Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
PKID ECC Generator v1.1
ISCB-5-RPT-C049-CR-v1a
Secure Smart Grid Hub (SGH-S), V1.02
BSI-DSZ-CC-1000-V2-2025
name PKID ECC Generator v1.1 Secure Smart Grid Hub (SGH-S), V1.02
category Key Management Systems Other Devices and Systems
scheme MY DE
status archived active
not_valid_after 20.11.2018 02.02.2033
not_valid_before 20.11.2013 03.02.2025
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1000V2c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C049-CR-v1a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1000V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/PKIDECC-ST-v1.0-071013.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1000V2b_pdf.pdf
manufacturer WannaStation.com (M) Sdn Bhd EFR GmbH
manufacturer_web https://www.wannastation.com/ https://www.efr.de
security_level EAL2 EAL4+, AVA_VAN.5, ALC_FLR.2
dgst ab7d3eefa9027743 086e8d4dead89abf
heuristics/cert_id ISCB-5-RPT-C049-CR-v1a BSI-DSZ-CC-1000-V2-2025
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ALC_LCD.1, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_FLR.2, ASE_SPD.1, AVA_VAN.5, AGD_OPE.1, ATE_COV.2, ASE_ECD.1, ALC_CMC.4, ALC_DEL.1, ADV_ARC.1, ADV_IMP.1
heuristics/extracted_versions 1.1 1.02
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1000-2023
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1000-2023
heuristics/scheme_data
  • cert_no: 2013-009-C049
  • certification_date: 20.11.2013
  • developer: WannaStation.com (M) Sdn Bhd
  • enhanced:
    • assurance_level: EAL2
    • category: Key Management System
    • cert_id: C049
    • certification_date: 20.11.2013
    • developer: Gan Chin Sam WannaStation.com (M) Sdn BhdLot 1109-A, 10th Floor Kelana Parkview Tower,No 1, Jalan SS6/2, Kelana Jaya,47301 Petaling Jaya, Selangor Darul EhsanMALAYSIA URL: http://www.wannastation.com/Email: [email protected]: +603 7885 0977Fax: +603 7885 0979
    • expiration_date: 20.11.2018
    • mutual_recognition: CCRA
    • product: PKID ECC Generator v1.1
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C049/ISCB-5-RPT-C049-CR-v1a.pdf
    • scope: The Target of Evaluation (TOE) is PKID ECC Generator v1.1, software that generates public and private keys based on a user definable and recognisable ID of ASCII characters or known as PKID. A user may choose a PKID unique to himself or herself, such as PC/Notebook MAC address, IMEI number and email address. A chosen PKID will become the seed to generate a public and private key through a series of key generation processes. The generated public and private keys are tied to the chosen PKID. Using algorithm based on elliptic curve encryption algorithm, much smaller key size will be used and desirable as it allows the application on PC, smart phones or mobile communication devices for multi-function security applications. The evaluation scope only covers: the generation of the Master Key based on random keystroke input from client organisation. The Master Key will be used to generate the customised PKID ECC Generator specific to that client organisation, and the generation of public and private keys together with the access code, based on the user’s PKID entered manually to the generated customised PKID ECC Generator.Hardware, software like automation Detection Software and operating system, and revocation, destruction and recovery of keys are not covered in the TOE scope. The scope of evaluation covers major security features as follows: Authentication – in order to generate the customised PKID ECC Generator which is specific to the client organisation, authentication is required by the TOE administrator before the Master Key can be imported into the generator. Authentication is also required by the TOE administrator to access the customised PKID ECC Generator before any further action is permitted. Security Management – provides management of TOE security functions during customisation of the PKID ECC generator such as setting the access code for the generated Master Key, management of public and private keys, and management of administrator credential in the customised PKID ECC generator. Cryptographic Support – provides generation of Master Key during customisation of the PKID ECC Generator based on the random keystroke input from client organisation, and generation of public and private keys together with access code, in customised PKID ECC Generator using specified encryption algorithm.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C049/PKIDECC-ST-v1.0-071013.pdf
    • type: Software that generates public and private keys based on a user definable and recognisable ID of ASCII characters or known as PKID.
  • expiration_date: 20.11.2018
  • level: EAL2
  • product: PKID ECC Generator v1.1
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/96
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1003-2018
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1003-2018, ANSSI-CC-2017/54, BSI-DSZ-CC-0891-V2-2016
heuristics/protection_profiles {} 989546572bfeab5c
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0073V2b_pdf.pdf
pdf_data/cert_filename 1000V2c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1000-V2-2025: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0073-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Federal Office for Information Security
  • /Keywords: "Common Criteria, Certification, Zertifizierung, SMGW, Smart Meter Gateway, efr, BSI-DSZ-CC-1000-V2-2025"
  • /Subject: Common Criteria, Certification, Zertifizierung, SMGW, Smart Meter Gateway, efr, BSI-DSZ-CC-1000-V2-2025
  • /Title: Certificate BSI-DSZ-CC-1000-V2-2025
  • pdf_file_size_bytes: 335426
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename ISCB-5-RPT-C049-CR-v1a.pdf 1000V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 extended EAL 4 augmented by AVA_VAN.5 and ALC_FLR.2 valid until: 2 February 2033
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1000-V2-2025
    • cert_item: Secure Smart Grid Hub (SGH-S) Version 1.02
    • cert_lab: BSI
    • developer: EFR GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C049-CR-v1a: 29
  • DE:
    • BSI-DSZ-CC-1000-2023: 3
    • BSI-DSZ-CC-1000-V2-2025: 14
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0073: 1
    • BSI-CC-PP-0073-2014: 5
    • BSI-CC-PP-0077-V2-2015: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 11
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMS: 1
    • ALC_FLR: 3
    • ALC_FLR.2: 4
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 2
  • FMT:
    • FMT_SMR.1: 1
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
      • AES-: 1
  • constructions:
    • MAC:
      • CMAC: 1
      • HMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 83
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 1
      • SHA256: 5
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 8
  • KA:
    • Key Agreement: 2
    • Key agreement: 1
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 7
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • TRNG:
    • TRNG: 3
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 3
pdf_data/report_keywords/side_channel_analysis
  • other:
    • Reverse engineering: 1
  • FI:
    • malfunction: 1
    • physical tampering: 1
  • SCA:
    • side channel: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102-1: 1
    • BSI TR-03109-3: 1
    • BSI TR-03111: 1
    • BSI TR-03116: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • BSI:
    • AIS 1: 1
    • AIS 32: 1
    • AIS 34: 2
    • AIS 38: 1
    • AIS 46: 2
    • AIS 48: 2
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 197: 3
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18033-: 1
    • ISO/IEC 18045: 4
  • RFC:
    • RFC 2104: 2
    • RFC 3394: 2
    • RFC 4493: 3
    • RFC 5084: 3
    • RFC 5246: 1
    • RFC 5289: 4
    • RFC 5652: 3
    • RFC-2104: 1
    • RFC-3394: 1
    • RFC4493: 1
    • RFC5246: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 7] Evaluation Technical Report, Version 2.3, 21.01.2025, SRC Security Research & Consulting GmbH, (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
    • ALC_CMS “Konfigurations-Management-Scope Konfigurationsliste”, v1.19_e; 13.01.2025, EFR GmbH (confidential document) [11] Servicetechniker Handbuch für das Smart-Meter-Gateway (SMGW) Secure Smart Grid Hub EFR SGH-S: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • OutOfScope:
    • 2. Multiple Communication Modules for LTE exist, however these are non-TOE components and as such out of scope for this certification. 16 / 26 BSI-DSZ-CC-1000-V2-2025 Certification Report 9. Results of the: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: ISCB Department
  • /Category: PUBLIC
  • /Caveat: FINAL
  • /Classification: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20131127174041+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Developer: Wannastation.com (M) Sdn Bhd
  • /Document Type: CR
  • /Identifier: ISCB-5-RPT-C049-CR-v1a
  • /Index: MyCB_TMP_002
  • /Keywords: PKID ECC Generator
  • /ModDate: D:20131127174047+08'00'
  • /Phase: Release
  • /Producer: Adobe PDF Library 10.0
  • /Project Code: C049
  • /Released: 20 November 2013
  • /ST Date: 7 October 2013
  • /ST Title: PKID ECC Generator v1.1 Security Target
  • /ST Version: v1.0
  • /SourceModified: D:20131127094025
  • /Sponsor: Wannastation.com (M) Sdn Bhd
  • /Subject: PKID ECC Generator v1.1
  • /TOE Name: PKID ECC Generator
  • /TOE Version: v1.1
  • /Title: C049 Certification Report
  • /Version: v1a
  • pdf_file_size_bytes: 507839
  • pdf_hyperlinks: mailto:[email protected], http://www.commoncriteriaportal.org/, http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 29
pdf_data/st_filename PKIDECC-ST-v1.0-071013.pdf 1000V2b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1003-: 1
    • BSI-DSZ-CC-1003-2018: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0073-: 1
    • BSI-CC-PP-0073-2014: 5
    • BSI-CC-PP-0077-: 1
    • BSI-CC-PP-0077-2015: 2
    • BSI-CC-PP-0077-V2-2015: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 4
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 1
    • EAL4: 1
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 5
    • ALC_FLR.2: 5
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_SPD: 3
    • ASE_SPD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 21
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 20
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 16
    • FCS_COP.1: 4
  • FDP:
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
  • FIA:
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 14
    • FIA_UAU.2.1: 2
    • FIA_UID.1: 5
  • FMT:
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 2
  • FAU:
    • FAU_ARP: 9
    • FAU_GEN: 30
    • FAU_GEN.1: 22
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAA: 9
    • FAU_SAA.1: 5
    • FAU_SAR: 21
    • FAU_SAR.1: 9
    • FAU_STG: 23
    • FAU_STG.1: 8
    • FAU_STG.2: 10
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 2
    • FAU_STG.3: 3
    • FAU_STG.4: 3
    • FAU_STG.4.1: 1
  • FCO:
    • FCO_NRO: 3
    • FCO_NRO.1: 1
    • FCO_NRO.2: 8
    • FCO_NRO.2.1: 1
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 1
  • FCS:
    • FCS_CKM: 48
    • FCS_CKM.1: 6
    • FCS_CKM.2: 5
    • FCS_CKM.4: 28
    • FCS_CKM.4.1: 2
    • FCS_COP: 49
    • FCS_COP.1: 10
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 9
    • FDP_ACC.2: 8
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 24
    • FDP_IFC.1: 12
    • FDP_IFC.2: 4
    • FDP_IFF: 20
    • FDP_IFF.1: 22
    • FDP_IFF.1.3: 1
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_RIP: 2
    • FDP_RIP.1: 1
    • FDP_RIP.2: 7
    • FDP_RIP.2.1: 1
    • FDP_SDI: 2
    • FDP_SDI.1: 1
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 2
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 6
    • FIA_UAU.6.1: 1
    • FIA_UID: 3
    • FIA_UID.1: 8
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
    • FIA_USB: 3
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA: 45
    • FMT_MSA.1: 10
    • FMT_MSA.3: 11
    • FMT_SMF: 2
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR: 3
    • FMT_SMR.1: 25
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_CON: 6
    • FPR_CON.1: 9
    • FPR_CON.1.1: 2
    • FPR_CON.1.2: 4
    • FPR_PSE: 2
    • FPR_PSE.1: 7
    • FPR_PSE.1.1: 1
    • FPR_PSE.1.2: 1
    • FPR_PSE.1.3: 1
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_RPL: 3
    • FPT_RPL.1: 6
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM: 3
    • FPT_STM.1: 18
    • FPT_STM.1.1: 1
    • FPT_TST: 3
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 23
    • FTP_ITC.1: 8
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.CLIENT: 3
    • A.DESTRUCT: 2
    • A.INPUT: 3
    • A.PHY: 3
    • A.REVOKE: 2
    • A.SECURE: 3
  • O:
    • O.AUTH: 6
    • O.CUSTOMIZE: 5
    • O.FUNCTION: 4
    • O.UNIQUE: 4
  • OE:
    • OE.ADMIN: 3
    • OE.CLIENT: 3
    • OE.DESTRUCT: 3
    • OE.INPUT: 3
    • OE.PHY: 3
    • OE.REVOKE: 3
    • OE.SECURE: 3
  • OSP:
    • OSP.ROLE: 3
  • T:
    • T.DUPLICATE: 3
    • T.KEYS: 2
  • OE:
    • OE.SM: 3
  • OSP:
    • OSP.SM: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 16
      • AES-: 1
  • constructions:
    • MAC:
      • CMAC: 1
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 59
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • JH:
    • JH: 1
  • SHA:
    • SHA2:
      • SHA-2: 3
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 7
  • KA:
    • Key Agreement: 3
    • Key agreement: 2
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 1
  • TLS:
    • TLS:
      • TLS: 44
      • TLSv1.2: 2
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • GCM:
    • GCM: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 3
    • physical tampering: 3
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03109-1: 2
    • BSI TR-03111: 1
    • BSI TR-03116-3: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 197: 1
  • NIST:
    • NIST SP 800-38D: 1
    • SP 800-38A: 1
  • RFC:
    • RFC 2104: 1
    • RFC 3394: 1
    • RFC 4493: 1
    • RFC 5084: 1
    • RFC 5246: 1
    • RFC 5289: 1
    • RFC 5652: 1
    • RFC-2104: 2
    • RFC-3394: 2
    • RFC-4493: 3
    • RFC-5084: 2
    • RFC-5246: 3
    • RFC-5289: 3
    • RFC-5652: 3
pdf_data/st_metadata
  • /Author: WannaStation (M) Sdn Bhd
  • /CreationDate: D:20131030112613+08'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20131030112613+08'00'
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1048687
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • pdf_file_size_bytes: 1249957
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 94
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different