name |
CEITEC ePassport Module, CTC21001, v1.0 (supporting EAC) |
Cisco Catalyst Switches (4503-E, 4506-E, 4507R+E, 4507R-E, 4510R+E, 4510R-E, and 4500X) running IOS XE 3.3.1SG |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
NO |
US |
status |
archived |
archived |
not_valid_after |
17.01.2022 |
31.12.2014 |
not_valid_before |
17.01.2017 |
13.12.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20170117%20S-080%20CR%20Ceitec%20EAC.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10489-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STlite-EAC]%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10489-st.pdf |
manufacturer |
CEITEC S.A. |
Cisco Systems, Inc. |
manufacturer_web |
https://www.ceitec-sa.com |
https://www.cisco.com |
security_level |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
EAL2+, ALC_DVS.1, ALC_FLR.2 |
dgst |
8856518b423e12c4 |
30e1080f4934448d |
heuristics/cert_id |
SERTIT-080 |
CCEVS-VR-10489-2001 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_DVS.2, ADV_FSP.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
ALC_DVS.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_DEL.1, ATE_IND.2, ALC_CMC.2, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
heuristics/extracted_versions |
1.0 |
3.3.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 17.01.2017
- developer: CEITEC S.A.
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-080
- certification_date: 17.01.2017
- description: The TOE is an electronic module for machine readable travel documents (MRTDs) based on the requirements of the International Civil Aviation Organization, as defined in ICAO Doc 9303. The TOE is developed and produced by CEITEC and delivered to the passport manufacturer as micro modules. The TOE contains at the physical level: Integrated circuit chip; IC Software; data necessary to enable the MRTD personalization; the associated guidance documentation. The TOE also provides the security functions: integrity and confidentiality of personal data; access control, identification and authentication; protection against abuse of functionality, information leakage, physical tampering, malfunctions.
- developer: CEITEC S.A.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135163-1607953148/SERTIT/Sertifikater/2017/80/20170117%20Sertit-080%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135166-1607953151/SERTIT/Sertifikater/2017/80/%5BSTlite-EAC%5D%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135160-1607953146/SERTIT/Sertifikater/2017/80/20170117%20S-080%20CR%20Ceitec%20EAC.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 4, ALC_DVS.2, AVA_VAN.5
- mutual_recognition: CCRA, SOG-IS
- product: 1.0
- protection_profile: BSI-CC-PP-0056, "Machine Readable Travel Document with 'ICAO Application', Extended Access Control"
- sponsor: CEITEC S.A.
- product: CEITEC ePassport Module CTC21001
- url: https://sertit.no/certified-products/product-archive/ceitec-epassport-module-ctc21001
|
- category: Network Switch
- certification_date: 13.12.2012
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 13.12.2014
- id: CCEVS-VR-VID10489
- product: Cisco Catalyst Switches (4503-E, 4506-E, 4507R+E, 4507R-E, 4510R+E, 4510R-E, and 4500X) running IOS XE 3.3.1SG
- scheme: US
- url: https://www.niap-ccevs.org/product/10489
- vendor: Cisco Systems, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
a33327d40f253f46 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
20170117 S-080 CR Ceitec EAC.pdf |
st_vid10489-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-10489-0001
- cert_item: Cisco Systems, Inc., 170 West Tasman Dr., San Jose, CA 95134 Cisco Catalyst Switches (4503-E, 4506-E, 4507R+E, 4507R-E, 4510R+E, 4510R-E, 4500X
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4+: 19
- EAL1: 1
- EAL4: 1
- EAL7: 1
|
- EAL:
- EAL 2: 9
- EAL 2 augmented: 2
- EAL2: 3
- EAL2 augmented: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 2
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ALC:
- ALC_DVS.1: 4
- ALC_FLR.2: 5
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP: 4
- FCS_RND.1: 4
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_UCT.1: 1
- FDP_UIT.1: 1
- FIA:
- FIA_API.1: 4
- FIA_UAU.1: 1
- FIA_UAU.4: 1
- FIA_UAU.5: 1
- FIA_UAU.6: 1
- FIA_UID.1: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FMT_MTD: 8
- FMT_MTD.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_PHP.3: 1
- FPT_TST.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 101
- Cisco Systems, Inc: 4
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
- ISO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /AAPL:Keywords: ['ugradert']
- /Author: Kjaertan
- /CreationDate: D:20170118113117Z00'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ugradert
- /ModDate: D:20170118113117Z00'00'
- /Producer: Mac OS X 10.12.2 Quartz PDFContext
- /Title: tittel
- pdf_file_size_bytes: 650258
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Tammy Compton
- /CreationDate: D:20130115113949
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130115113949
- /Producer: Microsoft® Office Word 2007
- /Title: Validation Report for Cisco
- pdf_file_size_bytes: 550745
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
pdf_data/st_filename |
[STlite-EAC] CEITECSA 5.410.052 - ST-Lite ePassport Module EAC 2.0.pdf |
st_vid10489-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056: 7
- BSI-PP-0056: 1
- BSI-PP-CC-0056: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 8
- EAL4 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.2: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- APE:
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.2: 2
- ADV_TDS.1: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 5
- ALC_FLR.2: 5
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 11
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM.1: 26
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 22
- FCS_CKM.4.1: 1
- FCS_COP: 36
- FCS_COP.1: 7
- FCS_RND: 7
- FCS_RND.1: 11
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 20
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC: 1
- FDP_ITC.1: 10
- FDP_ITC.2: 10
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 7
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 6
- FIA_API.1: 10
- FIA_API.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 8
- FIA_UAU.4.1: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 21
- FMT_LIM.1.1: 2
- FMT_LIM.2: 18
- FMT_LIM.2.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 46
- FMT_MTD.1: 11
- FMT_MTD.3: 4
- FMT_MTD.3.1: 1
- FMT_SMF.1: 34
- FMT_SMF.1.1: 1
- FMT_SMR.1: 38
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
- FAU:
- FAU_GEN: 5
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 21
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 41
- FCS_COP.1.1: 7
- FCS_SSH_EXT: 3
- FCS_SSH_EXT.1: 4
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_SSH_EXT.1.8: 1
- FCS_SSH_EXT.1.9: 1
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 2
- FDP_ACC.2: 6
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 1
- FDP_ACF.1: 3
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 22
- FDP_IFC.1.1: 3
- FDP_IFF.1: 38
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_ITC.1: 7
- FDP_ITC.2: 1
- FDP_RIP: 2
- FDP_RIP.2: 4
- FDP_RIP.2.1: 1
- FIA:
- FIA_ATD: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_UAU: 5
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 2
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA.1: 6
- FMT_MSA.2: 5
- FMT_MSA.2.1: 1
- FMT_MSA.3: 20
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD: 2
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RPL: 2
- FPT_RPL.1: 3
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM: 2
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TST_EXP.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTA_TAB: 2
- FTA_TAB.1: 4
- FTA_TAB.1.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.BAC-PP: 2
- OE.BAC_PP: 1
- OE.MRTD_: 2
|
- A:
- A.CONFIDENTIALITY: 3
- A.INTEROPERABILITY: 2
- A.LOCATE: 2
- A.LOWEXP: 3
- A.NOEVIL: 3
- A.TRAIN_AUDIT: 2
- A.TRAIN_GUIDAN: 3
- O:
- O.ACCESS_CONTROL: 8
- O.ADMIN_ROLE: 4
- O.AUDIT_GEN: 6
- O.AUDIT_VIEW: 5
- O.CFG_MANAGE: 6
- O.DISPLAY_BANNER: 5
- O.IDAUTH: 4
- O.MEDIATE: 5
- O.RESIDUAL_INFORMATION_CLEA: 1
- O.RESIDUAL_INFORMATION_CLEARING: 3
- O.SELFPRO: 7
- O.STARTUP_TEST: 4
- O.TIME: 4
- OE:
- OE.AUDIT_REVIEW: 4
- OE.CONFIDENTIALITY: 3
- OE.INTEROPERABILITY: 3
- OE.LOCATE: 3
- OE.LOWEXP: 3
- OE.NOEVIL: 3
- OE.TRAIN_GUIDAN: 3
- T:
- T.AUDIT_REVIEW: 4
- T.AUTHADMIN: 2
- T.MEDIATE: 3
- T.NOAUDIT: 2
- T.NOAUTH: 3
- T.NOMGT: 2
- T.TIME: 2
- T.UNAUTH_MGT_ACCESS: 3
- T.USER_DATA_REUSE: 3
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 85
- Cisco Systems: 1
- Cisco Systems, Inc: 3
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- Physical Tampering: 7
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 5
- SCA:
- DPA: 3
- SPA: 2
- physical probing: 3
- timing attacks: 1
- other:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 10
- EF.DG1: 20
- EF.DG13: 2
- EF.DG14: 7
- EF.DG16: 17
- EF.DG2: 7
- EF.DG3: 20
- EF.DG4: 18
- EF.DG5: 5
- EF.SOD: 10
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-2: 1
- FIPS 180-411: 1
- ICAO:
- PKCS:
|
- FIPS:
- FIPS 140-2: 9
- FIPS 186-3: 1
- FIPS PUB 180-3: 2
- FIPS PUB 197: 2
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-90: 1
- SP 800-90: 1
- RFC:
- RFC 1321: 1
- RFC 2328: 2
- RFC 2385: 2
- RFC 2453: 2
- RFC 4252: 1
- RFC 4253: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Marcos Kordyas Dossa
- /CreationDate: D:20161212160233-02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20161212160233-02'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 1330959
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 71
|
- /Author: Cisco TME
- /CreationDate: D:20130509072846
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130509072846
- /Producer: Microsoft® Office Word 2007
- /Title: Security Target
- pdf_file_size_bytes: 1092778
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 80
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |