Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Sourcefire 3D System Version 5.2.0.1
CCEVS-VR-VID-10537-2014
CASA 1.0
BSI-DSZ-CC-0919-2019
name Sourcefire 3D System Version 5.2.0.1 CASA 1.0
category Detection Devices and Systems Other Devices and Systems
scheme US DE
status archived active
not_valid_after 21.03.2016 17.12.2027
not_valid_before 06.08.2014 17.12.2019
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0919a_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0919a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0919b_pdf.pdf
manufacturer Sourcefire Inc. EMH metering GmbH & Co. KG
manufacturer_web https://www.sourcefire.com/ https://emh-metering.de
security_level {} EAL4+, ALC_FLR.2, AVA_VAN.5
dgst 79f1b9da6ca5a71c b8ec1436be942d5e
heuristics/cert_id CCEVS-VR-VID-10537-2014 BSI-DSZ-CC-0919-2019
heuristics/cert_lab US BSI
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ATE_COV.2, ASE_TSS.1, ASE_INT.1, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ASE_REQ.2, ASE_CCL.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1
heuristics/extracted_versions 5.2.0.1 1.0
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0919-V2-2021
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0919-V3-2023, BSI-DSZ-CC-0919-V2-2021
heuristics/scheme_data
  • category: Firewall, Wireless Monitoring
  • certification_date: 06.08.2014
  • evaluation_facility: COACT, Inc. Labs
  • expiration_date: 06.08.2016
  • id: CCEVS-VR-VID10537
  • product: Sourcefire 3D System Version 5.2.0.1
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10537
  • vendor: Sourcefire, Inc.
heuristics/protection_profiles ac9abe3d5c5a31f0 6346b04de6859db3
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0073b_pdf.pdf
pdf_data/cert_filename 0919a_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0919-2019: 14
  • NL:
    • CC-19-175197: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0077-V2: 1
    • BSI-CC-PP-0073-2014: 3
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 3
    • ALC_FLR.2: 4
  • AVA:
    • AVA_VAN.5: 5
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
    • TÜViT: 1
pdf_data/cert_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/cert_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
      • SHA256: 1
      • SHA384: 1
      • SHA512: 1
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 4
  • TLS:
    • TLS:
      • TLS: 4
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
  • GCM:
    • GCM: 2
pdf_data/cert_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 1
    • brainpoolP384r1: 1
    • brainpoolP512r1: 1
  • NIST:
    • secp256r1: 1
    • secp384r1: 1
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
  • SCA:
    • side-channel: 2
pdf_data/cert_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-03109: 1
    • BSI TR-03109-1: 1
    • BSI TR-03109-3: 1
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 32: 1
    • AIS 34: 3
    • AIS 46: 2
    • AIS 48: 2
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-4: 2
    • FIPS 197: 5
    • FIPS180-4: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • RFC:
    • RFC 2104: 3
    • RFC 3394: 3
    • RFC 4493: 3
    • RFC 5084: 3
    • RFC 5289: 2
    • RFC 5639: 3
    • RFC5289: 1
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
  • ConfidentialDocument:
    • 1, 2019-12-16, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • list for the TOE CASA-Konfigurationsliste, Version 9, 2019-12-16, Konfigurationsliste (confidential document) [10] CASA (CASA-AGD) Benutzerhandbuch für Letztverbraucher (LV), Version 1.17, 2019-12-16 [11: 1
pdf_data/cert_metadata
pdf_data/report_filename st_vid10537-vr.pdf 0919a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10537-2014
    • cert_item: Sourcefire 3D System Version 5.2.0.1
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5 and ALC_FLR.2
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0919-2019
    • cert_item: CASA 1.0
    • cert_lab: BSI
    • developer: EMH metering GmbH & Co. KG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10537-2014: 1
  • DE:
    • BSI-DSZ-CC-0919-2019: 14
  • NL:
    • CC-19-175197: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0077-V2: 1
    • BSI-CC-PP-0073-2014: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 3
    • ALC_FLR.2: 4
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
    • TÜViT: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 4
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-224: 2
      • SHA-384: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
      • SHA256: 1
      • SHA384: 1
      • SHA512: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
    • SSHv2: 4
  • SSH:
    • SSH: 4
  • TLS:
    • TLS:
      • TLS: 4
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 3
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 2
pdf_data/report_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 1
    • brainpoolP384r1: 1
    • brainpoolP512r1: 1
  • NIST:
    • secp256r1: 1
    • secp384r1: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • side-channel: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-03109: 1
    • BSI TR-03109-1: 1
    • BSI TR-03109-3: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-2: 1
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
  • NIST:
    • NIST SP 800-38A: 1
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 32: 1
    • AIS 34: 3
    • AIS 46: 2
    • AIS 48: 2
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-4: 2
    • FIPS 197: 5
    • FIPS180-4: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • RFC:
    • RFC 2104: 3
    • RFC 3394: 3
    • RFC 4493: 3
    • RFC 5084: 3
    • RFC 5289: 2
    • RFC 5639: 3
    • RFC5289: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1, 2019-12-16, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • list for the TOE CASA-Konfigurationsliste, Version 9, 2019-12-16, Konfigurationsliste (confidential document) [10] CASA (CASA-AGD) Benutzerhandbuch für Letztverbraucher (LV), Version 1.17, 2019-12-16 [11: 1
pdf_data/report_metadata
  • /Author: Robert Roland
  • /Comments:
  • /Company: COACT
  • /CreationDate: D:20140807135046-04'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Keywords:
  • /ModDate: D:20140807135101-04'00'
  • /Producer: Adobe PDF Library 10.0
  • /SourceModified: D:20140807175026
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 136944
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename st_vid10537-st.pdf 0919b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0073: 1
    • BSI-CC-PP-0077-2013: 3
    • BSI-CC-PP-0077-V2: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 5
    • EAL 4 augmented: 2
    • EAL4: 1
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 16
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 15
    • AGD_PRE: 1
    • AGD_PRE.1: 11
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 5
    • ALC_CMS: 1
    • ALC_CMS.1: 6
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 6
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 7
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 6
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 11
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 5
    • FAU_STG_EXT.1: 4
    • FAU_STG_EXT.1.1: 1
  • FCS:
    • FCS_CKM: 5
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 5
    • FCS_CKM_EXT: 5
    • FCS_CKM_EXT.4: 8
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 33
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT: 5
    • FCS_RBG_EXT.1: 4
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSH_EXT: 5
    • FCS_SSH_EXT.1: 4
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
    • FCS_TLS_EXT: 5
    • FCS_TLS_EXT.1: 6
    • FCS_TLS_EXT.1.1: 2
  • FDP:
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_RIP: 5
    • FDP_RIP.2: 3
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_PMG_EXT: 5
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 5
    • FIA_UAU_EXT.2: 4
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT: 4
    • FIA_UIA_EXT.1: 7
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UID.1: 2
    • FIA_UID_EXT: 1
  • FMT:
    • FMT_MTD: 5
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 1
    • FMT_SMF: 6
    • FMT_SMF.1: 5
    • FMT_SMF.1.1: 1
    • FMT_SMR: 5
    • FMT_SMR.2: 3
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 3
    • FPT_APW_EXT.1: 4
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_AWP_EXT: 2
    • FPT_ITT: 5
    • FPT_ITT.1: 7
    • FPT_ITT.1.1: 1
    • FPT_SKP_EXT: 5
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM: 5
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 5
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 5
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL: 12
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT: 6
    • FTA_SSL_EXT.1: 4
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 5
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC: 5
    • FTP_ITC.1: 3
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 6
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP: 10
    • FAU_ARP.1: 1
    • FAU_CON.1.2: 1
    • FAU_GEN: 38
    • FAU_GEN.1: 22
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAA: 11
    • FAU_SAA.1: 4
    • FAU_SAR: 30
    • FAU_SAR.1: 7
    • FAU_STG: 32
    • FAU_STG.1: 7
    • FAU_STG.2: 16
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.3: 3
    • FAU_STG.4: 3
  • FCO:
    • FCO_NRO: 3
    • FCO_NRO.1: 1
    • FCO_NRO.2: 9
    • FCO_NRO.2.1: 1
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 1
  • FCS:
    • FCS_CKM: 46
    • FCS_CKM.1: 17
    • FCS_CKM.2: 6
    • FCS_CKM.4: 32
    • FCS_CKM.4.1: 1
    • FCS_COP: 62
    • FCS_COP.1: 11
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 9
    • FDP_ACC.2: 11
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 6
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 3
    • FDP_IFC: 29
    • FDP_IFC.1: 12
    • FDP_IFC.2: 4
    • FDP_IFF: 25
    • FDP_IFF.1: 25
    • FDP_IFF.1.3: 1
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_RIP: 2
    • FDP_RIP.1: 1
    • FDP_RIP.2: 9
    • FDP_RIP.2.1: 1
    • FDP_SDI: 2
    • FDP_SDI.1: 1
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 2
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UID: 3
    • FIA_UID.1: 8
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
    • FIA_USB: 3
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 1
    • FMT_MSA: 61
    • FMT_MSA.1: 9
    • FMT_MSA.3: 12
    • FMT_SMF: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR: 3
    • FMT_SMR.1: 30
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_CON: 6
    • FPR_CON.1: 10
    • FPR_CON.1.1: 3
    • FPR_CON.1.2: 4
    • FPR_PSE: 2
    • FPR_PSE.1: 8
    • FPR_PSE.1.1: 3
    • FPR_PSE.1.2: 2
    • FPR_PSE.1.3: 2
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP: 3
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_RPL: 3
    • FPT_RPL.1: 8
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_SDI.2: 2
    • FPT_STM: 3
    • FPT_STM.1: 19
    • FPT_STM.1.1: 1
    • FPT_TST: 3
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 33
    • FTP_ITC.1: 9
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECTIONS: 4
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.ADDRESS_FILTERING: 5
    • O.DISPLAY_BANNER: 1
    • O.PORT_FILTERING: 5
    • O.PROTECTED_COMMUNICATIONS: 1
    • O.RELATED_CONNECTION_FILTERING: 5
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.SESSION_LOCK: 1
    • O.STATEFUL_INSPECTION: 5
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
  • OE:
    • OE.CONNECTIONS: 2
  • T:
    • T.ADMIN_ERROR: 1
    • T.NETWORK_ACCESS: 3
    • T.NETWORK_DISCLOSURE: 2
    • T.NETWORK_DOS: 4
    • T.NETWORK_MISUSE: 2
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
  • OE:
    • OE.SM: 4
  • OSP:
    • OSP.SM: 5
pdf_data/st_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 23
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 9
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 1
  • ECC:
    • ECC:
      • ECC: 4
    • ECDSA:
      • ECDSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 4
      • SHA-256: 2
      • SHA-384: 5
      • SHA-512: 12
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
    • Key agreement: 1
  • MAC:
    • MAC: 12
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 37
    • SSHv1: 2
    • SSHv2: 19
  • TLS:
    • TLS:
      • TLS: 16
      • TLS 1.0: 1
  • VPN:
    • VPN: 4
  • TLS:
    • TLS:
      • TLS: 41
      • TLS 1.2: 5
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 3
  • RNG:
    • RBG: 5
    • RNG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 3
    • brainpoolP384r1: 3
    • brainpoolP512r1: 3
  • NIST:
    • NIST P-256: 3
    • NIST P-384: 3
    • P-256: 3
    • P-384: 3
    • ansip384r1: 3
    • prime256v1: 3
    • secp256r1: 3
    • secp384r1: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
    • physical tampering: 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03109: 1
    • BSI TR-03109-1: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 4
    • FIPS 186-2: 1
    • FIPS 186-3: 1
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-2: 2
    • FIPS PUB 186-3: 1
    • FIPS PUB 197: 2
    • FIPS PUB 198-1: 1
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-56B: 1
    • SP 800-56B: 3
    • SP 800-90: 1
  • RFC:
    • RFC 2246: 2
    • RFC 2460: 2
    • RFC 2818: 2
    • RFC 3513: 2
    • RFC 4253: 1
    • RFC 4443: 2
    • RFC 5735: 2
    • RFC 768: 2
    • RFC 791: 2
    • RFC 792: 2
    • RFC 793: 2
    • RFC 959: 1
  • FIPS:
    • FIPS 140-2: 4
    • FIPS 180-4: 4
    • FIPS 197: 6
  • RFC:
    • RFC 2104: 4
    • RFC 2616: 3
    • RFC 3394: 4
    • RFC 3565: 3
    • RFC 4493: 6
    • RFC 5084: 6
    • RFC 5246: 4
    • RFC 5289: 5
    • RFC 5639: 7
    • RFC 5905: 4
    • RFC5246: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • NTP Server SMTP Server Audit Server SNMP Server Network Assets Legend TOE Operational Environment Out of Scope … … Sourcefire 3D System Security Target 13 The TOE main subsystems are summarized as followed: •: 1
    • Out of Scope: 1
    • in the update header to ensure they match. 12 This process requires access to the Internet and is out of scope of the evaluation. Sourcefire 3D System Security Target 61 During the update process, if the Snort: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: EMH metering GmbH & Co. KG
  • /CreationDate: D:20191216100008+01'00'
  • /Creator: LaTeX with hyperref package
  • /Keywords: SMGW SmartMetering Version: 2.00
  • /ModDate: D:20191216100008+01'00'
  • /PTEX.Fullbanner: This is pdfTeX, Version 3.14159265-2.6-1.40.18 (TeX Live 2017) kpathsea version 6.2.3
  • /Producer: pdfTeX-1.40.18
  • /Subject: CASA-ST
  • /Title: CASA 1.0 Security Target
  • /Trapped: /False
  • pdf_file_size_bytes: 2143082
  • pdf_hyperlinks: http://www.jtc1sc27.din.de/sce/sd6
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 132
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different