| name |
Juniper EX4600 and QFX5100 with JUNOS 14.1X53d30 |
STARCOS 3.5 ID EAC+AA C1 |
| category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
US |
DE |
| status |
archived |
archived |
| not_valid_after |
28.02.2018 |
01.09.2019 |
| not_valid_before |
28.12.2015 |
05.07.2013 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10681-ci.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10681-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0760a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10681-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0760b_pdf.pdf |
| manufacturer |
HPE Juniper Networking |
G+D Mobile Security GmbH |
| manufacturer_web |
https://www.juniper.net/ |
https://www.gi-de.com/de/de/mobile-security/ |
| security_level |
{} |
EAL4+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
af3038487cee6710 |
e53e4ba4e8394b4b |
| heuristics/cert_id |
CCEVS-VR-VID-10681-2015 |
BSI-DSZ-CC-0760-2013 |
| heuristics/cert_lab |
US |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_OBJ.2, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ASE_REQ.2, ADV_FSP.1 |
ADV_TDS.3, ALC_FLR.3, ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, AVA_VAN.5, ASE_INT.1, APE_ECD.1, ASE_REQ.2, ATE_FUN.2, AGD_PRE.1, ATE_DPT.1, ATE_IND.3, ASE_ECD.1, APE_OBJ.2, ALC_TAT.3, ADV_IMP.1, ADV_FSP.4, ALC_DVS.2, ASE_SPD.1, APE_INT.1, ATE_COV.3, ADV_INT.3, ALC_LCD.2, ASE_TSS.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ALC_DEL.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2 |
| heuristics/extracted_versions |
14.1 |
3.5 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0761-2013 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0813-2012 |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0760-2013, BSI-DSZ-CC-0761-2013 |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10681/
- categories: ['Network Device']
- category: Network Device
- certification_date: 28.12.2015
- evaluation_facility: UL Verification Services
- expiration_date: 28.12.2017
- id: CCEVS-VR-VID10681
- product: Juniper EX4600 and QFX5100 with JUNOS 14.1X53d30
- scheme: US
- url: https://www.niap-ccevs.org/products/10681
- vendor: HPE Juniper Networking
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0813-2012 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0813-2012 |
| heuristics/protection_profiles |
ac9abe3d5c5a31f0 |
78bcc246f0f43034 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056b.pdf |
| pdf_data/cert_filename |
st_vid10681-ci.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10681-2015: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20151231084801-05'00'
- /ModDate: D:20151231084817-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 179001
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
st_vid10681-vr.pdf |
0760a_pdf.pdf |
| pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID10681-2015
- cert_item: Juniper Networks, Inc. Juniper Networks EX4600 and QFX5100 Switches Running Junos OS 14.1X53-D30
- cert_lab: US NIAP
|
- DE:
- cert_id: BSI-DSZ-CC-0760-2013
- cert_item: STARCOS 3.5 ID EAC+AA C1
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10681-2015: 1
|
- DE:
- BSI-DSZ-CC-0760-2013: 24
- BSI-DSZ-CC-0761-2013: 2
- BSI-DSZ-CC-0813-2012: 5
- BSI-DSZ-CC-S-0007-2011: 2
- BSI-DSZ-CC-S-0008-2011: 2
- BSI-DSZ-CC-S-0009-2012: 2
- BSI-DSZ-CC-S-0010-2012: 2
- BSI-DSZ-CC-S-0012-2012: 2
- BSI-DSZ-CC-S-0015-2012: 2
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 7
- EAL 4 augmented: 3
- EAL 5: 3
- EAL 5+: 1
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 7
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
|
| pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 2
- Giesecke & Devrient: 23
- Infineon:
- Infineon: 4
- Infineon Technologies: 4
- Infineon Technologies AG: 1
|
| pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
- CVE:
- CVE-2004-0468: 1
- CVE-2006-3529: 1
- CVE-2007-6372: 1
- CVE-2013-4684: 1
- CVE-2013-4686: 1
- CVE-2013-4687: 1
- CVE-2013-4688: 1
- CVE-2013-6170: 1
- CVE-2014-0612: 1
- CVE-2014-0613: 1
- CVE-2014-0614: 1
- CVE-2014-0616: 1
- CVE-2014-0618: 1
- CVE-2014-2713: 1
- CVE-2014-2714: 1
- CVE-2014-3815: 1
- CVE-2014-3817: 1
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- physical tampering: 1
- SCA:
- other:
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 24: 1
- BSI 25: 1
- BSI 7125: 2
- BSI 7148: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- BSI:
- AIS 20: 1
- AIS 25: 3
- AIS 26: 3
- AIS 31: 1
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 5
- AIS36: 1
- FIPS:
- FIPS 180-2: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 9797-1: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration: 1
- Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration. 8 4.5 Security Management The TOE provides an: 1
- out of scope: 1
|
- ConfidentialDocument:
- Report, Version 1.5, 27.06.2013, STARCOS 3.5 ID EAC+AA C1, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration list for the TOE, Version 0.5, 01.08.2012, STARCOS 3.5 ID EAC+AA C1: 1
- Version 2.9, 27.07.2012, STARCOS 3.5 ID EAC+AA C1 Security Target, Giesecke & Devrient GmbH (confidential document) [7] Machine Readable Travel Document with "ICAO Application" Extended Access Control, Version 1.10: 1
|
| pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20130712102207+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, MRTD, EAC, BAC, Reisepass, Extended Access Control, G&D. Giesecke & Devrient"
- /ModDate: D:20130712102611+02'00'
- /Producer: LibreOffice 3.6
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0760-2013
- pdf_file_size_bytes: 1053666
- pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
| pdf_data/st_filename |
st_vid10681-st.pdf |
0760b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-CC-PP-0056-2009: 1
- BSI-PP-0002-2001: 1
- BSI-PP-0035-2007: 1
- BSI-PP-0056: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 5: 2
- EAL4: 8
- EAL4 augmented: 2
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- APE:
- ATE:
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 7
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 5
- FAU_GEN.1: 7
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 1
- FAU_STG_EXT.1: 11
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 19
- FCS_CKM.1.1: 2
- FCS_CKM.2: 1
- FCS_CKM.4: 7
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 20
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 46
- FCS_COP.1.1: 4
- FCS_RBG_EXT.1: 15
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSH_EXT.1: 14
- FCS_SSH_EXT.1.1: 2
- FCS_SSH_EXT.1.2: 2
- FCS_SSH_EXT.1.3: 2
- FCS_SSH_EXT.1.4: 2
- FCS_SSH_EXT.1.5: 2
- FCS_SSH_EXT.1.6: 2
- FCS_SSH_EXT.1.7: 2
- FCS_TLS_EXT.1: 2
- FDP:
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT.1: 11
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 3
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 11
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 17
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 5
- FMT:
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 2
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 9
- FPT_APW_EXT.1.1: 4
- FPT_APW_EXT.1.2: 2
- FPT_SKP_EXT.1: 11
- FPT_SKP_EXT.1.1: 2
- FPT_SSP.1: 1
- FPT_SSP.2: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TRP.1: 1
- FPT_TST.1: 1
- FPT_TST_EXT.1: 11
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_EXT_SSL.1: 1
- FTA_SSL: 1
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 9
- FTA_SSL_EXT.1.1: 3
- FTA_SSL_EXT.4: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 16
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 33
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 25
- FCS_CKM.4.1: 1
- FCS_CMK: 1
- FCS_COP: 61
- FCS_COP.1: 9
- FCS_RND: 5
- FCS_RND.1: 14
- FCS_RND.1.1: 2
- FCS_RNG.1: 2
- FDP:
- FDP_ACC.1: 17
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 5
- FDP_ITC: 1
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_ITT.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 7
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 13
- FIA_API.1: 11
- FIA_API.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 10
- FIA_UAU.4.1: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 26
- FMT_LIM.1.1: 3
- FMT_LIM.2: 21
- FMT_LIM.2.1: 4
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 42
- FMT_MTD.1: 25
- FMT_MTD.3: 8
- FMT_MTD.3.1: 1
- FMT_SMF.1: 38
- FMT_SMF.1.1: 1
- FMT_SMR.1: 38
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 14
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 14
- FPT_PHP.3.1: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TST: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FPT_TST.2: 2
- FRU:
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.DISPLAY_BANNER: 1
- O.PROTECTED_COMMUNICATIONS: 1
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- OE:
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
- O:
- OE:
- OE.BAC-PP: 1
- OE.BAC_PP: 4
- T:
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 5
- SHA-256: 5
- SHA-512: 2
- SHA256: 2
|
- JH:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 8
- SHA-256: 5
- SHA-384: 4
- SHA-512: 2
|
| pdf_data/st_keywords/crypto_scheme |
- KEX:
- Key Exchange: 2
- Key exchange: 1
- MAC:
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 6
- P-384: 4
- P-521: 4
|
- NIST:
- P-256: 4
- P-384: 4
- P-521: 6
- secp256r1: 2
- secp384r1: 2
- secp521r1: 2
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 12
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 5
- SCA:
- DPA: 2
- Leak-Inherent: 6
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 10
- EF.DG1: 21
- EF.DG13: 1
- EF.DG14: 8
- EF.DG15: 3
- EF.DG16: 21
- EF.DG2: 9
- EF.DG3: 24
- EF.DG4: 23
- EF.DG5: 7
- EF.SOD: 10
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS PUB 186-3: 3
- FIPS PUB 197: 1
- FIPS140: 1
- FIPS197: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- RFC:
- RFC 4251: 2
- RFC 4252: 1
- RFC 4253: 3
- RFC 4254: 1
- RFC 4741: 1
- RFC 6668: 1
- RFC4251: 1
- RFC4252: 1
- RFC4253: 3
- RFC4254: 1
- RFC5656: 3
- RFC6668: 2
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS20: 2
- AIS31: 1
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS 180-2: 2
- FIPS PUB 180-2: 1
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 14888-3: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 9796-2: 2
- ISO/IEC14888-3: 1
- PKCS:
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
- i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled: 1
- including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
- out of scope: 2
- the HTTP traffic arrives (i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled. This service can only: 1
|
|
| pdf_data/st_metadata |
- /Author: Denise Cater
- /CreationDate: D:20151210100023Z
- /Creator: Microsoft® Word 2010
- /ModDate: D:20151228094136-05'00'
- /Producer: Microsoft® Word 2010
- /Subject: Junos OS 13.3R1.8, Junos OS 13.2X50-D19 and Junos OS 13.2X51-D20
- /Title: Security Target
- pdf_file_size_bytes: 1293501
- pdf_hyperlinks: http://www.juniper.net/
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
- /Author: ksz
- /Classification: Public
- /Comments:
- /Company:
- /CreationDate: D:20120726152004+02'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Date: 26.07.2012
- /Keywords: Version 2.9 Status 26.07.2012
- /ModDate: D:20120726152010+02'00'
- /Producer: Acrobat Distiller 9.3.3 (Windows)
- /State: Final
- /Styles: supported
- /Subject: STARCOS 3.5 ID EAC+AA C1
- /TOE_HW: Infineon M7820
- /TOE_Name: STARCOS 3.5 ID EAC+AA C1
- /TemplAuthor: Joern Treger
- /TemplVersion: 1.0
- /Title: Security Target Lite
- /Version: 2.9
- pdf_file_size_bytes: 416941
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 91
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |