Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BAE Systems Secure KVM Gen2 8560943-2
CCEVS-VR-11304-2023
eTugra SAM v1.4
OCSI/CERT/CCL/01/2023/RC
name BAE Systems Secure KVM Gen2 8560943-2 eTugra SAM v1.4
category Other Devices and Systems Products for Digital Signatures
scheme US IT
not_valid_after 12.01.2028 16.04.2029
not_valid_before 12.01.2023 16.04.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11304-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_FP_etugra_sam_14_v1.0_en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11304-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_etugra_sam_14_v1.0_en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11304-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_etugra_sam_14_v10.pdf
manufacturer BAE Systems Information and Electronic Systems, Inc. E-Tugra EBG Information Technologies and Services Joint Stock Company
manufacturer_web https://www.baesystems.com https://e-tugra.com.tr/
security_level {} EAL4+, AVA_VAN.5
dgst 9674e40d5815c857 f4885e7bbdd8eb7d
heuristics/cert_id CCEVS-VR-11304-2023 OCSI/CERT/CCL/01/2023/RC
heuristics/cert_lab US []
heuristics/direct_transitive_cves {} CVE-2022-36986, CVE-2022-36997, CVE-2022-42301, CVE-2022-36984, CVE-2022-42299, CVE-2022-42304, CVE-2022-36999, CVE-2022-42307, CVE-2022-36992, CVE-2022-42305, CVE-2022-36988, CVE-2022-37000, CVE-2022-36995, CVE-2022-36996, CVE-2022-36991, CVE-2022-36990, CVE-2022-36985, CVE-2022-36987, CVE-2021-41570, CVE-2022-42300, CVE-2022-42302, CVE-2022-36998, CVE-2022-36989, CVE-2022-42303, CVE-2022-36993, CVE-2022-36994, CVE-2023-28759
heuristics/indirect_transitive_cves {} CVE-2022-36986, CVE-2022-36997, CVE-2022-42301, CVE-2022-36984, CVE-2022-42299, CVE-2022-42304, CVE-2022-36999, CVE-2022-42307, CVE-2022-36992, CVE-2022-42305, CVE-2022-36988, CVE-2022-37000, CVE-2022-36995, CVE-2022-36996, CVE-2022-36991, CVE-2022-36990, CVE-2022-36985, CVE-2022-36987, CVE-2021-41570, CVE-2022-42300, CVE-2022-42302, CVE-2022-36998, CVE-2022-36989, CVE-2022-42303, CVE-2022-36993, CVE-2022-36994, CVE-2023-28759
heuristics/extracted_sars AGD_PRE.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, ASE_REQ.2 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 8560943, 2 1.4
heuristics/report_references/directly_referenced_by {} OCSI/CERT/CCL/01/2022/RC
heuristics/report_references/directly_referencing {} OCSI/CERT/CCL/13/2021/RC
heuristics/report_references/indirectly_referenced_by {} OCSI/CERT/CCL/01/2022/RC
heuristics/report_references/indirectly_referencing {} OCSI/CERT/CCL/13/2021/RC
heuristics/scheme_data
  • certification_date: 16.04.2024
  • level: EAL4+
  • report_link_en: https://www.ocsi.gov.it/documenti/certificazioni/eTugra/cr_etugra_sam_14_v1.0_en.pdf
  • report_link_it: https://www.ocsi.gov.it/documenti/certificazioni/eTugra/rc_etugra_sam_14_v.1.0_it.pdf
  • supplier: E-Tugra EBG Information Technologies and Services Joint Stock Company
  • target_link: https://www.ocsi.gov.it/documenti/certificazioni/eTugra/st_etugra_sam_14_v10.pdf
  • title: eTugra SAM v1.4
heuristics/protection_profiles 42cf355b24450489, 76f8f05a35d87f59, 814f66c77bc7f33b eabbd431e1f174cd
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf
pdf_data/cert_filename st_vid11304-ci.pdf cr_FP_etugra_sam_14_v1.0_en.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11304-2023: 1
  • IT:
    • OCSI/CERT/CCL/01/2023/RC: 1
    • OCSI/CERT/CCL/13/2021/RC: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL4: 2
    • EAL4+: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
pdf_data/cert_metadata
  • /CreationDate: D:20230124105725-05'00'
  • /ModDate: D:20230124105725-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 180693
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Tiziano Inzerilli
  • /CreationDate: D:20240419162007+02'00'
  • /ModDate: D:20240419162007+02'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Certification Report "eTugra SAM v1.4".pdf
  • pdf_file_size_bytes: 373181
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid11304-vr.pdf cr_etugra_sam_14_v1.0_en.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-11304-2023
    • cert_item: for BAE Systems Secure KVM Gen2 8560943-2
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-11304-2023: 1
  • IT:
    • OCSI/CERT/CCL/01/2023/RC: 25
    • OCSI/CERT/CCL/13/2021/RC: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4+: 4
    • EAL2: 4
    • EAL4: 10
    • EAL4 augmented: 3
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_APC_EXT.1: 1
    • FDP_CDS_EXT.1: 1
    • FDP_FIL_EXT: 1
    • FDP_IPC_EXT.1: 2
    • FDP_RIP: 1
    • FDP_SPR_EXT: 1
    • FDP_SWI_EXT.3: 1
  • FTA:
    • FTA_CIN_EXT.1: 2
pdf_data/report_keywords/cc_claims
  • O:
    • O.J: 1
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 10
  • CCLab:
    • CCLab Software Laboratory: 5
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 4
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • using a USB connector. This device is not switched and does not use the KVM. The handgrip is out of scope and not part of the TOE. Host PC1 and Host PC2 output HDMI using the DisplayPort dual mode feature: 2
pdf_data/report_metadata
  • /Author: OCSI
  • /CreationDate: D:20240416084741+02'00'
  • /Creator: Microsoft® Word per Microsoft 365
  • /ModDate: D:20240416084741+02'00'
  • /Producer: Microsoft® Word per Microsoft 365
  • /Title: Certification Report "eTugra SAM v1.4"
  • pdf_file_size_bytes: 656782
  • pdf_hyperlinks: https://www.sogis.eu/, https://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename st_vid11304-st.pdf st_etugra_sam_14_v10.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 1
    • AGD_PRE: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_AFL_EXT.1: 1
    • FDP_APC_EXT: 4
    • FDP_APC_EXT.1: 14
    • FDP_CDS_EXT.1: 9
    • FDP_CDS_EXT.1.1: 2
    • FDP_FIL_EXT: 9
    • FDP_FIL_EXT.1: 3
    • FDP_IPC_EXT.1: 10
    • FDP_IPC_EXT.1.1: 1
    • FDP_IPC_EXT.1.2: 1
    • FDP_PDC_EXT: 28
    • FDP_PDC_EXT.1: 7
    • FDP_PDC_EXT.1.1: 1
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 4
    • FDP_PDC_EXT.3: 4
    • FDP_RIP: 8
    • FDP_RIP.1: 1
    • FDP_RIP_EXT.1: 7
    • FDP_RIP_EXT.1.1: 1
    • FDP_SPR_EXT: 9
    • FDP_SPR_EXT.1: 1
    • FDP_SWI_EXT.1: 7
    • FDP_SWI_EXT.1.1: 1
    • FDP_SWI_EXT.2: 9
    • FDP_SWI_EXT.2.1: 1
    • FDP_SWI_EXT.2.2: 1
    • FDP_SWI_EXT.3: 8
    • FDP_SWI_EXT.3.1: 1
    • FDP_UDF_EXT: 14
    • FDP_UDF_EXT.1: 2
  • FPT:
    • FPT_FLS_EXT.1: 7
    • FPT_FLS_EXT.1.1: 1
    • FPT_NTA_EXT.1: 7
    • FPT_NTA_EXT.1.1: 1
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 1
  • FTA:
    • FTA_CIN_EXT.1: 11
    • FTA_CIN_EXT.1.1: 1
    • FTA_CIN_EXT.1.2: 1
    • FTA_CIN_EXT.1.3: 1
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
  • FCS:
    • FCS_CKM: 25
    • FCS_CKM.1: 17
    • FCS_CKM.2: 6
    • FCS_CKM.4: 29
    • FCS_CKM.4.1: 1
    • FCS_COP: 26
    • FCS_COP.1: 14
    • FCS_RNG: 3
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 91
    • FDP_ACC.1: 43
    • FDP_ACF: 60
    • FDP_ACF.1: 49
    • FDP_ETC: 15
    • FDP_ETC.2: 8
    • FDP_IFC: 29
    • FDP_IFC.1: 24
    • FDP_IFF: 15
    • FDP_IFF.1: 14
    • FDP_ITC: 15
    • FDP_ITC.1: 12
    • FDP_ITC.2: 22
    • FDP_UCT.1: 7
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 11
    • FIA_AFL.1: 1
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_UAU: 15
    • FIA_UAU.1: 5
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 4
    • FIA_UID.1: 5
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
    • FIA_USB.1: 18
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 2
    • FIA_USB.1.3: 1
    • FIA_UTD.1: 1
  • FMT:
    • FMT_MSA: 38
    • FMT_MSA.1: 10
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 26
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.2: 13
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_PHP.1: 11
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 14
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TRP: 2
  • FTP:
    • FTP_ITC: 8
    • FTP_ITC.1: 11
    • FTP_TDC.1: 2
    • FTP_TRP: 24
    • FTP_TRP.1: 15
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • A:
    • A.ACCESS_PROTECTED: 4
    • A.AUTH_DATA: 4
    • A.CA: 4
    • A.PRIVILEGED_USER: 4
    • A.SEC_REQ: 4
    • A.SIGNER_AUTHENTICATION_DATA_PROTECTION: 4
    • A.SIGNER_DEVICE: 4
    • A.SIGNER_ENROLMENT: 4
    • A.TSP_AUDITED: 4
  • OE:
    • OE.CA_REQUEST_CERTIFICATE: 4
    • OE.CERTIFICATE_VERFICATION: 2
    • OE.CERTIFICATE_VERIFICATION: 1
    • OE.CRYPTOMODULE_CERTIFIED: 5
    • OE.DELEGATED_AUTHENTICATION: 3
    • OE.DEVICE: 10
    • OE.ENV: 9
    • OE.SIGNER_AUTHENTICATION_DATA: 6
    • OE.SVD_AUTHENTICITY: 5
  • OSP:
    • OSP.CRYPTO: 4
    • OSP.RANDOM: 5
  • OT:
    • OT.AUDIT_PROTECTION: 5
    • OT.CRYPTO: 6
    • OT.DTBSR_INTEGRITY: 4
    • OT.PRIVILEGED_USER_AUTHENTICATION: 6
    • OT.PRIVILEGED_USER_MANAGEMENT: 19
    • OT.PRIVILEGED_USER_PROTECTION: 18
    • OT.RANDOM: 20
    • OT.REFERENCE_SIGNER_AUTHENTICATION_DATA: 7
    • OT.SAD_VERIFICATION: 18
    • OT.SAP: 8
    • OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION: 19
    • OT.SIGNATURE_INTEGRITY: 18
    • OT.SIGNER_KEY_PAIR_GENERATION: 19
    • OT.SIGNER_MANAGEMENT: 5
    • OT.SIGNER_PROTECTION: 20
    • OT.SVD: 4
    • OT.SYSTEM_PROTECTION: 19
  • R:
    • R.AUDIT: 2
    • R.RANDOM: 2
    • R.SAD: 27
    • R.SVD: 42
    • R.TSF_DATA: 11
  • T:
    • T.ADMIN_IMPERSONATION: 8
    • T.AUDIT_ALTERATION: 7
    • T.AUTHENTICATION_SIGNER_IMPERSONATION: 10
    • T.AUTHORISATION_DATA_DISCLOSE: 3
    • T.AUTHORISATION_DATA_UPDATE: 10
    • T.CONTEXT_ALTERATION: 11
    • T.DTBSR_FORGERY: 7
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_: 1
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCL: 2
    • T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED: 3
    • T.ENROLMENT_SIGNER_IMPERSONATION: 10
    • T.MAINTENANCE_AUTHENTICATION_DISCLOSE: 6
    • T.PRIVILEGED_USER_INSERTION: 10
    • T.RANDOM: 9
    • T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_: 1
    • T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DA: 1
    • T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION: 2
    • T.SAD_FORGERY: 6
    • T.SAP_BYPASS: 7
    • T.SAP_REPLAY: 7
    • T.SIGNATURE_FORGERY: 7
    • T.SIGNATURE_REQUEST_DISCLOSURE: 7
    • T.SIGNER_AUTHENTICATION_DATA_MODIFIED: 6
    • T.SVD_FORGERY: 8
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 3
  • STMicroelectronics:
    • STM: 1
  • Thales:
    • Thales: 4
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 2
  • CCLab:
    • CCLab Software Laboratory: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • HMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 6
  • RSA:
    • RSA 2048: 3
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 2
      • SHA224: 2
      • SHA256: 7
      • SHA384: 3
      • SHA512: 5
    • SHA3:
      • SHA-3: 1
      • SHA3-224: 4
      • SHA3-256: 3
      • SHA3-384: 5
      • SHA3-512: 5
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 9
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP224r1: 2
    • brainpoolP256r1: 2
    • brainpoolP256t1: 2
    • brainpoolP320r1: 2
    • brainpoolP320t1: 2
    • brainpoolP384r1: 2
    • brainpoolP384t1: 2
    • brainpoolP512r1: 2
    • brainpoolP512t1: 2
  • NIST:
    • NIST P-256: 2
    • P-256: 2
    • P-384: 2
    • P-521: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 3
  • SCA:
    • side channel: 2
  • FI:
    • physical tampering: 4
  • SCA:
    • side-channels: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 31: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 3
  • FIPS:
    • FIPS 140-3: 1
    • FIPS 186-5: 7
    • FIPS 202: 1
    • FIPS PUB 140-3: 1
    • FIPS PUB 186-5: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 19790: 8
    • ISO/IEC 19790:2012: 1
  • PKCS:
    • PKCS#1: 5
  • RFC:
    • RFC 5639: 4
    • RFC 6151: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • used to authenticate the signer are managed by the IdP or mobile application via SSA and are thus out of scope of this ST. 145 [selection: [assignment: the rules describing how delegated authentication is: 1
pdf_data/st_metadata
  • /CreationDate: D:20230124105039-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20230124105039-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 771042
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different