Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Sourcefire 3D System Version 5.2.0.1
CCEVS-VR-VID-10537-2014
S3CS9AB 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with specific IC Dedicated Software
BSI-DSZ-CC-0882-2013
name Sourcefire 3D System Version 5.2.0.1 S3CS9AB 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with specific IC Dedicated Software
category Detection Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US DE
not_valid_after 21.03.2016 01.09.2019
not_valid_before 06.08.2014 04.12.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0882a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0882b_pdf.pdf
manufacturer Sourcefire Inc. Samsung Electronics Co., Ltd.
manufacturer_web https://www.sourcefire.com/ https://www.samsung.com
security_level {} ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 79f1b9da6ca5a71c db89c868db0d272f
heuristics/cert_id CCEVS-VR-VID-10537-2014 BSI-DSZ-CC-0882-2013
heuristics/cert_lab US BSI
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions 5.2.0.1 0, 32
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0882-V2-2019
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0801-2012
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0882-V2-2019
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0720-2011, BSI-DSZ-CC-0639-2010, BSI-DSZ-CC-0547-2009, BSI-DSZ-CC-0719-2011, BSI-DSZ-CC-0801-2012
heuristics/scheme_data
  • category: Firewall, Wireless Monitoring
  • certification_date: 06.08.2014
  • evaluation_facility: COACT, Inc. Labs
  • expiration_date: 06.08.2016
  • id: CCEVS-VR-VID10537
  • product: Sourcefire 3D System Version 5.2.0.1
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10537
  • vendor: Sourcefire, Inc.
heuristics/protection_profiles ac9abe3d5c5a31f0 f6d23054061d72ba
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf
pdf_data/report_filename st_vid10537-vr.pdf 0882a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10537-2014
    • cert_item: Sourcefire 3D System Version 5.2.0.1
    • cert_lab: US NIAP
  • DE:
    • cert_id: BSI-DSZ-CC-0882-2013
    • cert_item: S3CS9AB 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with specific IC Dedicated Software
    • cert_lab: BSI
    • developer: Samsung Electronics
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10537-2014: 1
  • DE:
    • BSI-DSZ-CC-0801-2012: 3
    • BSI-DSZ-CC-0882: 1
    • BSI-DSZ-CC-0882-2013: 22
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035-2007: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 5: 7
    • EAL 5 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 7
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 2
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 24
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 2
    • TÜViT: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 2
      • Triple-DES: 2
    • DES:
      • DES: 5
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-224: 2
      • SHA-384: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
    • SSHv2: 4
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 3
  • RNG:
    • RNG: 2
  • TRNG:
    • DTRNG: 12
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 1
    • side-channel: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICVersion:
    • IC Version: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-2: 1
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
  • NIST:
    • NIST SP 800-38A: 1
  • BSI:
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 38: 1
    • AIS 46: 1
    • AIS31: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 2013-11-27, TÜViT (confidential document) [11] Project < Kansa > Life Cycle Definition (Class ALC_CMC.4/CMS.5), Version 1.4, 2013-10-21: 1
    • Electronics (confidential document) [12] S3CS9AB 32-Bit CMOS Microcontroller for Smart Card User’s manual, Version 1.00, April 2013: 1
    • Report Summary (ETR Summary), BSI-DSZ-CC-0882, S3CS9AB Revision 0, Version 3, 2013-11-27, TÜViT (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product S3CS9AB Revision 0, Version: 1
    • Software (Project Kansa), BSI-DSZ-CC-0882-2013, Version 1.9, 2013-10-21, Samsung Electronics (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8: 1
pdf_data/report_metadata
  • /Author: Robert Roland
  • /Comments:
  • /Company: COACT
  • /CreationDate: D:20140807135046-04'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Keywords:
  • /ModDate: D:20140807135101-04'00'
  • /Producer: Adobe PDF Library 10.0
  • /SourceModified: D:20140807175026
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 136944
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20140205100058+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, S3CS9AB 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with specific IC Dedicated Software, Samsung Electronics"
  • /ModDate: D:20140206085959+01'00'
  • /Producer: LibreOffice 3.6
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0882-2013
  • pdf_file_size_bytes: 996795
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename st_vid10537-st.pdf 0882b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 4
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 2
    • EAL 5 augmented: 2
    • EAL5: 6
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 16
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 15
    • AGD_PRE: 1
    • AGD_PRE.1: 11
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 5
    • ALC_CMS: 1
    • ALC_CMS.1: 6
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 6
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 7
  • ADV:
    • ADV_ARC.1: 7
    • ADV_ARV: 1
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_VAN: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 2
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 2
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 8
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 13
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 11
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 5
    • FAU_STG_EXT.1: 4
    • FAU_STG_EXT.1.1: 1
  • FCS:
    • FCS_CKM: 5
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 5
    • FCS_CKM_EXT: 5
    • FCS_CKM_EXT.4: 8
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 33
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT: 5
    • FCS_RBG_EXT.1: 4
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSH_EXT: 5
    • FCS_SSH_EXT.1: 4
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
    • FCS_TLS_EXT: 5
    • FCS_TLS_EXT.1: 6
    • FCS_TLS_EXT.1.1: 2
  • FDP:
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_RIP: 5
    • FDP_RIP.2: 3
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_PMG_EXT: 5
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 5
    • FIA_UAU_EXT.2: 4
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT: 4
    • FIA_UIA_EXT.1: 7
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UID.1: 2
    • FIA_UID_EXT: 1
  • FMT:
    • FMT_MTD: 5
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 1
    • FMT_SMF: 6
    • FMT_SMF.1: 5
    • FMT_SMF.1.1: 1
    • FMT_SMR: 5
    • FMT_SMR.2: 3
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 3
    • FPT_APW_EXT.1: 4
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_AWP_EXT: 2
    • FPT_ITT: 5
    • FPT_ITT.1: 7
    • FPT_ITT.1.1: 1
    • FPT_SKP_EXT: 5
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM: 5
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 5
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 5
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL: 12
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT: 6
    • FTA_SSL_EXT.1: 4
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 5
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC: 5
    • FTP_ITC.1: 3
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 6
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 1
    • FAU_SAS: 8
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.4: 4
    • FCS_COP: 8
    • FCS_COP.1: 9
    • FCS_RNG: 6
    • FCS_RNG.1: 15
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF: 2
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 18
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_ITT: 1
    • FDP_ITT.1: 17
    • FDP_ITT.1.1: 1
    • FDP_SDI.1: 1
  • FMT:
    • FMT_LIM: 8
    • FMT_LIM.1: 24
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 28
    • FMT_LIM.2.1: 2
    • FMT_MSA: 2
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 21
    • FPT_FLS.1.1: 1
    • FPT_ITT: 1
    • FPT_ITT.1: 15
    • FPT_ITT.1.1: 1
    • FPT_PHP: 3
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT: 1
    • FRU_FLT.1: 1
    • FRU_FLT.2: 17
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECTIONS: 4
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.ADDRESS_FILTERING: 5
    • O.DISPLAY_BANNER: 1
    • O.PORT_FILTERING: 5
    • O.PROTECTED_COMMUNICATIONS: 1
    • O.RELATED_CONNECTION_FILTERING: 5
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.SESSION_LOCK: 1
    • O.STATEFUL_INSPECTION: 5
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
  • OE:
    • OE.CONNECTIONS: 2
  • T:
    • T.ADMIN_ERROR: 1
    • T.NETWORK_ACCESS: 3
    • T.NETWORK_DISCLOSURE: 2
    • T.NETWORK_DOS: 4
    • T.NETWORK_MISUSE: 2
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
  • O:
    • O.RND: 5
  • T:
    • T.RND: 5
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 13
  • DES:
    • 3DES:
      • 3DES: 6
      • TDEA: 1
      • Triple-DES: 2
    • DES:
      • DES: 8
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 4
      • SHA-256: 2
      • SHA-384: 5
      • SHA-512: 12
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
    • Key agreement: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 37
    • SSHv1: 2
    • SSHv2: 19
  • TLS:
    • TLS:
      • TLS: 16
      • TLS 1.0: 1
  • VPN:
    • VPN: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 3
  • RNG:
    • RBG: 5
    • RNG: 4
  • RNG:
    • RND: 10
  • TRNG:
    • DTRNG: 18
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 4
  • OFB:
    • OFB: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
  • NSS:
    • NSS: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 24
    • malfunction: 11
    • physical tampering: 2
  • SCA:
    • DPA: 3
    • Leak-Inherent: 21
    • Physical Probing: 4
    • Physical probing: 2
    • SPA: 2
    • physical probing: 9
    • side-channel: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 5
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 4
    • FIPS 186-2: 1
    • FIPS 186-3: 1
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-2: 2
    • FIPS PUB 186-3: 1
    • FIPS PUB 197: 2
    • FIPS PUB 198-1: 1
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-56B: 1
    • SP 800-56B: 3
    • SP 800-90: 1
  • RFC:
    • RFC 2246: 2
    • RFC 2460: 2
    • RFC 2818: 2
    • RFC 3513: 2
    • RFC 4253: 1
    • RFC 4443: 2
    • RFC 5735: 2
    • RFC 768: 2
    • RFC 791: 2
    • RFC 792: 2
    • RFC 793: 2
    • RFC 959: 1
  • BSI:
    • AIS 31: 2
    • AIS31: 1
    • BSI-AIS31: 3
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 3
  • FIPS:
    • FIPS 197: 1
    • FIPS197: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • NTP Server SMTP Server Audit Server SNMP Server Network Assets Legend TOE Operational Environment Out of Scope … … Sourcefire 3D System Security Target 13 The TOE main subsystems are summarized as followed: •: 1
    • Out of Scope: 1
    • in the update header to ensure they match. 12 This process requires access to the Internet and is out of scope of the evaluation. Sourcefire 3D System Security Target 61 During the update process, if the Snort: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: KyungSuk YI
  • /Baustein: SLE66C82P/SLE66C42P
  • /BausteinVersion: a15
  • /Classification: Public
  • /Company: Samsung Electronics
  • /CreationDate: D:20131021190305+09'00'
  • /Creator: Word용 Acrobat PDFMaker 10.1
  • /Datum: 23-10-2003
  • /Dokument: Security Target
  • /EEPROM: 8 kBytes
  • /Jahr: 2003
  • /ModDate: D:20140206090253+01'00'
  • /PP_Augmentations: Smartcard Integrated Circuit Platform Augmentations V0.98
  • /PP_Date: July 2001
  • /PP_Short: BSI-PP-0002; Version 1.0, July 2001
  • /PP_Version: 1.0
  • /Producer: Adobe PDF Library 10.0
  • /Protection Profile: Smartcard IC Platform Protection Profile
  • /ROM: 64 kBytes
  • /SourceModified: D:20131021100233
  • /Technologie: 0,22 µm
  • /Title: Security Target
  • /Version: 1.2
  • /XRAM: 2 kBytes
  • /m-Nummer: m1474/m1495
  • pdf_file_size_bytes: 1315207
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different