name |
Cisco ASA 9.20 on Cisco Secure Firewall 4200 Series |
IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration) |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
NL |
status |
active |
archived |
not_valid_after |
14.12.2026 |
19.11.2023 |
not_valid_before |
13.01.2025 |
19.11.2018 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11461-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-18-196231.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11461-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-196231-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11461-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-BAC-Lite]%202018_2000037746%20-%20Security%20Target%20Lite%20IDeal%20Pass%20v2.3-i%20JC%20(BAC%20Configuration)%20(v1.0,%202018-09-07).pdf |
manufacturer |
Cisco Systems, Inc. |
Idemia |
manufacturer_web |
https://www.cisco.com |
https://www.idemia.com |
security_level |
{} |
ADV_TDS.4, ALC_CMS.5, ATE_DPT.3, ADV_INT.2, ADV_FSP.5, EAL4+, ALC_DVS.2, ALC_TAT.2 |
dgst |
956bd09ad9e50f29 |
ce867531085e33f8 |
heuristics/cert_id |
CCEVS-VR-VID-11461-2025 |
NSCIB-CC-196231-CR |
heuristics/cert_lab |
US |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
ALC_CMS.5, AVA_VAN.5, ADV_TDS.4, ATE_DPT.3, ALC_DVS.2, ADV_ARC.1, ADV_FSP.5, ADV_INT.2, ALC_TAT.2, ADV_SPM.1 |
heuristics/extracted_versions |
9.20 |
2.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2018/27, NSCIB-CC-195748-CR |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-2012, ANSSI-CC-2016/66, NSCIB-CC-195748-CR, BSI-DSZ-CC-0782-V3-2017, BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2017/59, ANSSI-CC-2018/27, BSI-DSZ-CC-0782-V2-2015 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2018/27 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27 |
heuristics/protection_profiles |
e2ad7e4a892e3703, 89f2a255423f4a20, bde3d7587cf42e78 |
60455fc9564e2545 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPNGW_v1.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.4e.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf |
pdf_data/cert_filename |
st_vid11461-ci.pdf |
Signed certificate CC-18-196231.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11461-2025: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_TAT.2: 1
- ATE:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Cisco:
- Cisco: 2
- Cisco Systems, Inc: 1
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ICAO:
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Producer: WeasyPrint 62.3
- /Title: VID11461-FINAL CERT
- pdf_file_size_bytes: 136415
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20181119163400+01'00'
- /Creator: BHC364e
- /ModDate: D:20181119163400+01'00'
- /Producer: KONICA MINOLTA bizhub C364e
- /Title: BHC364e-20181119163400
- pdf_file_size_bytes: 202344
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid11461-vr.pdf |
Certification Report NSCIB-CC-196231-CR.pdf |
pdf_data/report_frontpage |
- NL:
- US:
- cert_id: CCEVS-VR-VID11461-2025
- cert_item: Cisco ASA 9.20 on Cisco Secure Firewall 4200 Series
- cert_lab: US NIAP
|
- NL:
- cert_id: NSCIB-CC-196231-CR
- cert_item: IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration
- cert_lab: Brightsight
- developer: IDEMIA
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11461-2025: 1
|
- FR:
- NL:
- CC-19-180045: 1
- CC-195748: 2
- NSCIB-CC-196231-CR: 12
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 2
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_FSP.5: 2
- ADV_INT.2: 2
- ADV_TDS.4: 2
- AGD:
- ALC:
- ALC_CMS.5: 2
- ALC_DVS.2: 2
- ALC_TAT.2: 2
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Cisco:
- Cisco: 47
- Cisco Systems, Inc: 3
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- Configuration This section briefly identifies the evaluated configuration(s) and any excluded and out of scope functionality. 8.1 Evaluated Configuration The evaluated configuration consists of the following: 1
- out of scope: 1
|
- OutOfScope:
- of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. 2.5 Documentation The following documentation is: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author: comptont
- /CreationDate: D:20250117135159-05'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20250117135159-05'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 338018
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /Author: p646
- /CreationDate: D:20181120153406+01'00'
- /Creator: PDFCreator Version 1.2.0
- /Keywords:
- /ModDate: D:20181120153406+01'00'
- /Producer: GPL Ghostscript 9.0
- /Subject:
- /Title: Certification Report NSCIB-CC-196231-CR
- pdf_file_size_bytes: 630780
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
pdf_data/st_filename |
st_vid11461-st.pdf |
[ST-BAC-Lite] 2018_2000037746 - Security Target Lite IDeal Pass v2.3-i JC (BAC Configuration) (v1.0, 2018-09-07).pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0055-2009: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
- BSI-PP-0056: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 6
- EAL4 augmented: 2
- EAL5: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 4
- ADV_INT.2: 4
- ADV_SPM.1: 1
- ADV_TDS.4: 4
- AGD:
- ALC:
- ALC_CMS.5: 4
- ALC_DVS.2: 5
- ALC_TAT.2: 4
- ATE:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 7
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 9
- FCS_CKM.1.1: 2
- FCS_CKM.2: 6
- FCS_CKM.2.1: 2
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_COP: 22
- FCS_COP.1: 4
- FCS_NTP_EXT.1: 4
- FCS_NTP_EXT.1.1: 1
- FCS_NTP_EXT.1.2: 2
- FCS_NTP_EXT.1.3: 1
- FCS_NTP_EXT.1.4: 3
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 1
- FCS_SSHS_EXT.1: 6
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.1: 6
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2: 4
- FCS_TLSC_EXT.2.1: 2
- FCS_TLSC_EXT.2.3: 2
- FCS_TLSS_EXT.1: 5
- FCS_TLSS_EXT.1.1: 1
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.1.4: 3
- FDP:
- FDP_RIP.2: 4
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT.1: 4
- FIA_PSK_EXT.1.1: 3
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.2: 4
- FIA_PSK_EXT.2.1: 1
- FIA_PSK_EXT.3: 4
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 4
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 4
- FMT_MOF.1: 1
- FMT_MTD: 8
- FMT_MTD.1: 2
- FMT_SMF: 10
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS: 4
- FPT_FLS.1: 2
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 5
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 2
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.3: 4
- FPT_TST_EXT.3.1: 1
- FPT_TST_EXT.3.2: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL: 5
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 3
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTA_TSE.1: 4
- FTA_TSE.1.1: 1
- FTA_VCM_EXT.1: 4
- FTA_VCM_EXT.1.1: 1
- FTP:
- FTP_ITC: 6
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 4
- FTP_TRP.1: 3
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 7
- FAU_SAS.1: 11
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 30
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 22
- FCS_CKM.4.1: 1
- FCS_COP: 51
- FCS_COP.1: 9
- FCS_RND: 9
- FCS_RND.1: 13
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 18
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC: 2
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_UCT.1: 11
- FDP_UCT.1.1: 1
- FDP_UIT: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_API: 16
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 6
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 16
- FIA_UAU.4.1: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 4
- FIA_UAU.6: 12
- FIA_UAU.6.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 8
- FMT_LIM.1: 18
- FMT_LIM.1.1: 3
- FMT_LIM.2: 19
- FMT_LIM.2.1: 4
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 3
- FMT_MTD: 35
- FMT_MTD.1: 5
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 19
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS.1: 1
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_: 1
- A.CONNECTIONS: 1
- A.LIMITED_FUNCTIONALITY: 2
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINSTRATOR: 1
- O:
- O.ADDRESS_FILTERING: 1
- O.AUTHENTICATION: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.FAIL_SECURE: 1
- O.PORT_FILTERING: 1
- O.RESIDUAL_INFORMATION: 1
- O.STATEFUL_TRAFFIC_FILTERING: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- OE:
- OE.ADMIN_CREDENTIALS_: 1
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.DATA_INTEGRITY: 1
- T.MALICIOUS_TRAFFIC: 1
- T.NETWORK_ACCESS: 1
- T.NETWORK_DISCLOSURE: 2
- T.NETWORK_MISUSE: 2
- T.PASSWORD_CRACKING: 1
- T.REPLAY_ATTACK: 1
- T.SECURITY_FUNCTIONALITY_: 2
- T.UNAUTHORIZED_: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATIONS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- OE:
- OE.AA_MRTD: 6
- OE.MRTD_: 2
|
pdf_data/st_keywords/vendor |
- Cisco:
- Cisco: 30
- Cisco Systems, Inc: 2
- Microsoft:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 3
- HMAC-SHA-256: 6
- HMAC-SHA-384: 5
- HMAC-SHA-512: 6
- miscellaneous:
|
- AES_competition:
- AES:
- AES: 11
- AES-: 1
- AES-128: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 3
- SHA-512: 3
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 2
- SHA-256: 1
- SHA-384: 2
- SHA-512: 1
- SHA224: 1
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 2
- SSL 2.0: 1
- SSL 3.0: 1
- TLS:
- TLS: 54
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- TLS v1.2: 1
- TLS1.1: 2
- TLS1.2: 2
- TLSv1.2: 3
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 14
- P-384: 14
- P-521: 14
- secp256r1: 3
- secp384r1: 4
- secp521r1: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 7
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 4
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 9
- EF.DG1: 27
- EF.DG13: 4
- EF.DG14: 3
- EF.DG15: 8
- EF.DG16: 27
- EF.DG2: 10
- EF.DG3: 7
- EF.DG4: 6
- EF.DG5: 8
- EF.SOD: 9
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 140-2: 3
- FIPS PUB 140-2: 1
- FIPS PUB 180-4: 2
- FIPS PUB 186-3: 1
- FIPS PUB 186-4: 9
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- NIST:
- PKCS:
- RFC:
- RFC 2460: 3
- RFC 2818: 1
- RFC 2986: 1
- RFC 3268: 4
- RFC 3447: 2
- RFC 3513: 2
- RFC 3526: 6
- RFC 3602: 2
- RFC 4106: 1
- RFC 4253: 1
- RFC 4301: 1
- RFC 4303: 2
- RFC 4346: 2
- RFC 4443: 2
- RFC 4868: 1
- RFC 4945: 1
- RFC 5077: 1
- RFC 5114: 1
- RFC 5246: 9
- RFC 5280: 4
- RFC 5282: 1
- RFC 5289: 4
- RFC 5735: 2
- RFC 5759: 1
- RFC 5905: 2
- RFC 5996: 2
- RFC 6125: 1
- RFC 6960: 1
- RFC 768: 4
- RFC 791: 4
- RFC 792: 2
- RFC 793: 4
- RFC 8200: 1
- RFC 8784: 1
- X509:
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 2
- FIPS 46-3: 2
- FIPS PUB 197: 1
- FIPS46: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 6
- ISO/IEC 18013: 6
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC15946-2: 1
- RFC:
- RFC 5639: 1
- RFC-5639: 1
- RFC3369: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security features: 1
- out of scope: 1
|
pdf_data/st_metadata |
|
- /Author: IDEMIA
- /CreationDate: D:20180907132327+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: NSCIB-CC-196231, ASE Lite, ICAO, ePassport, BAC
- /ModDate: D:20180907132327+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: ASE Lite 2018_2000037746, v1.0, 2018-09-07
- /Title: Security Target Lite IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
- pdf_file_size_bytes: 1486764
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 102
|
state/cert/convert_garbage |
True |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |