| name |
Alcatel-Lucent Enterprise OmniSwitch series 6360, 6465, 6560, 6860, 6865, 6900, 9900 with AOS 8.9.R11 |
Akis Gezgin_N SAC&EAC Configuration v1.0.1.0 |
| category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
US |
TR |
| status |
archived |
archived |
| not_valid_after |
21.10.2025 |
22.03.2024 |
| not_valid_before |
21.10.2023 |
22.03.2021 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11404-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS_GEZGiN_N_SAC&EAC_cc.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11404-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS_GEZGiN_N_SAC&EAC_CR.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11404-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS%20GEZGiN_N%20SAC%20&%20EAC%20Security%20Target%20Lite.pdf |
| manufacturer |
ALE USA Inc |
TÜBİTAK BİLGEM UEKAE |
| manufacturer_web |
https://www.al-enterprise.com/ |
https://www.uekae.tubitak.gov.tr |
| security_level |
{} |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
| dgst |
826867d07cbf5910 |
6cb9f17e70d5dc02 |
| heuristics/cert_id |
CCEVS-VR-VID-11404-2023 |
21.0.03/TSE-CCCS-72 |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_FSP.1, AGD_OPE.1, ALC_CMC.1, ALC_CMS.1, AVA_VAN.1, ATE_IND.1, AGD_PRE.1 |
ASE_TSS.2, ATE_IND.2, ALC_LCD.1, ATE_COMP.1, ASE_ECD.1, ALC_CMS.5, ALC_COMP.1, ASE_OBJ.2, ATE_DPT.3, AGD_PRE.1, ADV_ARC.1, ATE_FUN.1, AVA_COMP.1, ASE_COMP.1, ADV_IMP.1, ADV_TDS.3, ASE_SPD.1, ASE_INT.1, ALC_TAT.2, ASE_CCL.1, AGD_COMP.1, ATE_COV.2, AVA_VAN.5, ADV_COMP.1, ADV_INT.2, ASE_REQ.2, ALC_DEL.1, ALC_FLR.1, ALC_CMC.4, AGD_OPE.1, ALC_DVS.2, ADV_FSP.4 |
| heuristics/extracted_versions |
8.9 |
1.0.1.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
| heuristics/protection_profiles |
89f2a255423f4a20 |
a33327d40f253f46 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
| pdf_data/cert_filename |
st_vid11404-ci.pdf |
AKiS_GEZGiN_N_SAC&EAC_cc.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11404-2023: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20231101122548-04'00'
- /ModDate: D:20231101122548-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 180676
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Cem ERDİVAN
- /CreationDate: D:20210330120805+03'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20210330120805+03'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 152539
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
st_vid11404-vr.pdf |
AKiS_GEZGiN_N_SAC&EAC_CR.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11404-2023
- cert_item: Alcatel-Lucent Enterprise OmniSwitch series 6360, 6465, 6560, 6860, 6865, 6900, 9900 with AOS 8.9 R11
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11404-2023: 1
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0035: 1
- BSI-PP-0056-V2-2012: 1
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4+: 1
- EAL 5: 1
- EAL 5+: 4
- EAL2: 1
- EAL5+: 1
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_COMP.1: 1
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COMP.1: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_COMP.1: 1
- AVA_VAN.5: 7
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
- /Author: TSE KSDB
- /CreationDate: D:20210330120917+03'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20210330120917+03'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 649800
- pdf_hyperlinks: http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
| pdf_data/st_filename |
st_vid11404-st.pdf |
AKiS GEZGiN_N SAC & EAC Security Target Lite.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1136-V3-2022: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0084-2014: 2
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0056-V2-2012: 5
- BSI-CC-PP-0068-: 1
- BSI-CC-PP-0068-V2-2011: 2
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 9
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 3
- EAL 6 augmented: 3
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 4
- ALC_CMS: 1
- ALC_CMS.1: 5
- ATE:
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 6
- AVA_VLA: 1
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 5
- ADV_FSP.4: 1
- ADV_IMP.1: 8
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.2: 8
- ALC_FLR.1: 2
- ASE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.2: 3
- FCS_COP: 7
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT.1: 1
- FCS_SSHS_EXT.1: 3
- FCS_TLSC_EXT.1: 2
- FCS_TLSC_EXT.2.3: 1
- FDP:
- FIA:
- FPT:
- FTA:
- FTP:
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 15
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 45
- FCS_CKM.1: 21
- FCS_CKM.2: 5
- FCS_CKM.4: 39
- FCS_CKM.4.1: 1
- FCS_COP: 87
- FCS_COP.1: 11
- FCS_RND: 6
- FCS_RND.1: 17
- FCS_RND.1.1: 1
- FCS_RNG: 3
- FDP:
- FDP_ACC: 26
- FDP_ACC.1: 11
- FDP_ACF: 26
- FDP_ACF.1: 23
- FDP_IFC.1: 5
- FDP_ITC: 1
- FDP_ITC.1: 16
- FDP_ITC.2: 16
- FDP_ITT.1: 1
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FDP_SDC.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 9
- FDP_UCT.1: 1
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 14
- FIA_AFL.1: 4
- FIA_API: 5
- FIA_API.1: 12
- FIA_API.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU: 65
- FIA_UAU.1: 6
- FIA_UAU.4: 1
- FIA_UAU.5: 2
- FIA_UAU.6: 2
- FIA_UID: 15
- FIA_UID.1: 6
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 23
- FMT_LIM.1.1: 2
- FMT_LIM.2: 22
- FMT_LIM.2.1: 2
- FMT_MSA: 2
- FMT_MSA.3: 6
- FMT_MTD: 90
- FMT_MTD.1: 13
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 46
- FMT_SMF.1.1: 1
- FMT_SMR: 23
- FMT_SMR.1: 24
- FPT:
- FPT_EMS: 3
- FPT_EMS.1: 19
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 16
- FPT_PHP.3.1: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 13
- FTP_ITC.1: 7
- FTP_TRP.1: 4
|
| pdf_data/st_keywords/cc_claims |
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.COMPONENTS_RUNNING: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- OE.VM_CONFIGURATION: 1
|
|
| pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 6
- NXP Semiconductors: 1
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 4
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
- AES_competition:
- AES:
- AES: 14
- AES128: 1
- AES192: 1
- AES256: 1
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 11
- Diffie-Hellman: 14
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 14
- SHA-384: 5
- SHA-512: 8
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 5
- SHA-384: 4
- SHA-512: 5
|
| pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
|
| pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 53
- TLS 1.2: 1
- TLSv1.2: 8
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 14
- P-384: 12
- P-521: 12
- secp256r1: 2
- secp384r1: 2
- secp521r1: 2
|
- ANSSI:
- Brainpool:
- brainpoolP192r1: 1
- brainpoolP224r1: 4
- brainpoolP224t1: 3
- brainpoolP256r1: 5
- brainpoolP256t1: 3
- brainpoolP320r1: 4
- brainpoolP320t1: 3
- brainpoolP384r1: 5
- brainpoolP384t1: 3
- brainpoolP512r1: 5
- brainpoolP512t1: 3
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 4
- Physical Tampering: 4
- fault injection: 1
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 5
- EF.CardAccess: 3
- EF.DG1: 15
- EF.DG11: 1
- EF.DG14: 17
- EF.DG16: 9
- EF.DG2: 2
- EF.DG3: 12
- EF.DG4: 13
- EF.DG5: 1
- EF.DG6: 1
- EF.DG7: 12
- EF.DG8: 12
- EF.DG9: 1
- EF.SOD: 6
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-3: 1
- FIPS PUB 186-4: 5
- ISO:
- ISO/IEC 14888-3: 2
- ISO/IEC 18031:2011: 2
- ISO/IEC 9796-2: 3
- NIST:
- NIST SP 800-38A: 3
- NIST SP 800-56A: 3
- SP 800-90A: 1
- PKCS:
- RFC:
- RFC 2986: 1
- RFC 3268: 2
- RFC 3447: 1
- RFC 3526: 2
- RFC 4253: 1
- RFC 4492: 4
- RFC 5077: 1
- RFC 5246: 3
- RFC 5280: 2
- RFC 5288: 2
- RFC 5289: 8
- RFC 6125: 1
- RFC 6960: 1
- RFC3526: 1
- RFC4251: 1
- RFC4252: 1
- RFC4253: 2
- RFC4254: 1
- RFC4344: 1
- RFC4492: 1
- RFC5280: 1
- RFC5656: 1
- RFC6125: 2
- RFC6668: 1
- RFC6960: 1
- RFC8332: 1
- X509:
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 197: 1
- FIPS PUB 197: 1
- ICAO:
- NIST:
- PKCS:
- PKCS #1: 1
- PKCS #15: 1
- PKCS #3: 1
- PKCS#1: 1
- PKCS#3: 2
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- SHA-1. However, this algorithm is out of scope for the certification due to security considerations. The cryptographic functionality of the TOE: 2
- and the list of security mechanisms given in “ICAO Doc 9303” (please see [ 11 ]), this algorithm is out of scope for the certification as well. FCS_COP.1/SIG_GEN Cryptographic Operation - Signature generation: 1
- brainpoolP384r1, and brainpoolP512r1. In addition, RSA key lengths under 1976 bits are out of scope for the certification. FCS_CKM.1/CA Cryptographic Key Generation - Diffie-Hellman for Chip: 1
- considerations and BSI and SOGIS recommendations (please see [ 31 ] and [ 32 ]), this algorithm is out of scope for the certification as well. FCS_COP.1/CA_MAC Cryptographic Operation - MAC for CA protocol: 1
- out of scope: 9
- paper or the plastic card is achieved by physical and organizational security measures which are out of scope of this ST. The physical scope of the TOE is composed of the IC dedicated software, the IC embedded: 1
- please see [ 11 ]), this algorithm is out of scope for the certification as well: 1
- please see [ 31 ] and [ 32 ]), this algorithm is out of scope for the certification as well: 1
- the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. Application Note 6: The cryptographic functionality of the TOE includes hash: 1
- the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. Application Note 8: The cryptographic functionality of the TOE includes hash: 1
- the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. FCS_CKM.4 Cryptographic Key Destruction Hierarchical to: No other components: 1
|
| pdf_data/st_metadata |
- /Author: Tolliver Eric
- /CreationDate: D:20231101120921-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20231101120921-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Subject: Common Criteria Security Target
- /Title: <<LongProductName>> Security Target
- pdf_file_size_bytes: 868632
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
- /Author: Ali YILDIRIM
- /CreationDate: D:20240219152217+03'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20240219152217+03'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 2020528
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 128
|
| state/cert/convert_garbage |
True |
False |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
False |
False |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
False |
False |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |