name |
VMware ESX Server 3.0.2 and Virtual Center 2.0.2 |
Infineon IFX_CCI_00003Fh IFX_CCI_000059h IFX_CCI_00005Bh IFX_CCI_00003Ch IFX_CCI_00003Dh IFX_CCI_00005Ah design step G11 and H11 with optional HSL v2.01.6198, optional SCL v2.13.001, optional ACL v3.03.003, optional ACL v3.04.001, optional ACL v3.05.002, optional HCL v1.13.001, optional RCL v1.10.006 and with specific IC-dedicated firmware identifier 80.203.00.3 and Flash Loader v8.06.001 |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
NL |
status |
archived |
active |
not_valid_after |
29.09.2015 |
30.08.2029 |
not_valid_before |
20.05.2008 |
30.08.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200060-02-Cert.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-cert-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200060-02-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-sec-e.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200060-02-ST_lite_v2.6.pdf |
manufacturer |
VMware Inc. |
Infineon Technologies AG |
manufacturer_web |
https://www.vmware.com |
https://www.infineon.com/ |
security_level |
EAL4+, ALC_FLR.1 |
EAL6+, ALC_FLR.1 |
dgst |
9062ee5b68da8ae8 |
6b6c005285b16441 |
heuristics/cert_id |
383-4-72 |
NSCIB-CC-2200060-02-CR |
heuristics/cert_lab |
CANADA |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
2.0.2, 3.0.2 |
2.13.001, 1.13.001, 3.04.001, 2.01.6198, 8.06.001, 1.10.006, 3.05.002, 80.203.00.3, 3.03.003 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1158-V3-2025 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1158-V3-2025 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
|
NSCIB-CC-2200060-02-Cert.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- NL:
- NSCIB-2200060-02: 1
- NSCIB-CC-2200060-02: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL7: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.3: 1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
|
pdf_data/cert_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Valerie
- /CreationDate: D:20240902124133+01'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20240902124133+01'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 88337
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
vmware-cert-eng.pdf |
NSCIB-CC-2200060-02-CR.pdf |
pdf_data/report_frontpage |
- NL:
- CA:
- cert_id: 383-4-72-CR
- cert_lab: CANADA
|
- NL:
- cert_id: NSCIB-CC-2200060-02-CR
- cert_item: IFX_CCI_00003Fh IFX_CCI_000059h IFX_CCI_00005Bh IFX_CCI_00003Ch IFX_CCI_00003Dh IFX_CCI_00005Ah design step G11 and H11 with optional HSL v2.01.6198, optional SCL v2.13.001, optional ACL v3.03.003, optional ACL v3.04.001, optional ACL v3.05.002, optional HCL v1.13.001, optional RCL v1.10.006 and with specific IC- dedicated firmware identifier 80.203.00.3 and Flash Loader v8.06.001 v1.13.001, optional RCL v1.10.006 and with specific IC- dedicated firmware identifier 80.203.00.3 and Flash Loader v8.06.001
- cert_lab:
- developer: Infineon Technologies AG
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- NL:
- NSCIB-2200060-02: 3
- NSCIB-CC-2200060-02-CR: 13
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 4+: 2
|
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 3
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- SCA:
- other:
- JIL: 2
- JIL-AAPS: 3
- JIL-AM: 1
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- following proprietary or non-standard algorithms, protocols and implementations: none, which are out of scope as there are no security claims relating to these. Not all key sizes specified in the [ST] have: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: mgauvreau
- /CC Version: 2.3
- /CC date: August 2005
- /CEM Version: 2.3
- /CEM date: August 2005
- /CR_Date: 15 May 2008
- /CR_Version: 0.2
- /Client City: Palo Alto
- /Client Country: United States
- /Client Full Name: VMware Incorporated
- /Client Postal Code: 94304
- /Client Short Name: VMware
- /Client State: California
- /Client Street: 3145 Porter Drive
- /Comments: PCR Template
Version 1.2.01-EWA-C
- /CreationDate: D:20090216143637-05'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Developer Long Name: VMware Incorporated
- /Developer Short Name: VMware
- /EAL Level: 4+
- /EAL Level Base: 4
- /EAL Long: EAL 4
- /EAL Short: EAL 4
- /ETPlan_Doc#: 1538-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: 1.0
- /ETPlan_date: 1 April 2008
- /ETProcRes_Date: 30 April 2008
- /ETProcRes_Doc#: 1538-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: 1.0
- /ETProc_Date: 7 April 2008
- /ETProc_Doc#: 1538-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: 1.0
- /ETReport_Date: 30 April 2008
- /ETReport_Doc#: 1538-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_Version: 1.0
- /EWP_Date: 17 January 2007
- /EWP_Doc#: 1538-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.0
- /Eval number: 383-4-72
- /Eval_End_Date: [dd month yyyy (date on certificate)]
- /Eval_Start_Date: [dd month yyyy (registration)]
- /ModDate: D:20090216143729-05'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /ProjectNumber: 1538
- /ST_Date: 23 April 2008
- /ST_Title: VMware® Inc ESX Server 3.0.2 and VirtualCenter 2.0.2 Security Target
- /ST_Version: 0.7
- /SVR_Date: 31 October 2007
- /SVR_Doc#: 1538-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: 1.0
- /SV_City: [site vist city/cities]
- /Security Classification: EWA-Canada & VMware Proprietary
- /SourceModified: D:20090213151120
- /Sponsor: VMware Incorporated
- /Sponsor City: Palo Alto
- /Sponsor Country: United States
- /Sponsor Postal Code: 94304
- /Sponsor State: California
- /Sponsor Street: 3145 Porter Drive
- /TOE: VMware® ESX Server 3.0.2 and VirtualCenter 2.0.2
- /TOE Line1: [TOE Line1 - enter later for PCR or web page]
- /TOE Line2: [TOE Line2 - enter later for PCR or web page]
- /TOE Line3: [TOE Line3 - enter later for PCR or web page]
- /TOE Line4: [TOE Line4 - enter later for PCR or web page]
- /TOE Line5: [TOE Line5 - enter later for PCR or web page]
- /TOE Short: VMware® ESX Server and VirtualCenter
- /TOE Short with version: VMware® ESX Server 3.0.2 and VirtualCenter 2.0.2
- /TOE Short-NoTM: VMware® ESX Server 3.0.2 and VirtualCenter 2.0.2
- /TOE Version: VMware® ESX Server 3.0.2 and VirtualCenter 2.0.2
- /TOE with version: VMware® ESX Server 3.0.2 and VirtualCenter 2.0.2
- /TOE-NoTM: [TOE Name, no version, no trademarks]
- /Title: EAL X+ Evaluation of [Developer Long Name]
- /_AdHocReviewCycleID: -1898353217
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Reade, Rick A.
- /_EmailSubject: CR update request ... rick
- pdf_file_size_bytes: 126219
- pdf_hyperlinks: http://www.cse-cst.gc.ca/services/common-criteria/trusted-products-e.html, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
|
pdf_data/st_filename |
vmware-sec-e.pdf |
NSCIB-CC-2200060-02-ST_lite_v2.6.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 9
|
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL6: 125
- EAL6 augmented: 122
- EAL6+: 123
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 3
- ACM_CAP: 1
- ACM_CAP.4: 3
- ACM_SCP.2: 3
- ADO:
- ADO_DEL.2: 3
- ADO_IGS: 1
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.2: 3
- ADV_HLD.2: 3
- ADV_IMP.1: 3
- ADV_LLD.1: 3
- ADV_RCR.1: 3
- ADV_SPM.1: 3
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 2
- AGD_USR: 1
- AGD_USR.1: 2
- ALC:
- ALC_DVS.1: 3
- ALC_FLR.1: 4
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 3
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 3
- AVA_SOF.1: 3
- AVA_VLA.2: 3
|
- ADV:
- ADV_ARC.1: 1
- ADV_CMC.5: 1
- ADV_FSP: 1
- ADV_FSP.4: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_IMP.2: 2
- ADV_INT.3: 1
- ADV_SPM: 2
- ADV_SPM.1: 7
- ADV_TDS.5: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 3
- ALC_CMC.5: 2
- ALC_CMS: 2
- ALC_CMS.4: 2
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS: 2
- ALC_DVS.1: 2
- ALC_DVS.2: 4
- ALC_FLR.1: 11
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL: 10
- ASE_CCL.1: 1
- ASE_ECD: 4
- ASE_ECD.1: 1
- ASE_INT: 25
- ASE_INT.1: 1
- ASE_OBJ: 9
- ASE_OBJ.2: 1
- ASE_REQ: 48
- ASE_REQ.2: 1
- ASE_SPD: 8
- ASE_SPD.1: 1
- ASE_TSS: 17
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 3
- ATE_COV.3: 4
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC.1: 22
- FDP_ACC.1.1: 2
- FDP_ACF.1: 18
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 2
- FIA:
- FIA_UAU: 3
- FIA_UAU.1: 17
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID: 2
- FIA_UID.1: 22
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MSA.1: 26
- FMT_MSA.1.1: 2
- FMT_MSA.3: 26
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 26
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_RVM.1: 18
- FPT_RVM.1.1: 1
- FPT_SEP.1: 26
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 2
- FPT_STM.1: 6
- FPT_STM.1.1: 1
|
- FAU:
- FAU_SAS: 3
- FAU_SAS.1: 11
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 106
- FCS_CKM.1: 33
- FCS_CKM.2: 4
- FCS_CKM.4: 29
- FCS_COP: 191
- FCS_COP.1: 30
- FCS_RNG: 61
- FCS_RNG.1: 18
- FDP:
- FDP_ACC: 17
- FDP_ACC.1: 27
- FDP_ACC.1.1: 1
- FDP_ACF: 17
- FDP_ACF.1: 23
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_AFC: 1
- FDP_IFC.1: 16
- FDP_ITC.1: 23
- FDP_ITC.2: 23
- FDP_ITT.1: 14
- FDP_PHP.3: 1
- FDP_SDC: 2
- FDP_SDC.1: 12
- FDP_SDC.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 14
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 16
- FDP_UCT.1.1: 1
- FDP_UIT.1: 16
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 3
- FIA_API.1: 13
- FIA_API.1.1: 1
- FIA_SOS.2: 2
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FMT:
- FMT_ACF: 1
- FMT_LIM: 29
- FMT_LIM.1: 12
- FMT_LIM.2: 11
- FMT_MSA.1: 17
- FMT_MSA.1.1: 1
- FMT_MSA.3: 20
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_FLS.1: 22
- FPT_ITC.1: 2
- FPT_ITT.1: 15
- FPT_PHP.3: 19
- FPT_TST: 5
- FPT_TST.1: 11
- FPT_TST.2: 31
- FPT_TST.2.1: 1
- FRU:
- FTP:
- FTP_ITC.1: 21
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.ACCESS: 3
- O.ADMIN: 6
- O.AUDIT: 4
- O.IDAUTH: 6
- O.SECURE: 5
- O.VM: 3
- OE:
- OE.IDAUTH: 6
- OE.SEP: 7
- OE.TIME: 4
- T:
- T.COMINT: 3
- T.PRIVIL: 3
- T.VM: 3
|
- O:
- O.AES: 4
- O.RND: 4
- O.TDES: 4
- T:
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 12
- Infineon Technologies: 21
- Infineon Technologies AG: 31
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 28
- Triple-DES: 2
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 2
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- Malfunction: 11
- malfunction: 1
- SCA:
- DPA: 2
- Leak-Inherent: 11
- Physical Probing: 2
- SPA: 1
- physical probing: 1
- side channel: 7
- side-channel: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 4
- FIPS PUB 140-2: 1
- FIPS PUB 180-4: 2
- ISO:
- ISO/IEC 11770-3: 1
- ISO/IEC 14888-3: 6
- ISO/IEC 15946-1: 1
- ISO/IEC 7816-3: 1
- ISO/IEC 9797-1: 2
- ISO/IEC 9798-2: 1
- NIST:
- SP 800-108: 1
- SP 800-38A: 9
- SP 800-38B: 5
- SP 800-67: 5
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. End of note: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Adam O'Brien
- /CreationDate: D:20080423125817Z
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20080618154753-04'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: ESX Server 3.0.2 and VirtualCenter 2.0.2
- /Title: Security Target
- pdf_file_size_bytes: 671445
- pdf_hyperlinks: http://www.corsec.com/, http://www.vmware.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 50
|
- /Author: Jürgen Noller
- /CreationDate: D:20240816140000+02'00'
- /Creator: Microsoft® Word for Microsoft 365
- /Keywords: Infineon, EAL6 +, EAL6 plus, PP0084, SmartCard
- /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_ActionId: d341d1f5-358b-49ec-b185-c3480f3a71fb
- /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_ContentBits: 0
- /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_Enabled: true
- /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_Method: Standard
- /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_Name: a15a25aa-e944-415d-b7a7-40f6b9180b6b
- /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_SetDate: 2024-08-16T08:21:51Z
- /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_SiteId: eeb8d0e8-3544-41d3-aac6-934c309faf5a
- /ModDate: D:20240816140000+02'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: Public Security Target
- pdf_file_size_bytes: 1233413
- pdf_hyperlinks: mailto:[email protected];[email protected]?subject=Document%20question%20, http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html, http://www.ietf.org/rfc/rfc5639.txt, http://www.infineon.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 121
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |