Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microcontrôleur ORION_CB_03
ANSSI-CC-2017/41
Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230
2019-7-INF-4068
name Microcontrôleur ORION_CB_03 Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230
category ICs, Smart Cards and Smart Card-Related Devices and Systems Other Devices and Systems
scheme FR ES
not_valid_after 07.06.2027 21.09.2028
not_valid_before 26.07.2017 21.06.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2017_41-s05.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_Certificado.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_41fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07-INF-4068.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_41-cible.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-07_ST.pdf
manufacturer INVIA Secure Semiconductor Huawei Technologies Co., Ltd.
manufacturer_web https://www.invia.fr https://www.huawei.com
security_level EAL5+, ALC_DVS.2, AVA_VAN.5 EAL4+, ALC_FLR.1
dgst 34afdb93cf8d78bd 0e8a25a9fbdc32c5
heuristics/cert_id ANSSI-CC-2017/41 2019-7-INF-4068
heuristics/cert_lab CEA []
heuristics/extracted_sars ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ALC_DEL.1, ASE_INT.1, ADV_ARC.1, ADV_FSP.5, AVA_VAN.5, ASE_ECD.1, ATE_DPT.3, ALC_LCD.1, ADV_IMP.1, ASE_REQ.2, ALC_DVS.2, ASE_OBJ.2, ATE_IND.2, ATE_FUN.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.5, ADV_INT.2, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1 ASE_INT.1, ASE_REQ.2, ADV_ARC.1, ALC_TAT.1, ATE_COV.2, AGD_OPE.1, ATE_FUN.1, ADV_IMP.1, ALC_DEL.1, ALC_CMC.4, AVA_VAN.3, ALC_FLR.1, ASE_CCL.1
heuristics/report_references/directly_referenced_by ANSSI-CC-2022/51 {}
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2022/51 {}
heuristics/scheme_data
  • category: Others
  • certification_date: 21.06.2023
  • enhanced:
    • category: Others
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1852
    • certification_date: 21.06.2023
    • description: The TOE is server service software that is deployed on CloudOS, which serves as a united network controller (UNC). UNC authenticates mobile subscribers onto the network system and tracks active and idle subscribers on the network system. UNC pages mobile subscribers when it is triggered by new data arriving for an idle subscriber at the assigned Serving GW (gateway). When a subscriber attaches to an eNodeB, the eNodeB select a UNC. UNC in turn selects the Serving GW and the PDN GW that will handle bearer packets of the subscriber. There are procedures to relocate a subscriber to a new UNC (and potentially a new Serving GW), when an active or idle subscriber moves to a new area outside of the current UNC control.
    • evaluation_facility: DEKRA Testing and Certification S.A.U.
    • level: EAL4 + ALC_FLR.1
    • manufacturer: Huawei Technologies Co., Ltd.
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1853
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1851
    • type: Product
  • manufacturer: Huawei Technologies Co., Ltd.
  • product: Huawei UNC V001R001C20SPC200 with Patch V100R001C20SPH230
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/995-huawei-unc-v001r001c20spc200-with-patch-v100r001c20sph230
heuristics/st_references/directly_referenced_by ANSSI-CC-2022/51 {}
heuristics/st_references/indirectly_referenced_by ANSSI-CC-2022/51 {}
heuristics/protection_profiles cf0f01bcd7be3e9c {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf {}
pdf_data/cert_filename certificat-anssi-cc-2017_41-s05.pdf 2019-07_Certificado.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2017/41-S05: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL5: 1
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.1: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.U: 1
  • O:
    • O.E: 1
  • R:
    • R.C: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 2
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA-LETI: 2
pdf_data/cert_metadata
  • /Author: mflament
  • /CreationDate: D:20220613140249+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20220613140249+02'00'
  • /Producer: Acrobat Distiller 21.0 (Windows)
  • /Title: Microsoft Word - Certificat ANSSI-CC-2017_41-S05
  • pdf_file_size_bytes: 1553065
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 934591
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename anssi-cc-2017_41fr.pdf 2019-07-INF-4068.pdf
pdf_data/report_frontpage
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2017/41
    • cert_item: Microcontrôleur ORION_CB_03
    • cert_item_version: Révision matériel C
    • cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
    • developer: INVIA Secure Semiconductor Meyreuil Arteparc – Bât D, route de la côte d’Azur, 13590 Meyreuil, France Commanditaire INVIA Secure Semiconductor Meyreuil Arteparc – Bât D, route de la côte d’Azur, 13590 Meyreuil, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité à “Package 1: Loader dedicated for usage in Secured Environment only
  • FR:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2017/41: 15
  • ES:
    • 2019-7-INF-4068- v1: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL4: 8
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 9
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAR.1: 1
    • FAU_STG.1: 1
  • FDP:
    • FDP_ACC.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU.4: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.3: 1
    • FMT_SMF.1: 1
  • FTA:
    • FTA_MCS: 2
    • FTA_SSL.3: 1
  • FTP:
    • FTP_TRP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.U: 4
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Huawei:
    • Huawei: 20
    • Huawei Technologies Co: 3
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 2
  • DEKRA:
    • DEKRA Testing and Certification: 4
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 31: 1
    • AIS31: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_metadata
  • /Author: Christian Benardeau
  • /CreationDate: D:20170801175442+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.024
  • /ModDate: D:20201104161309+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Microcontrôleur ORION_CB_03
  • /Title: ANSSI-CC-2017/41
  • pdf_file_size_bytes: 797558
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
pdf_data/st_filename anssi-cc-2017_41-cible.pdf 2019-07_ST.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 25
    • BSI-PP-0084: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL5: 8
    • EAL5 augmented: 2
  • EAL:
    • EAL4: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_IMP.1: 2
    • ADV_INT.2: 2
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 2
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
    • ALC_LCD.1: 1
    • ALC_TAT.2: 2
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 11
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 2
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 1
    • FAU_SAS: 7
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_RNG: 11
    • FCS_RNG.1: 9
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 11
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 14
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 21
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ITC.1: 1
    • FDP_ITT.1: 18
    • FDP_ITT.1.1: 1
    • FDP_SDC: 5
    • FDP_SDC.1: 12
    • FDP_SDC.1.1: 2
    • FDP_SDI: 19
    • FDP_SDI.1: 3
    • FDP_SDI.2: 7
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 5
    • FIA_API.1: 11
    • FIA_API.1.1: 2
  • FMT:
    • FMT_LIM: 22
    • FMT_LIM.1: 27
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 31
    • FMT_LIM.2.1: 2
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS.1: 19
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 16
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 19
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT.1: 1
    • FRU_FLT.2: 16
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 11
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 4
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 4
    • FAU_STG.3.1: 1
  • FDP:
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UAU.4: 4
    • FIA_UAU.4.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 4
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SAE.1: 3
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
  • FTA:
    • FTA_MCS: 10
    • FTA_MCS.1.1: 2
    • FTA_MCS.1.2: 2
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 6
  • OE:
    • OE.TOE: 1
  • T:
    • T.RND: 5
  • A:
    • A.ADMIN_CREDENTIALS_SECU: 1
    • A.ADMIN_CREDENTIALS_SECURE: 2
    • A.COMPONENTS_RUNNING: 3
    • A.ENVIRONMENT_ACL: 3
    • A.LIMITED_FUNCTIONALITY: 3
    • A.NETWORK_SEGREGATION: 3
    • A.PHYSICAL_PROTECTION: 3
    • A.RESIDUAL_INFORMATION: 3
    • A.TIME: 3
    • A.TRUSTED_ADMINISTRATOR: 3
  • O:
    • O.AUDIT: 5
    • O.COMMUNICA: 1
    • O.COMMUNICATI: 1
    • O.COMMUNICATION: 5
    • O.IDAUTH: 8
  • OE:
    • OE.ADMIN_CRE: 1
    • OE.ADMIN_CREDENTI: 2
    • OE.ADMIN_CREDENTIALS_SEC: 2
    • OE.COMPONEN: 1
    • OE.COMPONENTS_RU: 1
    • OE.COMPONENTS_RUNNING: 1
    • OE.ENVIRONM: 1
    • OE.ENVIRONMENT_AC: 1
    • OE.ENVIRONMENT_ACL: 1
    • OE.LIMITED_FU: 1
    • OE.LIMITED_FUNCTIO: 1
    • OE.LIMITED_FUNCTIONALITY: 1
    • OE.NETWORK_: 1
    • OE.NETWORK_SEGRE: 1
    • OE.NETWORK_SEGREGATION: 1
    • OE.NETWOR_SEGREG: 1
    • OE.NETWOR_SEGREGATION: 1
    • OE.PHYSICAL: 4
    • OE.RESIDUAL_I: 1
    • OE.RESIDUAL_INFOR: 3
    • OE.RESIDUAL_INFORMATION: 3
    • OE.TIME: 7
    • OE.TRUSTED_A: 1
    • OE.TRUSTED_ADMIN: 4
  • OSP:
    • OSP: 1
    • OSP.AUDIT: 4
  • T:
    • T.UNAUTHORIZED_: 2
    • T.UNAUTHORIZED_ADMINISTR: 1
    • T.UNTRUSTED_COMMUNICATI: 2
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.WEAK_AUTHENTICATION_E: 2
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 3
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
  • Huawei:
    • Huawei: 23
    • Huawei Technologies Co: 3
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • TDES: 2
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 7
  • constructions:
    • MAC:
      • HMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 3
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 3
      • SHA384: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 45
  • TLS:
    • SSL:
      • SSL: 12
    • TLS:
      • TLS: 33
      • TLS1.2: 1
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 11
    • RNG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • GCM:
    • GCM: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 22
    • malfunction: 10
    • physical tampering: 2
  • SCA:
    • Leak-Inherent: 17
    • Physical Probing: 5
    • Physical probing: 1
    • physical probing: 6
    • side channel: 2
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS140-2: 1
  • ISO:
    • ISO/IEC 7816-3: 1
pdf_data/st_metadata
  • /Author: Alain Pomet
  • /CreationDate: D:20201116134244+01'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20201116134244+01'00'
  • /Producer: Microsoft® Word 2013
  • /Title: Security Target
  • pdf_file_size_bytes: 1616979
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different