name |
Sourcefire 3D System Version 5.2.0.1 |
Apollo OS e-Passport Version 1.0 |
category |
Detection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
21.03.2016 |
31.07.2014 |
not_valid_before |
06.08.2014 |
27.07.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0229_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0229_est.pdf |
manufacturer |
Sourcefire Inc. |
SC Square LTD. |
manufacturer_web |
https://www.sourcefire.com/ |
https://www.scsquare.com/ |
security_level |
{} |
AVA_MSU.3, EAL4+, AVA_VLA.4 |
dgst |
79f1b9da6ca5a71c |
2b75001bea02144e |
heuristics/cert_id |
CCEVS-VR-VID-10537-2014 |
JISEC-CC-CRP-C0229 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
5.2.0.1 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0399-2007 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
- category: Firewall, Wireless Monitoring
- certification_date: 06.08.2014
- evaluation_facility: COACT, Inc. Labs
- expiration_date: 06.08.2016
- id: CCEVS-VR-VID10537
- product: Sourcefire 3D System Version 5.2.0.1
- scheme: US
- url: https://www.niap-ccevs.org/product/10537
- vendor: Sourcefire, Inc.
|
- cert_id: JISEC-CC-CRP-C0229
- certification_date: 01.07.2009
- claim: EAL4+ ADV_IMP.2, ALC_DVS.2 PP
- enhanced:
- assurance_level: EAL4 Augmented with ADV_IMP.2, ALC_DVS.2
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0229_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The Target of Evaluation (TOE) is the contactless integrated circuit chip of machine readable travel documents (MRTD's chip) programmed according to the Logical Data Structure (LDS) [LDS] and providing the Basic Access Control according to the ICAO technical report [PKI]. The MRTD is viewed as unit of - The physical MRTD as travel document in form of paper, plastic and chip. It presents visual readable data including (but not limited to) personal data of the MRTD holder - the biographical data on the biographical data page of the passport book, - the printed data in the Machine Readable Zone (MRZ) and - The printed portrait. - The logical MRTD as data of the MRTD holder stored according to the Logical Data Structure [LDS] as specified by ICAO on the contactless integrated circuit. It presents contactless readable data including (but not limited to) personal data of the MRTD holder - the digital Machine Readable Zone Data (digital MRZ data, EF.DG1), - the digitized portraits (EF.DG2), - the biometric reference data of finger(s) (EF.DG3) or iris image(s) (EF.DG4) or both - the other data according to LDS (EF.DG5 to EF.DG16) and - the Document security object The physical MRTD is protected by physical security measures (e.g. watermark on paper, security printing), logical (e.g. authentication keys of the MRTD痴 chip) and organisational security measures (e.g. control of materials, personalization procedures) [SSMR]. These security measures include the binding of the MRTD痴 chip to the passport book. The logical MRTD is protected in authenticity and integrity by a digital signature created by the document signer acting for the issuing State or Organization and the security features of the MRTD痴 chip. TOE security functions TOE security function is as follows - SF.Cryptographic Support The cryptographic support for the other Security Functions. - SF.Identification and Authentication The identification and authentication for the TOE user - SF. User Data Protection The user data protection - SF.Security Management The security management of the TOE - SF.Protection (Protection of TSC) This Security Function protects the TSF functionality, TSF data and user data.
- evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
- product: Apollo OS e-Passport
- product_type: IT Product (IC chip firmware)
- protection_profile: BSI-PP-0017
- report_link: https://www.ipa.go.jp/en/security/c0229_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0229_est.pdf
- toe_version: 1.0
- vendor: SC Square LTD.
- expiration_date: 01.07.2014
- supplier: SC Square LTD.
- toe_japan_name: Apollo OS e-Passport 1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0229_it8194.html
- toe_overseas_name: Apollo OS e-Passport 1.0
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0399-2007 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0399-2007 |
heuristics/protection_profiles |
ac9abe3d5c5a31f0 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10537-vr.pdf |
c0229_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10537-2014
- cert_item: Sourcefire 3D System Version 5.2.0.1
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10537-2014: 1
|
- DE:
- JP:
- CRP-C0229-01: 1
- Certification No. C0229: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 3
- EAL4 augmented: 2
- EAL5+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- AVA:
- AVA_MSU.3: 1
- AVA_VLA.4: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.INSP_SYS: 1
- A.PERS_AGENT: 1
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 2
- TÜViT: 2
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- Fault Injection: 1
- Malfunction: 1
- Physical Tampering: 1
- Physical tampering: 1
- fault injection: 3
- malfunction: 3
- physical tampering: 1
- SCA:
- DPA: 3
- physical probing: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 23: 1
- AIS 31: 1
- AIS 32: 1
- AIS 34: 1
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ICAO:
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Robert Roland
- /Comments:
- /Company: COACT
- /CreationDate: D:20140807135046-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Keywords:
- /ModDate: D:20140807135101-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140807175026
- /Subject:
- /Title:
- pdf_file_size_bytes: 136944
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /CreationDate: D:20090910140719+09'00'
- /ModDate: D:20090910140719+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 170365
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
pdf_data/st_filename |
st_vid10537-st.pdf |
c0229_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- NL:
- CC-1: 3
- CC-2: 3
- CC-3: 2
- CC-4: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002-2001: 1
- BSI-PP-0017: 3
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4+: 1
- EAL 5+: 1
- EAL4: 9
- EAL4 augmented: 2
- EAL4+: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 15
- AGD_PRE: 1
- AGD_PRE.1: 11
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 5
- ALC_CMS: 1
- ALC_CMS.1: 6
- ATE:
- AVA:
|
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 1
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.2: 8
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 3
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 8
- ALC_LCD.1: 1
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_MSU.3: 1
- AVA_SOF.1: 1
- AVA_VLA.2: 1
- AVA_VLA.4: 1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 11
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 5
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 5
- FCS_CKM_EXT: 5
- FCS_CKM_EXT.4: 8
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 33
- FCS_COP.1.1: 4
- FCS_RBG_EXT: 5
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT: 5
- FCS_SSH_EXT.1: 4
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_TLS_EXT: 5
- FCS_TLS_EXT.1: 6
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP: 5
- FDP_RIP.2: 3
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT: 5
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU: 5
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 5
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 4
- FIA_UIA_EXT.1: 7
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 2
- FIA_UID_EXT: 1
- FMT:
- FMT_MTD: 5
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF: 6
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR: 5
- FMT_SMR.2: 3
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 3
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_AWP_EXT: 2
- FPT_ITT: 5
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_SKP_EXT: 5
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM: 5
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 5
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 5
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL: 12
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 6
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 5
- FTA_TAB.1: 4
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 5
- FTP_ITC.1: 3
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 6
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_SAS.1: 7
- FAU_SAS.1.1: 4
- FCS:
- FCS_CKM: 22
- FCS_CKM.1: 30
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.4: 33
- FCS_COP: 46
- FCS_COP.1: 24
- FCS_RND: 8
- FCS_RND.1: 13
- FCS_UIT: 1
- FDP:
- FDP_ACC: 19
- FDP_ACC.1: 25
- FDP_ACC.1.1: 1
- FDP_ACF: 15
- FDP_ACF.1: 34
- FDP_ACF.1.2: 1
- FDP_ACF.1.4: 1
- FDP_DAU: 2
- FDP_DAU.1: 5
- FDP_IFC: 1
- FDP_IFC.1: 9
- FDP_IFF: 1
- FDP_ITC.1: 17
- FDP_ITC.2: 13
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 12
- FDP_UCT.1: 12
- FDP_UIT: 12
- FDP_UIT.1: 13
- FIA:
- FIA_API: 6
- FIA_API.1: 1
- FIA_UAU: 36
- FIA_UAU.1: 6
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 3
- FIA_UAU.4: 7
- FIA_UAU.5: 4
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 4
- FIA_UAU.6: 7
- FIA_UCT: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 3
- FIA_UID.1.2: 3
- FMT:
- FMT_LIM.1: 12
- FMT_LIM.1.1: 3
- FMT_LIM.2: 12
- FMT_LIM.2.1: 3
- FMT_MOF.1: 12
- FMT_MOF.1.1: 4
- FMT_MSA.1: 2
- FMT_MSA.2: 22
- FMT_MSA.3: 4
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 22
- FMT_MTD.1: 14
- FMT_SMF.1: 17
- FMT_SMF.1.1: 3
- FMT_SMR.1: 16
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 3
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 11
- FPT_FLS.1.1: 3
- FPT_PHP.3: 11
- FPT_PHP.3.1: 4
- FPT_RVM.1: 6
- FPT_RVM.1.1: 3
- FPT_SEP.1: 8
- FPT_SEP.1.1: 4
- FPT_SEP.1.2: 4
- FPT_TST: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 3
- FPT_TST.1.2: 3
- FPT_TST.1.3: 4
- FPT_TST.2.1: 1
- FRU:
- FTP:
- FTP_ITC.1: 9
- FTP_TRP.1: 8
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECTIONS: 4
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.ADDRESS_FILTERING: 5
- O.DISPLAY_BANNER: 1
- O.PORT_FILTERING: 5
- O.PROTECTED_COMMUNICATIONS: 1
- O.RELATED_CONNECTION_FILTERING: 5
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.STATEFUL_INSPECTION: 5
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- OE:
- T:
- T.ADMIN_ERROR: 1
- T.NETWORK_ACCESS: 3
- T.NETWORK_DISCLOSURE: 2
- T.NETWORK_DOS: 4
- T.NETWORK_MISUSE: 2
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
- A:
- A.INSP_SYS: 2
- A.PERS_AGENT: 2
- O:
- OE:
- OE.EXAM_MRTD: 1
- OE.PERSONALIZATION: 2
- OE.PROT_LOGICAL_MRTD: 2
- OT:
- OT.AC_PERS: 4
- OT.DATA_CONF: 3
- OT.PROT_ABUSE_FU: 2
- OT.PROT_ABUSE_FUNC: 1
- OT.PROT_INF_LEAK: 2
- OT.PROT_MALFUNCT: 2
- OT.PROT_PHYS_TAMPER: 1
- T:
- T.ABUSE_FUNC: 1
- T.CHIP_ID: 1
- T.EAVESDROPPING: 1
- T.FORGERY: 1
- T.INFORMATION_LEAKAGE: 1
- T.MALFUNCTION: 1
- T.PHYS_TAMPER: 1
- T.SKIMMING: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 2
- SHA-384: 5
- SHA-512: 12
|
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 1
- Key agreement: 1
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- SSH: 37
- SSHv1: 2
- SSHv2: 19
- TLS:
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 5
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 8
- SCA:
- DPA: 1
- Leak-Inherent: 2
- physical probing: 4
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.DG1: 1
- EF.DG16: 1
- EF.DG2: 1
- EF.DG3: 1
- EF.DG4: 1
- EF.DG5: 1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 4
- FIPS 186-2: 1
- FIPS 186-3: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-2: 2
- FIPS PUB 186-3: 1
- FIPS PUB 197: 2
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-56B: 1
- SP 800-56B: 3
- SP 800-90: 1
- RFC:
- RFC 2246: 2
- RFC 2460: 2
- RFC 2818: 2
- RFC 3513: 2
- RFC 4253: 1
- RFC 4443: 2
- RFC 5735: 2
- RFC 768: 2
- RFC 791: 2
- RFC 792: 2
- RFC 793: 2
- RFC 959: 1
|
- BSI:
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
- FIPS 180-2: 3
- FIPS 180-212: 1
- FIPS 46-3: 3
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- NTP Server SMTP Server Audit Server SNMP Server Network Assets Legend TOE Operational Environment Out of Scope … … Sourcefire 3D System Security Target 13 The TOE main subsystems are summarized as followed: •: 1
- Out of Scope: 1
- in the update header to ensure they match. 12 This process requires access to the Internet and is out of scope of the evaluation. Sourcefire 3D System Security Target 61 During the update process, if the Snort: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
- /CreationDate: D:20090812100814Z
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20090812131114+03'00'
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 1066290
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 116
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |