Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
KeyW Protect for Samsung, Version 1.2.1.0
CCEVS-VR-11061-2020
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 )
ANSSI-CC-2023/42
name KeyW Protect for Samsung, Version 1.2.1.0 Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 )
category Data Protection ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
status archived active
not_valid_after 09.06.2022 29.09.2028
not_valid_before 09.06.2020 29.09.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11061-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_42fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11061-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_42fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11061-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_42en.pdf
manufacturer KeyW Corporation THALES DIS FRANCE SA
manufacturer_web https://www.keywcorp.com https://www.thalesgroup.com/en/europe/france
security_level {} EAL5+, ALC_DVS.2, AVA_VAN.5
dgst 50865c2a977d2baf 5f61ebf23c6ad99d
heuristics/cert_id CCEVS-VR-11061-2020 ANSSI-CC-2023/42
heuristics/cert_lab US []
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ALC_DVS.2, AVA_VAN.5
heuristics/extracted_versions 1.2.1.0 5.1, 3.1, 5.2.1
heuristics/report_references/directly_referencing {} ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/protection_profiles a1cc4a4e079f4d1f, aac242206b8a0606 d9553e7194783182, d918b28fd7bb5d79, 4a814d0e3c9f9082, 27abdb9c6ab375a7
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_FE_V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf
pdf_data/cert_filename st_vid11061-ci.pdf Certificat-CC-2023_42fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11061-2020: 1
  • FR:
    • ANSSI-CC-2023/42: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.C: 1
    • A.O: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 1
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_metadata
  • /CreationDate: D:20200612112602-04'00'
  • /ModDate: D:20200612112602-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 182130
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20230929173949+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20230929174206+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 158885
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid11061-vr.pdf ANSSI-CC-2023_42fr.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-11061-2020
    • cert_item: KeyW Corporation KeyW Protect for Samsung, Version 1.2.1.0
    • cert_lab: US NIAP
  • FR:
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-11061-2020: 1
  • FR:
    • ANSSI-CC-2023/01: 2
    • ANSSI-CC-2023/31: 3
    • ANSSI-CC-2023/42: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0071-2012-MA-01: 2
    • BSI-CC-PP-0072-2012-MA-01: 2
    • BSI-CC-PP-0075-2012-MA-01: 2
    • BSI-CC-PP-0076-2013-MA-01: 2
  • other:
    • PP-SSCD-: 1
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
    • PP-SSCD-Part4: 2
    • PP-SSCD-Part5: 2
    • PP-SSCD-Part6: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.C: 4
    • A.O: 4
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 13
  • Samsung:
    • Samsung: 61
  • Gemalto:
    • Gemalto: 1
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
pdf_data/st_filename st_vid11061-st.pdf ANSSI-cible-2023_42en.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • CC-1: 2
    • CC-2: 2
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-CC-PP-0099-V2-2020: 1
  • other:
    • PP-SSCD: 4
    • PP-SSCD-KG: 37
    • PP-SSCD-KI: 28
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 2
  • EAL:
    • EAL 5+: 1
    • EAL5: 3
    • EAL5 augmented: 1
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 4
    • ALC_CMS: 1
    • ALC_CMS.1: 5
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 7
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
  • ALC:
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.6: 2
    • FCS_CKM_EXT.6.1: 1
    • FCS_CKM_EXT.6.3: 1
    • FCS_COP.1: 6
    • FCS_RBG_EXT.1: 3
    • FCS_SMC_EXT.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_PRT_EXT.1.1: 1
  • FIA:
    • FIA_AUT_EXT.1.1: 1
  • FAU:
    • FAU_ARP.1: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 59
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 3
    • FCS_CKM.3: 1
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 2
    • FCS_COP: 35
    • FCS_COP.1: 6
    • FCS_COP.1.1: 2
    • FCS_RNG: 1
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 55
    • FDP_ACC.1: 27
    • FDP_ACC.1.1: 4
    • FDP_ACF: 43
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_AFC: 1
    • FDP_DAU: 11
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 9
    • FDP_IFF: 2
    • FDP_ITC: 11
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.2: 8
    • FDP_RIP: 6
    • FDP_RIP.1: 17
    • FDP_RIP.1.1: 1
    • FDP_SDI: 22
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
    • FDP_UCT: 11
    • FDP_UCT.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 20
    • FIA_AFL.1: 4
    • FIA_API: 5
    • FIA_API.1: 14
    • FIA_API.1.1: 2
    • FIA_ATD: 2
    • FIA_UAU: 28
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 25
    • FIA_UID.1: 14
    • FIA_USB: 1
  • FMT:
    • FMT_LIM: 2
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 80
    • FMT_MSA.1: 10
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.4: 3
    • FMT_MTD: 25
    • FMT_MTD.1: 3
    • FMT_SMF: 6
    • FMT_SMF.1: 27
    • FMT_SMF.1.1: 1
    • FMT_SMR: 7
    • FMT_SMR.1: 36
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS: 6
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 1
    • FPT_RCV: 2
    • FPT_TST: 2
    • FPT_TST.1: 14
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 42
    • FTP_ITC.1: 16
    • FTP_TRP: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.SHUTDOWN: 1
  • OE:
    • OE.AUTHORIZATION_FACTOR_STRENGTH: 1
    • OE.PLATFORM: 1
    • OE.POWER_SAVE: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
    • OE.STRONG_ENVIRONMENT_CRYPTO: 1
  • A:
    • A.C: 5
    • A.CAP_FILE: 4
    • A.CGA: 3
    • A.CSP: 3
    • A.O: 5
    • A.SCA: 3
    • A.VERIFICATION: 4
  • O:
    • O.ALARM: 1
    • O.ARRAY_VIEWS_CONFID: 1
    • O.CARD-MANAGEMENT: 1
    • O.CIPHER: 1
    • O.CONFID-OS-UPDATE: 2
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.INSTALL: 1
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.RNG: 1
    • O.SCP: 3
    • O.SECURE_AC_ACTIVATION: 2
    • O.SECURE_LOAD_ACODE: 2
    • O.SID: 1
    • O.TOE_IDENTIFICATION: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.CAP_FILE: 5
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 5
    • OE.HID_VAD: 3
    • OE.PERSONALISATION: 2
    • OE.PROT_LOGICAL_DATA: 1
    • OE.SCP: 2
    • OE.TERMINAL: 2
    • OE.USER_OBLIGATIONS: 1
    • OE.VERIFICATION: 7
pdf_data/st_keywords/vendor
  • Qualcomm:
    • Qualcomm: 14
  • Samsung:
    • Samsung: 86
  • Thales:
    • Thales: 75
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 34
  • constructions:
    • MAC:
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 6
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 4
    • DES:
      • DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 16
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF: 3
    • PBKDF2: 5
  • SHA:
    • SHA2:
      • SHA-256: 4
      • SHA-384: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • VPN:
    • VPN: 1
  • PACE:
    • PACE: 16
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 12
  • RNG:
    • RBG: 2
  • RNG:
    • RND: 1
    • RNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 6
    • P-384: 6
    • P-521: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • fault induction: 1
    • fault injection: 1
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 2
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
  • NIST:
    • NIST SP 800-132: 2
    • NIST SP 800-38E: 3
    • NIST SP 800-38F: 2
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 5
    • SP 800-132: 2
    • SP 800-38A: 1
    • SP 800-38F: 1
  • CC:
    • CCMB-2012-04-003: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS197: 2
  • ICAO:
    • ICAO: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 3
pdf_data/st_keywords/javacard_packages
  • com:
    • com.samsung.android.knox: 1
  • java:
    • java.security: 2
  • org:
    • org.json: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • by authorized users. The functionalities of IAS Classic 5.2.1 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.1.1 application) provides biometry recognition with: 1
    • out of scope: 1
pdf_data/st_metadata
  • /CreationDate: D:20200612104042-04'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20200612104042-04'00'
  • /Producer: Microsoft® Word 2013
  • pdf_file_size_bytes: 1370199
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
  • /Author: Emmanuel BACHIMON
  • /CreationDate: D:20230504155302+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20230504155302+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: IAS Classic v5.2 on MultiApp V5.1- Security Target
  • pdf_file_size_bytes: 2282348
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 69
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different