name |
Sourcefire 3D System Version 5.2.0.1 |
Luna PCI-E Cryptographic Module, Firmware version 6.10.9 (AVA_VAN.5) |
category |
Detection Devices and Systems |
Products for Digital Signatures |
scheme |
US |
NL |
status |
archived |
archived |
not_valid_after |
21.03.2016 |
29.12.2022 |
not_valid_before |
06.08.2014 |
29.12.2017 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Get%20cert%20CC-17-179205.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-179205-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20CR-3524_23%20-%20Security%20Target.pdf |
manufacturer |
Sourcefire Inc. |
SafeNet Inc. |
manufacturer_web |
https://www.sourcefire.com/ |
https://www.safenet-inc.com/ |
security_level |
{} |
EAL4+, ALC_FLR.2, AVA_VAN.5 |
dgst |
79f1b9da6ca5a71c |
5aff27b2a405d882 |
heuristics/cert_id |
CCEVS-VR-VID-10537-2014 |
NSCIB-CC-179205-CR |
heuristics/cert_lab |
US |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
5.2.0.1 |
6.10.9 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
NSCIB-CC-38671-CR |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
NSCIB-CC-38671-CR |
heuristics/scheme_data |
- category: Firewall, Wireless Monitoring
- certification_date: 06.08.2014
- evaluation_facility: COACT, Inc. Labs
- expiration_date: 06.08.2016
- id: CCEVS-VR-VID10537
- product: Sourcefire 3D System Version 5.2.0.1
- scheme: US
- url: https://www.niap-ccevs.org/product/10537
- vendor: Sourcefire, Inc.
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
ac9abe3d5c5a31f0 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
{} |
pdf_data/cert_filename |
|
Get cert CC-17-179205.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL7: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20171229160529+01'00'
- /Creator: BHC364e
- /ModDate: D:20171229160529+01'00'
- /Producer: KONICA MINOLTA bizhub C364e
- /Title: BHC364e-20171229160529
- pdf_file_size_bytes: 194726
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid10537-vr.pdf |
[CR] NSCIB-CC-179205-CR.pdf |
pdf_data/report_frontpage |
- NL:
- US:
- cert_id: CCEVS-VR-VID10537-2014
- cert_item: Sourcefire 3D System Version 5.2.0.1
- cert_lab: US NIAP
|
- NL:
- cert_id: NSCIB-CC-179205-CR
- cert_item: Luna PCI-E Cryptographic Module, Firmware Version 6.10.9
- cert_lab: Brightsight
- developer: SafeNet Inc
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10537-2014: 1
|
- NL:
- CC-17-38671: 2
- CC-38671: 2
- NSCIB-CC-179205-CR: 13
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- AVA:
- AVA_VAN.4: 2
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
- FPT:
- FPT_PHP: 1
- FPT_PHP.1: 1
- FPT_PHP.3: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- interfaces not exposed to the host computer (such as serial and USB interfaces on the device), are out of scope of these evaluations. The user of the TOE is reminded to operate the TOE in a physically and: 2
- out of scope: 2
- such as serial and USB interfaces on the device), are out of scope of these evaluations: 2
|
pdf_data/report_metadata |
- /Author: Robert Roland
- /Comments:
- /Company: COACT
- /CreationDate: D:20140807135046-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Keywords:
- /ModDate: D:20140807135101-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140807175026
- /Subject:
- /Title:
- pdf_file_size_bytes: 136944
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: p646
- /CreationDate: D:20171229163718+01'00'
- /Creator: PDFCreator Version 1.2.0
- /Keywords:
- /ModDate: D:20171229163718+01'00'
- /Producer: GPL Ghostscript 9.0
- /Subject:
- /Title: Certification Report NSCIB-CC-179205-CR
- pdf_file_size_bytes: 575783
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
pdf_data/st_filename |
st_vid10537-st.pdf |
[ST] CR-3524_23 - Security Target.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-00078: 1
- BSI-CC-PP-00080: 1
- BSI-CC-PP-0078: 6
- BSI-PP-00078: 1
- BSI-PP-CC-00078: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 6
- EAL 4 augmented: 3
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 15
- AGD_PRE: 1
- AGD_PRE.1: 11
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 5
- ALC_CMS: 1
- ALC_CMS.1: 6
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.4: 5
- ADV_IMP.1: 3
- ADV_TDS.3: 4
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 19
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 11
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 11
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 5
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 5
- FCS_CKM_EXT: 5
- FCS_CKM_EXT.4: 8
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 33
- FCS_COP.1.1: 4
- FCS_RBG_EXT: 5
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT: 5
- FCS_SSH_EXT.1: 4
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_TLS_EXT: 5
- FCS_TLS_EXT.1: 6
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP: 5
- FDP_RIP.2: 3
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT: 5
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU: 5
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 5
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 4
- FIA_UIA_EXT.1: 7
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 2
- FIA_UID_EXT: 1
- FMT:
- FMT_MTD: 5
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF: 6
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR: 5
- FMT_SMR.2: 3
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 3
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_AWP_EXT: 2
- FPT_ITT: 5
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_SKP_EXT: 5
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM: 5
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 5
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 5
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL: 12
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 6
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 5
- FTA_TAB.1: 4
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 5
- FTP_ITC.1: 3
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 6
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM: 72
- FCS_CKM.1: 18
- FCS_CKM.1.1: 1
- FCS_CKM.2: 17
- FCS_CKM.4: 15
- FCS_CKM.4.1: 1
- FCS_COP: 37
- FCS_COP.1: 10
- FCS_RNG: 3
- FCS_RNG.1: 12
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 31
- FDP_ACC.1: 11
- FDP_ACC.2: 8
- FDP_ACF: 33
- FDP_ACF.1: 22
- FDP_ACF.1.4: 1
- FDP_ETC.2: 8
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 2
- FDP_IFC.1: 4
- FDP_ITC.1: 4
- FDP_ITC.2: 17
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 2
- FDP_RIP.2: 6
- FDP_RIP.2.1: 1
- FDP_UCT.1: 1
- FDP_UIT.1: 1
- FIA:
- FIA_AFL: 15
- FIA_AFL.1: 7
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 5
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 14
- FMT_MOF.1: 4
- FMT_MSA: 26
- FMT_MSA.1: 4
- FMT_MSA.2: 12
- FMT_MSA.2.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 12
- FMT_MTD.1: 3
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.2: 12
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_EMS: 3
- FPT_EMS.1: 11
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_PHP.1: 14
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_STM.1: 1
- FPT_TDC.1: 15
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 16
- FPT_TST.2.1: 3
- FPT_TST.2.2: 2
- FPT_TST.2.3: 2
- FPT_TST.2.4: 2
- FPT_TST.2.5: 2
- FPT_TST.2.6: 3
- FPT_TST.2.7: 2
- FPT_TST.2.8: 2
- FTP:
- FTP_ITC: 11
- FTP_ITC.1: 4
- FTP_TRP.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECTIONS: 4
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.ADDRESS_FILTERING: 5
- O.DISPLAY_BANNER: 1
- O.PORT_FILTERING: 5
- O.PROTECTED_COMMUNICATIONS: 1
- O.RELATED_CONNECTION_FILTERING: 5
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.STATEFUL_INSPECTION: 5
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- OE:
- T:
- T.ADMIN_ERROR: 1
- T.NETWORK_ACCESS: 3
- T.NETWORK_DISCLOSURE: 2
- T.NETWORK_DOS: 4
- T.NETWORK_MISUSE: 2
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
- AES_competition:
- AES:
- AES: 36
- AES-256: 4
- AES256: 2
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 2
- SHA-384: 5
- SHA-512: 12
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 10
- SHA-256: 16
- SHA-384: 14
- SHA-512: 9
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 1
- Key agreement: 1
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- SSH: 37
- SSHv1: 2
- SSHv2: 19
- TLS:
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- B-163: 6
- B-233: 5
- B-283: 6
- B-409: 5
- B-571: 6
- K-163: 5
- K-233: 5
- K-283: 5
- K-409: 5
- K-571: 4
- P-192: 12
- P-224: 10
- P-256: 12
- P-384: 10
- P-521: 12
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 5
- Physical tampering: 1
- malfunction: 2
- physical tampering: 4
- SCA:
- physical probing: 1
- side-channels: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 4
- FIPS 186-2: 1
- FIPS 186-3: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-2: 2
- FIPS PUB 186-3: 1
- FIPS PUB 197: 2
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-56B: 1
- SP 800-56B: 3
- SP 800-90: 1
- RFC:
- RFC 2246: 2
- RFC 2460: 2
- RFC 2818: 2
- RFC 3513: 2
- RFC 4253: 1
- RFC 4443: 2
- RFC 5735: 2
- RFC 768: 2
- RFC 791: 2
- RFC 792: 2
- RFC 793: 2
- RFC 959: 1
|
- BSI:
- AIS 20: 2
- AIS 31: 2
- AIS20: 1
- AIS31: 1
- FIPS:
- FIPS PUB 113: 3
- FIPS PUB 180-4: 7
- FIPS PUB 186-3: 17
- FIPS PUB 197: 9
- FIPS PUB 198-1: 3
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 19790:2012: 5
- NIST:
- NIST SP 800-38B: 4
- NIST SP 800-38D: 2
- NIST SP 800-56A: 1
- NIST SP 800-57: 1
- NIST SP 800-67: 4
- NIST SP 800-90: 2
- NIST SP 800-90A: 1
- SP 800-108: 3
- SP 800-38B: 1
- SP 800-38D: 1
- SP 800-57: 2
- PKCS:
- PKCS #1: 9
- PKCS #11: 10
- PKCS #8: 2
- PKCS#11: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- NTP Server SMTP Server Audit Server SNMP Server Network Assets Legend TOE Operational Environment Out of Scope … … Sourcefire 3D System Security Target 13 The TOE main subsystems are summarized as followed: •: 1
- Out of Scope: 1
- in the update header to ensure they match. 12 This process requires access to the Internet and is out of scope of the evaluation. Sourcefire 3D System Security Target 61 During the update process, if the Snort: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
- /CreationDate: D:20171208160736+01'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20171208160736+01'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 1327623
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 117
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |