Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
POLYAS CORE Version 2.5.0
BSI-DSZ-CC-0862-V2-2021
Keyper Hardware Security Module (HSM) v2.0:a) Enterprise (Hardware: 9720, Software: 011126)b) Professional (Hardware: 9720, Software: 010405)
ISCB-5-RPT-C037-CR-v1a
name POLYAS CORE Version 2.5.0 Keyper Hardware Security Module (HSM) v2.0:a) Enterprise (Hardware: 9720, Software: 011126)b) Professional (Hardware: 9720, Software: 010405)
category Other Devices and Systems Key Management Systems
scheme DE MY
status active archived
not_valid_after 24.06.2026 04.01.2018
not_valid_before 25.06.2021 04.01.2013
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0862V2c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0862V2a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr-ISCB-5-RPT-C037-v1a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0862V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-AEP_Keyper_EAL4_ASE_1_3.pdf
manufacturer POLYAS GmbH AEP Networks Ltd.
manufacturer_web https://www.aepnetworks.com/
security_level ALC_DVS.1, ALC_CMC.3, ALC_CMS.3, EAL2+, ALC_LCD.1 EAL4+, AVA_VAN.5
dgst 8916d91243168c04 5f49aadb6b4baf28
heuristics/cert_id BSI-DSZ-CC-0862-V2-2021 ISCB-5-RPT-C037-CR-v1a
heuristics/cert_lab BSI []
heuristics/extracted_sars ALC_DEL.1, ATE_FUN.1, ASE_INT.1, AGD_OPE.1, ATE_COV.1, ASE_CCL.1, ADV_ARC.1, AVA_VAN.2, ASE_SPD.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, ALC_CMS.3, AGD_PRE.1, ALC_DVS.1, ADV_FSP.2, ASE_TSS.1, ASE_REQ.2, ALC_CMC.3, ALC_LCD.1, ASE_OBJ.2 ALC_DEL.1, ATE_FUN.1, ALC_CMS.4, AVA_VAN.5, ASE_INT.1, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, ASE_CCL.1, ADV_ARC.1, ATE_COV.2, ASE_SPD.1, ATE_IND.2, ALC_CMC.4, ALC_TAT.1, ATE_DPT.1, ASE_ECD.1, AGD_PRE.1, ALC_DVS.1, ASE_TSS.1, ADV_IMP.1, ASE_REQ.2, ALC_LCD.1, ASE_OBJ.2
heuristics/extracted_versions 2.5.0 2.0
heuristics/report_references/directly_referencing BSI-DSZ-CC-0862-2016 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0862-2016 {}
heuristics/scheme_data
  • category: Other products
  • cert_id: BSI-DSZ-CC-0862-V2-2021
  • certification_date: 25.06.2021
  • enhanced:
    • applicant: POLYAS GmbH Marie-Calm-Straße 1-5 34131 Kassel
    • assurance_level: EAL2,ALC_LCD.1,ALC_DVS.1,ALC_CMS.3,ALC_CMC.3
    • certification_date: 25.06.2021
    • description: The Target of Evaluation (TOE) is the product for conducting online elections (in short: online voting product) POLYAS CORE Version 2.2.3. Corresponding to the security requirements from the claimed Protection Profile BSI-CC-PP-0037, POLYAS CORE V2.2.3 is sufficient to securely implement elections in associations, for boards and bodies such as at universities, within the scope of education and research, and in particular other non-political elections with low attack potential. The functional and security features of the TOE relate only to the polling phase incl. tallying, but not to the election preparation (such as drawing up the electoral register, for example) or to the archiving of the polling and result data. A client-sided TOE at the endpoint device does not exist. The complete range of functions is provided by the server-sided TOE.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-0862-V2-2021-MA-02 (Ausstellungsdatum / Certification Date 11.03.2022)', 'description': 'security functionality is unchanged. Configuration management procedures require a change of the product version from version 2.5.3 to version 2.5.4.'}), frozendict({'id': 'BSI-DSZ-CC-0862-V2-2021-MA-01 (Ausstellungsdatum / Certification Date 24.11.2021)', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-0862-V2-2021 (Ausstellungsdatum / Certification Date 25.06.2021, gültig bis / valid until 24.06.2026) Zertifizierungsreport / Certification Report', 'description': 'This re-certification was conducted, because the validity of the previous certificate expired and to include minor product changes in the certified scope.'}), frozendict({'id': 'BSI-DSZ-CC-0862-2016 (Ausstellungsdatum / Certification Date 10.03.2016, gültig bis / valid until 09.03.2021)', 'description': 'Security Target'})]
    • evaluation_facility: Deutsches Forschungszentrum für Künstliche Intelligenz GmbH
    • expiration_date: 24.06.2026
    • product: POLYAS CORE Version 2.5.0
    • protection_profile: Common Criteria Schutzprofil für Basissatz von Sicherheitsanforderungen an Online-Wahlprodukte, Version 1.0, 18. April 2008, BSI-CC-PP-0037-2008
  • product: POLYAS CORE Version 2.5.0
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/0862_0862V2.html
  • vendor: POLYAS GmbH
  • cert_no: 2013-001-C037
  • certification_date: 04.01.2013
  • developer: AEP Networks Ltd.
  • enhanced:
    • assurance_level: EAL4+ AVA_VAN.5
    • category: Key Management System
    • cert_id: C037
    • certification_date: 04.01.2013
    • developer: AEP Networks Ltd. Knaves Beech Business Centre,Loudwater, Buckinghamshire,HP10 9UT,UNITED KINGDOM. URL: http://www.aepnetworks.com/Email: [email protected]: +44 1628 642 600Fax: +44 1628 642 605
    • expiration_date: 04.01.2018
    • mutual_recognition: CCRA
    • product: Keyper Hardware Security Module (HSM) v2.0: a) Enterprise (Hardware: 9720, Software: 011126) b) Professional (Hardware: 9720, Software: 010405)
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C037/ISCB-5-RPT-C037-CR-v1a.pdf
    • scope: Keyper Hardware Security Module (HSM) v2.0 or the Target of Evaluation (TOE) is a dedicated hardware product which provides secure digital signature services, cryptographic services and key management services to applications that reside on physically separate host computer systems. The TOE is a secure module that is contained within an outer casing. The outer casing includes a Keypad, LCD screen, smart card reader and a number of external ports; they are out of the evaluation scope. The TOE is tamper reactive; and has been validated against the requirements for the FIPS PUB 140-2 at level 4. Keyper Hardware Security Module (HSM) v2.0 is intended for use in a dedicated network with devices and applications that make use of its cryptographic functions. Keyper Hardware Security Module (HSM) v2.0 should be provided appropriate physical and logical protections. The TOE encompasses two models: AEP Keyper Enterprise (Hardware: 9720, Software: 011126) and AEP Keyper Professional (Hardware: 9720, Software: 010405). Both models share the same features and architecture (the only difference is performance), therefore both models shall be considered together. Two additional “High Availability” models also exist, however they are out of the scope of this evaluation. The functions of the TOE that are within the scope of evaluation covering: Secure generation, distribution and destruction of cryptographic keys. Secure storage and management of keys throughout their lifecycle. User authentication to facilitate controlled access to cryptographic key management and TOE management functions by trusted personnel only. Security management to enable role-based management of the core functions of the TOE. Access control for key management functions to ensure that only specified roles are permitted to perform defined tasks. Auditing of security relevant events to provide suitable accountability. Self-test of the core cryptographic functions and algorithms of the TOE. Tamper protection to ensure that the TOE is adequately protected from unauthorised physical access.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C037/AEP_Keyper_EAL4_ASE_1.3.pdf
    • type: Web based frontend to the Microsoft Certification Authority (CA) services
  • expiration_date: 04.01.2018
  • level: EAL4+ AVA_VAN.5
  • product: Keyper Hardware Security Module (HSM) v2.0: a) Enterprise (Hardware: 9720, Software: 011126) b) Professional (Hardware: 9720, Software: 010405)
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/98
heuristics/protection_profiles fc76773839dc79d0 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0037b.pdf {}
pdf_data/cert_filename 0862V2c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0862-V2-2021: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0037-2008: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/report_filename 0862V2a_pdf.pdf cr-ISCB-5-RPT-C037-v1a.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0862-V2-2021
    • cert_item: POLYAS Core, Version 2.5.0
    • cert_lab: BSI
    • developer: POLYAS GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0862-: 1
    • BSI-DSZ-CC-0862-2016: 2
    • BSI-DSZ-CC-0862-V2-2021: 15
  • MY:
    • ISCB-5-RPT-C037-CR-v1a: 30
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0037: 2
    • BSI-CC-PP-0037-2008: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 6
    • EAL 2+: 1
    • EAL 4: 1
  • EAL:
    • EAL4: 5
    • EAL4+: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMC.3: 4
    • ALC_CMS.3: 4
    • ALC_DVS.1: 4
    • ALC_FLR: 2
    • ALC_LCD.1: 4
  • AVA:
    • AVA_VAN.5: 7
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_SAR.1: 2
  • FDP:
    • FDP_DAU.1: 2
    • FDP_IFC: 4
    • FDP_IFF: 4
    • FDP_IFF.5: 3
    • FDP_RIP: 4
    • FDP_SDI.2: 2
    • FDP_UCT: 4
    • FDP_UIT: 4
  • FIA:
    • FIA_ATD.1: 2
    • FIA_UAU: 2
    • FIA_UAU.6: 1
    • FIA_UID: 2
    • FIA_USB: 3
  • FMT:
    • FMT_SMR.2: 2
  • FPR:
    • FPR_ANO.1: 2
    • FPR_UNL: 4
  • FPT:
    • FPT_ITT.1: 2
    • FPT_RCV.1: 2
    • FPT_RCV.4: 2
    • FPT_TST.1: 2
  • FTA:
    • FTA_SSL: 1
    • FTA_SSL.3: 1
    • FTA_SSL.4: 1
    • FTA_TSE.1: 2
  • FTP:
    • FTP_TRP: 4
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 1
    • FCS_COP: 3
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACF: 7
    • FDP_RIP.1: 1
    • FDP_SDI.2: 1
  • FIA:
    • FIA_SOS.1: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_MTD: 2
    • FMT_SMF.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITC.1: 1
    • FPT_ITI.1: 1
    • FPT_PHP.2: 1
    • FPT_PHP.3: 1
    • FPT_RCV.1: 1
    • FPT_STM.1: 1
    • FPT_TST.1: 1
pdf_data/report_keywords/eval_facility
  • DFKI:
    • DFKI: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-256: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • DPA: 1
    • SPA: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • FIPS:
    • FIPS 140-2: 1
    • FIPS PUB 140-2: 2
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • PKCS:
    • PKCS#11: 1
    • PKCS11: 1
pdf_data/report_metadata
  • /Author: ISCB Department
  • /Category: PUBLIC
  • /Caveat: FINAL
  • /Classification: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20130109091227+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Developer: AEP Networks
  • /Document Type: REPORT
  • /Identifier: ISCB-5-RPT-C037-CR-v1a
  • /Index: MyCB_TMP_011
  • /Keywords: Keyper
  • /ModDate: D:20130109091238+08'00'
  • /Phase: Release
  • /Producer: Adobe PDF Library 10.0
  • /Project Code: C037
  • /Released: 4 January 2013
  • /ST Title: Security Target for the Keyper Hardware Security Module (HSM) v2.0
  • /ST Version: v1.3
  • /SourceModified: D:20130109011207
  • /Sponsor: AEP Networks
  • /Subject: Keyper Hardware Security Module (HSM) v2.0
  • /TOE Name: Keyper Hardware Security Module (HSM) v2.0
  • /TOE Version: version 2.0
  • /Title: C037 Certification Report
  • /Version: v1a
  • pdf_file_size_bytes: 442113
  • pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 30
pdf_data/st_filename 0862V2b_pdf.pdf st-AEP_Keyper_EAL4_ASE_1_3.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0037: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 4
    • EAL 3: 1
    • EAL2: 1
    • EAL3: 1
  • EAL:
    • EAL4: 10
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMC.3: 2
    • ALC_CMS.2: 1
    • ALC_CMS.3: 2
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_LCD.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL: 3
    • ASE_CCL.1: 1
    • ASE_ECD: 3
    • ASE_ECD.1: 1
    • ASE_INT: 3
    • ASE_INT.1: 1
    • ASE_OBJ: 3
    • ASE_OBJ.2: 1
    • ASE_REQ: 8
    • ASE_REQ.2: 1
    • ASE_SPD: 3
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
  • FDP:
    • FDP_ACC.1: 8
    • FDP_DAU.1: 6
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_IFC: 28
    • FDP_IFC.1: 12
    • FDP_IFF: 42
    • FDP_IFF.1: 3
    • FDP_IFF.4: 1
    • FDP_IFF.5: 8
    • FDP_IFF.5.1: 1
    • FDP_RIP: 11
    • FDP_RIP.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT: 16
    • FDP_UIT: 16
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 4
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
    • FIA_USB: 17
  • FMT:
    • FMT_MSA.3: 3
    • FMT_SMR.1: 1
    • FMT_SMR.2: 9
  • FPR:
    • FPR_ANO.1: 6
    • FPR_ANO.1.1: 1
    • FPR_UNL: 10
    • FPR_UNL.1: 1
  • FPT:
    • FPT_ITT.1: 7
    • FPT_ITT.1.1: 1
    • FPT_RCV.1: 6
    • FPT_RCV.1.1: 1
    • FPT_RCV.4: 6
    • FPT_RCV.4.1: 1
    • FPT_SSL.3: 1
    • FPT_SSL.4: 1
    • FPT_STM.1: 2
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 7
    • FTA_SSL.4.1: 1
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_TRP: 29
    • FTP_TRP.1: 8
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
  • FCS:
    • FCS_CKM.1: 24
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 20
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 24
    • FCS_CKM.4.1: 1
    • FCS_COP: 37
    • FCS_COP.1: 4
    • FCS_RND: 2
    • FCS_RND.1: 15
    • FCS_RND.1.1: 2
    • FCS_RND.1.2: 2
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 16
    • FDP_ACC.1: 6
    • FDP_ACF: 22
    • FDP_ACF.1: 4
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 17
    • FDP_IFC.1: 6
    • FDP_IFF: 21
    • FDP_IFF.1: 3
    • FDP_IFF.3: 2
    • FDP_IFF.4: 2
    • FDP_ITC.1: 8
    • FDP_ITC.2: 8
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 7
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MSA.3: 3
    • FMT_MTD: 20
    • FMT_MTD.1: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 1
    • FPT_ITC: 1
    • FPT_ITC.1: 7
    • FPT_ITC.1.1: 1
    • FPT_ITI.1: 9
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_PHP.1: 1
    • FPT_PHP.2: 13
    • FPT_PHP.2.1: 1
    • FPT_PHP.2.2: 1
    • FPT_PHP.2.3: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_RCV.1: 8
    • FPT_RCV.1.1: 1
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1: 21
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_claims
  • D:
    • D.H: 11
  • O:
    • O.AUDIT_CM: 1
    • O.CSP-: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 29
  • AES_competition:
    • AES:
      • AES: 8
    • E2:
      • E2: 2
  • DES:
    • 3DES:
      • 3DES: 4
      • TDES: 4
    • DES:
      • DES: 8
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 8
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 6
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-2: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • malfunction: 3
    • physical tampering: 7
  • SCA:
    • Side-channel: 5
    • Side-channels: 2
    • side channel: 1
    • side-channel: 3
    • side-channels: 4
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS 140-2: 2
    • FIPS PUB 140-2: 2
    • FIPS PUB 186-2: 5
  • NIST:
    • NIST SP 800-90: 1
  • PKCS:
    • PKCS#11: 1
    • PKCS11: 1
  • RFC:
    • RFC 3447: 1
pdf_data/st_metadata
  • /Author: Niels Menke, Kai Reinhard, Melanie Volkamer, Dr. Sönke Maseberg, Florian Heinecke, Ibrahim Rabah, Jan Schirrmacher, Wolfgang Jung, Tobias Pressel
  • /CreationDate: D:20210528013617-07'00'
  • /Creator: Microsoft Word
  • /Keywords: remote Voting, eVoting, Online Wahlen, elektronische Wahlen
  • /ModDate: D:20210528013617-07'00'
  • /Producer: macOS Version 11.3.1 (Build 20E241) Quartz PDFContext
  • /Subject: 1.10
  • /Title: Security Target Polyas CORE zu Common Criteria Protection Profile BSI-PP-0037
  • pdf_file_size_bytes: 1705361
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 87
  • /Author: Doug Stuart
  • /Category: ASE
  • /Company: stratsec
  • /CreationDate: D:20121218144137+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /DEV_Fullname: AEP Networks
  • /DEV_Shortname: AEP
  • /DEV_Sponsor: David Miller
  • /DOC_Classification: COMMERCIAL-IN-CONFIDENCE
  • /DOC_Id: KPR_EAL4_ASE
  • /DOC_Phase: DRAFT
  • /DOC_Released: 13-DEC-2012
  • /DOC_Title: Keyper HSM EAL4 Security Target
  • /DOC_Version: 1.3
  • /EVAL_CC: 3.1 (Rev 3)
  • /EVAL_EAL: EAL4
  • /ModDate: D:20121218144151+08'00'
  • /Producer: Adobe PDF Library 10.0
  • /SourceModified: D:20121213065300
  • /Subject: Security Target
  • /TOE_Fullname: Keyper Hardware Security Module Version 2.0
  • /TOE_Shortname: Keyper HSM
  • /TOE_Version: 2.0
  • /Title: Keyper Hardware Security Module (HSM) v2.0
  • pdf_file_size_bytes: 737530
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 77
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different