BSI-DSZ-CC-0808-V3-2017
name HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2 TCOS Passport Version 2.1 Release 3/P60D144
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme MY DE
not_valid_after 18.03.2020 15.12.2022
not_valid_before 18.03.2015 15.12.2017
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C055-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0808V3a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%201-0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0808V3b_pdf.pdf
manufacturer HP TippingPoint T-Systems International GMBH
manufacturer_web https://www.hp.com/ https://www.t-systems.de/
security_level ALC_FLR.2, EAL3+ EAL4+, ATE_DPT.2, AVA_VAN.5, ALC_DVS.2
dgst 2cfde4db66d5e375 3d14a74805cc464c
heuristics/cert_id ISCB-5-RPT-C055-CR-v1 BSI-DSZ-CC-0808-V3-2017
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ALC_FLR.2, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.3, ASE_ECD.1, ALC_FLR.1, APE_OBJ.2, ADV_IMP.1, ALC_LCD.1, ADV_FSP.4, ALC_DVS.2, ATE_DPT.2, ASE_SPD.1, APE_INT.1, ATE_COV.2, ADV_INT.3, ASE_TSS.2, ALC_TAT.1, ADV_FUN.1, APE_CCL.1, AGD_OPE.1, ALC_CMS.4, APE_SPD.1, ALC_DEL.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2
heuristics/extracted_versions 3.7.2 2.1
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0809-V3-2017
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0808-V2-2016, BSI-DSZ-CC-0809-V3-2017, BSI-DSZ-CC-0978-V2-2017
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0809-V3-2017, BSI-DSZ-CC-0808-V3-2017
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0809-2013, BSI-DSZ-CC-0808-2013, BSI-DSZ-CC-0809-V2-2016, BSI-DSZ-CC-0886-2013, BSI-DSZ-CC-0978-2016, BSI-DSZ-CC-0808-V3-2017, BSI-DSZ-CC-0885-2013, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0808-V2-2016, BSI-DSZ-CC-0809-V3-2017, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0978-V2-2017
heuristics/scheme_data
  • cert_no: 2015-001-C055
  • certification_date: 18.03.2015
  • developer: Trend Micro TippingPoint
  • enhanced:
    • assurance_level: EAL3+ALC_FLR.2
    • category: Network and Network-Related Devices and Systems
    • cert_id: C055
    • certification_date: 18.03.2015
    • developer: Freddy MercadoGlobal Compliance EngineerTrend Micro - TippingPointTel: +1 512 432-2947Cell: +1 512 632-6308VoIP: +1 512 319-5317Email: [email protected] Tandem Blvd.Austin, TX 78728 – USA URL:http://www.trendmicro.com/
    • expiration_date: 18.03.2020
    • mutual_recognition: CCRA
    • product: Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/ISCB-5-RPT-C055-CR-v1.pdf
    • scope: The TOE is a hardware and software appliance that contains all the functions needed for intrusion prevention, including Internet Protocol (IP) defragmentation, TCP flow reassembly, statistical analysis, traffic shaping, flow blocking, flow state tracking and application-layer parsing of network protocols. The primary function of the TOE is to protect networks from intrusion attempts by scanning network traffic, detecting intrusion attempts, and reacting to detected intrusion attempts according to the filters and action sets with which the device is configured. The scope of evaluation covers major security features as follows: Security Audit: The TOE is able to generate auditable events for the basic level of audit. Identification and authentication: The TOE identifies and authenticates all administrative users of the TOE before granting them access to the TOE. Intrusion Detection and Prevention: The TOE collects network traffic and subjects it to statistical and signature-based analysis, depending on configured IPS filters. Traffic Management: The TOE can be configured to operate as a firewall, blocking or permitting network traffic based on protocol or IP address and port. Security Management: The TOE provides the security management functions to enable the administrative users to manage user accounts, audit data and audit configurations, security configuration data, traffic management filters, and IDS data collection, analysis, and reaction. TSF Protection: The TOE includes its own time source for providing reliable time stamps that are used in audit records and stored IDS data. Trusted Path: The TOE provides a trusted path for remote administrative users of the TOE to communicate with the TOE. The trusted path is implemented over the network management port using HTTPS for access to the LSM and SSHv2 for access to the CLI.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/TippingPointST%201-0.pdf
    • type: Hardware-based intrusion prevention systems
  • expiration_date: 18.03.2020
  • level: EAL3+ALC_FLR.2
  • product: Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/120
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0978-V2-2017
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0978-V2-2017
heuristics/protection_profiles {} a33327d40f253f46
maintenance_updates

protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf
pdf_data/report_filename ISCB-5-RPT-C055-CR-v1.pdf 0808V3a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2, AVA_VAN.5
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0808-V3-2017
    • cert_item: TCOS Passport Version 2.1 Release 3/P60D144
    • cert_lab: BSI
    • developer: T-Systems International GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Machine Readable Travel Document with "ICAO Application" Extended Access Control with PACE, Version 1.3.2, 5 December 2012, BSI-CC-PP-0056- V2-2012-MA-02 and in accordance with BSI Technische Richtlinie BSI-TR-03116-2, 2017
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C055-CR-v1: 28
  • DE:
    • BSI-DSZ-CC-0808-V2-: 1
    • BSI-DSZ-CC-0808-V2-2016: 2
    • BSI-DSZ-CC-0808-V3-2017: 20
    • BSI-DSZ-CC-0809-V3-2017: 2
    • BSI-DSZ-CC-0978-V2-2017: 3
    • BSI-DSZ-CC-S-0053-2016-MA-01: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0056-: 1
    • BSI-CC-PP-0056-V2-: 1
    • BSI-CC-PP-0056-V2-2012-MA-: 1
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0068-V2-: 1
    • BSI-CC-PP-0068-V2-2011: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL3: 8
  • EAL:
    • EAL 1: 7
    • EAL 2: 6
    • EAL 3: 4
    • EAL 4: 9
    • EAL 4 augmented: 3
    • EAL 5: 9
    • EAL 5+: 1
    • EAL 6: 4
    • EAL 7: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 6
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 5
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SEL.1.1: 1
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4.1: 1
  • FMT:
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 9
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 3
  • TSystems:
    • T-Systems International: 10
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
    • SSHv2: 4
  • TLS:
    • SSL:
      • SSL: 1
  • PACE:
    • PACE: 11
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • BSI:
    • AIS 20: 1
    • AIS 25: 3
    • AIS 26: 3
    • AIS 31: 1
    • AIS 34: 2
    • AIS 36: 6
    • AIS 38: 1
  • ICAO:
    • ICAO: 6
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Dedicated Software, BSI-DSZ-CC-0978-V2, TÜV Informationstechnik GmbH, Version 2, 14 September 2017 (confidential document) [14] Technical Guideline TR-03110: Advanced Security Mechanisms for Machine Readable Travel: 1
    • ETR) - TCOS Passport Version 2.1 Release 3/P60D144, SRC Security Research & Consulting GmbH (confidential document) 9 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
    • TCOS Passport Version 2.1 Release 3/P60D144, Version 1.2, 06.11.2017, T-Systems International GmbH (confidential document) [18] Certification Report BSI-DSZ-CC-0809-V3-2017 for TCOS Passport Version 2.1 Release 3-BAC : 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /Author: ISCB Department
  • /CreationDate: D:20150318142844+08'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: HP TippingPoint Intrusion Prevention System
  • /ModDate: D:20150318142844+08'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2
  • /Title: C055 Certification Report
  • pdf_file_size_bytes: 733406
  • pdf_hyperlinks: mailto:[email protected], http://www.commoncriteriaportal.org/, http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
pdf_data/st_filename TippingPointST 1-0.pdf 0808V3b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0978-V2-2017: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0056-V2-2012: 2
    • BSI-CC-PP- 0068-V2-2011: 1
    • BSI-CC-PP-0035-2007: 1
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0068-V2-2011: 2
    • BSI-PP-0026: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 5
    • EAL 3 augmented: 4
    • EAL3: 1
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL 6+: 1
    • EAL4: 11
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.3: 12
    • ADV_TDS: 1
    • ADV_TDS.2: 13
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.3: 13
    • ALC_CMS: 1
    • ALC_CMS.3: 6
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_DVS: 1
    • ALC_DVS.1: 5
    • ALC_FLR: 1
    • ALC_FLR.2: 18
    • ALC_LCD: 1
    • ALC_LCD.1: 6
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 14
    • ASE_ECD: 1
    • ASE_ECD.1: 10
    • ASE_INT: 1
    • ASE_INT.1: 12
    • ASE_OBJ: 1
    • ASE_OBJ.2: 10
    • ASE_REQ: 1
    • ASE_REQ.2: 13
    • ASE_SPD: 1
    • ASE_SPD.1: 7
    • ASE_TSS: 1
    • ASE_TSS.1: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 5
    • ATE_DPT: 1
    • ATE_DPT.1: 5
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 7
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 4
    • ADV_FSP: 1
    • ADV_FSP.4: 2
    • ADV_FUN.1: 1
    • ADV_IMP.1: 4
    • ADV_TDS: 1
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 5
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.3: 1
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 5
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 6
    • FAU_SAR.3.1: 1
    • FAU_SEL: 2
    • FAU_SEL.1: 6
    • FAU_SEL.1.1: 1
    • FAU_STG: 2
    • FAU_STG.1: 2
    • FAU_STG.2: 9
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_IFC: 2
    • FDP_IFC.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFF: 2
    • FDP_IFF.1: 12
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS: 2
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 1
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.3: 2
    • FMT_MTD: 1
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 6
    • FMT_SMF: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM: 3
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP: 2
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_SAS: 6
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 38
    • FCS_CKM.1: 6
    • FCS_CKM.2: 4
    • FCS_CKM.4: 17
    • FCS_CKM.4.1: 1
    • FCS_COP: 40
    • FCS_COP.1: 12
    • FCS_RND: 6
    • FCS_RND.1: 11
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 3
  • FDP:
    • FDP_ACC: 8
    • FDP_ACC.1: 5
    • FDP_ACF: 9
    • FDP_ACF.1: 13
    • FDP_IFC.1: 3
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_ITT.1: 1
    • FDP_RIP: 3
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
    • FDP_SDI.2: 1
    • FDP_UCT: 6
    • FDP_UCT.1: 2
    • FDP_UIT: 6
    • FDP_UIT.1: 3
  • FIA:
    • FIA_AFL: 8
    • FIA_AFL.1: 3
    • FIA_API: 7
    • FIA_API.1: 10
    • FIA_API.1.1: 2
    • FIA_UAU: 54
    • FIA_UAU.1: 3
    • FIA_UAU.4: 2
    • FIA_UAU.5: 3
    • FIA_UAU.6: 2
    • FIA_UID: 11
    • FIA_UID.1: 5
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 20
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 18
    • FMT_LIM.2.1: 2
    • FMT_MDT.3: 1
    • FMT_MSA.1: 2
    • FMT_MSA.3: 3
    • FMT_MTD: 58
    • FMT_MTD.1: 5
    • FMT_MTD.3: 8
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 24
    • FMT_SMF.1.1: 1
    • FMT_SMR: 9
    • FMT_SMR.1: 13
  • FPT:
    • FPT_EMS: 6
    • FPT_EMS.1: 12
    • FPT_EMS.1.1: 5
    • FPT_EMS.1.2: 3
    • FPT_FLS: 1
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 10
    • FTP_ITC.1: 6
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.MANAGE: 3
    • A.NOEVIL: 2
    • A.PROTECT: 2
  • O:
    • O.ACCESS: 4
    • O.ADMIN: 4
    • O.ANALYZER: 6
    • O.AUDIT: 4
    • O.INTEGRITY: 3
    • O.RESPONSE: 7
    • O.REVIEW: 6
    • O.SENSOR: 7
    • O.STORAGE: 4
    • O.TRAFFIC: 3
  • OE:
    • OE.CONFID: 2
    • OE.INSTALL: 2
    • OE.PERSONNEL: 2
    • OE.PHYSICAL: 2
  • T:
    • T.ACCIDENT: 2
    • T.ACCOUNT: 2
    • T.COMPROMISE: 3
    • T.CONFIG: 2
    • T.INFLUX: 3
    • T.LOSSOF: 2
    • T.MALICE: 3
    • T.MISUSE: 3
    • T.PRIVILEGE: 3
  • O:
    • O.CUST_RECONFIG: 1
    • O.FW_HW: 1
    • O.HW_AES: 4
    • O.MEM_ACCESS: 2
    • O.RND: 2
    • O.SFR_ACCESS: 2
  • T:
    • T.RND: 2
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 4
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 1
  • TSystems:
    • T-Systems International: 100
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
    • RC:
      • RC2: 2
      • RC4: 2
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 2
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
  • AES_competition:
    • AES:
      • AES: 17
  • DES:
    • 3DES:
      • 3DES: 5
      • TDEA: 1
      • TDES: 14
      • Triple-DES: 2
    • DES:
      • DES: 7
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 6
      • KMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 2
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 10
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 9
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 7
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 9
    • SSHv2: 7
  • TLS:
    • SSL:
      • SSL: 5
  • PACE:
    • PACE: 165
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 4
    • RNG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP192r1: 1
    • brainpoolP224r1: 1
    • brainpoolP256r1: 1
    • brainpoolP320r1: 1
    • brainpoolP384r1: 1
    • brainpoolP512r1: 1
  • NIST:
    • NIST P-256: 2
    • P-256: 2
    • secp256r1: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
  • FI:
    • Malfunction: 7
    • Physical Tampering: 2
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 4
    • physical tampering: 2
  • SCA:
    • DPA: 1
    • Leak-Inherent: 5
    • Physical Probing: 2
    • physical probing: 3
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 3
    • EF.DG1: 8
    • EF.DG13: 1
    • EF.DG14: 4
    • EF.DG16: 6
    • EF.DG2: 5
    • EF.DG3: 9
    • EF.DG4: 8
    • EF.DG5: 3
    • EF.SOD: 5
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 2
  • X509:
    • X.509: 1
  • BSI:
    • AIS 31: 1
    • AIS 36: 1
    • AIS31: 5
    • AIS36: 4
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS 180: 1
    • FIPS 186: 2
    • FIPS 197: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 1
    • FIPS180: 2
    • FIPS186: 8
    • FIPS197: 3
  • ICAO:
    • ICAO: 13
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#3: 3
  • RFC:
    • RFC 2631: 1
    • RFC 5639: 5
    • RFC3369: 1
    • RFC5639: 8
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20150318142909+08'00'
  • /Creator:
  • /Keywords:
  • /ModDate: D:20150318142917+08'00'
  • /Producer: Foxit Reader PDF Printer Version 7.0.1.831
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 1322388
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different