Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM
383-4-270
Oracle Enterprise Linux Version 5 Update 1
BSI-DSZ-CC-0481-2008
name Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM Oracle Enterprise Linux Version 5 Update 1
category Other Devices and Systems Operating Systems
scheme CA DE
not_valid_after 19.04.2018 01.09.2019
not_valid_before 16.07.2013 15.10.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/belkin-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0481a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/belkin-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0481b.pdf
manufacturer Belkin International, Inc. Oracle Corporation
manufacturer_web https://www.belkin.com https://www.oracle.com
dgst 40eda3a9b18267e3 f13f26271d047c8f
heuristics/cert_id 383-4-270 BSI-DSZ-CC-0481-2008
heuristics/cert_lab CANADA BSI
heuristics/cpe_matches {} cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*, cpe:2.3:o:oracle:linux:5:9:*:*:*:*:*:*, cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
heuristics/related_cves {} CVE-2011-2306, CVE-2016-3458, CVE-2016-1962, CVE-2016-2796, CVE-2014-9584, CVE-2007-6283, CVE-2016-2792, CVE-2016-2795, CVE-2016-3598, CVE-2014-7169, CVE-2016-5258, CVE-2016-5252, CVE-2016-5262, CVE-2016-1950, CVE-2016-5403, CVE-2016-1954, CVE-2016-2797, CVE-2016-2799, CVE-2016-2801, CVE-2016-4470, CVE-2014-3153, CVE-2014-3687, CVE-2014-2678, CVE-2015-0235, CVE-2016-1964, CVE-2016-5265, CVE-2016-1966, CVE-2016-1952, CVE-2015-3195, CVE-2016-2776, CVE-2014-0203, CVE-2016-2794, CVE-2016-2790, CVE-2014-1737, CVE-2016-2182, CVE-2015-8000, CVE-2014-3673, CVE-2016-1965, CVE-2016-2798, CVE-2016-3710, CVE-2016-3550, CVE-2016-1977, CVE-2014-1738, CVE-2016-0695, CVE-2016-5263, CVE-2016-5264, CVE-2016-3500, CVE-2016-1961, CVE-2016-2837, CVE-2016-2800, CVE-2014-6271, CVE-2016-1930, CVE-2016-1957, CVE-2013-4312, CVE-2014-9644, CVE-2015-2922, CVE-2016-2793, CVE-2016-2791, CVE-2016-3508, CVE-2016-1960, CVE-2016-1973, CVE-2016-5254, CVE-2016-2178, CVE-2016-1935, CVE-2016-5259, CVE-2016-3427, CVE-2016-5387, CVE-2016-1958, CVE-2016-2177, CVE-2016-1974, CVE-2016-2802, CVE-2015-0239, CVE-2016-3610, CVE-2013-7421
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, ASE_REQ.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ALC_FLR.3, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1
heuristics/extracted_versions - 1, 5
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0427-2007
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0427-2007
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0766-2012, BSI-DSZ-CC-0765-2012
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0766-2012, BSI-DSZ-CC-0765-2012
heuristics/protection_profiles fd5d86dc01df0437 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf {}
pdf_data/report_filename belkin-cert-eng.pdf 0481a.pdf
pdf_data/report_frontpage
  • DE:
  • CA:
    • cert_id: 383-4-270 CR
    • cert_lab: CANADA
  • DE:
    • cert_id: BSI-DSZ-CC-0481-2008
    • cert_item: Oracle Enterprise Linux Version 5 Update 1
    • cert_lab: BSI
    • developer: Oracle Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-270: 1
  • DE:
    • BSI-DSZ-CC-0427-2007: 4
    • BSI-DSZ-CC-0481-2008: 19
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 2
    • EAL 4+: 2
    • EAL4: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 3
    • EAL 4 augmented: 2
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 9
    • EAL4 augmented: 1
    • EAL4+: 2
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 2
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_FLR.3: 5
    • ALC_LCD: 1
    • ALC_TAT: 2
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 4
  • atsec:
    • atsec: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
    • RC:
      • RC4: 1
  • DES:
    • 3DES:
      • 3DES: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 4
  • TLS:
    • SSL:
      • SSL: 5
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • BSI:
    • AIS 14: 1
    • AIS 32: 1
    • AIS 34: 2
    • AIS19: 1
  • ISO:
    • ISO/IEC 15408:2005: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Evaluation Technical Report Oracle Enterprise Linux 5 Update 1, atsec information security GmbH (confidential document) [8] Configuration list for the TOE, 7 July 2008, SVN logs for EL 5.1 x86-64 security evaluation: 1
pdf_data/report_metadata
  • /Author: User
  • /CCEF: CCEF name
  • /CR date: dd month yyyy
  • /CR version: x.x
  • /Certificate date: dd month yyyy
  • /Comments:
  • /Company:
  • /CreationDate: D:20131004084035-04'00'
  • /Creator: Acrobat PDFMaker 10.0 for Word
  • /Developer name: Developer name
  • /Document number: 383-4-xx-CR
  • /ETR title, version, date: ETR title, version, date
  • /Evaluation completion date: dd month yyyy
  • /Manager:
  • /ModDate: D:20131004084142-04'00'
  • /Producer: Acrobat Distiller 10.0.0 (Windows)
  • /ST Title: ST title
  • /ST date: dd month yyyy
  • /ST version: ST version
  • /Sponsor: Sponsor
  • /Subject:
  • /TOE Version: 5.0
  • /TOE name and version: TOE name and version
  • /TOE short name: TOE short name
  • /Title: EAL 4+ Evaluation of Belkin® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM
  • pdf_file_size_bytes: 64923
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20081106141556+01'00'
  • /Creator: Writer
  • /Keywords: "Oracle Enterprise LinuxVersion 5 Update 1, Oracle Corporation, BSI-DSZ-CC-0481-2008"
  • /ModDate: D:20081107123841+01'00'
  • /Producer: StarOffice 8
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0481-2008
  • pdf_file_size_bytes: 768415
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename belkin-sec-eng.pdf 0481b.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL 4: 68
    • EAL 4 augmented: 65
    • EAL4: 1
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL3: 1
    • EAL4: 6
    • EAL4 augmented: 3
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 2
    • ALC_FLR.3: 71
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 6
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_FLR.3: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_REQ.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.2: 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 5
    • FDP_ETC: 1
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 33
    • FDP_IFC.1: 6
    • FDP_IFF: 27
    • FDP_IFF.1: 12
    • FDP_ITC: 1
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
  • FMT:
    • FMT_MSA: 4
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 3
    • FMT_SMR.1: 3
  • FPT:
    • FPT_PHP: 2
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
  • FAU:
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 10
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 12
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 11
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 12
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 11
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 11
    • FAU_STG.3.1: 1
    • FAU_STG.4: 11
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 19
    • FCS_CKM.2.1: 4
    • FCS_CKM.4: 4
    • FCS_COP.1: 19
    • FCS_COP.1.1: 3
  • FDP:
    • FDP_ACC.1: 39
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 3
    • FDP_ETC: 1
    • FDP_ETC.1: 9
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 10
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 16
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 4
    • FDP_IFF.2: 10
    • FDP_IFF.2.1: 1
    • FDP_IFF.2.2: 1
    • FDP_IFF.2.3: 1
    • FDP_IFF.2.4: 1
    • FDP_IFF.2.5: 1
    • FDP_IFF.2.6: 1
    • FDP_IFF.2.7: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 11
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 11
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 2
    • FDP_MSA.3: 1
    • FDP_RIP.2: 14
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 11
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 11
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_ATD.1: 17
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 14
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 13
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 11
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 15
    • FIA_UID.2.1: 1
    • FIA_USB: 1
    • FIA_USB.1: 27
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 40
    • FMT_MSA.1.1: 6
    • FMT_MSA.2: 16
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 38
    • FMT_MSA.3.1: 5
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 69
    • FMT_MTD.1.1: 6
    • FMT_MTD.3: 11
    • FMT_MTD.3.1: 1
    • FMT_REV.1: 29
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 16
    • FMT_SMR.2: 24
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_AMT.1: 10
    • FPT_AMT.1.1: 1
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_RCV: 1
    • FPT_RCV.1: 10
    • FPT_RCV.1.1: 1
    • FPT_RCV.4: 9
    • FPT_RCV.4.1: 1
    • FPT_RVM.1: 14
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 18
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 12
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_LSA.1: 10
    • FTA_LSA.1.1: 1
    • FTA_TSE.1: 10
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 16
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.MANAGE: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 2
  • O:
    • O.CONF: 7
    • O.INDICATE: 3
    • O.ROM: 11
    • O.SELECT: 3
    • O.SWITCH: 7
    • O.TAMPER: 6
    • O.UNIDIR: 11
    • O.USBDETECT: 6
  • OE:
    • OE.ACCESS: 3
    • OE.MANAGE: 2
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 2
  • T:
    • T.INFECTED: 3
    • T.INVALIDUSB: 3
    • T.PERIP: 3
    • T.RESIDUAL: 3
    • T.ROM_PROG: 3
    • T.SPOOF: 3
    • T.TAMPER: 3
    • T.TRANSFER: 3
  • A:
    • A.ACCESS: 3
    • A.ASSET: 3
    • A.CLEARANCE: 3
    • A.CONNECT: 7
    • A.COOP: 3
    • A.LOCATE: 3
    • A.MANAGE: 5
    • A.NET_COMP: 5
    • A.NO_EVIL_ADMIN: 4
    • A.OWNER: 3
    • A.PEER: 3
    • A.PROTECT: 5
    • A.SENSITIVITY: 3
    • A.UTRAIN: 3
    • A.UTRUST: 3
  • O:
    • O.AUDITING: 19
    • O.AUTHORIZATION: 18
    • O.COMPROT: 23
    • O.DISCRETIONARY_ACCESS: 15
    • O.DUTY: 7
    • O.ENFORCEMENT: 12
    • O.HIERARCHICAL: 7
    • O.MANAGE: 33
    • O.MANDATORY_ACCESS: 18
    • O.RESIDUAL_INFO: 9
    • O.RESIDUAL_INFORMATION: 1
    • O.ROLE: 21
  • OE:
    • OE.ADMIN: 7
    • OE.CREDEN: 4
    • OE.HW_SEP: 8
    • OE.INFO_PROTECT: 20
    • OE.INSTALL: 12
    • OE.MAINTENANCE: 5
    • OE.PHYSICAL: 8
    • OE.PROTECT: 10
    • OE.RECOVER: 8
    • OE.SERIAL_LOGIN: 4
    • OE.SOFTWARE_IN: 5
  • T:
    • T.ACCESS: 4
    • T.COMPROT: 3
    • T.OPERATE: 3
    • T.ROLEDEV: 5
    • T.UAUSER: 4
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Microsoft:
    • Microsoft: 4
  • Samsung:
    • Samsung: 3
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA: 1
  • atsec:
    • atsec: 125
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
    • RC:
      • RC4: 4
  • DES:
    • 3DES:
      • TDES: 6
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 2
  • miscellaneous:
    • SM4:
      • SM4: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 32
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 3
  • IPsec:
    • IPsec: 9
  • SSH:
    • SSH: 34
  • TLS:
    • SSL:
      • SSL: 45
    • TLS:
      • TLS: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
  • libgcrypt:
    • libgcrypt: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 10
  • other:
    • reverse engineering: 1
  • FI:
    • malfunction: 8
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 3268: 1
  • X509:
    • X.509: 3
pdf_data/st_keywords/javacard_api_const
  • curves:
    • SM2: 4
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • outside of the TOE, such as the hypervisor’s enforcement of separation between guest VMs, is out of scope for this Security Target. 2.4.3 TOE Environment Several TOE systems may be interlinked in a network: 1
pdf_data/st_metadata
  • /Author: krshann
  • /CreationDate: D:20130909140137-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20130910104630-04'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title: Microsoft Word - Belkin Secure DVI KVM Switch ST Rev 1_01 updated by keith.docx
  • pdf_file_size_bytes: 739602
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different