name |
Juniper MX240 MX480, MX960, MX2010, MX2020, EX9204, EX9208, EX9214, PTX3000, PTX5000 with JUNOS 14.2R3 |
TCOS CSP Module Version 1.0 Release 1/P6022y |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
DE |
status |
archived |
archived |
not_valid_after |
28.02.2017 |
07.04.2025 |
not_valid_before |
28.12.2015 |
07.04.2020 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10661-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1118c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10661-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1118a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10661-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1118b_pdf.pdf |
manufacturer |
Juniper Networks, Inc. |
T-Systems International GMBH |
manufacturer_web |
https://www.juniper.net/ |
https://www.t-systems.de/ |
security_level |
{} |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
92ea4a365faaabfd |
55b8d7537c8fdcc1 |
heuristics/cert_id |
CCEVS-VR-VID-10661-2015 |
BSI-DSZ-CC-1118-2020 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.1, ASE_INT.1, ASE_OBJ.2, ALC_CMC.1, ATE_IND.1, AVA_VAN.1, ADV_FSP.1, ASE_TSS.1, AGD_OPE.1, ASE_ECD.1, AGD_PRE.1, ASE_REQ.2, ASE_CCL.1 |
ADV_FSP.4, ALC_DVS.2, ADV_TDS.3, AGD_PRE.1, ATE_DPT.2, ATE_COV.2, ALC_TAT.1, ALC_CMS.4, ADV_ARC.1, AVA_VAN.5, AGD_OPE.1, ATE_FUN.1, ALC_FLR.1, ASE_TSS.2, ALC_DEL.1, ALC_LCD.1, ALC_CMC.4, ADV_IMP.1 |
heuristics/extracted_versions |
14.2 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1121-V2-2021 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1059-V2-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1121-V2-2021 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1059-V2-2019, BSI-DSZ-CC-0973-2016 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1059-2018 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1059-2018 |
heuristics/protection_profiles |
ac9abe3d5c5a31f0 |
ae9dcab62c3296a2, 1153ad24c84b397a |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0107b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0104b_pdf.pdf |
pdf_data/cert_filename |
st_vid10661-ci.pdf |
1118c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10661-2015: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20151231080423-05'00'
- /ModDate: D:20151231080446-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 178899
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200409141124+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP"
- /ModDate: D:20200409141414+02'00'
- /Producer: LibreOffice 6.2
- /Subject: TCOS CSP Module Version 1.0 Release 1/P6022y
- /Title: Certificate BSI-DSZ-CC-1118-2020
- pdf_file_size_bytes: 889220
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid10661-vr.pdf |
1118a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID10661-2015
- cert_item: Juniper Networks, Inc. Juniper Networks Mx Routers, PTX Routers and EX9200 Switches Running Junos OS 14.2R3
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant / extended EAL 4 augmented by ALC_DVS.2 and AVA_VAN.5 SOGIS Recognition Agreement
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1118-2020
- cert_item: TCOS CSP Module Version 1.0 Release 1/P6022y
- cert_lab: BSI
- developer: T-Systems International GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Cryptographic Service Provider (CSP) Version 0.9.8, 19 February 2019, BSI-CC-PP-0104-2019, Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit (PPC-CSP-TS-Au) Version 0.9.5, 8 April 2019, BSI- CC-PP-0107-2019
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10661-2015: 1
|
- DE:
- BSI-DSZ-CC-1059-: 1
- BSI-DSZ-CC-1059-V2-2019: 1
- BSI-DSZ-CC-1078: 2
- BSI-DSZ-CC-1118-2020: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0104-2019: 3
- BSI-CC-PP-0107-: 1
- BSI-CC-PP-0107-2019: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 1
- EAL5+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 4
- NXP Semiconductors: 1
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TSystems:
- T-Systems International: 13
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 12
- AES-: 4
- AES-128: 6
- AES-256: 4
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
- CVE:
- CVE-2004-0468: 1
- CVE-2006-3529: 1
- CVE-2007-6372: 1
- CVE-2013-4686: 1
- CVE-2013-4687: 1
- CVE-2013-4688: 1
- CVE-2013-6170: 1
- CVE-2013-7313: 1
- CVE-2014-0612: 1
- CVE-2014-0613: 1
- CVE-2014-0614: 1
- CVE-2014-0616: 1
- CVE-2014-0617: 1
- CVE-2014-2713: 1
- CVE-2014-2714: 1
- CVE-2014-3815: 1
- CVE-2014-3817: 1
- CVE-2014-3819: 1
- CVE-2014-3822: 1
- CVE-2014-3825: 1
- CVE-2014-6378: 1
- CVE-2014-6380: 1
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- malfunction: 1
- SCA:
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- BSI:
- AIS 1: 1
- AIS 28: 1
- AIS 34: 1
- AIS 36: 1
- AIS14: 1
- AIS19: 1
- AIS20: 1
- AIS25: 1
- AIS26: 1
- AIS31: 1
- AIS32: 1
- AIS34: 1
- AIS35: 1
- AIS36: 1
- AIS37: 1
- AIS38: 1
- AIS46: 1
- AIS47: 1
- FIPS:
- FIPS 180-4: 3
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 46-3: 1
- FIPS180: 2
- FIPS180-4: 1
- FIPS186: 9
- FIPS186-4: 2
- FIPS197: 9
- FIPS46: 1
- ICAO:
- ISO:
- ISO/IEC 10116:2017: 1
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- RFC:
- RFC 2104: 1
- RFC 5639: 9
- RFC 8017: 1
- RFC2104: 2
- RFC5639: 4
- RFC8017: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration: 1
- Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration. 7 4.5 Security Management The TOE provides an: 1
- out of scope: 1
|
- ConfidentialDocument:
- 0 Release 1/P6022y User guidance manual”, Version 1.0.4, 24.03.2020, T-Systems International GmbH (confidential document) [12] “TCOS CSP Module Personalization Guidance”, Version 1.4, 04.03.2020, T- Systems International: 1
- 2019 (confidential document) 7 See secton 9.1 for list of used AIS 28 / 31 BSI-DSZ-CC-1118-2020 Certification Report C: 1
- CSP Module Version 1.0 Release 1/NXP P60D145 VB”, 24.03.2020, v1.0.1, T-Systems International GmbH (confidential document) [11] “TCOS Cryptographic Service Provider Version 2.0 Release 1/P6022yTCOS Cryptographic Service: 1
- Report (ETR) - TCOS CSP Module Version 1.0 Release 1/P6022y”, SRC Security Research & Consulting, (confidential document) [8] Protection Profile (PP-0104) and Protection Profile-Module (PP-0107): Cryptographic Service: 1
- Update im Feld unter TCOS CSP Module 1.0 R1, T-Systems International GmbH, Version 0.2, 11.10.2019 (confidential document) [RNG] Zufallszahlengenerierung in TCOS,Version 1.01, 21.02.2019 (confidential document) [HWST] NXP: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- confidential document) [13] “Update im Feld unter TCOS CSP Module 1.0 R1”, T-Systems International GmbH, Version 0.2, 11: 1
|
pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200409135722+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP"
- /ModDate: D:20200409141001+02'00'
- /Producer: LibreOffice 6.2
- /Subject: TCOS CSP Module Version 1.0 Release 1/P6022y
- /Title: Certification Report BSI-DSZ-CC-1118-2020
- pdf_file_size_bytes: 1420347
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/AIS
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
pdf_data/st_filename |
st_vid10661-st.pdf |
1118b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1059-2018: 1
- BSI-DSZ-CC-1118: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0104-: 1
- BSI-CC-PP-0104-2019: 1
- BSI-CC-PP-0107-2019: 2
- BSI-CC-PP0035: 1
- BSI-CC-PP0104: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 6: 1
- EAL 6 augmented: 1
- EAL 6+: 1
- EAL4: 8
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 5
- FAU_GEN.1: 7
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 1
- FAU_STG_EXT.1: 11
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 19
- FCS_CKM.1.1: 2
- FCS_CKM.2: 1
- FCS_CKM.4: 7
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 20
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 47
- FCS_COP.1.1: 4
- FCS_RBG_EXT.1: 15
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSH_EXT.1: 14
- FCS_SSH_EXT.1.1: 2
- FCS_SSH_EXT.1.2: 2
- FCS_SSH_EXT.1.3: 2
- FCS_SSH_EXT.1.4: 2
- FCS_SSH_EXT.1.5: 2
- FCS_SSH_EXT.1.6: 2
- FCS_SSH_EXT.1.7: 2
- FCS_TLS_EXT.1: 2
- FDP:
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT.1: 11
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 3
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 11
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 17
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 5
- FMT:
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 2
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 9
- FPT_APW_EXT.1.1: 4
- FPT_APW_EXT.1.2: 2
- FPT_SKP_EXT.1: 11
- FPT_SKP_EXT.1.1: 2
- FPT_SSP.1: 1
- FPT_SSP.2: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TRP.1: 1
- FPT_TST.1: 1
- FPT_TST_EXT.1: 11
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_EXT_SSL.1: 1
- FTA_SSL: 1
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 9
- FTA_SSL_EXT.1.1: 3
- FTA_SSL_EXT.4: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 7
- FAU_GEN.1.1: 4
- FAU_GEN.1.2: 1
- FAU_SAS.1: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 5
- FAU_STG.3.1: 4
- FCS:
- FCS_CKM: 85
- FCS_CKM.1: 30
- FCS_CKM.2: 14
- FCS_CKM.4: 28
- FCS_CKM.4.1: 1
- FCS_CKM.5: 16
- FCS_CKM.5.1: 1
- FCS_COP: 135
- FCS_COP.1: 38
- FCS_RNG: 6
- FCS_RNG.1: 13
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 13
- FDP_ACC.1: 29
- FDP_ACF: 11
- FDP_ACF.1: 19
- FDP_DAU: 18
- FDP_DAU.1: 3
- FDP_DAU.2: 6
- FDP_ETC: 4
- FDP_ETC.1: 4
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 8
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 19
- FDP_ITC: 19
- FDP_ITC.1: 21
- FDP_ITC.2: 31
- FDP_ITT.1: 1
- FDP_RIP: 4
- FDP_RIP.1: 1
- FDP_SDC: 3
- FDP_SDC.1: 11
- FDP_SDC.1.1: 3
- FDP_SDI: 1
- FDP_SDI.2: 2
- FDP_UCT: 1
- FDP_UIT: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 14
- FIA_API.1: 7
- FIA_API.1.1: 1
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 11
- FIA_UAU.5.2: 1
- FIA_UAU.6: 4
- FIA_UAU.6.1: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MOF: 5
- FMT_MOF.1: 7
- FMT_MOF.1.1: 7
- FMT_MSA: 10
- FMT_MSA.1: 9
- FMT_MSA.2: 5
- FMT_MSA.2.1: 1
- FMT_MSA.3: 6
- FMT_MSA.4: 5
- FMT_MTD: 21
- FMT_MTD.1: 17
- FMT_MTD.3: 13
- FMT_MTD.3.1: 1
- FMT_SAE.1: 6
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 4
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS.1: 1
- FPT_ESA: 8
- FPT_ESA.1: 9
- FPT_ESA.1.1: 1
- FPT_ESA.1.2: 1
- FPT_ESA.1.3: 1
- FPT_ESA.1.4: 1
- FPT_FLS: 1
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ISA: 12
- FPT_ISA.1: 14
- FPT_ISA.1.1: 1
- FPT_ISA.1.2: 1
- FPT_ISA.1.3: 1
- FPT_ISA.1.4: 1
- FPT_ISA.1.5: 1
- FPT_ITT.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_SDC: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 4
- FPT_TCT: 10
- FPT_TCT.1: 5
- FPT_TCT.1.1: 1
- FPT_TDC: 9
- FPT_TDC.1: 16
- FPT_TIT: 15
- FPT_TIT.1: 10
- FPT_TIT.1.1: 2
- FPT_TIT.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 6
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 16
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.DISPLAY_BANNER: 1
- O.PROTECTED_COMMUNICATIONS: 1
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- OE:
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
- O:
- O.AES: 1
- O.CUST_RECONF_PLAIN: 1
- O.EEPROM_INTEGRITY: 1
- O.FM_FW: 1
- O.MEM_ACCESS: 1
- O.PUF: 1
- O.RBGS: 6
- O.RND: 1
- O.SFR_ACCESS: 1
- O.TDES: 1
- O.TST: 6
- OE:
- OSP:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 3
- NXP Semiconductors: 1
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 107
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- AES:
- AES: 24
- AES-: 2
- AES-128: 9
- AES-256: 11
- DES:
- 3DES:
- TDEA: 1
- TDES: 4
- Triple-DES: 1
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 5
- SHA-256: 5
- SHA-512: 3
- SHA256: 2
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 2
- SHA-512: 1
- SHA384: 1
|
pdf_data/st_keywords/crypto_scheme |
- KEX:
- Key Exchange: 2
- Key exchange: 1
- MAC:
|
- KA:
- Key Agreement: 1
- Key agreement: 5
- KEX:
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 6
- P-384: 4
- P-521: 4
|
- Brainpool:
- brainpoolP192r1: 1
- brainpoolP192t1: 1
- brainpoolP224r1: 1
- brainpoolP224t1: 1
- brainpoolP256r1: 4
- brainpoolP256t1: 1
- brainpoolP320r1: 1
- brainpoolP320t1: 1
- brainpoolP384r1: 2
- brainpoolP384t1: 1
- brainpoolP512r1: 2
- brainpoolP512t1: 1
- NIST:
- Curve P-192: 1
- Curve P-256: 1
- Curve P-384: 1
- Curve P-521: 1
- P-192: 1
- P-256: 1
- P-384: 1
- P-521: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 1
- physical probing: 5
- side channels: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS PUB 186-3: 3
- FIPS PUB 197: 1
- FIPS140: 1
- FIPS197: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- RFC:
- RFC 4251: 2
- RFC 4252: 1
- RFC 4253: 3
- RFC 4254: 1
- RFC 4741: 1
- RFC 6668: 1
- RFC4251: 1
- RFC4252: 1
- RFC4253: 3
- RFC4254: 1
- RFC5656: 3
- RFC6668: 2
|
- BSI:
- AIS 31: 1
- AIS 36: 1
- AIS31: 4
- AIS36: 2
- CC:
- CCMB-2012-09-004: 1
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 1
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 4
- FIPS180: 2
- FIPS186: 4
- FIPS197: 11
- ICAO:
- ISO:
- ISO/IEC 10116:2017: 1
- ISO/IEC 19790: 6
- NIST:
- PKCS:
- RFC:
- RFC 2104: 1
- RFC 5639: 1
- RFC 5903: 1
- RFC 6954: 1
- RFC 8017: 1
- RFC2104: 2
- RFC5639: 13
- RFC5903: 3
- RFC6954: 4
- RFC8017: 5
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
- i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled: 1
- including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
- out of scope: 2
- the HTTP traffic arrives (i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled. This service can only: 1
|
|
pdf_data/st_metadata |
- /Author: Denise Cater
- /CreationDate: D:20151210100045Z
- /Creator: Microsoft® Word 2010
- /ModDate: D:20151228141543-05'00'
- /Producer: Microsoft® Word 2010
- /Subject: Junos OS 13.3R1.8, Junos OS 13.2X50-D19 and Junos OS 13.2X51-D20
- /Title: Security Target
- pdf_file_size_bytes: 1384363
- pdf_hyperlinks: http://www.juniper.net/
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |