Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
CCEVS-VR-VID-11155-2021
eTugra SAM v1.4
OCSI/CERT/CCL/01/2023/RC
name VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2 eTugra SAM v1.4
category Other Devices and Systems Products for Digital Signatures
scheme US IT
status archived active
not_valid_after 28.07.2023 16.04.2029
not_valid_before 28.07.2021 16.04.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_FP_etugra_sam_14_v1.0_en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_etugra_sam_14_v1.0_en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_etugra_sam_14_v10.pdf
manufacturer VMware Inc. E-Tugra EBG Information Technologies and Services Joint Stock Company
manufacturer_web https://www.vmware.com https://e-tugra.com.tr/
security_level {} EAL4+, AVA_VAN.5
dgst 8129b9e38f61ae35 f4885e7bbdd8eb7d
heuristics/cert_id CCEVS-VR-VID-11155-2021 OCSI/CERT/CCL/01/2023/RC
heuristics/cert_lab US []
heuristics/direct_transitive_cves {} CVE-2022-36986, CVE-2022-36997, CVE-2022-42301, CVE-2022-36984, CVE-2022-42299, CVE-2022-42304, CVE-2022-36999, CVE-2022-42307, CVE-2022-36992, CVE-2022-42305, CVE-2022-36988, CVE-2022-37000, CVE-2022-36995, CVE-2022-36996, CVE-2022-36991, CVE-2022-36990, CVE-2022-36985, CVE-2022-36987, CVE-2021-41570, CVE-2022-42300, CVE-2022-42302, CVE-2022-36998, CVE-2022-36989, CVE-2022-42303, CVE-2022-36993, CVE-2022-36994, CVE-2023-28759
heuristics/indirect_transitive_cves {} CVE-2022-36986, CVE-2022-36997, CVE-2022-42301, CVE-2022-36984, CVE-2022-42299, CVE-2022-42304, CVE-2022-36999, CVE-2022-42307, CVE-2022-36992, CVE-2022-42305, CVE-2022-36988, CVE-2022-37000, CVE-2022-36995, CVE-2022-36996, CVE-2022-36991, CVE-2022-36990, CVE-2022-36985, CVE-2022-36987, CVE-2021-41570, CVE-2022-42300, CVE-2022-42302, CVE-2022-36998, CVE-2022-36989, CVE-2022-42303, CVE-2022-36993, CVE-2022-36994, CVE-2023-28759
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 7.2 1.4
heuristics/report_references/directly_referenced_by {} OCSI/CERT/CCL/01/2022/RC
heuristics/report_references/directly_referencing {} OCSI/CERT/CCL/13/2021/RC
heuristics/report_references/indirectly_referenced_by {} OCSI/CERT/CCL/01/2022/RC
heuristics/report_references/indirectly_referencing {} OCSI/CERT/CCL/13/2021/RC
heuristics/scheme_data
  • category: Application Software
  • certification_date: 28.07.2021
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 28.07.2023
  • id: CCEVS-VR-VID11155
  • product: VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11155
  • vendor: VMware, LLC
  • certification_date: 16.04.2024
  • level: EAL4+
  • report_link_en: https://www.ocsi.gov.it/documenti/certificazioni/eTugra/cr_etugra_sam_14_v1.0_en.pdf
  • report_link_it: https://www.ocsi.gov.it/documenti/certificazioni/eTugra/rc_etugra_sam_14_v.1.0_it.pdf
  • supplier: E-Tugra EBG Information Technologies and Services Joint Stock Company
  • target_link: https://www.ocsi.gov.it/documenti/certificazioni/eTugra/st_etugra_sam_14_v10.pdf
  • title: eTugra SAM v1.4
heuristics/protection_profiles a1cc4a4e079f4d1f eabbd431e1f174cd
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf
pdf_data/cert_filename st_vid11155-ci.pdf cr_FP_etugra_sam_14_v1.0_en.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11155-2021: 1
  • IT:
    • OCSI/CERT/CCL/01/2023/RC: 1
    • OCSI/CERT/CCL/13/2021/RC: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL2: 2
    • EAL4: 2
    • EAL4+: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_FLR: 2
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
pdf_data/cert_metadata
  • /CreationDate: D:20210803124126-04'00'
  • /ModDate: D:20210803124126-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 183258
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Tiziano Inzerilli
  • /CreationDate: D:20240419162007+02'00'
  • /ModDate: D:20240419162007+02'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Certification Report "eTugra SAM v1.4".pdf
  • pdf_file_size_bytes: 373181
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid11155-vr.pdf cr_etugra_sam_14_v1.0_en.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID11155-2021
    • cert_item: VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11155-2021: 1
  • IT:
    • OCSI/CERT/CCL/01/2023/RC: 25
    • OCSI/CERT/CCL/13/2021/RC: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4+: 4
    • EAL2: 4
    • EAL4: 10
    • EAL4 augmented: 3
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_TSU_EXT.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • O:
    • O.J: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 4
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 3
  • CCLab:
    • CCLab Software Laboratory: 5
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
      • TLS v1.2: 1
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 4
pdf_data/report_metadata
  • /Author: OCSI
  • /CreationDate: D:20240416084741+02'00'
  • /Creator: Microsoft® Word per Microsoft 365
  • /ModDate: D:20240416084741+02'00'
  • /Producer: Microsoft® Word per Microsoft 365
  • /Title: Certification Report "eTugra SAM v1.4"
  • pdf_file_size_bytes: 656782
  • pdf_hyperlinks: https://www.sogis.eu/, https://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename st_vid11155-st.pdf st_etugra_sam_14_v10.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE.1: 12
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.1: 6
    • ALC_CMS.1: 7
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 12
    • ASE_INT.1: 14
    • ASE_OBJ.1: 6
    • ASE_REQ.1: 12
    • ASE_TSS.1: 7
  • ATE:
    • ATE_IND.1: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 9
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 1
    • AGD_PRE: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM_EXT.1: 4
    • FCS_CKM_EXT.1.1: 1
    • FCS_COP: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 2
    • FCS_STO_EXT.1: 7
    • FCS_STO_EXT.1.1: 1
  • FDP:
    • FDP_DAR_EXT: 1
    • FDP_DAR_EXT.1: 5
    • FDP_DEC_EXT.1: 5
    • FDP_DEC_EXT.1.1: 2
    • FDP_DEC_EXT.1.2: 2
    • FDP_NET_EXT.1: 5
    • FDP_NET_EXT.1.1: 1
  • FMT:
    • FMT_CFG_EXT.1: 5
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 1
    • FMT_MEC_EXT.1: 8
    • FMT_MEC_EXT.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
  • FPR:
    • FPR_ANO_EXT.1: 4
    • FPR_ANO_EXT.1.1: 1
  • FPT:
    • FPT_AEX_EXT.1: 4
    • FPT_AEX_EXT.1.1: 2
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 2
    • FPT_AEX_EXT.1.4: 2
    • FPT_AEX_EXT.1.5: 1
    • FPT_API_EXT.1: 4
    • FPT_API_EXT.1.1: 1
    • FPT_IDV_EXT.1: 4
    • FPT_IDV_EXT.1.1: 1
    • FPT_LIB_EXT.1: 4
    • FPT_LIB_EXT.1.1: 1
    • FPT_TUD_EXT.1: 6
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 2
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 1
    • FPT_TUD_EXT.2: 7
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTP:
    • FTP_DIT_EXT.1: 6
    • FTP_DIT_EXT.1.1: 1
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
  • FCS:
    • FCS_CKM: 25
    • FCS_CKM.1: 17
    • FCS_CKM.2: 6
    • FCS_CKM.4: 29
    • FCS_CKM.4.1: 1
    • FCS_COP: 26
    • FCS_COP.1: 14
    • FCS_RNG: 3
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 91
    • FDP_ACC.1: 43
    • FDP_ACF: 60
    • FDP_ACF.1: 49
    • FDP_ETC: 15
    • FDP_ETC.2: 8
    • FDP_IFC: 29
    • FDP_IFC.1: 24
    • FDP_IFF: 15
    • FDP_IFF.1: 14
    • FDP_ITC: 15
    • FDP_ITC.1: 12
    • FDP_ITC.2: 22
    • FDP_UCT.1: 7
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 11
    • FIA_AFL.1: 1
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_UAU: 15
    • FIA_UAU.1: 5
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 4
    • FIA_UID.1: 5
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
    • FIA_USB.1: 18
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 2
    • FIA_USB.1.3: 1
    • FIA_UTD.1: 1
  • FMT:
    • FMT_MSA: 38
    • FMT_MSA.1: 10
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 26
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.2: 13
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_PHP.1: 11
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 14
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TRP: 2
  • FTP:
    • FTP_ITC: 8
    • FTP_ITC.1: 11
    • FTP_TDC.1: 2
    • FTP_TRP: 24
    • FTP_TRP.1: 15
pdf_data/st_keywords/cc_claims
  • A:
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
  • A:
    • A.ACCESS_PROTECTED: 4
    • A.AUTH_DATA: 4
    • A.CA: 4
    • A.PRIVILEGED_USER: 4
    • A.SEC_REQ: 4
    • A.SIGNER_AUTHENTICATION_DATA_PROTECTION: 4
    • A.SIGNER_DEVICE: 4
    • A.SIGNER_ENROLMENT: 4
    • A.TSP_AUDITED: 4
  • OE:
    • OE.CA_REQUEST_CERTIFICATE: 4
    • OE.CERTIFICATE_VERFICATION: 2
    • OE.CERTIFICATE_VERIFICATION: 1
    • OE.CRYPTOMODULE_CERTIFIED: 5
    • OE.DELEGATED_AUTHENTICATION: 3
    • OE.DEVICE: 10
    • OE.ENV: 9
    • OE.SIGNER_AUTHENTICATION_DATA: 6
    • OE.SVD_AUTHENTICITY: 5
  • OSP:
    • OSP.CRYPTO: 4
    • OSP.RANDOM: 5
  • OT:
    • OT.AUDIT_PROTECTION: 5
    • OT.CRYPTO: 6
    • OT.DTBSR_INTEGRITY: 4
    • OT.PRIVILEGED_USER_AUTHENTICATION: 6
    • OT.PRIVILEGED_USER_MANAGEMENT: 19
    • OT.PRIVILEGED_USER_PROTECTION: 18
    • OT.RANDOM: 20
    • OT.REFERENCE_SIGNER_AUTHENTICATION_DATA: 7
    • OT.SAD_VERIFICATION: 18
    • OT.SAP: 8
    • OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION: 19
    • OT.SIGNATURE_INTEGRITY: 18
    • OT.SIGNER_KEY_PAIR_GENERATION: 19
    • OT.SIGNER_MANAGEMENT: 5
    • OT.SIGNER_PROTECTION: 20
    • OT.SVD: 4
    • OT.SYSTEM_PROTECTION: 19
  • R:
    • R.AUDIT: 2
    • R.RANDOM: 2
    • R.SAD: 27
    • R.SVD: 42
    • R.TSF_DATA: 11
  • T:
    • T.ADMIN_IMPERSONATION: 8
    • T.AUDIT_ALTERATION: 7
    • T.AUTHENTICATION_SIGNER_IMPERSONATION: 10
    • T.AUTHORISATION_DATA_DISCLOSE: 3
    • T.AUTHORISATION_DATA_UPDATE: 10
    • T.CONTEXT_ALTERATION: 11
    • T.DTBSR_FORGERY: 7
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_: 1
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCL: 2
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED: 3
    • T.ENROLMENT_SIGNER_IMPERSONATION: 10
    • T.MAINTENANCE_AUTHENTICATION_DISCLOSE: 6
    • T.PRIVILEGED_USER_INSERTION: 10
    • T.RANDOM: 9
    • T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_: 1
    • T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DA: 1
    • T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION: 2
    • T.SAD_FORGERY: 6
    • T.SAP_BYPASS: 7
    • T.SAP_REPLAY: 7
    • T.SIGNATURE_FORGERY: 7
    • T.SIGNATURE_REQUEST_DISCLOSURE: 7
    • T.SIGNER_AUTHENTICATION_DATA_MODIFIED: 6
    • T.SVD_FORGERY: 8
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 9
  • Thales:
    • Thales: 4
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
  • CCLab:
    • CCLab Software Laboratory: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
      • AES-: 1
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • HMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 6
  • RSA:
    • RSA 2048: 3
pdf_data/st_keywords/hash_function
  • bcrypt:
    • bcrypt: 1
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 2
      • SHA224: 2
      • SHA256: 7
      • SHA384: 3
      • SHA512: 5
    • SHA3:
      • SHA-3: 1
      • SHA3-224: 4
      • SHA3-256: 3
      • SHA3-384: 5
      • SHA3-512: 5
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 7
      • TLS v1.2: 3
  • VPN:
    • VPN: 1
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
  • RNG:
    • RNG: 9
pdf_data/st_keywords/cipher_mode
  • CCM:
    • CCM: 1
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP224r1: 2
    • brainpoolP256r1: 2
    • brainpoolP256t1: 2
    • brainpoolP320r1: 2
    • brainpoolP320t1: 2
    • brainpoolP384r1: 2
    • brainpoolP384t1: 2
    • brainpoolP512r1: 2
    • brainpoolP512t1: 2
  • NIST:
    • NIST P-256: 2
    • P-256: 2
    • P-384: 2
    • P-521: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
  • SCA:
    • side-channels: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 186-4: 1
  • RFC:
    • RFC 5280: 3
    • RFC 6960: 2
  • X509:
    • X.509: 8
  • BSI:
    • AIS 20: 2
    • AIS 31: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 3
  • FIPS:
    • FIPS 140-3: 1
    • FIPS 186-5: 7
    • FIPS 202: 1
    • FIPS PUB 140-3: 1
    • FIPS PUB 186-5: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 19790: 8
    • ISO/IEC 19790:2012: 1
  • PKCS:
    • PKCS#1: 5
  • RFC:
    • RFC 5639: 4
    • RFC 6151: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • in the claimed Protection Profile. Therefore, the following product functionality is considered out of scope as there are no SFRs that can be mapped to this functionality: • The functionality of collecting: 1
    • out of scope: 1
  • OutOfScope:
    • out of scope: 1
    • used to authenticate the signer are managed by the IdP or mobile application via SSA and are thus out of scope of this ST. 145 [selection: [assignment: the rules describing how delegated authentication is: 1
pdf_data/st_metadata
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different