This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Petra Cipher V4.0 None |
Tenable Security Center 3.2 (SC3) with 3D Tool 1.2 (3DT), Log Correlation Engine 2.0.2 (LCE), Passive Vulnerability Scanner 3.0 (PVS), and Nessus Scanner 3.0.4 (Nessus) CCEVS-VR-VID-10273-2010 |
|
---|---|---|
name | Petra Cipher V4.0 | Tenable Security Center 3.2 (SC3) with 3D Tool 1.2 (3DT), Log Correlation Engine 2.0.2 (LCE), Passive Vulnerability Scanner 3.0 (PVS), and Nessus Scanner 3.0.4 (Nessus) |
category | Databases | Detection Devices and Systems |
scheme | KR | US |
status | active | archived |
not_valid_after | 22.10.2029 | 01.11.2014 |
not_valid_before | 22.10.2024 | 31.01.2010 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-24-54%20Petra%20Cipher%20V4.0(eng)(??).pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10273-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Petra%20Cipher%20V4.0-ASE(Security%20Target)-V1.4(ENG).pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10273-st.pdf |
manufacturer | SINSIWAY Co., LTD. | Tenable Network Security, Inc. |
manufacturer_web | https://www.sinsiway.com/ | https://www.tenable.com/ |
security_level | US Standard | EAL2+ |
dgst | 66829680145540fa | b1453ddae675bfa6 |
heuristics/cert_id | CCEVS-VR-VID-10273-2010 | |
heuristics/cert_lab | [] | US |
heuristics/extracted_sars | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, ATE_FUN.1, AVA_VAN.1, ATE_IND.1, ATE_COV.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 | ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_COV.1, ATE_IND.2, ALC_FLR.3, ADV_HLD.1, AVA_SOF.1 |
heuristics/extracted_versions | 4.0 | 3.0.4, 3.0, 2.0.2, 3.2, 1.2 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | 6f83fc6eba388cf0 | {} |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/KECS-PP-0821a-2017_PP_EN.pdf | {} |
pdf_data/report_filename | st_vid10273-vr.pdf | |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id | ||
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr | ||
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor | ||
pdf_data/report_keywords/eval_facility | ||
pdf_data/report_keywords/symmetric_crypto | ||
pdf_data/report_keywords/asymmetric_crypto | ||
pdf_data/report_keywords/pq_crypto | ||
pdf_data/report_keywords/hash_function | ||
pdf_data/report_keywords/crypto_scheme | ||
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness | ||
pdf_data/report_keywords/cipher_mode | ||
pdf_data/report_keywords/ecc_curve | ||
pdf_data/report_keywords/crypto_engine | ||
pdf_data/report_keywords/tls_cipher_suite | ||
pdf_data/report_keywords/crypto_library | ||
pdf_data/report_keywords/vulnerability | ||
pdf_data/report_keywords/side_channel_analysis | ||
pdf_data/report_keywords/technical_report_id | ||
pdf_data/report_keywords/device_model | ||
pdf_data/report_keywords/tee_name | ||
pdf_data/report_keywords/os_name | ||
pdf_data/report_keywords/cplc_data | ||
pdf_data/report_keywords/ic_data_group | ||
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version | ||
pdf_data/report_keywords/javacard_api_const | ||
pdf_data/report_keywords/javacard_packages | ||
pdf_data/report_keywords/certification_process | ||
pdf_data/report_metadata |
|