Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Hitachi AE45C (HD65145C) Smartcard Integrated Circuit Version 01
BSI-DSZ-CC-0168-2002
Juniper Networks Junos Pulse Secure Access Service 7.2 R4
ISCB-5-RPT-C040-CR-v1a
name Hitachi AE45C (HD65145C) Smartcard Integrated Circuit Version 01 Juniper Networks Junos Pulse Secure Access Service 7.2 R4
category ICs, Smart Cards and Smart Card-Related Devices and Systems Network and Network-Related Devices and Systems
scheme DE MY
not_valid_after 01.09.2019 15.07.2018
not_valid_before 01.05.2002 15.07.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0168a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C040-CR-v1a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0168b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JNPR%20SA%207.2R4%20EAL3%20ST%20v1.4.pdf
manufacturer Hitachi, Ltd. HPE Juniper Networking
manufacturer_web https://www.hitachi.com/ https://www.juniper.net/
security_level EAL4+, AVA_VLA.4, AVA_MSU.3, ADV_IMP.2, ALC_DVS.2 ALC_FLR.2, EAL3+
dgst a167d2b92d71eb88 7116d2046dcede84
heuristics/cert_id BSI-DSZ-CC-0168-2002 ISCB-5-RPT-C040-CR-v1a
heuristics/cert_lab BSI []
heuristics/extracted_sars ATE_FUN.1, ADV_RCR.1, ASE_INT.1, ADV_LLD.1, ADV_IMP.2, ASE_ENV.1, ATE_IND.2, ATE_DPT.1, AGD_USR.1, ASE_REQ.1, ASE_SRE.1, ALC_LCD.1, ALC_DVS.2, AVA_VLA.4, ADV_HLD.2, ATE_COV.2, AVA_MSU.3, ASE_PPC.1, ASE_DES.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, AVA_SOF.1, ASE_OBJ.1, ASE_TSS.1, ADV_SPM.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ALC_FLR.2, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 01 7.2
heuristics/scheme_data
  • cert_no: 2013-004-C040
  • certification_date: 15.07.2013
  • developer: Juniper Networks, Inc.
  • enhanced:
    • assurance_level: EAL3+ALC_FLR.2
    • category: Access Control Devices and System
    • cert_id: C040
    • certification_date: 15.07.2013
    • developer: Juniper Networks, Inc1194 North Matilda Avenue,Sunnyvale, California 94089-1206UNITED STATES URL:http://www.juniper.netEmail: [email protected]: 978 589 8822
    • expiration_date: 15.07.2018
    • mutual_recognition: CCRA
    • product: Juniper Networks Junos Pulse Secure Access Service 7.2 R4
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/ISCB-5-RPT-C040-CR-v1a.pdf
    • scope: The Target of Evaluation (TOE) is Juniper Networks Junos Pulse Secure Access Service 7.2 R4 (hereafter referred as Secure Access) is the appliance and software client running on a remote IT system. The TOE provides secure remote access to internal network resources. The TOE acts as a secure application-layer gateway that intermediates all request between remote computers and internal corporate resources. All requests from remote computers to a Secure Access appliance and from a Secure Access appliance to remote computers are encrypted using SSL/HTTPS 168-bit encryption. All unencrypted requests (e.g. HTTP) are redirected to HTTPS, which ensures the connection is encrypted. Each request is subject to administratively defined access control and authorisation policies, such as dual-factor or client-side digital certificate authentication, before the request is forwarded to an internal resource. Users gain authenticated access to authorised resources via an extranet session hosted by the appliance. From any Internet-connected Web browser, users can access Web-based enterprise applications, Java applications, file shares and terminal hosts. Secure Access generates audit records for security events. The administrator and read-only administrator are the only roles with access to the audit trail and have the ability to view the audit trail. In the context of the evaluation, the TOE provides the following major security features: Generates audit records for security events. Cryptographic support for secure communications between users and the TOE and between TOE components. Provides information flow security policy that limits traffic to URLs and resource types, such as file servers, to specific user roles. Identification and authentication before any information flows are permitted and user must be authenticated before performing any administrative functions. Security management functions for administrator to configure the TOE, manage users, information flow policy and auditing activities. Protection of the TOE security function (TSF) by enforcing session timeouts.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C040/JNPR%20SA%207.2R4%20EAL3%20ST%20v1.4.pdf
    • type: Set of appliance and software client running on a remote IT system that provides secure remote access to internal network resources.
  • expiration_date: 15.07.2018
  • level: EAL3+ALC_FLR.2
  • product: Juniper Networks Junos Pulse Secure Access Service 7.2 R4
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/123
pdf_data/report_filename 0168a.pdf ISCB-5-RPT-C040-CR-v1a.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0168-2002
    • cert_item: Hitachi AE45C (HD65145C) Smartcard Integrated Circuit Version 01
    • cert_lab: BSI
    • developer: Hitachi Ltd
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0168: 1
    • BSI-DSZ-CC-0168-2002: 22
  • MY:
    • ISCB-5-RPT-C040-CR-v1a: 28
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 14
    • EAL4 augmented: 3
    • EAL4+: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL3: 6
    • EAL3 augmented: 1
    • EAL3+: 6
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 2
    • ACM_CAP: 2
    • ACM_CAP.4: 2
    • ACM_SCP: 2
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 2
    • ADO_IGS: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.2: 3
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 4
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 2
    • ALC_TAT: 2
    • ALC_TAT.1: 2
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 3
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 4
  • ALC:
    • ALC_FLR.2: 12
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_COP.1: 1
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC.1: 1
    • FDP_ITT.1: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
    • FPT_SEP.1: 1
  • FRU:
    • FRU_FLT.2: 1
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAR.1: 1
    • FAU_STG.1: 1
    • FAU_STG.3: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
    • FDP_RIP.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_SOS.1: 1
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_SAE.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_ITT.1: 1
    • FPT_STM.1: 1
  • FTA:
    • FTA_SSL.3: 1
  • FTP:
    • FTP_TRP.1: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • Philips:
    • Philips: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • Triple-DES: 1
    • DES:
      • DES: 11
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 3
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Physical Probing: 1
    • physical probing: 1
  • other:
    • Reverse engineering: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 32: 1
  • FIPS:
    • FIPS PUB 140-1: 1
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC15408: 1999: 2
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1.0, 03 May 2002, for the Product Hitachi Single-Chip Microcontroller AE45C (HD65145C) Version 01, (confidential document) [9] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
    • AE-4 Series, Guidelines for using the AE45C Rev. 1.11, 30 April 2002, Hitachi, Ltd., (confidential document) [12] Hitachi Single-Chip Microcomputer, AE-4 Series, AE-4 Series AE45C (HD65145C), Current Control: 1
    • AE45C]), V1.42, 29 March 2002, (confidential document) [14] Federal Information Processing Standards Publication, Security Requirements for Cryptographic: 1
    • Rev. 1.2, 24 January 2002, Hitachi, Ltd., (confidential document) [13] Hitachi, Semiconductor Technical Report, Option List for Smart Card Microcomputer (for: 1
    • Security Target, Semiconductor & Integrated Circuits Hitachi, Ltd., Version 1-3, 29 March 2002, (confidential document) [7] AE45C (HD65145C) Version 01, Smartcard Security Target, (Public version), Semiconductor &: 1
pdf_data/report_metadata
  • /Author: BSI
  • /CreationDate: D:20020508105002
  • /Creator: Microsoft Word - 0168a.doc
  • /ModDate: D:20020508150116+02'00'
  • /Producer: Acrobat PDFWriter 4.0 für Windows NT
  • /Title: 0168a.PDF
  • pdf_file_size_bytes: 176459
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
  • /Author: ISCB Department
  • /Category: PUBLIC
  • /Caveat: FINAL
  • /Classification: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20130806135033+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Developer: Juniper Networks
  • /Document Type: REPORT
  • /Identifier: ISCB-5-RPT-C040-CR-v1a
  • /Index: MyCB_TMP_011
  • /Keywords: Secure Access
  • /ModDate: D:20130806135039+08'00'
  • /Phase: External
  • /Producer: Adobe PDF Library 10.0
  • /Project Code: C040
  • /Released: 15 July 2013
  • /ST Title: Security Target: Juniper Networks Junos Pulse Secure Access Service 7.2 R4
  • /ST Version: v1.4
  • /SourceModified: D:20130806055016
  • /Sponsor: Juniper Networks
  • /Subject: Juniper Networks Junos Pulse Secure Access Service 7.2 R4
  • /TOE Name: Juniper Networks Junos Pulse Secure Access Service
  • /TOE Version: 7.2 R4
  • /Title: C040 Certification Report
  • /Version: v1a
  • pdf_file_size_bytes: 317229
  • pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 29
pdf_data/st_filename 0168b.pdf JNPR SA 7.2R4 EAL3 ST v1.4.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 6
    • EAL4 augmented: 2
  • EAL:
    • EAL3: 6
pdf_data/st_keywords/cc_sar
  • ADO:
    • ADO_DEL: 1
    • ADO_IGS: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 2
    • ADV_LLD: 1
    • ADV_RCR: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 2
  • AGD:
    • AGD_AGM: 1
    • AGD_USR: 2
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.3: 2
    • AVA_SOF: 1
    • AVA_VLA: 1
    • AVA_VLA.4: 2
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.3: 2
    • ADV_TDS.2: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.3: 2
    • ALC_CMS.3: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.2: 5
    • ALC_LCD.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAS.1: 9
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 7
    • FCS_CKM.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 14
    • FCS_COP.1.1: 2
    • FCS_RND: 1
    • FCS_RND.1: 8
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 5
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 1
    • FDP_ITC.1: 7
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 9
    • FDP_ITT.1.1: 1
    • FDP_SDI.1: 1
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 9
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 9
    • FMT_LIM.2.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.2: 8
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 27
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_SEP.1: 8
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FRU:
    • FRU_FLT.1: 1
    • FRU_FLT.2: 13
    • FRU_FLT.2.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG: 2
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 6
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_IFC: 1
    • FDP_IFC.1: 5
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP: 1
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 1
    • FMT_MSA: 3
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 8
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 3
    • FMT_SAE: 1
    • FMT_SAE.1: 5
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 5
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT: 1
    • FPT_ITT.1: 5
    • FPT_ITT.1.1: 1
    • FPT_STM: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL: 1
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_TRP: 1
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 3
  • T:
    • T.RND: 3
  • A:
    • A.GENPUR: 2
    • A.NOEVIL: 2
    • A.PHYSEC: 3
    • A.PUBLIC: 1
    • A.SINGEN: 2
  • O:
    • O.ACCOUN: 7
    • O.AUDREC: 9
    • O.ENCRYP: 12
    • O.ENCRYPT: 1
    • O.IDAUTH: 11
    • O.MEDIAT: 17
    • O.SECFUN: 20
    • O.SECKEY: 9
    • O.SECSTA: 15
    • O.SELPRO: 9
    • O.SINUSE: 7
    • O.TOECOM: 6
  • OE:
    • OE.ADMTRA: 4
    • OE.GENPUR: 3
    • OE.GUIDAN: 4
    • OE.PHYSEC: 3
    • OE.PUBLIC: 3
    • OE.SINGEN: 3
  • T:
    • T.AUDACC: 5
    • T.AUDFUL: 4
    • T.MEDIAT: 4
    • T.NOAUTH: 3
    • T.OLDINF: 4
    • T.PROCOM: 4
    • T.REPLAY: 4
    • T.SELPRO: 4
    • T.TOECOM: 5
    • T.TUSAGE: 5
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 41
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 5
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 6
    • RNG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 4
  • CBC:
    • CBC: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 15
    • malfunction: 5
    • physical tampering: 1
  • SCA:
    • DPA: 7
    • Leak-Inherent: 14
    • Physical Probing: 2
    • Physical probing: 1
    • physical probing: 4
  • other:
    • reverse engineering: 2
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 31: 1
  • FIPS:
    • FIPS PUB 140-1: 1
    • FIPS PUB 46-3: 3
    • FIPS140-1: 2
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-2: 1
    • FIPS 197: 2
    • FIPS 46-3: 2
  • PKCS:
    • PKCS7: 1
  • RFC:
    • RFC 1321: 1
    • RFC 2246: 1
pdf_data/st_metadata
  • /CreationDate: D:20020502113112+01'00'
  • /ModDate: D:20020502113112+01'00'
  • /Producer: Acrobat Distiller 5.0 (Windows)
  • pdf_file_size_bytes: 336673
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 63
  • /Author: Apex Assurance Group
  • /CreationDate: D:20130515170648-07'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130515170648-07'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Secure Access Family Version 7.2R4
  • /Title: Security Target
  • pdf_file_size_bytes: 1078324
  • pdf_hyperlinks: http://www.apexassurance.com/, http://www.juniper.net/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different