name |
Operator Terminal Adapter (OTA) |
Microsoft Windows 8.1, Phone 8.1 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
NO |
US |
status |
archived |
archived |
not_valid_after |
15.07.2024 |
11.02.2017 |
not_valid_before |
15.07.2019 |
16.03.2015 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-101%20C_v%201.0.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-101%20CR_v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10592-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/3AQ%2024863%20AAAA%20377%20EN%20Security%20Target%20for%20OTA%20ed.%206.2.9.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10592-st.pdf |
manufacturer |
Thales Norway AS |
Microsoft Corporation |
manufacturer_web |
https://www.thales.no/ |
https://www.microsoft.com |
security_level |
EAL5+, ALC_FLR.3 |
{} |
dgst |
332bae91ff39cc8f |
15c60fa3c2a41d40 |
heuristics/cert_id |
SERTIT-101 |
CCEVS-VR-VID-10592-2015 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, ASE_REQ.1, AGD_OPE.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
heuristics/extracted_versions |
- |
8.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Virtualization
- certification_date: 11.02.2021
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 11.02.2023
- id: CCEVS-VR-VID11087
- product: Microsoft Windows Server, Microsoft Windows 10 version 1909 (November 2019 Update), Microsoft Windows Server 2019 (version 1809) Hyper-V
- scheme: US
- url: https://www.niap-ccevs.org/product/11087
- vendor: Microsoft Corporation
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
7a7b216fc3e5f2ae |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MD_v1.1.pdf |
pdf_data/cert_filename |
SERTIT-101 C_v 1.0.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 5: 1
- EAL 5 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes: 895896
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
SERTIT-101 CR_v1.0.pdf |
st_vid10592-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10592-2015
- cert_item: for Microsoft Windows 8.1 and Windows 8.1 Phone
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10592-2015: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 5: 29
- EAL 5 augmented: 28
- EAL1: 1
- EAL5: 2
- EAL7: 1
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 1
- ALC_FLR.3: 30
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FDP:
- FDP_IFC.2: 1
- FDP_IFF.1: 1
- FDP_IFF.6: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FPT:
- FPT_FLS.1: 1
- FPT_PHP.1: 1
- FPT_TST.1: 1
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Microsoft:
- Microsoft: 58
- Microsoft Corporation: 1
- Qualcomm:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- ISO:
- ISO/IEC 15408: 8
- ISO/IEC 18045: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: borgosl
- /CreationDate: D:20190716144632+02'00'
- /Creator: Microsoft® Word 2013
- /Keywords: ugradert
- /ModDate: D:20190716144632+02'00'
- /Producer: Microsoft® Word 2013
- /Title: tittel
- pdf_file_size_bytes: 685022
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
- /CreationDate: D:20150317102727-04'00'
- /ModDate: D:20150317102727-04'00'
- pdf_file_size_bytes: 403290
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
3AQ 24863 AAAA 377 EN Security Target for OTA ed. 6.2.9.pdf |
st_vid10592-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 5
- EAL5 augmented: 3
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 4
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_TSU_EXT: 1
- ALC_TSU_EXT.1: 7
- ASE:
- ASE_CCL: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 19
- FAU_ARP.1.1: 3
- FAU_SAA.1: 5
- FAU_STG.2.2: 1
- FDP:
- FDP_IFC.1: 7
- FDP_IFC.2: 12
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.6: 8
- FDP_IFF.6.1: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 5
- FMT_SMR.1: 8
- FPT:
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_PHP.1: 5
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 41
- FCS_CKM.1.1: 3
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM_EXT: 5
- FCS_CKM_EXT.1: 6
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.2: 18
- FCS_CKM_EXT.2.1: 2
- FCS_CKM_EXT.3: 10
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 10
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 7
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 6
- FCS_CKM_EXT.6.1: 1
- FCS_COP.1: 60
- FCS_COP.1.1: 8
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 19
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_RBG_EXT.1.3: 2
- FCS_SRV_EXT: 1
- FCS_SRV_EXT.1: 6
- FCS_SRV_EXT.1.1: 1
- FCS_STG_EXT: 3
- FCS_STG_EXT.1: 8
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 2
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 11
- FCS_STG_EXT.2.1: 1
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 8
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_TLS_EXT.1: 7
- FCS_TLS_EXT.1.1: 1
- FCS_TLS_EXT.1.2: 1
- FCS_TLS_EXT.2: 8
- FCS_TLS_EXT.2.1: 1
- FCS_TLS_EXT.2.2: 1
- FDP:
- FDP_ACF_EXT: 1
- FDP_ACF_EXT.1: 6
- FDP_ACF_EXT.1.1: 1
- FDP_DAR_EXT.1: 16
- FDP_DAR_EXT.1.1: 2
- FDP_DAR_EXT.1.2: 2
- FDP_IFC.1.1: 1
- FDP_IFC_EXT: 1
- FDP_IFC_EXT.1: 6
- FDP_IFC_EXT.1.1: 1
- FDP_ITC_EXT.1: 1
- FDP_STG_EXT: 1
- FDP_STG_EXT.1: 7
- FDP_STG_EXT.1.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_AFL_EXT: 1
- FIA_AFL_EXT.1: 6
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_BLT_EXT: 1
- FIA_BLT_EXT.1: 6
- FIA_BLT_EXT.1.1: 1
- FIA_PAE_EXT: 1
- FIA_PAE_EXT.1: 6
- FIA_PAE_EXT.1.1: 1
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 1
- FIA_TRT_EXT: 1
- FIA_TRT_EXT.1: 6
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 3
- FIA_UAU_EXT.1: 7
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 8
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.2.2: 1
- FIA_UAU_EXT.3: 6
- FIA_UAU_EXT.3.1: 1
- FMT:
- FMT_MOF.1: 28
- FMT_MOF.1.1: 3
- FMT_SMF: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 2
- FMT_SMF_EXT: 1
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 1
- FPT:
- FPT_AEX_EXT: 4
- FPT_AEX_EXT.1: 6
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.1.3: 3
- FPT_AEX_EXT.1.4: 1
- FPT_AEX_EXT.2: 6
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.2.2: 2
- FPT_AEX_EXT.3: 6
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 6
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_ITC_EXT: 1
- FPT_KST_EXT: 3
- FPT_KST_EXT.1: 8
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 6
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 6
- FPT_KST_EXT.3.1: 1
- FPT_NOT_EXT: 1
- FPT_NOT_EXT.1: 6
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 6
- FPT_TST_EXT.2.1: 1
- FPT_TST_EXT.2.2: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FPT_TUD_EXT.1.4: 1
- FPT_TUD_EXT.2: 6
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.2.4: 1
- FPT_TUD_EXT.2.5: 3
- FPT_TUD_EXT.2.6: 2
- FTA:
- FTA_SSL_EXT: 1
- FTA_SSL_EXT.1: 6
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTA_WSE_EXT: 1
- FTA_WSE_EXT.1: 6
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_ITC_EXT.1: 7
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUDIT: 2
- A.CLEARANCE: 3
- A.MAN: 2
- A.OTA: 3
- A.PHYSICAL: 4
- A.SELF: 3
- A.TRAINING: 2
- A.USAGE: 3
- A.VCS: 3
- O:
- O.ALARM: 14
- O.AUDIT: 1
- O.CROSS-: 1
- O.CROSS-TALK: 10
- O.FILTER: 5
- O.SEC: 20
- O.SELF: 7
- O.TX: 7
- OE:
- OE.AUDIT: 4
- OE.MAN: 9
- OE.RECORDING: 3
- OE.SELF: 4
- T:
- T.ACOUSTIC: 3
- T.CONN: 3
- T.MISUSE: 2
- T.SEC: 3
- T.TAMPERING: 4
- T.TEMPEST: 3
- T.UNAUTHORISED: 2
- T.WRONG: 3
|
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.PRECAUTION: 1
- O:
- O.AUTH: 1
- O.COMMS: 1
- O.CONFIG: 1
- O.INTEGRITY: 1
- O.STORAGE: 1
- OE:
- OE.CONFIG: 1
- OE.NOTIFY: 1
- OE.PRECAUTION: 1
- T:
- T.EAVESDROP: 1
- T.FLAWAPP: 1
- T.NETWORK: 1
- T.PERSISTENT: 1
- T.PHYSICAL: 1
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Microsoft:
- Microsoft: 189
- Microsoft Corporation: 5
- Qualcomm:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 39
- AES-: 2
- AES-128: 6
- AES-256: 5
- AES256: 1
- RC:
- DES:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 23
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
- HMAC-SHA-512: 3
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 8
- DHE: 2
- Diffie-Hellman: 10
- DSA:
- RSA:
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-256: 6
- SHA-384: 6
- SHA-512: 7
- SHA256: 3
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- KA: 16
- Key Agreement: 10
- Key agreement: 1
- KEX:
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 11
- IKEv1: 2
- IKEv2: 2
- IPsec:
- TLS:
- SSL:
- TLS:
- TLS: 71
- TLS 1.0: 7
- TLS 1.1: 1
- TLS 1.2: 2
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 20
- P-284: 6
- P-384: 8
- P-521: 14
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 5
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- malfunction: 1
- physical tampering: 3
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- ISO:
|
- FIPS:
- FIPS 140: 1
- FIPS 140-1: 2
- FIPS 140-2: 5
- FIPS 180-3: 1
- FIPS 186-4: 12
- FIPS 197: 2
- FIPS 198-1: 1
- FIPS 198-2: 1
- FIPS PUB 186-4: 5
- FIPS PUB 197: 1
- NIST:
- NIST SP 800-132: 2
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38F: 5
- NIST SP 800-56A: 3
- NIST SP 800-56B: 2
- NIST SP 800-57: 1
- NIST SP 800-90: 1
- SP 800-108: 2
- SP 800-132: 1
- SP 800-56A: 3
- SP 800-90: 2
- RFC:
- RFC 2246: 4
- RFC 2396: 1
- RFC 2560: 1
- RFC 2818: 2
- RFC 2986: 2
- RFC 3268: 1
- RFC 3546: 2
- RFC 4301: 1
- RFC 4306: 1
- RFC 4346: 1
- RFC 4366: 1
- RFC 4492: 1
- RFC 4681: 1
- RFC 5216: 1
- RFC 5246: 8
- RFC 5280: 4
- RFC 5289: 5
- RFC 5759: 1
- RFC 6460: 4
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this security target. T.FLAWAPP Malicious or Flawed Application: Applications loaded onto the: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20190325162731+01'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20190325162731+01'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 1044516
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 48
|
- /CreationDate: D:20150317091244-04'00'
- /ModDate: D:20150317091244-04'00'
- pdf_file_size_bytes: 2124079
- pdf_hyperlinks: http://www.ietf.org/rfc/rfc4346.txt, http://www.ietf.org/rfc/rfc4306.txt, mailto:[email protected], http://msdn.microsoft.com/en-us/library/windows/apps/windows.devices.humaninterfacedevice.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.networking.vpn.aspxn, http://msdn.microsoft.com/en-us/library/windows/apps/dn298272.aspx, http://i.dell.com/sites/doccontent/shared-content/solutions/en/Documents/wireless_interoperability_and_radio_approval_information_english_us.pdf, http://support.microsoft.com/kb/816042#method2, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.dataprotection.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.security.cryptography.certificates.certificateenrollmentmanager.importpfxdataasync.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.asymmetrickeyalgorithmprovider.createkeypair.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.hashalgorithmprovider.hashdata.aspx, http://www.ietf.org/rfc/rfc3268.txt, http://www.intel.com/content/www/us/en/processors/core/3rd-gen-core-desktop-vol-1-datasheet.html, http://www.ietf.org/rfc/rfc4681.txt, http://msdn.microsoft.com/en-us/library/windows/desktop/aa374757(v=vs.85).aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.signhasheddataasync.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.decrypt.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.hashalgorithmprovider.createhash.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.encrypt.aspx, http://www.ietf.org/rfc/rfc4492.txt, http://www.wi-fi.org/certified-products-results?cid=WFA50617&op=Search&sortby=default&org=0&ga_category_2=&ga_capabilities=%5B%5D&category=Select&start_date%5Bdate%5D=&end_date%5Bdate%5D=&form_build_id=form-3yBIr4lyqqVZ2f-iRnAk2v4uLq1CW6OLldw4xPkhwKg&form_id=wifi_cert_api_advanced_search_form, http://creativecommons.org/licenses/by-nd-nc/1.0/, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.sign.aspx, http://msdn.microsoft.com/en-us/library/windows/hardware/ff556022(v=vs.85).aspx, http://msdn.microsoft.com/en-us/library/windows/apps/dn298266.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.signasync.aspx, http://technet.microsoft.com/en-us/library/cc773013(v=WS.10).aspx, https://www.niap-ccevs.org/pp/pp_swfde_v1.1.pdf, http://technet.microsoft.com/en-us/library/cc783349(v=WS.10).aspx, https://www.niap-ccevs.org/st/st_vid10540-st.pdf, https://www.niap-ccevs.org/st/st_vid10540-vr.pdf, http://www.intel.com/content/www/us/en/processors/core/4th-gen-core-family-mobile-u-y-processor-lines-vol-1-datasheet.html, http://tools.ietf.org/html/rfc5280, http://www.ietf.org/rfc/rfc2246.txt, http://msdn.microsoft.com/en-us/library/windows/apps/windows.devices.bluetooth.rfcomm.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.verifysignaturewithhashinput.aspx, http://www.ietf.org/rfc/rfc3546.txt, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.signhasheddata.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.cryptographicbuffer.generaterandomnumber.aspx, https://www.niap-ccevs.org/st/st_vid10520-st.pdf, http://msdn.microsoft.com/en-us/library/windows/apps/windows.networking.vpn.aspx, https://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00, http://msdn.microsoft.com/en-us/library/windows/desktop/aa374757(v=vs.85).aspx), http://www.intel.com/content/www/us/en/processors/core/4th-gen-core-family-desktop-vol-1-datasheet.html, http://www.microsoft.com/security/default.aspx, http://www.ietf.org/rfc/rfc5246.txt, http://msdn.microsoft.com/en-us/library/windows/apps/windows.security.cryptography.core.asymmetrickeyalgorithmprovider.importkeypair.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.devices.usb.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.security.cryptography.core.keyderivationparameters.buildforpbkdf2.aspx, http://msdn.microsoft.com/en-us/library/ms725473(v=vs.85).aspx, http://www.ietf.org/rfc/rfc4366.txt, http://msdn.microsoft.com/en-us/library/jj709814.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.verifysignature.aspx, http://www.ietf.org/rfc/rfc4301.txt, http://www.wi-fi.org/content/search-page?keys=wfa51001, http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm, http://msdn.microsoft.com/en-us/library/windows/apps/dn279161.aspx, http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0464f/index.html, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.cryptographicbuffer.generaterandom.aspx, http://msdn.microsoft.com/en-us/library/ms724962(v=vs.85).aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.security.cryptography.certificates.certificate.buildchainasync.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.web.http.httpclient.aspx, https://www-ssl.intel.com/content/www/us/en/processors/atom/atom-z36xxx-z37xxx-datasheet-vol-1.html, http://msdn.microsoft.com/en-us/library/windows/desktop/aa376545(v=vs.85).aspx, http://technet.microsoft.com/en-us/library/cc733982(v=WS.10).aspx, http://msdn.microsoft.com/en-us/library/aa375458(v=VS.85).aspx, http://csrc.nist.gov/publications/nistpubs/800-56B/sp800-56B.pdf, http://www.wi-fi.org/content/search-page?keys=Lumia%20520, http://www.ietf.org/rfc/rfc5289.txt, http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf, http://technet.microsoft.com/en-us/library/cc766159(v=WS.10).aspx, http://www.ietf.org/rfc/rfc2409.txt
- pdf_is_encrypted: False
- pdf_number_of_pages: 152
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |