Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Juniper MX240 MX480, MX960, MX2010, MX2020, EX9204, EX9208, EX9214, PTX3000, PTX5000 with JUNOS 14.2R3
CCEVS-VR-VID-10661-2015
IDmove v5 on SCR404U in PACE configuration with AA and/or CA in optionOS Commercial Version : 0x098912 ; OS Unique Identifier : 0xB7BC0108 et E48C0108 (ANSSI-CC-2023/66)
ANSSI-CC-2023/66
name Juniper MX240 MX480, MX960, MX2010, MX2020, EX9204, EX9208, EX9214, PTX3000, PTX5000 with JUNOS 14.2R3 IDmove v5 on SCR404U in PACE configuration with AA and/or CA in optionOS Commercial Version : 0x098912 ; OS Unique Identifier : 0xB7BC0108 et E48C0108 (ANSSI-CC-2023/66)
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
status archived active
not_valid_after 28.02.2017 19.01.2029
not_valid_before 28.12.2015 19.01.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10661-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_66fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10661-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_66fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10661-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_66en.pdf
manufacturer Juniper Networks, Inc. Idemia
manufacturer_web https://www.juniper.net/ https://www.idemia.com
security_level {} ALC_DVS.2, ATE_COV.3, EAL5+, ATE_FUN.2, ADV_TDS.5, ADV_INT.3, AVA_VAN.5, ADV_IMP.2, ALC_CMC.5
dgst 92ea4a365faaabfd b26b4f91a5d3f44b
heuristics/cert_id CCEVS-VR-VID-10661-2015 ANSSI-CC-2023/66
heuristics/cert_lab US []
heuristics/extracted_sars ALC_CMS.1, ASE_INT.1, ASE_OBJ.2, ALC_CMC.1, ATE_IND.1, AVA_VAN.1, ADV_FSP.1, ASE_TSS.1, AGD_OPE.1, ASE_ECD.1, AGD_PRE.1, ASE_REQ.2, ASE_CCL.1 AGD_OPE.1, ATE_COV.3, ASE_INT.3, ALC_DEL.1, ADV_TDS.5, ADV_ARC.1, ALC_CMC.5, ADV_FSP.5, AVA_VAN.5, ASE_ECD.1, ATE_DPT.3, ALC_LCD.1, ASE_REQ.2, ALC_DVS.2, ASE_OBJ.2, ATE_IND.2, ADV_IMP.2, ALC_CMS.5, ASE_CCL.1, ADV_INT.3, ALC_FLR.3, ATE_FUN.2, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ALC_TAT.3
heuristics/extracted_versions 14.2 2023, 66
heuristics/report_references/directly_referencing {} ANSSI-CC-2023/37
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2023/37
heuristics/st_references/directly_referencing {} ANSSI-CC-2023/37
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2023/37
heuristics/protection_profiles ac9abe3d5c5a31f0 b380aabf93b29692
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf
pdf_data/cert_filename st_vid10661-ci.pdf Certificat-CC-2023_66fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10661-2015: 1
  • FR:
    • ANSSI-CC-2023/66: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_IMP.2: 1
    • ADV_INT.3: 1
    • ADV_TDS.5: 1
  • ALC:
    • ALC_CMC.5: 1
    • ALC_DVS.2: 1
    • ALC_FLR.3: 2
    • ALC_TAT.3: 1
  • ATE:
    • ATE_COV.3: 1
    • ATE_FUN.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • Idemia:
    • IDEMIA: 2
pdf_data/cert_keywords/eval_facility
  • Serma:
    • SERMA: 2
pdf_data/cert_keywords/crypto_protocol
  • PACE:
    • PACE: 2
pdf_data/cert_metadata
  • /CreationDate: D:20151231080423-05'00'
  • /ModDate: D:20151231080446-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 178899
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20240123145400+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240123145400+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 158762
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid10661-vr.pdf ANSSI-CC-2023_66fr.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-VID10661-2015
    • cert_item: Juniper Networks, Inc. Juniper Networks Mx Routers, PTX Routers and EX9200 Switches Running Junos OS 14.2R3
    • cert_lab: US NIAP
  • FR:
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10661-2015: 1
  • FR:
    • ANSSI-CC-2023/37: 2
    • ANSSI-CC-2023/66: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0068-V2-2011-MA-01: 2
    • BSI-CC-PP-0090-2016: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_IMP.2: 1
    • ADV_INT.3: 1
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 2
  • ALC:
    • ALC_CMC.5: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.3: 2
    • ALC_TAT.3: 1
  • ATE:
    • ATE_COV.3: 1
    • ATE_FUN.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
pdf_data/report_keywords/vendor
  • Idemia:
    • IDEMIA: 5
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • Serma:
    • SERMA: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 10
    • SSHv2: 3
  • TLS:
    • SSL:
      • SSL: 2
  • PACE:
    • PACE: 11
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 1
    • RNG: 1
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2004-0468: 1
    • CVE-2006-3529: 1
    • CVE-2007-6372: 1
    • CVE-2013-4686: 1
    • CVE-2013-4687: 1
    • CVE-2013-4688: 1
    • CVE-2013-6170: 1
    • CVE-2013-7313: 1
    • CVE-2014-0612: 1
    • CVE-2014-0613: 1
    • CVE-2014-0614: 1
    • CVE-2014-0616: 1
    • CVE-2014-0617: 1
    • CVE-2014-2713: 1
    • CVE-2014-2714: 1
    • CVE-2014-3815: 1
    • CVE-2014-3817: 1
    • CVE-2014-3819: 1
    • CVE-2014-3822: 1
    • CVE-2014-3825: 1
    • CVE-2014-6378: 1
    • CVE-2014-6380: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • ICAO:
    • ICAO: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration: 1
    • Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration. 7 4.5 Security Management The TOE provides an: 1
    • out of scope: 1
pdf_data/report_metadata
pdf_data/st_filename st_vid10661-st.pdf ANSSI-cible-CC-2023_66en.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023_37: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 2
    • BSI-CC-PP-0086: 1
    • BSI-CC-PP-0087-: 1
    • BSI-CC-PP-0090-2016: 2
    • BSI-PP-0056: 1
    • BSI-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 3
    • EAL4 augmented: 2
    • EAL5: 7
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 2
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 4
    • ADV_IMP.1: 2
    • ADV_IMP.2: 6
    • ADV_INT.3: 5
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.5: 9
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 6
    • AGD_PRE: 7
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.5: 5
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 10
    • ALC_FLR.3: 5
    • ALC_LCD.1: 2
    • ALC_STM: 2
    • ALC_TAT.1: 2
    • ALC_TAT.3: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_INT.3: 2
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.3: 6
    • ATE_DPT.1: 2
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 7
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 1
    • FAU_STG_EXT.1: 11
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 1
    • FCS_CKM.4: 7
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.4: 20
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 47
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SSH_EXT.1: 14
    • FCS_SSH_EXT.1.1: 2
    • FCS_SSH_EXT.1.2: 2
    • FCS_SSH_EXT.1.3: 2
    • FCS_SSH_EXT.1.4: 2
    • FCS_SSH_EXT.1.5: 2
    • FCS_SSH_EXT.1.6: 2
    • FCS_SSH_EXT.1.7: 2
    • FCS_TLS_EXT.1: 2
  • FDP:
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.2: 5
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_PMG_EXT.1: 11
    • FIA_PMG_EXT.1.1: 2
    • FIA_PSK_EXT.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 3
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 11
    • FIA_UAU_EXT.2.1: 2
    • FIA_UIA_EXT.1: 17
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
    • FIA_UID.1: 5
  • FMT:
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 2
    • FMT_SMR.2: 5
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 9
    • FPT_APW_EXT.1.1: 4
    • FPT_APW_EXT.1.2: 2
    • FPT_SKP_EXT.1: 11
    • FPT_SKP_EXT.1.1: 2
    • FPT_SSP.1: 1
    • FPT_SSP.2: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TRP.1: 1
    • FPT_TST.1: 1
    • FPT_TST_EXT.1: 11
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT.1: 11
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 2
  • FTA:
    • FTA_EXT_SSL.1: 1
    • FTA_SSL: 1
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 9
    • FTA_SSL_EXT.1.1: 3
    • FTA_SSL_EXT.4: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 11
    • FAU_SAS.1: 13
    • FAU_SAS.1.1: 3
  • FCS:
    • FCS_CKM: 82
    • FCS_CKM.1: 23
    • FCS_CKM.2: 2
    • FCS_CKM.4: 38
    • FCS_CKM.4.1: 2
    • FCS_COP: 88
    • FCS_COP.1: 36
    • FCS_RND: 6
    • FCS_RND.1: 16
    • FCS_RND.1.1: 3
  • FDP:
    • FDP_ACC: 30
    • FDP_ACC.1: 21
    • FDP_ACF: 33
    • FDP_ACF.1: 39
    • FDP_ACF.1.2: 1
    • FDP_IFC: 9
    • FDP_IFC.1: 9
    • FDP_IFF: 10
    • FDP_IFF.1: 7
    • FDP_ITC: 8
    • FDP_ITC.1: 12
    • FDP_ITC.2: 4
    • FDP_RIP: 6
    • FDP_RIP.1: 14
    • FDP_RIP.1.1: 2
    • FDP_UCT: 12
    • FDP_UCT.1: 9
    • FDP_UIT: 12
    • FDP_UIT.1: 16
  • FIA:
    • FIA_AFL: 22
    • FIA_AFL.1: 17
    • FIA_API: 18
    • FIA_API.1: 12
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 65
    • FIA_UAU.1: 16
    • FIA_UAU.4: 7
    • FIA_UAU.5: 11
    • FIA_UAU.6: 9
    • FIA_UID: 17
    • FIA_UID.1: 21
  • FMT:
    • FMT_LIM: 6
    • FMT_LIM.1: 18
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 17
    • FMT_LIM.2.1: 3
    • FMT_MOF: 9
    • FMT_MOF.1: 6
    • FMT_MSA.1: 2
    • FMT_MSA.3: 8
    • FMT_MTD: 115
    • FMT_MTD.1: 34
    • FMT_SMF: 6
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 2
    • FMT_SMR: 20
    • FMT_SMR.1: 13
  • FPT:
    • FPT_EMS: 7
    • FPT_EMS.1: 17
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 4
    • FPT_FLS: 5
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 2
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 2
    • FPT_TST: 5
    • FPT_TST.1: 12
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 17
    • FTP_ITC.1: 30
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.DISPLAY_BANNER: 1
    • O.PROTECTED_COMMUNICATIONS: 1
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.SESSION_LOCK: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
  • OE:
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
pdf_data/st_keywords/vendor
  • Idemia:
    • IDEMIA: 147
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 6
  • AES_competition:
    • AES:
      • AES: 19
  • DES:
    • 3DES:
      • TDES: 5
      • Triple-DES: 13
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CMAC: 5
      • KMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 11
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 2
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 4
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 2
    • SHA2:
      • SHA-2: 5
      • SHA-256: 5
      • SHA-512: 3
      • SHA256: 2
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 2
      • SHA-256: 8
      • SHA-384: 2
      • SHA-512: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 2
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • SSH:
    • SSH: 73
    • SSHv2: 10
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 3
  • PACE:
    • PACE: 189
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RBG: 4
    • RNG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CBC:
    • CBC: 13
  • ECB:
    • ECB: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 6
    • P-384: 4
    • P-521: 4
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 7
    • Physical Tampering: 6
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 7
    • physical tampering: 2
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 8
    • EF.DG1: 6
    • EF.DG14: 3
    • EF.DG15: 3
    • EF.DG16: 5
    • EF.DG2: 4
    • EF.DG3: 2
    • EF.DG4: 2
    • EF.DG5: 2
    • EF.SOD: 7
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS PUB 186-3: 3
    • FIPS PUB 197: 1
    • FIPS140: 1
    • FIPS197: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38D: 1
  • RFC:
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4254: 1
    • RFC 4741: 1
    • RFC 6668: 1
    • RFC4251: 1
    • RFC4252: 1
    • RFC4253: 3
    • RFC4254: 1
    • RFC5656: 3
    • RFC6668: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 186-5: 1
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS PUB 197: 1
  • ICAO:
    • ICAO: 15
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 18013: 6
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9797-1: 1
  • NIST:
    • NIST SP 800-90: 1
  • PKCS:
    • PKCS#3: 3
  • RFC:
    • RFC 3369: 1
  • SCP:
    • SCP02: 1
    • SCP03: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
    • i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled: 1
    • including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
    • out of scope: 2
    • the HTTP traffic arrives (i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled. This service can only: 1
pdf_data/st_metadata
  • /Author: Denise Cater
  • /CreationDate: D:20151210100045Z
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20151228141543-05'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Junos OS 13.3R1.8, Junos OS 13.2X50-D19 and Junos OS 13.2X51-D20
  • /Title: Security Target
  • pdf_file_size_bytes: 1384363
  • pdf_hyperlinks: http://www.juniper.net/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
  • /Author: Nicolas LOKIEC
  • /CreationDate: D:20231121142312+01'00'
  • /Creator: Microsoft® Word pour Microsoft 365
  • /Keywords: Security Passport
  • /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_ActionId: 62ed3b39-a12c-4fbf-bcf1-99f24164d887
  • /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_ContentBits: 2
  • /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_Enabled: true
  • /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_Method: Privileged
  • /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_Name: Customer Restricted
  • /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_SetDate: 2023-08-10T14:49:02Z
  • /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_SiteId: 7694d41c-5504-43d9-9e40-cb254ad755ec
  • /ModDate: D:20231121142312+01'00'
  • /Producer: Microsoft® Word pour Microsoft 365
  • /Subject: FQR 110 A0BE
  • /Title: IDmove v5 on SCR404U in PACE configuration with AA and/or CA in option
  • pdf_file_size_bytes: 2250377
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 124
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different