| name |
SecurePay Platform V4.9.1 |
Cisco Catalyst 9200L and 9400 Series Switches running IOS-XE 16.9 |
| category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
| scheme |
MY |
US |
| status |
active |
archived |
| not_valid_after |
16.06.2026 |
24.07.2021 |
| not_valid_before |
16.06.2021 |
24.07.2019 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C119-CERTIFICATE-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10971-ci.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C119-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10971-vr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecurePay%20Security%20Target%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10971-st.pdf |
| manufacturer |
SecurePay Sdn. Bhd. |
Cisco Systems, Inc. |
| manufacturer_web |
https://www.securepay.my/ |
https://www.cisco.com |
| security_level |
EAL2 |
{} |
| dgst |
b61f25e372177a5d |
28c4591978eba3a0 |
| heuristics/cert_id |
ISCB-5-RPT-C119-CR-v1 |
CCEVS-VR-VID-10972-2019 |
| heuristics/cert_lab |
[] |
US |
| heuristics/cpe_matches |
{} |
cpe:2.3:o:cisco:ios_xe:16.9:*:*:*:*:*:*:* |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
CVE-2019-12667, CVE-2023-20056, CVE-2025-20154, CVE-2021-1382, CVE-2021-1625, CVE-2023-20097, CVE-2024-20271, CVE-2023-20076, CVE-2019-12666, CVE-2023-44487, CVE-2021-1616, CVE-2020-3444, CVE-2021-34729, CVE-2020-3516, CVE-2019-12660, CVE-2022-20920 |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
| heuristics/extracted_versions |
4.9.1 |
16.9 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_no: 2021-003-C119
- certification_date: 16.06.2021
- developer: SecurePay Sdn. Bhd.
- enhanced:
- assurance_level: EAL2
- category: Other Devices and Systems
- cert_id: C119
- certification_date: 16.06.2021
- developer: A-3A-13, Blok A, Radia Office,Persiaran Arked, Bukit Jelutong,40150 Shah Alam, Selangor Amir Amir Haris Ahmad ([email protected]) https://www.securepay.my/
- expiration_date: 16.06.2026
- mutual_recognition: CCRA
- product: SecurePay Platform V4.9.1
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C119/ISCB-5-RPT-C119-CR-v1.pdf
- scope: The TOE is a software platform as a service whilst installed, configured and deployed on an enterprise cloud environment. The TOE is used by corporate, S_M_E_'s_ _or merchants as a secure payment processing platform for their customers. Users also able to perform e-commerce transaction, sending bills, bulk payments, collections and statutory payments. The TOE is connected to various banks which facilitate same day processing, ensure data integrity, reduces processing discrepancies and faster response time. It is simple, robust, user friendly, scalable, secured and available 24x7.Below are the primary features of the TOE: E-Commerce - Users able to use the TOE as an e-commerce portal and conduct business over the internet. Collection - Users able to create bill form and payment form for their customers Payment Processing - The TOE provides a secure payment processing platform and it is connected to various major banks in Malaysia API integration - Third-party developers able to use and access the TOE via API integrations
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C119/SecurePay_Security_Target_v1.0.pdf
- type: Other Devices and Systems
- expiration_date: 16.06.2026
- level: EAL2
- product: SecurePay Platform V4.9.1
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/131
|
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10972/
- categories: ['Network Device', ' Network Switch']
- category: Network Device
- certification_date: 24.07.2019
- evaluation_facility: Acumen Security
- expiration_date: 24.07.2021
- id: CCEVS-VR-VID10972
- product: Cisco Catalyst 9200L and 9400 Series Switches running IOS-XE 16.9
- scheme: US
- url: https://www.niap-ccevs.org/products/10972
- vendor: Cisco Systems, Inc.
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
48ac4778e4272298 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf |
| pdf_data/cert_filename |
ISCB-5-CERT-C119-CERTIFICATE-v1.pdf |
st_vid10971-ci.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10972-2019: 1
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
- Cisco:
- Cisco: 1
- Cisco Systems, Inc: 1
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20210702032620Z00'00'
- /Creator: Word
- /ModDate: D:20210702032620Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 196015
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20190725081758-04'00'
- /ModDate: D:20190725081758-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 180892
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
ISCB-5-RPT-C119-CR-v1.pdf |
st_vid10971-vr.pdf |
| pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10972-2019
- cert_item: for the Cisco Catalyst 9200L and 9400 Series Switches running IOS-XE 16.9, Version 1.0
- cert_lab: US NIAP
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C119-CR-v1: 31
|
- US:
- CCEVS-VR-VID10972-2019: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 2
- FAU_SAR.1: 3
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FIA:
- FIA_ATD.1: 2
- FIA_SOS.1: 2
- FIA_UAU.1: 2
- FIA_UAU.2: 2
- FIA_UAU.6: 2
- FMT:
- FMT_MSA.1: 2
- FMT_MSA.3: 1
- FMT_MTD.1: 2
- FMT_SMF.1: 2
- FMT_SMR.1: 2
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.CLOUD: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.TIMESTAMP: 1
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPR: 1
- T.SECURITY_FUNCTIONALITY_FAILUR: 1
- T.UNAUTHORIZED_ADMINISTRATOR_: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_C: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOI: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
| pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 20
- Cisco Systems, Inc: 2
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20210624100326Z00'00'
- /Creator: Word
- /ModDate: D:20210624100326Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H524) Quartz PDFContext
- pdf_file_size_bytes: 952717
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
- /CreationDate: D:20190725075639-04'00'
- /ModDate: D:20190725075639-04'00'
- pdf_file_size_bytes: 807395
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
| pdf_data/st_filename |
SecurePay Security Target v1.0.pdf |
st_vid10971-st.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 4
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT.1: 2
- ASE_OBJ.1: 2
- ASE_REQ.1: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FIA:
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTP:
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 2
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 20
- FCS_COP.1: 4
- FCS_COP.1.1: 3
- FCS_DTLS: 1
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 2
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHC_EXT.1.5: 1
- FCS_SSHC_EXT.1.8: 2
- FCS_SSHC_EXT.1.9: 1
- FCS_SSHS_EXT.1: 5
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 2
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 3
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.1.1: 3
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.2: 1
- FCS_TLSC_EXT.2.1: 3
- FCS_TLSC_EXT.2.2: 1
- FCS_TLSS_EXT.1: 1
- FCS_TLSS_EXT.1.1: 1
- FCS_TLSS_EXT.2: 1
- FCS_TLSS_EXT.2.1: 1
- FCS_TLSS_EXT.2.4: 2
- FCS_TLSS_EXT.2.5: 2
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 5
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 5
- FMT_MTD: 9
- FMT_MTD.1: 1
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 1
- FPT_APW_EXT.1: 3
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_ITT.1: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM: 1
- FPT_STM_EXT.1: 4
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.4: 3
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 7
- FTP:
- FTP_ITC.1: 9
- FTP_ITC.1.2: 1
- FTP_TRP: 3
- FTP_TRP.1: 5
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.CLOUD: 3
- A.NOEVIL: 3
- A.NOTRST: 2
- A.TIMESTAMP: 3
- O:
- O.ACC_CONTROL: 1
- O.ACC_CTRL: 4
- O.AUDREC: 3
- O.AUTH: 4
- O.MANAGE: 4
- O.PASSWORD: 3
- O.TOECOM: 4
- OE:
- OE.ADMIN: 2
- OE.AUTHDATA: 4
- OE.CLOUD: 2
- OE.TIMESTAMP: 3
- T:
- T.AUDREC: 3
- T.NOMGMT: 2
- T.PSWD_CRACKING: 2
- T.UNAUTH: 3
- T.WEB_ATTACK: 3
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 2
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_CO: 1
- T.SECURITY_FUNCTIONALITY_FAI: 1
- T.UNAUTHORIZED_ADMINISTRATO: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDP: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
| pdf_data/st_keywords/vendor |
- Microsoft:
- STMicroelectronics:
|
- Cisco:
- Cisco: 46
- Cisco Systems, Inc: 4
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 17
- AES-: 1
- AES128: 2
- AES256: 2
- constructions:
- MAC:
- HMAC: 7
- HMAC-SHA-256: 5
- HMAC-SHA-512: 4
|
| pdf_data/st_keywords/asymmetric_crypto |
|
- FF:
- DH:
- DH: 13
- Diffie-Hellman: 10
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 5
- SHA-512: 6
- SHA512: 2
|
| pdf_data/st_keywords/crypto_scheme |
|
- KEX:
- Key Exchange: 2
- Key exchange: 1
- MAC:
|
| pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 31
- IKEv1: 11
- IKEv2: 10
- IPsec:
- SSH:
- TLS:
- DTLS:
- TLS:
- TLS: 6
- TLS1.1: 1
- TLS1.2: 1
- VPN:
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 2
- FIPS 186-4: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 2
- FIPS PUB 186-3: 2
- FIPS PUB 186-4: 5
- ISO:
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- NIST:
- PKCS:
- RFC:
- RFC 2986: 1
- RFC 3526: 4
- RFC 3602: 2
- RFC 4109: 1
- RFC 4253: 1
- RFC 4301: 1
- RFC 4303: 1
- RFC 4868: 2
- RFC 4945: 1
- RFC 5280: 4
- RFC 5759: 1
- RFC 6187: 1
- RFC 6960: 1
- RFC3526: 1
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
- /Author: Cisco GCT CC TME
- /CreationDate: D:20190615072857-04'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20190615072857-04'00'
- /Producer: Microsoft® Word for Office 365
- /Title: ST
- pdf_file_size_bytes: 950761
- pdf_hyperlinks: http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol
- pdf_is_encrypted: False
- pdf_number_of_pages: 67
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |