name |
Alteon version 32.6.3.50 |
MultiApp ID Java Card Platform - MultiApp ID v1.0 and patch v3.1 embedded on the secure Microcontroller SLE66CX680PE-A13 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
FR |
status |
active |
archived |
not_valid_after |
03.05.2028 |
01.09.2019 |
not_valid_before |
03.05.2023 |
13.02.2008 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-42_Certificado.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-42-INF-4015.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_01fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-42_ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible2008_01en.pdf |
manufacturer |
Radware, LTD. |
Gemalto - Infineon Technologies AG |
manufacturer_web |
https://www.radware.com/products/alteon/ |
https://www.gemalto.com/ |
security_level |
EAL2 |
ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
dgst |
69b82608a6c3aa9c |
76e4088454d57adb |
heuristics/cert_id |
2021-42-INF-4015 |
ANSSI-CC-2008/01 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ATE_COV.2, ADV_RCR.1, AVA_VLA.4, ALC_TAT.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_FSP.2, ADV_IMP.2, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
32.6.3.50 |
3.1, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2008/02, ANSSI-CC-2010/59 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2008/02, ANSSI-CC-2010/59 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Others
- certification_date: 03.05.2023
- enhanced:
- category: Others
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1741
- certification_date: 03.05.2023
- description: The TOE is the Alteon version 32.6.3.50 series of products, with the TSF covering the core load balancing capabilities together with the SSL Offloading and part of the management capabilities. The TOE, thus, acts as a load balancer which redirects service request in a balanced way to multiple providing servers. As such, from hence forward the TOE may be referred as an ADC or as a load balancer interchangeably. Additionally, the TOE provides the following major security features: security audit, cryptographic support, user data protection, identification and authentication, security management, protection of the TSF, TOE access and trusted path/channel.
- evaluation_facility: Applus Laboratories
- level: EAL2
- manufacturer: RADWARE, LTD.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1742
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1740
- type: Product
- manufacturer: RADWARE, LTD.
- product: Alteon version 32.6.3.50
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/982-alteon-version-32-6-3-50
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
2021-42_Certificado.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 892166
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2021-42-INF-4015.pdf |
dcssi-2008_01fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4
- cc_version: Critères Communs version 2.3 conforme à la norme ISO 15408:2005
- cert_id: Plateforme Java Card MultiApp ID - Microcontrôleur SLE66CX680PE-A13 masqué par le logiciel MultiApp ID v1.0 et correctif v3.1 Rapport de certification DCSSI-2008/01 Page 3 sur 15 DCSSI-2008/01
- cert_item: Plateforme Java Card MultiApp ID - Microcontrôleur SLE66CX680PE-A13 masqué par le logiciel MultiApp ID v1.0 et correctif v3.1
- cert_item_version: Version 1.0
- cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Tél : +33 (0)5 57 26 08 75, mél : [email protected]
- developer: Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France Infineon Technologies AG Security & Chipcard ICs P.O. Box 80 09 49, 81609 München, Allemagne Commanditaire Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP/0304 JavaCard System Standard – JavaCard 2.1.1 configuration v1.0b
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 9
- EAL 4: 2
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 3
- EAL5: 1
- EAL5+: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_SCP: 1
- ADO:
- ADV:
- ADV_FSP: 1
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 1
- AVA_VLA: 1
- AVA_VLA.4: 2
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_STG.1: 1
- FCS:
- FCS_CKM.2: 1
- FCS_HTS.1: 1
- FCS_TLS: 1
- FCS_TLS.2: 1
- FDP:
- FIA:
- FIA_AFL.1: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FPT:
- FTA:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
- OE:
- OE.APPLET: 1
- OE.DEVELOPMENT: 1
- OE.VERIFICATION: 1
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon Technologies AG: 2
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- TLS:
- SSL:
- TLS:
- TLS: 1
- TLS1.2: 1
- TLS1.3: 2
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 1
|
pdf_data/report_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2.1: 1
- JavaCard 2.1.1: 3
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: watanabe
- /Comments: Gemalto
- /Company: SGDN/DCSSI
- /CreationDate: D:20080218175709+01'00'
- /Creator: Acrobat PDFMaker 7.0.7 pour Word
- /Keywords: CER/F/07.5
- /ModDate: D:20080218175713+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Subject: Plateforme Java Card MultiApp ID - Microcontrôleur SLE66CX680PE-A13 masqué par le logiciel MultiApp ID v1.0 et correctif v3.1
- /Title: DCSSI-2008/01
- pdf_file_size_bytes: 208518
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
pdf_data/st_filename |
2021-42_ST.pdf |
dcssi-cible2008_01en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 4
- EAL4 augmented: 3
- EAL4+: 7
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 2
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 2
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 9
- ACM_CAP: 1
- ACM_CAP.4: 19
- ACM_SCP: 1
- ACM_SCP.2: 5
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 8
- ADO_IGS: 1
- ADO_IGS.1: 6
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 10
- ADV_HLD: 1
- ADV_HLD.2: 14
- ADV_IMP: 1
- ADV_IMP.2: 11
- ADV_LLD: 1
- ADV_LLD.1: 15
- ADV_RCR: 1
- ADV_RCR.1: 5
- ADV_SPM: 1
- ADV_SPM.1: 9
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 12
- AGD_USR: 1
- AGD_USR.1: 10
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 11
- ALC_LCD: 1
- ALC_LCD.1: 7
- ALC_TAT: 1
- ALC_TAT.1: 8
- ATE:
- ATE_COV: 1
- ATE_COV.2: 6
- ATE_DPT: 1
- ATE_DPT.1: 5
- ATE_FUN: 1
- ATE_FUN.1: 10
- ATE_IND: 1
- ATE_IND.2: 8
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 17
- AVA_SOF: 7
- AVA_SOF.1: 7
- AVA_VLA: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 18
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_STG: 2
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 6
- FCS_CKM.1: 6
- FCS_CKM.2: 7
- FCS_CKM.2.1: 1
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_COP: 4
- FCS_HTS: 4
- FCS_HTS.1: 10
- FCS_HTS.1.1: 2
- FCS_HTS.1.2: 2
- FCS_TLS: 20
- FCS_TLS.1: 8
- FCS_TLS.1.1: 3
- FCS_TLS.1.2: 3
- FCS_TLS.1.3: 3
- FCS_TLS.2: 7
- FCS_TLS.2.1: 2
- FCS_TLS.2.2: 2
- FCS_TLS.2.3: 2
- FDP:
- FDP_ACC.1: 1
- FDP_IFC: 1
- FDP_IFC.1: 10
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_UAU: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 6
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 5
- FMT_SMR.2: 9
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_STM: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTP:
- FTP_ITC: 5
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 3
- FTP_TRP.1: 12
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCO:
- FCS:
- FCS_CKM: 16
- FCS_CKM.1: 3
- FCS_CKM.2: 3
- FCS_CKM.3: 3
- FCS_CKM.4: 3
- FCS_COP: 9
- FCS_COP.1: 6
- FDP:
- FDP_ACC: 6
- FDP_ACC.1: 1
- FDP_ACC.2: 5
- FDP_ACF: 7
- FDP_ACF.1: 14
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_IFC: 6
- FDP_IFC.1: 1
- FDP_IFC.2: 4
- FDP_IFF: 8
- FDP_IFF.1: 14
- FDP_IFF.2: 7
- FDP_IFF.2.2: 1
- FDP_IFF.2.7: 2
- FDP_ITC: 2
- FDP_ITC.2: 5
- FDP_RIP: 16
- FDP_RIP.1: 8
- FDP_ROL: 2
- FDP_ROL.1: 2
- FDP_SDI.2: 3
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 2
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 2
- FIA_ATD.1: 1
- FIA_UID: 10
- FIA_UID.1: 2
- FIA_UID.2: 1
- FIA_USB.1: 2
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 30
- FMT_MSA.1: 10
- FMT_MSA.2: 2
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 2
- FMT_MTD.1: 1
- FMT_MTD.3: 2
- FMT_MTD.3.1: 1
- FMT_SMF: 3
- FMT_SMF.1: 1
- FMT_SMR: 23
- FMT_SMR.1: 5
- FMT_SMR.1.1: 1
- FPR:
- FPR_UNO.1: 3
- FPR_UNO.1.1: 1
- FPT:
- FPT_AMT: 2
- FPT_AMT.1: 1
- FPT_FLS: 12
- FPT_FLS.1: 5
- FPT_PHP: 3
- FPT_PHP.3: 1
- FPT_RCV: 10
- FPT_RCV.3: 4
- FPT_RCV.4: 1
- FPT_RVM: 3
- FPT_RVM.1: 3
- FPT_SEP: 3
- FPT_SEP.1: 3
- FPT_TDC.1: 2
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 2
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT: 3
- FRU_FLT.1: 1
- FRU_RSA: 4
- FRU_RSA.1: 2
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.LIMITED_FUNCTIONALITY: 2
- A.MANAGEMENT_SEPARATION: 2
- A.NO_EVIL: 3
- A.PHYSICAL_PROTECTION: 3
- O:
- O.ACCESS: 9
- O.ADMINISTRATION: 7
- O.AUDIT: 11
- O.TRAFFIC_FLOW: 9
- O.TRUSTED_CHANNELS: 8
- OE:
- OE.NO_GENERAL_PURPOSE: 4
- OE.PHYSICAL_SECURITY: 5
- OE.TRUESTED_ADMINS: 1
- OE.TRUSTED_ADMINS: 5
- OSP:
- OSP.ACCOUNTABILITY: 3
- OSP.LOGS: 2
- OSP.ROLES: 3
- OSP.TRUSTED_ADMINISTRATORS: 2
- T:
- T.PASSWORD_CRACKING: 4
- T.UNBALANCED_LOAD: 3
- T.UNDETECTED_ACTIVITIES: 2
- T.WEAK_CRYPTOGRAPHY: 3
- T.WEAK_ENDPOINTS: 2
|
- A:
- A.APPLET: 2
- A.DELETION: 1
- A.NATIVE: 2
- A.VERIFICATION: 2
- D:
- D.API_DATA: 2
- D.APP_CODE: 2
- D.APP_C_DATA: 2
- D.APP_I_DATA: 2
- D.CRYPTO: 3
- D.JCS_CODE: 2
- D.JCS_DATA: 2
- D.PIN: 2
- D.SEC_DATA: 2
- O:
- O.APPLET: 16
- O.CODE_PCKG: 8
- O.CODE_PKG: 6
- O.DELETION: 1
- O.JAVAOBJECT: 38
- O.OBJ-DELETION: 1
- OE:
- OE.APPLET: 2
- OE.DEVELOPMENT: 2
- OE.NATIVE: 1
- OE.VERIFICATION: 2
- OP:
- OP.ARRAY_ACCESS: 3
- OP.BYTECODE: 1
- OP.CREATE: 5
- OP.DELETE_APPLET: 3
- OP.DELETE_PCKG: 2
- OP.DELETE_PCKG_APPLET: 2
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.JAVA: 4
- OP.PUT: 5
- OP.RECEIVE: 1
- OP.SEND: 1
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- OSP.NATIVE: 3
- OSP.VERIFICATION: 2
- OT:
- OT.ALARM: 2
- OT.CARD-MANAGEMENT: 2
- OT.CIPHER: 3
- OT.DELETION: 3
- OT.FIREWALL: 2
- OT.INSTALL: 2
- OT.KEY-MNGT: 6
- OT.LOAD: 2
- OT.NATIVE: 5
- OT.OBJ-DELETION: 2
- OT.OPERATE: 2
- OT.PIN-MNGT: 3
- OT.REALLOCATION: 2
- OT.RESOURCES: 2
- OT.SCP: 7
- OT.SHRD_VAR_CONFID: 2
- OT.SHRD_VAR_INTEG: 2
- OT.SID: 2
- OT.TRANSACTION: 3
- R:
- T:
- T.CONFID-APPLI-DATA: 2
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 2
- T.DELETION: 3
- T.EXE-CODE: 4
- T.INSTALL: 2
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 4
- T.INTEG-JCS-CODE: 2
- T.INTEG-JCS-DATA: 2
- T.NATIVE: 2
- T.OBJ-DELETION: 3
- T.PHYSICAL: 2
- T.RESOURCES: 2
- T.SID: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
- RSA:
- RSA 1024: 1
- RSA 1536: 1
- RSA2048: 1
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- SSL: 16
- SSL 2.0: 5
- SSL 3.0: 5
- TLS:
- TLS: 47
- TLS 1.0: 5
- TLS 1.1: 5
- TLS 1.2: 7
- TLS 1.3: 10
- TLS1.2: 1
- TLS1.3: 3
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- secp256r1: 3
- secp384r1: 3
- secp521r1: 3
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 4
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 4
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
- TLS_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_RSA_WITH_AES_256_GCM_SHA384: 4
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 2
- SCA:
- side channel: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- RFC:
- RFC 2818: 2
- RFC 4253: 1
- RFC 5246: 20
- RFC 5288: 16
- RFC 5289: 32
- RFC 8446: 24
- RFC2818: 1
- RFC3164: 4
- RFC5246: 2
- RFC5288: 1
- RFC5289: 1
- RFC5424: 4
- RFC8446: 5
|
- CC:
- CCIMB-2005-08-001: 1
- CCIMB-2005-08-002: 1
- CCIMB-2005-08-003: 1
- CCIMB-2005-08-004: 1
- FIPS:
- FIPS 180-2: 2
- FIPS 197: 1
- FIPS 46-3: 2
- ISO:
- NIST:
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 2
- javacard.security: 1
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: qnguyen
- /CreationDate: D:20080129094205+01'00'
- /Creator: PDFCreator Version 0.9.3
- /Keywords:
- /ModDate: D:20080129094205
- /Producer: GPL Ghostscript 8.54
- /Subject:
- /Title: ST_D1049224_Public
- pdf_file_size_bytes: 622088
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |