Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Black Box Secure KM Switch (CAC Models)
CCEVS-VR-11242-2021
Microsoft Windows 10 and Microsoft Windows Server (Fall Creators Update)
2018-4-INF-2341
name Black Box Secure KM Switch (CAC Models) Microsoft Windows 10 and Microsoft Windows Server (Fall Creators Update)
category Other Devices and Systems Operating Systems
scheme US ES
status active archived
not_valid_after 10.12.2026 19.05.2023
not_valid_before 10.12.2021 19.05.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11242-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-04-CCRA.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11242-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-04-INF-2341.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11242-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-04-ST.pdf
manufacturer Black Box, Inc. Microsoft Corporation
manufacturer_web https://www.blackbox.com https://www.microsoft.com
dgst 7e1ccba3850ecddc e7f887582b06bc9a
heuristics/cert_id CCEVS-VR-11242-2021 2018-4-INF-2341
heuristics/cert_lab US []
heuristics/cpe_matches {} cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm64:*
heuristics/related_cves {} CVE-2018-0599, CVE-2010-2157, CVE-2010-3139, CVE-2018-0598, CVE-2021-36958, CVE-2011-5049, CVE-2012-2971, CVE-2012-2972, CVE-2010-3143, CVE-2010-3889, CVE-2011-3389, CVE-2008-6194, CVE-2010-3888, CVE-1999-0524, CVE-2011-0638
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1
heuristics/extracted_versions - 10
heuristics/scheme_data
heuristics/protection_profiles 48f73a122587b992, 814f66c77bc7f33b, 9d5c0dd877473e05, 76f8f05a35d87f59 1edd61e3f1f2ce0d
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_ua_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_ao_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_os_v4.1.pdf
pdf_data/cert_filename st_vid11242-ci.pdf 2018-04-CCRA.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11242-2021: 1
pdf_data/cert_keywords/cc_claims
  • T:
    • T.I: 1
pdf_data/cert_keywords/vendor
  • Microsoft:
    • Microsoft: 7
    • Microsoft Corporation: 1
pdf_data/cert_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/cert_metadata
  • /CreationDate: D:20211214171613-05'00'
  • /ModDate: D:20211214171613-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181464
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: CERT10
  • /CreationDate: D:20180518102243+02'00'
  • /ModDate: D:20180518102243+02'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: 20180424124453197.pdf
  • pdf_file_size_bytes: 992756
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid11242-vr.pdf 2018-04-INF-2341.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-11242-2021
    • cert_item: for Black Box Secure KM Switch (CAC Models
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-11242-2021: 1
  • ES:
    • 2018-4-INF-2341 v3: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_FLR: 2
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_sfr
  • FPT:
    • FPT_PHP.3: 1
  • FAU:
    • FAU_GEN.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 4
    • FCS_DTLS_EXT.1: 1
    • FCS_RBG_EXT.1: 1
    • FCS_STO_EXT.1: 1
    • FCS_TLSC_EXT.1: 1
    • FCS_TLSC_EXT.2: 1
    • FCS_TLSC_EXT.3: 1
    • FCS_TLSC_EXT.4: 1
  • FDP:
    • FDP_ACF_EXT.1: 1
    • FDP_IFC_EXT.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_UAU.5: 1
  • FMT:
    • FMT_MOF_EXT.1: 1
    • FMT_SMF_EXT.1: 1
  • FPT:
    • FPT_ACF_EXT.1: 1
    • FPT_ASLR_EXT.1: 1
    • FPT_SBOP_EXT.1: 1
    • FPT_SRP_EXT.1: 1
    • FPT_TST_EXT.1: 1
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.2: 1
  • FTA:
    • FTA_TAB.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 2
    • FTP_TRP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_AC: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 33
    • Microsoft Corporation: 2
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 12
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 1
  • TLS:
    • DTLS:
      • DTLS: 3
    • TLS:
      • TLS: 6
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20180720103026+02'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20180720103026+02'00'
  • /Producer: Microsoft® Word 2013
  • pdf_file_size_bytes: 592582
  • pdf_hyperlinks: https://oc.ccn.cni.es/, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename st_vid11242-st.pdf 2018-04-ST.pdf
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FDP:
    • FDP_AFL_EXT.1: 4
    • FDP_AFL_EXT.1.1: 1
    • FDP_APC_EXT: 8
    • FDP_APC_EXT.1: 14
    • FDP_FIL_EXT: 6
    • FDP_FIL_EXT.1: 6
    • FDP_PDC_EXT: 13
    • FDP_PDC_EXT.1: 8
    • FDP_PDC_EXT.1.1: 1
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 7
    • FDP_PDC_EXT.3: 2
    • FDP_PDC_EXT.4: 3
    • FDP_PDC_EXT.4.1: 1
    • FDP_PUD_EXT.1: 3
    • FDP_PUD_EXT.1.1: 1
    • FDP_PWR_EXT.1: 3
    • FDP_PWR_EXT.1.1: 1
    • FDP_RDR_EXT.1: 1
    • FDP_RIP: 3
    • FDP_RIP.1: 1
    • FDP_RIP_EXT.1: 5
    • FDP_RIP_EXT.1.1: 1
    • FDP_RIP_EXT.2: 5
    • FDP_RIP_EXT.2.1: 1
    • FDP_SWI_EXT.1: 5
    • FDP_SWI_EXT.1.1: 1
    • FDP_SWI_EXT.2: 6
    • FDP_SWI_EXT.2.1: 1
    • FDP_SWI_EXT.2.2: 1
    • FDP_SWI_EXT.3: 3
    • FDP_SWI_EXT.3.1: 1
    • FDP_TER_EXT.1: 3
    • FDP_TER_EXT.1.1: 1
    • FDP_TER_EXT.2: 3
    • FDP_TER_EXT.2.1: 1
    • FDP_TER_EXT.3: 3
    • FDP_TER_EXT.3.1: 1
    • FDP_TER_EXT.3.2: 1
    • FDP_UAI_EXT.1: 3
    • FDP_UAI_EXT.1.1: 1
    • FDP_UDF_EXT: 7
    • FDP_UDF_EXT.1: 2
  • FIA:
    • FIA_UAU.2: 4
    • FIA_UAU.2.1: 1
    • FIA_UID.2: 4
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_SMF.1: 5
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 4
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 3
    • FPT_FLS_EXT.1: 6
    • FPT_FLS_EXT.1.1: 1
    • FPT_NTA_EXT.1: 3
    • FPT_NTA_EXT.1.1: 1
    • FPT_PHP.1: 4
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 4
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 3
    • FCS_CKM.4: 7
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 48
    • FCS_COP.1.1: 5
    • FCS_DTLS_EXT: 1
    • FCS_DTLS_EXT.1: 8
    • FCS_DTLS_EXT.1.1: 2
    • FCS_DTLS_EXT.1.2: 2
    • FCS_RBG_EXT: 1
    • FCS_RBG_EXT.1: 7
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_STO_EXT: 1
    • FCS_STO_EXT.1: 6
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 12
    • FCS_TLSC_EXT.1.1: 2
    • FCS_TLSC_EXT.1.2: 2
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.2: 8
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.3: 8
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.4: 7
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLS_EXT: 1
    • FCS_TLS_EXT.1: 1
    • FCS_TLS_EXT.2: 1
    • FCS_TLS_EXT.3: 1
  • FDP:
    • FDP_ACF_EXT: 1
    • FDP_ACF_EXT.1: 6
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT: 1
    • FDP_IFC_EXT.1: 6
    • FDP_IFC_EXT.1.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF_EXT.1: 7
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_SMF.1: 1
    • FMT_SMF_EXT: 1
    • FMT_SMF_EXT.1: 7
    • FMT_SMF_EXT.1.1: 2
  • FPT:
    • FPT_ACF_EXT: 1
    • FPT_ACF_EXT.1: 6
    • FPT_ACF_EXT.1.1: 2
    • FPT_ACF_EXT.1.2: 2
    • FPT_ASLR_EXT: 1
    • FPT_ASLR_EXT.1: 6
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT: 1
    • FPT_SBOP_EXT.1: 6
    • FPT_SBOP_EXT.1.1: 1
    • FPT_SRP_EXT: 1
    • FPT_SRP_EXT.1: 6
    • FPT_SRP_EXT.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.2: 6
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 6
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 16
    • FTP_ITC_EXT.1.1: 2
    • FTP_TRP: 1
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_MICROPHONES: 1
    • A.NO_TEMPEST: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED_ACCESS: 1
  • O:
    • O.ANTI_TAMPERING: 2
    • O.ANTI_TAMPERING_PERMANENTLY_DISABLE_TOE: 3
    • O.AUTHORIZED_USAGE: 3
    • O.COMPUTER_INTERFACE_I: 2
    • O.COMPUTER_INTERFACE_ISOLATION: 3
    • O.COMPUTER_INTERFACE_ISOLATION_TOE_UNPOWERED: 3
    • O.COMPUTER_TO_AUDIO_IS: 1
    • O.COMPUTER_TO_AUDIO_ISOLATION: 1
    • O.EMULATED_INPUT: 2
    • O.LEAK_PREVENTION_SWIT: 1
    • O.LEAK_PREVENTION_SWITCHING: 1
    • O.NO_OTHER_EXTERNAL_IN: 1
    • O.NO_OTHER_EXTERNAL_INTERFACES: 1
    • O.NO_TOE_ACCESS: 2
    • O.NO_USER_DATA_RETENTI: 1
    • O.NO_USER_DATA_RETENTION: 3
    • O.PERIPHERAL_PORTS_ISOL: 1
    • O.PERIPHERAL_PORTS_ISOLATION: 3
    • O.REJECT_UNAUTHORIZED_: 2
    • O.REJECT_UNAUTHORIZED_ENDPOINTS: 3
    • O.REJECT_UNAUTHORIZED_PERIPHERAL: 4
    • O.SELF_TEST: 5
    • O.SELF_TEST_FAIL_INDICAT: 1
    • O.SELF_TEST_FAIL_INDICATION: 1
    • O.SELF_TEST_FAIL_TOE_DIS: 1
    • O.SELF_TEST_FAIL_TOE_DISABLE: 4
    • O.SESSION_TERMINATION: 2
    • O.TAMPER_EVIDENT_LABE: 1
    • O.TAMPER_EVIDENT_LABEL: 1
    • O.UNIDIRECTIONAL_AUDIO: 1
    • O.UNIDIRECTIONAL_AUDIO_OUT: 1
    • O.UNIDIRECTIONAL_INPUT: 2
    • O.USER_AUTHENTICATION_: 1
    • O.USER_AUTHENTICATION_ISOLATION: 1
    • O.USER_DATA_ISOLATION: 4
  • OE:
    • OE.NO_MICROPHONES: 1
    • OE.NO_TEMPEST: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.AUDIO_REVERSED: 1
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.MICROPHONE_USE: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_USE: 1
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.ACCOUNTABILITY: 1
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 1
  • Microsoft:
    • Microsoft: 160
    • Microsoft Corporation: 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 18
      • AES-128: 1
      • AES-256: 4
    • RC:
      • RC4: 1
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 14
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 12
    • ECDH:
      • ECDH: 4
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 12
  • FF:
    • DH:
      • DH: 2
      • DHE: 2
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 9
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
      • SHA1: 2
    • SHA2:
      • SHA-2: 1
      • SHA-256: 12
      • SHA-384: 4
      • SHA-512: 4
      • SHA256: 4
      • SHA384: 3
      • SHA512: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • KEX:
    • Key Exchange: 5
  • MAC:
    • MAC: 19
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 7
    • IKEv1: 1
    • IKEv2: 1
  • IPsec:
    • IPsec: 20
  • PGP:
    • PGP: 1
  • TLS:
    • DTLS:
      • DTLS: 22
      • DTLS 1.0: 2
      • DTLS 1.2: 3
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 90
      • TLS 1.0: 2
      • TLS 1.1: 2
      • TLS 1.2: 4
  • VPN:
    • VPN: 20
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
    • PRNG: 2
  • RNG:
    • RBG: 7
    • RNG: 7
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 1
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 3
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 14
    • P-384: 14
    • P-521: 14
    • secp256r1: 2
    • secp384r1: 2
    • secp521r1: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_NULL_WITH_NULL_NULL: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 140: 1
    • FIPS 180-4: 1
    • FIPS 186-4: 15
    • FIPS 197: 2
    • FIPS 198-1: 1
    • FIPS 198-2: 1
    • FIPS PUB 186-4: 5
  • ISO:
    • ISO/IEC 2900-2: 1
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38C: 2
    • NIST SP 800-38D: 2
    • NIST SP 800-38E: 2
    • NIST SP 800-38F: 2
    • NIST SP 800-56A: 1
    • NIST SP 800-56B: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90: 1
    • NIST SP 800-90A: 1
    • NIST SP 800-90B: 1
    • SP 800-56A: 1
    • SP 800-90: 1
  • PKCS:
    • PKCS #7: 1
  • RFC:
    • RFC 2246: 2
    • RFC 2396: 1
    • RFC 2560: 1
    • RFC 2818: 1
    • RFC 3268: 1
    • RFC 3546: 2
    • RFC 4347: 1
    • RFC 4366: 1
    • RFC 4492: 5
    • RFC 4681: 1
    • RFC 5246: 8
    • RFC 5280: 4
    • RFC 5289: 9
    • RFC 5759: 1
    • RFC 6066: 1
    • RFC 6125: 1
    • RFC 6347: 2
  • X509:
    • X.509: 15
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • kernel. Software loaded for execution directly by the platform (e.g. first-stage bootloaders) is out of scope. For each additional category of executable code verified before execution, the evaluator will: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: John Hickey, BLACK BOX
  • /CreationDate: D:20211214170755-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20211214170755-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: Unrestricted
  • /Title: PP 3.0 Secure KVM Security Target
  • pdf_file_size_bytes: 681231
  • pdf_hyperlinks: https://www.blackbox.com/NIAP4/documentation
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different