Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belkin F1DN002MOD-KM-4, F1DN004MOD-KM-4 and F1DN-FLTR-HID-4 Firmware Version 40404-0E7 Peripheral Sharing Devices
535-EWA
Cisco Aggregation Services Router 1000 Series (ASR1K), Cisco Cloud Services Router 1000V (CSR1000V), Cisco Integrated Services Router 1100 Series (ISR1100), Cisco Integrated Services Router 4200 Series (ISR4K) running IOS-XE 17.3
CCEVS-VR-11186-2021
name Belkin F1DN002MOD-KM-4, F1DN004MOD-KM-4 and F1DN-FLTR-HID-4 Firmware Version 40404-0E7 Peripheral Sharing Devices Cisco Aggregation Services Router 1000 Series (ASR1K), Cisco Cloud Services Router 1000V (CSR1000V), Cisco Integrated Services Router 1100 Series (ISR1100), Cisco Integrated Services Router 4200 Series (ISR4K) running IOS-XE 17.3
category Other Devices and Systems Network and Network-Related Devices and Systems
scheme CA US
status active archived
not_valid_after 24.01.2027 28.12.2023
not_valid_before 24.01.2022 28.12.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/535-EWA%20CT%20Done.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11186-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/535-EWA%20CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11186-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%201.6%20Belkin_CFG_PSD-KM_Combined_ST_1.6.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11186-st.pdf
manufacturer Belkin International, Inc. Cisco Systems, Inc.
manufacturer_web https://www.belkin.com https://www.cisco.com
dgst 99b3bc3ca928c39f d64e23bf45735ebb
heuristics/cert_id 535-EWA CCEVS-VR-11186-2021
heuristics/cert_lab CANADA US
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1
heuristics/extracted_versions 40404, 4 17.3
heuristics/scheme_data
  • certification_date: 24.01.2022
  • level: PP_PSD_v4.0, MOD_KM_v1.0
  • product: Belkin F1DN002MOD-KM-4, F1DN004MOD-KM-4 and F1DN-FLTR-HID-4 Firmware Version 40404-0E7 Peripheral Sharing Devices
  • vendor: Belkin International, Inc.
  • category: Network Device, Virtual Private Network
  • certification_date: 28.12.2021
  • evaluation_facility: Acumen Security
  • expiration_date: 28.12.2023
  • id: CCEVS-VR-VID11186
  • product: Cisco Aggregation Services Router 1000 Series (ASR1K), Cisco Cloud Services Router 1000V (CSR1000V), Cisco Integrated Services Router 1100 Series (ISR1100), Cisco Integrated Services Router 4200 Series (ISR4K) running IOS-XE 17.3
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11186
  • vendor: Cisco Systems, Inc.
heuristics/protection_profiles 76f8f05a35d87f59, 814f66c77bc7f33b 89f2a255423f4a20
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf
pdf_data/cert_filename 535-EWA CT Done.pdf st_vid11186-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 535-EWA: 1
  • US:
    • CCEVS-VR-VID11186-2021: 1
pdf_data/cert_keywords/vendor
  • Cisco:
    • Cisco: 4
    • Cisco Systems, Inc: 1
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_metadata
  • /CreationDate: D:20190122115136-04'00'
  • /Creator: Adobe Illustrator CC 22.0 (Windows)
  • /ModDate: D:20220127142407-05'00'
  • /Producer: Adobe PDF library 15.00
  • /Title: cyber-centre-product-evaluation-certificate-e-bg
  • pdf_file_size_bytes: 1643295
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20211229123705-05'00'
  • /ModDate: D:20211229123705-05'00'
  • pdf_file_size_bytes: 170352
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 535-EWA CR.pdf st_vid11186-vr.pdf
pdf_data/report_frontpage
  • US:
  • CA:
    • cert_id: 535-EWA
    • cert_lab: CANADA
  • US:
    • cert_id: CCEVS-VR-11186-2021
    • cert_item: for the Cisco Aggregation Services Router 1000 Series (ASR1K), Cisco Cloud Services Router 1000V (CSR1000V), Cisco Integrated Services Router 1100 Series (ISR1100), Cisco Integrated Services Router 4200 Series (ISR4K) running IOS-XE 17.3
    • cert_lab: US NIAP
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 535-EWA: 1
  • US:
    • CCEVS-VR-11186-2021: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.2: 2
    • FCS_COP: 3
    • FCS_RBG_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.CONNECTIONS: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 2
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 2
    • A.VS_CORRECT_CONFIGURATION: 1
    • A.VS_ISOLATON: 1
    • A.VS_REGULAR_UPDATES: 1
    • A.VS_TRUSTED_ADMINISTRATOR: 1
  • T:
    • T.DATA_INTEGRITY: 1
    • T.NETWORK_ACCESS: 1
    • T.NETWORK_DISCLOSURE: 1
    • T.NETWORK_MISUSE: 1
    • T.PASSWORD_CRACKING: 1
    • T.REPLAY_ATTACK: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 78
    • Cisco Systems, Inc: 2
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Acumen:
    • Acumen Security: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 2
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • KEX:
    • Key Exchange: 1
    • Key exchange: 3
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 2
    • IKEv1: 1
    • IKEv2: 1
  • IPsec:
    • IPsec: 21
  • SSH:
    • SSH: 9
    • SSHv2: 4
  • VPN:
    • VPN: 33
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
  • RNG:
    • RBG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 1
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2021-1446: 2
    • CVE-2021-1621: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • FIPS:
    • FIPS 186-4: 2
  • ISO:
    • ISO/IEC 18031:2011: 1
  • NIST:
    • SP 800-90: 1
  • PKCS:
    • PKCS#1: 1
  • X509:
    • X.509: 1
pdf_data/report_metadata
  • /CreationDate: D:20211229111542-05'00'
  • /ModDate: D:20211229111542-05'00'
  • pdf_file_size_bytes: 1286945
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename ST 1.6 Belkin_CFG_PSD-KM_Combined_ST_1.6.pdf st_vid11186-st.pdf
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP.1: 4
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 3
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
  • FDP:
    • FDP_APC_EXT: 15
    • FDP_APC_EXT.1: 13
    • FDP_APC_EXT.1.1: 1
    • FDP_APC_EXT.1.2: 1
    • FDP_APC_EXT.1.3: 1
    • FDP_APC_EXT.1.4: 1
    • FDP_FIL_EXT: 16
    • FDP_FIL_EXT.1: 7
    • FDP_FIL_EXT.1.1: 1
    • FDP_FIL_EXT.1.2: 1
    • FDP_FIL_EXT.1.3: 1
    • FDP_FLS_EXT: 1
    • FDP_PDC_EXT: 17
    • FDP_PDC_EXT.1: 26
    • FDP_PDC_EXT.1.1: 2
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 6
    • FDP_PDC_EXT.2.1: 1
    • FDP_PDC_EXT.2.2: 1
    • FDP_PDC_EXT.3: 7
    • FDP_PDC_EXT.3.1: 1
    • FDP_PDC_EXT.3.2: 1
    • FDP_RDR_EXT: 4
    • FDP_RDR_EXT.1: 15
    • FDP_RDR_EXT.1.1: 2
    • FDP_RIP: 6
    • FDP_RIP.1: 1
    • FDP_RIP_EXT: 4
    • FDP_RIP_EXT.1: 9
    • FDP_RIP_EXT.1.1: 2
    • FDP_SWI_EXT: 4
    • FDP_SWI_EXT.1: 21
    • FDP_SWI_EXT.1.1: 3
    • FDP_SWI_EXT.2: 11
    • FDP_SWI_EXT.2.1: 2
    • FDP_SWI_EXT.2.2: 3
    • FDP_SWI_EXT.3: 14
    • FDP_SWI_EXT.3.1: 2
    • FDP_UDF_EXT: 11
    • FDP_UDF_EXT.1: 5
    • FDP_UDF_EXT.1.1: 1
  • FPT:
    • FPT_FLS_EXT: 3
    • FPT_FLS_EXT.1: 10
    • FPT_FLS_EXT.1.1: 3
    • FPT_NTA_EXT: 4
    • FPT_NTA_EXT.1: 8
    • FPT_NTA_EXT.1.1: 2
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT: 4
    • FPT_TST_EXT.1: 18
    • FPT_TST_EXT.1.1: 3
  • FTA:
    • FTA_CIN_EXT: 4
    • FTA_CIN_EXT.1: 11
    • FTA_CIN_EXT.1.1: 2
    • FTA_CIN_EXT.1.2: 2
    • FTA_CIN_EXT.1.3: 2
  • FAU:
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG: 1
    • FAU_STG_EXT.1: 4
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_COP: 23
    • FCS_COP.1: 4
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT.1: 5
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHS_EXT.1: 5
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT.2.3: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT.1: 3
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_PSK_EXT.1.4: 1
    • FIA_UAU.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 4
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 4
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 14
    • FMT_MOF.1: 1
    • FMT_MTD: 9
    • FMT_MTD.1: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 3
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_FLS: 3
    • FPT_FLS.1: 1
    • FPT_SKP_EXT: 1
    • FPT_SKP_EXT.1: 3
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM_EXT.1: 5
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 3
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.3: 2
    • FPT_TST_EXT.3.1: 2
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 5
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 6
  • FTP:
    • FTP_ITC: 3
    • FTP_ITC.1: 11
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 4
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_PHYSICAL: 1
    • A.NO_TEMPEST: 2
    • A.NO_WIRELESS: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED: 1
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED: 1
    • A.USER_ALLOWED_ACCESS: 1
  • O:
    • O.ANTI_TAMPERING: 2
    • O.AUTHORIZED: 2
    • O.COMPUTER: 5
    • O.EMULATED_INPUT: 3
    • O.LEAK: 1
    • O.LEAK_PREVENTION: 1
    • O.NO_OTHER: 3
    • O.NO_TOE_ACCESS: 2
    • O.NO_USER: 1
    • O.NO_USER_DATA: 1
    • O.PERIPHERAL: 1
    • O.PERIPHERAL_PORTS: 1
    • O.REJECT: 4
    • O.SELF_TEST: 4
    • O.SELF_TEST_FAIL: 2
    • O.TAMPER: 1
    • O.TAMPER_EVIDENT: 2
    • O.UNIDIRECTIONAL: 3
    • O.USER_DATA: 2
  • OE:
    • OE.NO_TEMPEST: 2
    • OE.NO_WIRELESS: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 3
    • OE.TRUSTED: 2
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.DATA_LEAK: 2
    • T.FAILED: 2
    • T.LOGICAL: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 2
    • T.RESIDUAL: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED: 1
    • T.UNINTENDED_USE: 1
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.CONNECTIONS: 1
    • A.LIMITED_F: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 2
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
    • A.VS_CORRECT_CONFIGURATION: 1
    • A.VS_ISOLATON: 1
    • A.VS_REGULAR_UPDATES: 1
    • A.VS_TRUSTED_ADMINISTRATOR: 1
  • O:
    • O.ADDRESS_FILTERING: 1
    • O.AUTHENTICATION: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.FAIL_SECURE: 1
    • O.PORT_FILTERING: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.CONNECTIONS: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
    • OE.VM_CONFIGURATION: 1
  • T:
    • T.DATA_INTEGRITY: 1
    • T.NETWORK_ACCESS: 1
    • T.NETWORK_DISCLOSURE: 1
    • T.NETWORK_MISUSE: 1
    • T.PASSWORD_CRACKING: 1
    • T.REPLAY_ATTACK: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 397
    • Cisco Systems, Inc: 3
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 17
      • AES-: 2
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 9
      • HMAC-SHA-256: 4
      • HMAC-SHA-512: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDSA:
      • ECDSA: 17
  • FF:
    • DH:
      • DH: 16
      • Diffie-Hellman: 8
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-256: 4
      • SHA-384: 3
      • SHA-512: 5
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • KEX:
    • Key Exchange: 3
    • Key exchange: 3
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 39
    • IKEv1: 14
    • IKEv2: 13
  • IPsec:
    • IPsec: 80
  • SSH:
    • SSH: 43
    • SSHv2: 15
  • TLS:
    • DTLS:
      • DTLS: 1
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 56
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
  • RNG:
    • RBG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 12
    • P-384: 12
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 7
  • SCA:
    • SPA: 3
pdf_data/st_keywords/device_model
  • STM:
    • STM32:
      • STM32F070C6T6: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 140-2: 2
    • FIPS 186-4: 2
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 2
    • FIPS PUB 186-3: 2
    • FIPS PUB 186-4: 11
    • FIPS PUB 198-1: 1
  • ISO:
    • ISO/IEC 14888-3: 2
    • ISO/IEC 18031:2011: 5
    • ISO/IEC 9796-2: 2
  • NIST:
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 1
    • SP 800-90: 2
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
    • PKCS12: 1
  • RFC:
    • RFC 2460: 2
    • RFC 2986: 1
    • RFC 3526: 5
    • RFC 3602: 7
    • RFC 4106: 6
    • RFC 4109: 1
    • RFC 4253: 1
    • RFC 4301: 2
    • RFC 4303: 2
    • RFC 4868: 2
    • RFC 4945: 1
    • RFC 5077: 1
    • RFC 5114: 2
    • RFC 5280: 4
    • RFC 5282: 1
    • RFC 5759: 1
    • RFC 5996: 2
    • RFC 768: 2
    • RFC 791: 2
    • RFC 793: 2
  • X509:
    • X.509: 8
pdf_data/st_metadata
  • /Author: Cisco CC TME
  • /CreationDate: D:20211228104535-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20211229110733-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: ST
  • pdf_file_size_bytes: 1437749
  • pdf_hyperlinks: http://www.cisco.com/cisco/software/navigator.html
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 107
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different