Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Entrust nShield Solo XC Hardware Security Module v12.60.15
NSCIB-CC-0368256-CR
Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252))
ANSSI-CC-2023/17
name Entrust nShield Solo XC Hardware Security Module v12.60.15 Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252))
category Products for Digital Signatures Mobility
scheme NL FR
not_valid_after 17.03.2026 27.03.2028
not_valid_before 17.03.2021 27.03.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-certificate%2021-0368256.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2023_17.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0368256-CR-1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_17fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0368256-ST-1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_17en.pdf
manufacturer Entrust, Inc. Apple Inc.
manufacturer_web https://www.entrust.com https://www.apple.com/
security_level EAL4+, AVA_VAN.5, ALC_FLR.2 ALC_FLR.3, ADV_FSP.3, EAL2+
dgst 5267a9b98b878ef1 cb2e15c281fc9c89
heuristics/cert_id NSCIB-CC-0368256-CR ANSSI-CC-2023/17
heuristics/cert_lab []
heuristics/cpe_matches {} cpe:2.3:o:apple:watchos:8.5:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2022-32875, CVE-2025-24137, CVE-2023-32428, CVE-2023-40448, CVE-2024-23288, CVE-2024-23207, CVE-2024-40812, CVE-2024-54505, CVE-2023-32391, CVE-2024-44171, CVE-2023-27928, CVE-2023-32416, CVE-2025-31226, CVE-2024-23225, CVE-2022-26702, CVE-2024-54497, CVE-2023-32354, CVE-2023-42846, CVE-2023-42946, CVE-2022-46695, CVE-2024-27816, CVE-2024-40813, CVE-2023-40417, CVE-2024-44254, CVE-2023-42823, CVE-2024-40857, CVE-2022-42813, CVE-2022-32907, CVE-2023-27931, CVE-2024-44233, CVE-2022-48618, CVE-2022-46690, CVE-2024-54499, CVE-2024-44232, CVE-2022-32866, CVE-2022-32932, CVE-2024-27820, CVE-2024-54512, CVE-2024-54526, CVE-2023-42890, CVE-2022-32899, CVE-2024-27826, CVE-2023-32402, CVE-2023-38580, CVE-2023-38596, CVE-2024-23218, CVE-2022-32888, CVE-2023-32423, CVE-2024-23206, CVE-2023-38136, CVE-2022-26768, CVE-2023-37450, CVE-2024-54500, CVE-2023-40452, CVE-2023-40395, CVE-2023-40429, CVE-2023-23499, CVE-2024-54560, CVE-2024-54510, CVE-2024-40793, CVE-2023-41984, CVE-2023-32404, CVE-2024-23287, CVE-2022-32815, CVE-2024-44296, CVE-2024-54534, CVE-2024-54479, CVE-2024-54468, CVE-2024-54508, CVE-2024-23296, CVE-2024-23286, CVE-2023-42970, CVE-2021-36690, CVE-2023-32389, CVE-2023-32441, CVE-2024-44274, CVE-2025-31217, CVE-2023-38604, CVE-2023-40432, CVE-2023-32390, CVE-2023-34352, CVE-2022-32824, CVE-2023-42949, CVE-2023-42947, CVE-2023-42898, CVE-2022-32947, CVE-2022-42852, CVE-2022-32858, CVE-2023-23517, CVE-2024-27811, CVE-2022-37434, CVE-2025-31205, CVE-2022-42837, CVE-2022-26700, CVE-2023-32388, CVE-2024-40788, CVE-2022-32913, CVE-2023-42888, CVE-2025-43200, CVE-2024-44185, CVE-2023-38594, CVE-2024-44273, CVE-2023-41174, CVE-2022-32924, CVE-2023-42852, CVE-2022-32825, CVE-2024-44170, CVE-2023-32412, CVE-2023-40412, CVE-2023-32433, CVE-2024-23208, CVE-2022-26757, CVE-2022-32813, CVE-2023-41071, CVE-2024-27851, CVE-2024-54467, CVE-2023-32403, CVE-2022-26711, CVE-2023-40408, CVE-2022-32814, CVE-2025-24123, CVE-2022-42859, CVE-2023-42862, CVE-2022-32883, CVE-2024-54551, CVE-2022-42808, CVE-2023-23535, CVE-2025-31233, CVE-2024-40776, CVE-2024-54501, CVE-2024-44239, CVE-2022-32845, CVE-2023-27933, CVE-2023-41976, CVE-2024-27810, CVE-2024-23282, CVE-2025-24085, CVE-2024-40777, CVE-2024-23204, CVE-2024-40780, CVE-2022-42863, CVE-2025-31239, CVE-2024-44194, CVE-2022-32820, CVE-2024-40782, CVE-2023-42866, CVE-2023-32425, CVE-2022-26765, CVE-2024-40805, CVE-2023-41254, CVE-2024-40789, CVE-2024-27805, CVE-2024-40850, CVE-2024-54513, CVE-2024-23231, CVE-2025-31241, CVE-2025-24162, CVE-2023-41073, CVE-2023-40456, CVE-2024-44255, CVE-2024-44234, CVE-2022-46691, CVE-2022-46692, CVE-2022-32940, CVE-2023-42878, CVE-2023-28191, CVE-2023-38611, CVE-2023-42848, CVE-2022-40304, CVE-2024-23239, CVE-2023-27954, CVE-2023-40528, CVE-2025-31215, CVE-2022-42866, CVE-2024-54658, CVE-2022-32908, CVE-2024-44191, CVE-2023-38572, CVE-2024-23250, CVE-2023-32409, CVE-2025-24131, CVE-2023-40396, CVE-2023-32373, CVE-2024-54538, CVE-2025-24117, CVE-2022-32821, CVE-2023-23504, CVE-2024-23210, CVE-2022-32911, CVE-2023-40413, CVE-2024-27834, CVE-2024-44282, CVE-2024-54518, CVE-2022-26764, CVE-2022-32835, CVE-2023-41070, CVE-2022-42801, CVE-2022-42811, CVE-2025-31203, CVE-2022-26709, CVE-2023-42865, CVE-2023-32396, CVE-2022-42867, CVE-2025-31251, CVE-2024-27821, CVE-2022-42864, CVE-2023-32394, CVE-2023-23511, CVE-2024-40836, CVE-2025-24111, CVE-2024-44169, CVE-2023-40420, CVE-2024-40779, CVE-2023-41997, CVE-2022-26714, CVE-2024-44240, CVE-2024-44176, CVE-2025-31221, CVE-2023-40400, CVE-2024-44269, CVE-2024-23284, CVE-2023-40520, CVE-2023-36495, CVE-2024-40787, CVE-2024-44244, CVE-2022-46694, CVE-2023-32413, CVE-2023-41068, CVE-2023-27932, CVE-2024-27823, CVE-2023-28202, CVE-2023-27929, CVE-2022-32914, CVE-2023-32384, CVE-2024-54486, CVE-2023-40409, CVE-2023-38606, CVE-2025-24184, CVE-2023-32424, CVE-2024-44302, CVE-2023-38593, CVE-2024-27814, CVE-2023-32372, CVE-2024-40824, CVE-2024-23289, CVE-2024-27880, CVE-2023-35993, CVE-2023-40399, CVE-2025-31206, CVE-2022-42799, CVE-2023-27937, CVE-2023-40419, CVE-2022-32826, CVE-2022-32817, CVE-2023-32392, CVE-2022-26766, CVE-2023-41982, CVE-2025-31212, CVE-2023-23502, CVE-2024-54478, CVE-2024-27828, CVE-2023-23527, CVE-2024-27801, CVE-2023-27956, CVE-2023-32432, CVE-2024-23278, CVE-2023-32398, CVE-2023-42953, CVE-2024-40835, CVE-2022-2294, CVE-2025-31223, CVE-2024-27884, CVE-2024-23235, CVE-2024-23246, CVE-2023-40410, CVE-2024-27815, CVE-2022-32787, CVE-2024-44183, CVE-2025-24126, CVE-2023-41074, CVE-2023-42893, CVE-2022-32816, CVE-2025-24161, CVE-2023-32408, CVE-2025-24223, CVE-2024-54541, CVE-2024-23251, CVE-2023-38598, CVE-2024-23213, CVE-2025-24251, CVE-2022-32894, CVE-2025-31222, CVE-2023-38595, CVE-2025-31209, CVE-2024-23226, CVE-2023-32434, CVE-2022-32944, CVE-2023-39434, CVE-2024-23271, CVE-2022-32903, CVE-2024-23212, CVE-2022-46689, CVE-2024-23223, CVE-2024-27840, CVE-2024-23297, CVE-2023-42936, CVE-2023-42839, CVE-2022-42823, CVE-2023-42875, CVE-2024-44297, CVE-2024-54525, CVE-2022-22675, CVE-2025-24129, CVE-2022-26716, CVE-2022-32889, CVE-2024-23254, CVE-2024-44155, CVE-2022-32793, CVE-2024-44192, CVE-2025-31219, CVE-2022-32810, CVE-2024-23265, CVE-2025-24189, CVE-2023-23512, CVE-2024-23291, CVE-2022-26710, CVE-2025-24163, CVE-2023-40427, CVE-2024-54527, CVE-2024-40818, CVE-2022-42803, CVE-2023-23505, CVE-2025-24149, CVE-2024-23280, CVE-2024-54502, CVE-2024-40784, CVE-2023-32734, CVE-2023-41988, CVE-2024-27859, CVE-2022-46700, CVE-2024-40785, CVE-2023-38565, CVE-2022-32792, CVE-2023-32420, CVE-2022-32840, CVE-2023-42957, CVE-2023-32361, CVE-2023-28185, CVE-2024-44225, CVE-2024-40799, CVE-2023-23524, CVE-2023-23537, CVE-2022-32847, CVE-2024-27806, CVE-2024-54494, CVE-2024-40815, CVE-2023-40414, CVE-2023-32381, CVE-2023-34425, CVE-2022-32928, CVE-2025-24107, CVE-2023-27963, CVE-2023-38599, CVE-2025-24158, CVE-2023-27969, CVE-2022-48503, CVE-2023-41990, CVE-2023-23496, CVE-2024-44278, CVE-2023-38600, CVE-2022-23308, CVE-2022-46705, CVE-2023-32400, CVE-2024-54522, CVE-2022-26726, CVE-2023-28181, CVE-2024-44212, CVE-2022-42849, CVE-2023-35074, CVE-2024-27856, CVE-2022-48610, CVE-2023-42834, CVE-2023-38133, CVE-2024-54517, CVE-2023-23519, CVE-2023-41061, CVE-2024-40806, CVE-2023-23500, CVE-2024-27800, CVE-2024-54543, CVE-2022-42795, CVE-2022-32891, CVE-2022-46696, CVE-2023-27961, CVE-2022-32844, CVE-2023-42942, CVE-2022-32788, CVE-2022-42825, CVE-2023-42937, CVE-2023-32368, CVE-2022-42817, CVE-2025-24160, CVE-2023-42950, CVE-2024-23217, CVE-2024-40822, CVE-2024-44285, CVE-2022-32854, CVE-2022-46699, CVE-2024-0258, CVE-2022-42842, CVE-2023-42849, CVE-2023-40424, CVE-2024-54542, CVE-2022-26981, CVE-2024-23290, CVE-2024-44198, CVE-2022-32841, CVE-2022-42845, CVE-2023-27930, CVE-2022-42865, CVE-2024-23263, CVE-2025-24086, CVE-2024-44215, CVE-2023-35984, CVE-2023-32393, CVE-2022-26717, CVE-2022-42824, CVE-2022-32879, CVE-2022-42798, CVE-2025-31238, CVE-2024-44144, CVE-2023-38590, CVE-2023-42899, CVE-2023-28204, CVE-2022-40303, CVE-2022-32898, CVE-2023-41968, CVE-2024-54535, CVE-2024-40795, CVE-2023-32352, CVE-2025-31204, CVE-2023-23503, CVE-2023-42914, CVE-2022-32864, CVE-2022-32925, CVE-2022-42843, CVE-2024-27804, CVE-2022-26706, CVE-2023-27942, CVE-2024-23201, CVE-2024-54514, CVE-2022-32881, CVE-2024-27863, CVE-2022-32926, CVE-2023-35990, CVE-2022-26771, CVE-2025-31257, CVE-2023-40454, CVE-2022-1622, CVE-2025-31262, CVE-2023-40447, CVE-2023-32407, CVE-2023-32399, CVE-2025-24159, CVE-2022-26763, CVE-2023-23518, CVE-2022-32857, CVE-2023-38592, CVE-2024-54530, CVE-2024-44187, CVE-2024-40829, CVE-2024-27808, CVE-2023-32417, CVE-2025-31208, CVE-2024-27832, CVE-2024-40809, CVE-2024-27838, CVE-2024-23293, CVE-2023-41065, CVE-2023-40403, CVE-2022-32819, CVE-2023-32445, CVE-2025-24144, CVE-2025-24124, CVE-2022-32832, CVE-2022-43454, CVE-2024-40774, CVE-2024-23215, CVE-2022-26719, CVE-2023-32438, CVE-2024-54523, CVE-2022-32823, CVE-2022-32923, CVE-2024-23211, CVE-2024-44290, CVE-2023-32376, CVE-2023-32357, CVE-2022-32790, CVE-2022-42800, CVE-2023-42883, CVE-2022-46698, CVE-2023-41981, CVE-2024-27830, CVE-2022-32839, CVE-2022-46693, CVE-2022-32870
heuristics/extracted_sars AVA_VAN.5, ATE_IND.2, ALC_FLR.2 AGD_OPE.1, ASE_ECD.1, ADV_FSP.3, ALC_DEL.1, ALC_CMS.2, ADV_ARC.1, ATE_COV.1, AVA_VAN.2, ASE_SPD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ATE_IND.2, ADV_TDS.1, ALC_FLR.3, ASE_TSS.1, ATE_FUN.1, AGD_PRE.1, ALC_CMC.2
heuristics/extracted_versions 12.60.15 8.5.1
heuristics/scheme_data
heuristics/protection_profiles ee319f4a624019b0 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-PP-2016_05 PP.pdf {}
pdf_data/cert_filename NSCIB-certificate 21-0368256.pdf certificat-cc-2023_17.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-PP-2016/05-M01: 1
  • NL:
    • CC-21-0368256: 1
  • FR:
    • ANSSI-CC-2023/17: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2016/05-M01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL7: 1
  • EAL:
    • EAL2: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
  • AVA:
    • AVA_VAN.5: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20210614114037+01'00'
  • /Creator: C458-M
  • /ModDate: D:20210614123528+02'00'
  • /Producer: KONICA MINOLTA bizhub C458
  • /Title: C458-M&S21061411400
  • pdf_file_size_bytes: 210038
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename NSCIB-CC-0368256-CR-1.0.pdf anssi-cc-2023_17fr.pdf
pdf_data/report_frontpage
  • FR:
  • NL:
    • cert_id: NSCIB-CC-0368256-CR
    • cert_item: nShield Solo XC Hardware Security Module v12.60.15
    • cert_lab: Brightsight B.V
    • developer: nCipher Security Limited (an Entrust company
  • FR:
  • NL:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-PP-2016/05-M01: 1
  • NL:
    • NSCIB-CC-0368256-CR: 12
  • FR:
    • ANSSI-CC-2023/17: 2
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2016/05-M01: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 2
  • EAL:
    • EAL2: 3
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 2
  • ATE:
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 4
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_COP: 1
  • FTP:
    • FTP_TRP: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • other:
    • JIL: 1
    • JIL-AAPHD: 1
    • JIL-AMHD: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 19790:2012: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
pdf_data/st_filename NSCIB-CC-0368256-ST-1.1.pdf anssi-cible-cc-2023_17en.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-: 1
    • ANSSI-CC-PP-2016/05-: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 59
    • EAL4 augmented: 3
  • EAL:
    • EAL 2: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 58
  • AVA:
    • AVA_VAN.5: 60
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 2
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.3: 3
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 1
    • FAU_STG.2: 5
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
    • FCS_RNG: 12
    • FCS_RNG.1: 5
  • FDP:
    • FDP_ACC: 15
    • FDP_ACC.1: 10
    • FDP_ACF: 14
    • FDP_ACF.1: 12
    • FDP_IFC: 10
    • FDP_IFC.1: 7
    • FDP_IFF: 9
    • FDP_IFF.1: 10
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU: 13
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6: 2
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA: 22
    • FMT_MSA.1: 5
    • FMT_MSA.3: 9
    • FMT_MTD: 12
    • FMT_MTD.1: 2
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 4
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 4
    • FPT_PHP.3.1: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TST_EXT.1: 9
    • FPT_TST_EXT.1.1: 1
  • FTP:
    • FTP_TRP: 15
    • FTP_TRP.1: 3
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 11
    • FDP_ACC.2: 4
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 16
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 7
    • FDP_ETC.2: 2
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_IFC.1: 8
    • FDP_ITC: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 8
    • FIA_AFL.1: 5
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 12
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 8
    • FPT_RPL.1: 6
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • OT:
    • OT.A: 1
    • OT.D: 2
    • OT.RNG: 3
  • R:
    • R.RAD: 1
  • A:
    • A.CDCVM: 3
    • A.DEVICE_AUTH: 3
    • A.IPHONE_USER: 3
    • A.PERSO: 3
  • D:
    • D.OS: 16
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • OT:
    • OT.-: 1
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIMMING: 2
    • T.USURP: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
    • Microsoft Corporation: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • DES:
    • 3DES:
      • TDEA: 1
      • Triple-DES: 4
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 3
      • HMAC: 2
      • HMAC-SHA-224: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RNG: 31
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 2
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP160r1: 1
    • brainpoolP192r1: 1
    • brainpoolP192t1: 1
    • brainpoolP224r1: 3
    • brainpoolP224t1: 1
    • brainpoolP256r1: 3
    • brainpoolP256t1: 3
    • brainpoolP320r1: 3
    • brainpoolP320t1: 3
    • brainpoolP384r1: 3
    • brainpoolP384t1: 3
    • brainpoolP512r1: 3
    • brainpoolP512t1: 3
  • NIST:
    • B-163: 1
    • B-233: 3
    • B-283: 3
    • B-409: 3
    • B-571: 3
    • K-163: 1
    • K-233: 3
    • K-283: 3
    • K-409: 3
    • K-571: 3
    • NIST P-192: 1
    • NIST P-224: 2
    • P-192: 1
    • P-224: 4
    • P-256: 6
    • P-384: 6
    • P-521: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 2
    • physical tampering: 2
  • SCA:
    • side-channels: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 4
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 31: 9
    • AIS31: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 140-2: 6
    • FIPS 180-4: 1
    • FIPS 186-4: 2
    • FIPS 197: 2
    • FIPS 198-1: 1
  • ISO:
    • ISO/IEC 19790:2012: 1
  • NIST:
    • NIST SP 800-22: 1
    • NIST SP 800-90A: 3
    • SP 800-108: 1
    • SP 800-38A: 1
    • SP 800-38B: 1
    • SP 800-38C: 1
    • SP 800-38D: 1
    • SP 800-38F: 1
    • SP 800-56A: 2
    • SP 800-67: 1
    • SP 800-90A: 3
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 2
    • PKCS#11: 2
  • RFC:
    • RFC 8017: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 140-3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Impath, out of scope) with a remote Hardserver (typically on an application server or PC: 1
    • for the TOE. The Hardserver instance in the Connect XC establishes a secure channel (Impath, out of scope) with a remote Hardserver (typically on an application server or PC), which also includes libraries: 1
    • out of scope: 3
    • support higher level APIs, for example, but not limited to NFKM, PKCS#11, MSCAPI, etc. These are out of scope of the TOE. Figure 3 Configuration 1: TOE in Connect XC 8 of 55 nShield Solo XC HSM Security: 1
    • support higher level APIs, for example, but not limited to, NFKM, PKCS#11, MSCAPI, etc. These are out of scope of the TOE. Figure 4 Configuration 2: TOE in host server 1.3.3 Usage and major security features of: 1
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • to return to its User. Note: Defending against device re-use after phys- ical compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker: 1
pdf_data/st_metadata
state/cert/convert_garbage True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/extract_ok True False
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different