name |
Cisco Aggregation Services Router 9000 (ASR9K) running IOS-XR 7.11 |
MaskTech eSign Applet on Secora ID S v1.1 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
NL |
status |
active |
active |
not_valid_after |
14.12.2026 |
18.10.2027 |
not_valid_before |
23.01.2025 |
18.10.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11484-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-22-0299278-cert.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11484-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0299278-cr-1.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11484-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0299278-stlite-1.2.pdf |
manufacturer |
Cisco Systems, Inc. |
MaskTech International GmbH |
manufacturer_web |
https://www.cisco.com |
https://www.masktech.de/ |
security_level |
{} |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
6ce5c5cdca5d92fe |
004dabd39b1e8b9c |
heuristics/cert_id |
CCEVS-VR-VID-11484-2025 |
NSCIB-CC-0299278-CR |
heuristics/cert_lab |
US |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
7.11 |
1.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V5-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1110-V5-2022, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
51ed84742f89c3f7, 89f2a255423f4a20 |
d9553e7194783182, d918b28fd7bb5d79, 4a814d0e3c9f9082, 1f7ea2e05de5b88b, 27abdb9c6ab375a7 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_MACSEC_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf |
pdf_data/cert_filename |
st_vid11484-ci.pdf |
nscib-cc-22-0299278-cert.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11484-2025: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-: 1
- BSI-CC-PP-0076-2013-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 7: 1
- EAL2: 1
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_DVS.2: 1
- ALC_FLR.3: 2
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Cisco:
- Cisco: 1
- Cisco Systems, Inc: 1
|
|
pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Producer: WeasyPrint 62.3
- /Title: VID11484-FINAL CERT
- pdf_file_size_bytes: 136674
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: kruitr
- /CreationDate: D:20221029175132+02'00'
- /Creator: Bullzip PDF Printer (11.0.0.2588)
- /ModDate: D:20221029175200+02'00'
- /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
- /Title: Microsoft Word - NSCIB-CC-22-0299278-Cert.docx
- pdf_file_size_bytes: 255047
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid11484-vr.pdf |
nscib-cc-0299278-cr-1.0.pdf |
pdf_data/report_frontpage |
- NL:
- US:
- cert_id: CCEVS-VR-VID11484-2025
- cert_item: for the Cisco Aggregation Services Router 9000 (ASR9K) running IOS-XR 7.11
- cert_lab: US NIAP
|
- NL:
- cert_id: NSCIB-CC-0299278-CR
- cert_item: MaskTech eSign Applet on Secora™ ID S v1.1
- cert_lab: SGS Brightsight B.V.
- developer: MaskTech International GmbH
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11484-2025: 1
|
- DE:
- BSI-DSZ-CC-1110-V5-2022: 2
- NL:
- NSCIB-CC-0299278-CR: 12
- NSCIB-CC-21-175887-CR3: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-: 1
- BSI-CC-PP-0071-2012-: 1
- BSI-CC-PP-0072-2012-: 1
- BSI-CC-PP-0075-2012-MA-01E: 1
- BSI-CC-PP-0076-2013-MA-01: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_DVS.2: 2
- ALC_FLR.1: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.2: 1
- FCS_COP: 8
- FCS_MKA_EXT.1: 1
- FCS_RBG_EXT.1: 1
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Cisco:
- Cisco: 55
- Cisco Systems, Inc: 2
|
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 2
|
pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 2
- SGS Brightsight: 2
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- SCA:
- other:
- JIL: 2
- JIL-AAPS: 1
- JIL-AM: 1
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
- PKCS:
- RFC:
- X509:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- BSI-DSZ- CC- 1110-V5-2022, ETR for Composite evaluation (EFC), TÜV Informationstechnik GmbH (confidential document) [HW-ST] Public Security Target BSI-DSZ-CC-1110-V5-2022, Version 2.0, 2022-03-28, “Public Security: 1
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
st_vid11484-st.pdf |
nscib-cc-0299278-stlite-1.2.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-S-0183-2021: 1
- BSI-DSZ-CC-S-0189-2021: 1
- BSI-DSZ-CC-S-0207-2021: 1
- NL:
- CC-22-175887: 3
- CC-299277: 1
- NSCIB-CC-299277: 1
- NSCIB-CC-299278: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0071: 1
- BSI-CC-PP- 0072: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0059: 2
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0075-MA-01: 1
- BSI-CC-PP-0076: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0086-2015: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5: 12
- EAL5 augmented: 8
- EAL6: 4
- EAL6 augmented: 4
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_IMP.1: 3
- ADV_INT.2: 2
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 2
- ALC_DEL.1: 2
- ALC_DVS.2: 10
- ALC_FLR.1: 1
- ALC_LCD.1: 2
- ALC_TAT.2: 2
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.2: 3
- ASE_SPD.1: 3
- ASE_TSS.1: 3
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM.2.1: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 36
- FCS_COP.1: 6
- FCS_MKA_EXT.1: 3
- FCS_MKA_EXT.1.1: 1
- FCS_MKA_EXT.1.2: 1
- FCS_MKA_EXT.1.3: 1
- FCS_MKA_EXT.1.4: 1
- FCS_MKA_EXT.1.5: 1
- FCS_MKA_EXT.1.6: 1
- FCS_MKA_EXT.1.7: 3
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT.1: 6
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SNMP_EXT.1: 1
- FCS_SSHS_EXT.1: 7
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.1: 5
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2.3: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_AFL_EXT.1: 1
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT.1: 5
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 4
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 5
- FMT_MTD: 9
- FMT_MTD.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FMT_SNMP_EXT.1: 1
- FPT:
- FPT_APW_EXT.1: 3
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_CAK_EXT.1: 3
- FPT_CAK_EXT.1.1: 1
- FPT_DDP_EXT.1: 1
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_RPL: 2
- FPT_RPL.1: 6
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_RPL_EXT.1: 2
- FPT_SKP_EXT: 1
- FPT_SKP_EXT.1: 3
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 5
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.4: 3
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 6
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 9
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_TRP: 5
- FTP_TRP.1: 4
|
- FAU:
- FCO:
- FCS:
- FCS_CKM: 45
- FCS_CKM.1: 22
- FCS_CKM.2: 10
- FCS_CKM.3: 1
- FCS_CKM.4: 41
- FCS_CKM.4.1: 1
- FCS_COP: 59
- FCS_COP.1: 28
- FCS_COP.1.1: 1
- FCS_RND: 1
- FCS_RND.1: 9
- FCS_RND.1.1: 1
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 65
- FDP_ACC.1: 36
- FDP_ACF: 27
- FDP_ACF.1: 35
- FDP_AFC: 13
- FDP_DAU: 6
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_IFC: 2
- FDP_IFC.1: 18
- FDP_IFF: 2
- FDP_ITC: 7
- FDP_ITC.1: 17
- FDP_ITC.2: 14
- FDP_RIP: 9
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FDP_ROL: 2
- FDP_SDI: 11
- FDP_SDI.1: 2
- FDP_SDI.2: 5
- FDP_UCT: 7
- FDP_UCT.1: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 14
- FIA_AFL.1: 7
- FIA_API: 1
- FIA_API.1: 8
- FIA_API.1.1: 1
- FIA_ATD: 1
- FIA_UAU: 20
- FIA_UAU.1: 18
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 2
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UID: 2
- FIA_UID.1: 20
- FIA_UID.1.1: 2
- FIA_UID.1.2: 1
- FIA_USB: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA: 64
- FMT_MSA.1: 9
- FMT_MSA.2: 5
- FMT_MSA.2.1: 1
- FMT_MSA.3: 20
- FMT_MSA.3.1: 1
- FMT_MSA.4: 4
- FMT_MTD: 34
- FMT_MTD.1: 5
- FMT_SMF: 3
- FMT_SMF.1: 34
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 40
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 9
- FPT_EMS.1: 8
- FPT_FLS: 4
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITC: 1
- FPT_PHP.1: 4
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 6
- FPT_PHP.3.1: 1
- FPT_RCV: 1
- FPT_TDC.1: 1
- FPT_TST: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ICT: 3
- FTP_ITC: 25
- FTP_ITC.1: 16
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- O:
- O.AUTHENTICATION_MACSEC: 1
- O.AUTHORIZED_ADMINISTRATION: 1
- O.CRYPTOGRAPHIC_FUNCTIONS_MACSEC: 1
- O.PORT_FILTERING_MACSEC: 1
- O.REPLAY_DETECTION: 1
- O.SYSTEM_MONITORING_MACSEC: 1
- O.TSF_INTEGRITY: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.DATA_INTEGRITY: 1
- T.NETWORK_ACCESS: 1
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UNTRUSTED_MACSEC_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- A.CGA: 3
- A.CSP: 5
- A.SCA: 3
- O:
- O.ALARM: 1
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 1
- O.COMMUNICATION: 1
- O.DELETION: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.GLOBAL_ARRAYS_INTEG: 1
- O.INSTALL: 1
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.SCP: 4
- O.SID: 1
- O.TRANSACTION: 1
- OE:
- OE.APPLET: 2
- OE.CGA_TC_: 1
- OE.CODE-EVIDENCE: 2
- OE.HID_VAD: 10
- OE.VERIFICATION: 5
- OT:
- OT.EMSEC_: 2
- OT.TOE_TC_: 1
|
pdf_data/st_keywords/vendor |
- Cisco:
- Cisco: 46
- Cisco Systems: 1
- Cisco Systems, Inc: 3
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 12
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- CMAC: 8
- HMAC: 11
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 5
- TDES: 4
- Triple-DES: 2
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 4
- SHA-512: 6
- SHA2: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 1
- SSL 2.0: 1
- SSL 3.0: 1
- TLS:
- TLS: 49
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 1
- TLS v1.2: 1
- TLSv1.2: 1
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 4
- P-384: 2
- P-521: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- malfunction: 2
- physical tampering: 5
- SCA:
- physical probing: 2
- side channel: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 2
- FIPS 186-4: 2
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 2
- FIPS PUB 186-3: 2
- FIPS PUB 186-4: 8
- FIPS PUB 198-1: 1
- FIPS140-2: 1
- ISO:
- ISO/IEC 10116: 2
- ISO/IEC 18031:2011: 4
- ISO/IEC 18033-3: 1
- ISO/IEC 19772: 2
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-: 2
- NIST:
- NIST SP 800-38B: 1
- NIST SP 800-38F: 3
- NIST SP 800-56A: 1
- NIST SP 800-90A: 2
- PKCS:
- RFC:
- RFC 3268: 4
- RFC 3447: 2
- RFC 4253: 1
- RFC 5077: 1
- RFC 5246: 1
- RFC 5280: 6
- RFC 6125: 1
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408-1: 2
- ISO/IEC 15408-22: 1
- ISO/IEC 15408-32: 1
- NIST:
- PKCS:
- RFC:
- SCP:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: MaskTech International GmbH
- /CreationDate: D:20220923164508+02'00'
- /Creator: LaTeX with hyperref
- /Keywords: Common Criteria, CC, Secure signature creation device, SSCD, EAL5 +
- /ModDate: D:20220923164508+02'00'
- /PTEX.Fullbanner: This is pdfTeX, Version 3.14159265-2.6-1.40.20 (TeX Live 2019/Cygwin) kpathsea version 6.3.1
- /Producer: pdfTeX-1.40.20
- /Subject: Common Criteria Certification
- /Title: Security Target – MaskTech eSign Applet on Secora™ ID S v1.1– Public version
- /Trapped: /False
- pdf_file_size_bytes: 941228
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 116
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |