name |
Motorola Solutions RFS7000-GR Wireless LAN Switch and AP-7131N Wireless Access Point |
IAIK-JCE CC Core 3.15 |
category |
Network and Network-Related Devices and Systems |
Products for Digital Signatures |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
28.03.2016 |
07.10.2013 |
not_valid_before |
28.03.2014 |
27.06.2007 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10472-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0107_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10472-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0107_est.pdf |
manufacturer |
Motorola Solutions, Inc. |
Stiftung Secure Information and Communication Technologies SIC |
manufacturer_web |
https://www.motorolasolutions.com |
https://jce.iaik.tugraz.at/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL3 |
dgst |
778473e553d9d55f |
ee01e752b230504e |
heuristics/cert_id |
CCEVS-VR-VID-10472-2014 |
JISEC-CC-CRP-C0107 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1, ADV_SPM.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
- |
3.15 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Wireless LAN
- certification_date: 28.03.2014
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date: 28.03.2016
- id: CCEVS-VR-VID10472
- product: Motorola Solutions RFS7000-GR Wireless LAN Switch and AP-7131N Wireless Access Point
- scheme: US
- url: https://www.niap-ccevs.org/product/10472
- vendor: Motorola Mobility LLC
|
- cert_id: JISEC-CC-CRP-C0107
- certification_date: 01.06.2007
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0107_eimg.pdf
- description: PRODUCT DESCRIPTION The IAIK-JCE CC Core is a set of APIs and implementations of cryptographic functionality. Including: - hash functions - signature schemes - block ciphers - stream ciphers - asymmetric ciphers - message authentication codes - random number generators It supplements the security functionality of the default Java Runtime Environment. The IAIK-JCE CC Core is delivered to the customer as part of the IAIK-JCE toolkit, which extends the CC Core by additional algorithms, features and protocols.
- evaluation_facility: TÜV Informationstechnik GmbH Evaluation Body for IT-Security
- product: IAIK-JCE CC Core
- product_type: IT Product (cryptographic library)
- report_link: https://www.ipa.go.jp/en/security/c0107_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0107_est.pdf
- toe_version: 3.15
- vendor: Stiftung Secure Information and Communication Technologies SIC
- expiration_date: 01.10.2013
- supplier: Stiftung Secure Information and Communication Technologies SIC
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0107_it6096.html
- toe_overseas_name: IAIK-JCE CC Core 3.15
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10472-vr.pdf |
c0107_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10472-2014
- cert_item: Motorola Solutions, Inc. RFS7000-GR Wireless LAN Switch and AP-7131N Wireless Access Point
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10472-2014: 1
|
- JP:
- CRP-C0107-01: 1
- Certification No. C0107: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NO_EVIL: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TOE_NO_BYPASS: 1
- T:
- T.ACCIDENTAL_ADMIN_ERROR: 1
- T.ACCIDENTAL_CRYPTO_COMPROMISE: 1
- T.MASQUERADE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTH_ACCESS_POINT: 1
- T.UNAUTH_ADMIN_ACCESS: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
- RSA:
- RSA 1024: 1
- RSA-OAEP: 1
- RSA-PSS: 1
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 7
- SHA-384: 6
- SHA-512: 7
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- BSI:
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- FIPS 46-3: 2
- FIPS PUB 180-1: 5
- FIPS PUB 180-2: 11
- FIPS PUB 197: 3
- FIPS PUB 46-3: 1
- ISO:
- ISO/IEC 10118-3: 4
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- secret. A.KeyManagement The IT-Environment is responsible for key management. Key management is out of scope of the TOE. O.PrivateKey and O.SecretKey, needed for computation of O.CipherText, O.MAC and O: 1
|
pdf_data/report_metadata |
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20140331160855-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Keywords:
- /ModDate: D:20140331160902-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140331200839
- /Subject:
- /Title: D
- pdf_file_size_bytes: 166987
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
- /CreationDate: D:20080207191148+09'00'
- /ModDate: D:20080207191148+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 132396
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
st_vid10472-st.pdf |
c0107_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 6
- EAL1: 4
- EAL2: 8
- EAL2 augmented: 4
- EAL2+: 2
- EAL3: 4
- EAL5: 4
- EAL6: 2
- EAL7: 4
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 12
- ADV_FSP: 2
- ADV_FSP.1: 2
- ADV_FSP.2: 26
- ADV_IMP: 2
- ADV_INT: 2
- ADV_SPM: 4
- ADV_SPM.1: 4
- ADV_TDS: 2
- ADV_TDS.1: 20
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 18
- AGD_PRE: 2
- AGD_PRE.1: 16
- ALC:
- ALC_CMC: 2
- ALC_CMC.2: 8
- ALC_CMS: 2
- ALC_CMS.2: 8
- ALC_DEL: 2
- ALC_DEL.1: 8
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_FLR.2: 18
- ALC_TAT: 2
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD: 2
- ASE_ECD.1: 2
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 2
- ASE_OBJ.2: 2
- ASE_REQ: 2
- ASE_REQ.2: 2
- ASE_SPD: 2
- ASE_SPD.1: 2
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV: 2
- ATE_COV.1: 14
- ATE_COV.2: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_FUN.1: 12
- ATE_IND: 2
- ATE_IND.2: 6
- AVA:
|
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 4
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 11
- ADV_HLD.1: 3
- ADV_HLD.2: 3
- ADV_RCR.1: 4
- AGD:
- AGD_ADM.1: 8
- AGD_USR.1: 6
- ALC:
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 1
- ATE_FUN.1: 6
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 4
- AVA_SOF.1: 2
- AVA_VLA.1: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 36
- FAU_GEN.1: 22
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 2
- FAU_GEN.2: 16
- FAU_GEN.2.1: 2
- FAU_SEL.1: 16
- FAU_SEL.1.1: 2
- FAU_UAU.1: 2
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 68
- FCS_CKM.1.1: 7
- FCS_CKM.2: 18
- FCS_CKM.2.1: 9
- FCS_CKM.4: 52
- FCS_CKM.4.1: 2
- FCS_CKM_EXT.2: 2
- FCS_COP: 6
- FCS_COP.1: 81
- FCS_COP.1.1: 37
- FCS_PEAP_EXT: 5
- FCS_PEAP_EXT.1: 28
- FCS_PEAP_EXT.1.1: 2
- FCS_PEAP_EXT.1.2: 4
- FCS_PEAP_EXT.1.3: 4
- FCS_PEAP_EXT.1.4: 4
- FCS_RAD_EXT: 5
- FCS_RAD_EXT.1: 28
- FCS_RAD_EXT.1.1: 4
- FCS_RAD_EXT.1.2: 4
- FCS_RAD_EXT.1.3: 4
- FCS_SFTP_EXT: 4
- FCS_SFTP_EXT.1: 30
- FCS_SFTP_EXT.1.1: 2
- FCS_SFTP_EXT.1.2: 4
- FCS_SSH_EXT: 4
- FCS_SSH_EXT.1: 39
- FCS_SSH_EXT.1.1: 4
- FCS_SSH_EXT.1.2: 4
- FCS_SSH_EXT.1.3: 4
- FCS_SSH_EXT.1.4: 4
- FCS_SSH_EXT.1.5: 4
- FCS_SSH_EXT.1.6: 4
- FCS_SSH_EXT.1.7: 4
- FCS_SSH_EXT.1.8: 4
- FCS_SSH_EXT.1.9: 4
- FCS_TLS_EXT: 4
- FCS_TLS_EXT.1: 61
- FCS_TLS_EXT.1.1: 4
- FCS_TTLS_EXT.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 4
- FDP_IFC.1: 48
- FDP_IFC.1.1: 5
- FDP_IFF: 43
- FDP_IFF.1: 44
- FDP_ITC.1: 18
- FDP_ITC.2: 14
- FDP_PUD: 2
- FDP_RIP: 4
- FDP_RIP.1: 18
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 16
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 4
- FIA_ATD.1: 29
- FIA_ATD.1.1: 5
- FIA_UAU: 12
- FIA_UAU.1: 38
- FIA_UAU.1.1: 6
- FIA_UAU.1.2: 4
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UAU.5: 1
- FIA_UAU.5.1: 1
- FIA_UID: 4
- FIA_UID.1: 8
- FIA_UID.2: 21
- FIA_UID.2.1: 2
- FIA_USB: 4
- FIA_USB.1: 16
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF: 4
- FMT_MOF.1: 93
- FMT_MOF.1.1: 12
- FMT_MSA: 5
- FMT_MSA.1: 19
- FMT_MSA.1.1: 1
- FMT_MSA.2: 58
- FMT_MSA.2.1: 2
- FMT_MSA.3: 49
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 5
- FMT_MTD: 4
- FMT_MTD.1: 40
- FMT_MTD.1.1: 5
- FMT_REV.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 105
- FMT_SMF.1.1: 12
- FMT_SMR: 4
- FMT_SMR.1: 43
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITC_EXT.1: 2
- FPT_ITC_EXT.1.1: 2
- FPT_ITC_EXT.1.2: 2
- FPT_ITC_EXT.1.3: 2
- FPT_ITT: 2
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_STM: 4
- FPT_STM.1: 2
- FPT_STM_EXT.1: 4
- FPT_STM_EXT.1.1: 4
- FPT_TST: 4
- FPT_TST.1: 32
- FPT_TST.1.1: 4
- FPT_TST.1.2: 4
- FPT_TST.1.3: 4
- FPT_TST.2: 2
- FPT_TST_EXT: 8
- FPT_TST_EXT.1: 22
- FPT_TST_EXT.1.1: 4
- FPT_TST_EXT.1.2: 4
- FTA:
- FTA_SSL: 4
- FTA_SSL.3: 14
- FTA_SSL.3.1: 4
- FTA_TAB: 4
- FTA_TAB.1: 14
- FTA_TAB.1.1: 2
- FTA_TSE: 2
- FTA_TSE.1: 8
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 2
- FTP_ITC_EXT: 4
- FTP_ITC_EXT.1: 23
- FTP_ITC_EXT.1.1: 2
- FTP_ITC_EXT.1.2: 2
- FTP_ITC_EXT.1.3: 2
- FTP_TRP: 2
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FCS:
- FCS_CKM: 87
- FCS_CKM.1: 4
- FCS_CKM.2: 9
- FCS_CKM.4: 26
- FCS_CKM.4.1: 2
- FCS_COP: 123
- FCS_COP.1: 9
- FCS_RND: 21
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FCS_RND.1.2: 1
- FDP:
- FDP_ACC.1: 2
- FDP_IFC.1: 2
- FDP_ITC: 13
- FDP_ITC.1: 41
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 22
- FDP_RIP.1: 3
- FDP_RIP.1.1: 2
- FMT:
- FMT_MSA: 6
- FMT_MSA.2: 32
- FMT_MSA.3: 2
- FPT:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_EVIL: 6
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 4
- A.TOE_NO_BYPASS: 3
- O:
- O.ADMIN_GUIDANCE: 14
- O.AUDIT_GENERATION: 8
- O.CONFIGURATION_: 3
- O.CONFIGURATION_DENTIFICATION: 6
- O.CONFIGURATION_IDENTIFICATION: 6
- O.CORRECT_: 1
- O.CORRECT_TSF_OPERATION: 7
- O.CRYPTOGRAPHY: 14
- O.CRYPTOGRAPHY_VALIDATED: 8
- O.DISPLAY_BANNER: 14
- O.DOCUMENTED_: 3
- O.DOCUMENTED_DESIGN: 8
- O.MANAGE: 20
- O.MEDIATE: 12
- O.PARTIAL_FUNCTIONAL_TESTING: 16
- O.RESIDUAL_: 1
- O.RESIDUAL_INFORMATION: 9
- O.ROGUE_AP_DETECTION: 14
- O.SELF_PROTECTION: 19
- O.TIME_STAMPS: 8
- O.TOE_ACCESS: 14
- O.VULNERABILITY_: 3
- O.VULNERABILITY_ANALYSIS: 5
- OE:
- OE.AUDIT_PROTECTION: 6
- OE.AUDIT_REVIEW: 6
- OE.MANAGE: 10
- OE.NO_EVIL: 8
- OE.NO_GENERAL_PURPOSE: 6
- OE.PHYSICAL: 6
- OE.PROTECT_MGMT_COMMS: 6
- OE.RESIDUAL_INFORMATION: 6
- OE.SELF_PROTECTION: 9
- OE.TIME_STAMPS: 6
- OE.TOE_ACCESS: 8
- OE.TOE_NO_BYPASS: 6
- OSP:
- T:
- T.ACCIDENTAL_: 2
- T.ACCIDENTAL_ADMIN_: 7
- T.ACCIDENTAL_ADMIN_ERROR: 7
- T.ACCIDENTAL_CRYPTO_COMPROMISE: 9
- T.MASQUERADE: 12
- T.POOR_DESIGN: 6
- T.POOR_IMPLEMENTATION: 6
- T.POOR_TEST: 4
- T.RESIDUAL_DATA: 8
- T.TSF_COMPROMISE: 14
- T.UNATTENDED_: 3
- T.UNATTENDED_SESSION: 3
- T.UNAUTHORIZED_: 2
- T.UNAUTHORIZED_ACCESS: 9
- T.UNAUTH_ACCESS_POINT: 2
- T.UNAUTH_ADMIN_ACCESS: 14
- T.UNAUTH_AP: 2
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 17
- AES-: 2
- AES-128: 6
- AES-192: 6
- AES-256: 6
- AES128: 1
- DES:
- 3DES:
- TDEA: 4
- TDES: 1
- Triple-DES: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- HMAC: 2
- HMAC-SHA-256: 2
|
- AES_competition:
- DES:
- 3DES:
- Triple-DES: 3
- TripleDES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- RSA:
- RSA 1024: 1
- RSA-OAEP: 1
- RSA-PSS: 1
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 17
- SHA-384: 14
- SHA-512: 17
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 2
- Key agreement: 2
- KEX:
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 17
- IKEv1: 30
- IKEv2: 6
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 96
- TLS 1.0: 14
- TLS 1.1: 2
- TLS 1.2: 2
- TLS v1.1: 6
- TLS v1.2: 6
- TLS1.0: 2
- TLSv1.0: 8
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 10
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 10
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 4
- TLS_RSA_WITH_AES_128_CBC_SHA: 13
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 12
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS 140-2: 16
- FIPS 186-2: 2
- FIPS 197: 2
- FIPS 46-3: 2
- FIPS 81: 2
- FIPS PUB 140-2: 4
- FIPS PUB 186-2: 2
- NIST:
- RFC:
- RFC 2346: 4
- RFC 2409: 2
- RFC 2818: 4
- RFC 3146: 1
- RFC 3164: 2
- RFC 3280: 2
- RFC 3602: 2
- RFC 4106: 4
- RFC 4109: 6
- RFC 4252: 8
- RFC 4253: 9
- RFC 4303: 4
- RFC 4346: 2
- RFC 4868: 2
- RFC 4869: 2
- RFC 5216: 5
- RFC 5246: 2
- RFC 5281: 6
- RFC 792: 2
- RFC3164: 1
- RFC3280: 4
- RFC4346: 2
- X509:
|
- BSI:
- AIS 20: 1
- AIS 31: 2
- AIS20: 7
- AIS31: 1
- FIPS:
- FIPS 46-3: 4
- FIPS PUB 180-1: 11
- FIPS PUB 180-2: 29
- FIPS PUB 186-2: 2
- FIPS PUB 197: 5
- FIPS PUB 46-3: 3
- ISO:
- PKCS:
- RFC:
- RFC 2104: 5
- RFC 2268: 5
- RFC2104: 1
- RFC2268: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Key Management. The IT-Environment is responsible for key management. Key management is out of scope of the TOE. O.PrivateKey and O.SecretKey, needed for computation of O.CipherText, O.MAC and O: 1
- its own key pad for entering this authentication data. Displaying data to be signed or verified is out of scope of the TOE. • Conventional Signatures. The TOE is used without hardware support to create: 1
- out of scope: 3
- several algorithms that can be used for data encryption and decryption. Key management is out of scope of the TOE. The application provides the keys to the TOE. The TOE does not modify the keys it gets: 1
|
pdf_data/st_metadata |
- /Author: CRD003
- /CreationDate: D:20140331105449+05'00'
- /Creator: PrimoPDF http://www.primopdf.com
- /ModDate: D:20140331162840-04'00'
- /Producer: Nitro PDF PrimoPDF
- /Title: Microsoft Word - Motorola_RFS7000_-AP7131_Security_Target_v1.51.docx
- pdf_file_size_bytes: 2408502
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 253
|
- /Author: Karl Scheibelhofer, Dieter Bratko, Harald Bratko
- /Company: IAIK, Graz University of Technology, Stiftung SIC
- /CreationDate: D:20070523123515+02'00'
- /Creator: Acrobat PDFMaker 7.0.5 für Word
- /Manager: Karl Scheibelhofer
- /ModDate: D:20070523123643+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20070523103041
- /Subject: Common Criteria Evaluation of IAIK-JCE
- /Title: Security Target, IAIK-JCE CC
- /Version: 1.8
- pdf_file_size_bytes: 413325
- pdf_hyperlinks: http://java.sun.com/products/archive/jdk/1.1/index.html, http://java.sun.com/j2se/1.4.2/docs/api/, http://java.sun.com/j2se/1.4.2/docs/guide/security/HowToImplAProvider.html, http://java.sun.com/docs/books/vmspec/index.html, http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf, http://www.ietf.org/rfc/rfc2104.txt, http://java.sun.com/j2se/1.4/docs/guide/security/CryptoSpec.html, http://www.ietf.org/rfc/rfc2268.txt, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://java.sun.com/j2se/1.4.2/docs/guide/security/jce/JCERefGuide.html, http://java.sun.com/j2se/1.5.0/docs/guide/security/jce/JCERefGuide.html, http://www.commoncriteriaportal.org/, http://java.sun.com/j2se/1.4.2/docs/api/javax/crypto/package-summary.html, http://java.sun.com/j2se/1.5.0/docs/api/java/security/package-summary.html, http://java.sun.com/security/index.html, http://www.rsasecurity.com/rsalabs/pkcs/pkcs-1/, http://java.sun.com/j2se/1.4.2/docs/api/java/security/package-summary.html, http://java.sun.com/products/jce/, http://java.sun.com/j2se/1.4.2/docs/guide/security/jce/HowToImplAJCEProvider.html, http://java.sun.com/j2se/1.5.0/docs/api/, http://java.sun.com/j2se/1.5/docs/guide/security/CryptoSpec.html, http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |