Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
VMware Workspace ONE Boxer Email Client 5.4
CCEVS-VR-VID-10840
Trend Micro Deep Security 20
561-LSS
name VMware Workspace ONE Boxer Email Client 5.4 Trend Micro Deep Security 20
category Other Devices and Systems Boundary Protection Devices and Systems
scheme US CA
status archived active
not_valid_after 27.06.2021 31.05.2027
not_valid_before 27.06.2019 31.05.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10840-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/561-LSS%20CT%20v1.0.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10840-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/561-LSS%20CR%20v1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10840-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/561-LSS%20ST%20v12.0.pdf
manufacturer VMware Inc. Trend Micro Inc.
manufacturer_web https://www.vmware.com https://www.trendmicro.com
security_level {} EAL2+, ALC_FLR.1
dgst ba98236dc7090775 0c1fb05671e601ac
heuristics/cert_id CCEVS-VR-VID-10840 561-LSS
heuristics/cert_lab US CANADA
heuristics/cpe_matches {} cpe:2.3:a:trendmicro:deep_security_agent:20.0:update224:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update213:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1822:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update6313:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1559:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3288:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update190:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5761:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5512:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2419:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update8137:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update158:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update690:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:-:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update198:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update167:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update7303:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update8268:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update8438:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5995:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2593:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2921:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5810:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5394:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3771:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3445:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1681:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3964:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update208:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update7119:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update183:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2395:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update877:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update173:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3165:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update223:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update182:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update6690:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1876:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update1337:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2740:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4726:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update6860:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2009:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update7476:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update7719:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4185:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update180:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update3530:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4416:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update5137:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update4959:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update2204:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security_agent:20.0:update7943:*:*:long_term_support:*:*:*, cpe:2.3:a:trendmicro:deep_security:20.0:-:*:*:long_term_support:*:*:*
heuristics/related_cves {} CVE-2023-52337, CVE-2021-25252, CVE-2023-52338
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ALC_CMS.2, ALC_FLR.1, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, AGD_PRE.1
heuristics/extracted_versions 5.4 20
heuristics/scheme_data
  • category: Application Software, Email Client
  • certification_date: 27.06.2019
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 27.06.2021
  • id: CCEVS-VR-VID10840
  • product: VMware Workspace ONE Boxer Email Client 5.4
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10840
  • vendor: VMware, LLC
  • certification_date: 31.05.2022
  • level: EAL 2+ (ALC_FLR.1)
  • product: Trend Micro Deep Security 20
  • vendor: Trend Micro Inc.
heuristics/protection_profiles 1aeebf1c5963b606 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_app_v1.2.pdf {}
pdf_data/cert_filename st_vid10840-ci.pdf 561-LSS CT v1.0.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10840-2019: 1
  • CA:
    • 561-LSS: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL 2+: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_FLR.1: 1
pdf_data/cert_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
  • Lightship:
    • Lightship Security: 1
pdf_data/cert_metadata
  • /CreationDate: D:20190703103801-04'00'
  • /ModDate: D:20190703103936-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 188325
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20190122115136-04'00'
  • /Creator: Adobe Illustrator CC 22.0 (Windows)
  • /ModDate: D:20220606065558-05'00'
  • /Producer: Adobe PDF library 15.00
  • /Title: cyber-centre-product-evaluation-certificate-e-bg
  • pdf_file_size_bytes: 1640320
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid10840-vr.pdf 561-LSS CR v1.0.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10840
    • cert_item: VMware Workspace ONE Boxer Email Client 5.4
    • cert_lab: US NIAP
  • CA:
  • US:
  • CA:
    • cert_id: 561-LSS
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10840: 1
  • CA:
    • 561-LSS: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_TSU_EXT.1: 1
  • ALC:
    • ALC_FLR.1: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM_EXT.5.3: 1
    • FCS_COP.1: 1
    • FCS_RBG_EXT.1.1: 1
    • FCS_STO_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.FLAWED_ADDON: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Samsung:
    • Samsung: 1
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 3
  • Lightship:
    • Lightship Security: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC-SHA-256: 1
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 8
      • TLS v1.2: 2
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 2
pdf_data/report_keywords/cipher_mode
  • CTR:
    • CTR: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_metadata
  • /CreationDate: D:20190703073405-04'00'
  • /ModDate: D:20190703073405-04'00'
  • pdf_file_size_bytes: 972360
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
pdf_data/st_filename st_vid10840-st.pdf 561-LSS ST v12.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2+: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE.1: 11
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 5
    • ALC_CMS.1: 6
    • ALC_TSU_EXT.1: 8
  • ATE:
    • ATE_IND.1: 6
  • AVA:
    • AVA_VAN.1: 7
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS: 2
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 3
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_AEX_EXT.1.1: 1
    • FCS_CKM: 3
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 6
    • FCS_CKM_EXT: 6
    • FCS_CKM_EXT.1: 6
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.3: 4
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.4: 6
    • FCS_CKM_EXT.5: 10
    • FCS_CKM_EXT.5.1: 3
    • FCS_CKM_EXT.5.3: 2
    • FCS_COP.1: 28
    • FCS_COP.1.1: 4
    • FCS_COP_EXT: 2
    • FCS_COP_EXT.2: 9
    • FCS_COP_EXT.2.1: 2
    • FCS_IVG_EXT: 2
    • FCS_IVG_EXT.1: 4
    • FCS_IVG_EXT.1.1: 1
    • FCS_KYC_EXT: 2
    • FCS_KYC_EXT.1: 5
    • FCS_KYC_EXT.1.1: 1
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 3
    • FCS_RBG_EXT.2: 3
    • FCS_RBG_EXT.2.1: 1
    • FCS_RBG_EXT.2.2: 1
    • FCS_STO_EXT.1: 22
    • FCS_STO_EXT.1.1: 5
    • FCS_TLSC_EXT: 6
    • FCS_TLSC_EXT.1: 12
    • FCS_TLSC_EXT.1.1: 5
    • FCS_TLSC_EXT.1.2: 5
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.1.4: 2
    • FCS_TLSC_EXT.2: 4
    • FCS_TLSC_EXT.2.1: 4
    • FCS_TLSC_EXT.4: 5
    • FCS_TLSC_EXT.4.1: 2
    • FCS_TLSS_EXT.1: 1
    • FCS_TLSS_EXT.1.1: 4
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLSS_EXT.1.4: 1
    • FCS_TLSS_EXT.1.5: 1
    • FCS_TLSS_EXT.2.4: 1
    • FCS_TLS_EXT.2.1: 1
    • FCS_TLS_EXT.4.1: 1
  • FDP:
    • FDP_DAR_EXT: 3
    • FDP_DAR_EXT.1: 4
    • FDP_DEC_EXT.1: 8
    • FDP_DEC_EXT.1.1: 2
    • FDP_DEC_EXT.1.2: 2
    • FDP_NET_EXT: 2
    • FDP_NET_EXT.1: 3
    • FDP_NET_EXT.1.1: 1
    • FDP_NOT_EXT: 2
    • FDP_NOT_EXT.1: 3
    • FDP_NOT_EXT.1.1: 1
  • FIA:
    • FIA_SASL_EXT.1: 3
  • FMT:
    • FMT_CFG_EXT: 2
    • FMT_CFG_EXT.1: 4
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 1
    • FMT_MEC_EXT: 2
    • FMT_MEC_EXT.1: 6
    • FMT_MEC_EXT.1.1: 3
    • FMT_MOD_EXT.1: 2
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 3
  • FPR:
    • FPR_ANO_EXT: 2
    • FPR_ANO_EXT.1: 3
    • FPR_ANO_EXT.1.1: 1
  • FPT:
    • FPT_AEX_EXT: 2
    • FPT_AEX_EXT.1: 3
    • FPT_AEX_EXT.1.1: 2
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 3
    • FPT_AEX_EXT.1.4: 2
    • FPT_AEX_EXT.1.5: 2
    • FPT_AON_EXT: 2
    • FPT_AON_EXT.1: 3
    • FPT_AON_EXT.1.1: 1
    • FPT_API_EXT: 2
    • FPT_API_EXT.1: 3
    • FPT_API_EXT.1.1: 1
    • FPT_LIB_EXT: 2
    • FPT_LIB_EXT.1: 3
    • FPT_LIB_EXT.1.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 2
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 1
    • FPT_TUD_EXT.1.6: 1
  • FTP:
    • FTP_DIT_EXT.1: 12
    • FTP_DIT_EXT.1.1: 2
    • FTP_ITC_EXT: 2
    • FTP_ITC_EXT.1: 4
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.1.3: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 6
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 1
    • FAU_STG.2: 15
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.4: 1
    • FCS_COP.1: 8
    • FCS_COP.1.1: 1
  • FIA:
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_ITT.1.1: 1
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 6
    • FPT_STM.1: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.ADDON_INTEGRITY: 1
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.FLAWED_ADDON: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
  • A:
    • A.ACCESS: 3
    • A.ASCOPE: 3
    • A.DYNMIC: 3
    • A.LOCATE: 3
    • A.MANAGE: 3
    • A.NOEVIL: 5
    • A.PROTCT: 3
    • A.TRUST: 4
  • O:
    • O.ACCESS: 12
    • O.APP_CONTROL: 7
    • O.AUDITS: 8
    • O.AUDIT_PROTECTION: 3
    • O.AUDIT_SORT: 6
    • O.EADMIN: 4
    • O.EXPORT: 3
    • O.IDANLZ: 5
    • O.IDAUTH: 19
    • O.IDSCAN: 7
    • O.IDSENS: 9
    • O.INTEGR: 7
    • O.OFLOWS: 6
    • O.PROTCT: 10
    • O.RESPON: 5
    • O.VIRUS: 8
  • OE:
    • OE.CREDEN: 5
    • OE.INSTAL: 5
    • OE.INTROP: 5
    • OE.PERSON: 5
    • OE.PHYCAL: 6
    • OE.TIME: 4
  • T:
    • T.COMDIS: 3
    • T.COMINT: 4
    • T.FACCNT: 3
    • T.FALACT: 3
    • T.FALASC: 3
    • T.FALREC: 4
    • T.IMPCON: 3
    • T.INADVE: 3
    • T.INFLUX: 4
    • T.LOSSOF: 4
    • T.MISACT: 4
    • T.MISUSE: 4
    • T.NOHALT: 3
    • T.PRIVIL: 4
    • T.SCNCFG: 4
    • T.SCNMLC: 3
    • T.SCNVUL: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Samsung:
    • Samsung: 10
  • Microsoft:
    • Microsoft: 4
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
      • AES-: 1
      • AES-128: 1
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 4
  • AES_competition:
    • AES:
      • AES: 10
  • constructions:
    • MAC:
      • HMAC: 7
      • HMAC-SHA-256: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
  • ECC:
    • ECDH:
      • ECDH: 1
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 17
  • FF:
    • DSA:
      • DSA: 13
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 2
    • SHA2:
      • SHA-256: 5
      • SHA-384: 4
      • SHA-512: 4
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 48
      • TLS 1.2: 2
      • TLS v1.2: 6
      • TLSv1.2: 2
  • VPN:
    • VPN: 1
  • TLS:
    • TLS:
      • TLS: 3
      • TLS 1.2: 6
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 16
  • RNG:
    • RBG: 1
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 4
    • secp256r1: 2
    • secp384r1: 2
  • NIST:
    • P-224: 2
    • P-256: 2
    • P-384: 2
    • P-521: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_RSA_WITH_AES_128_CBC_SHA: 4
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
  • TLS:
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 2
  • OpenSSL:
    • OpenSSL: 18
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-009-001: 1
    • CCMB-2012-009-002: 1
    • CCMB-2012-009-003: 1
    • CCMB-2012-009-004: 1
  • FIPS:
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 6
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
  • NIST:
    • NIST SP 800-132: 2
    • NIST SP 800-38A: 1
    • NIST SP 800-38F: 4
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 3
    • SP 800-56B: 1
  • RFC:
    • RFC 2560: 2
    • RFC 5246: 6
    • RFC 5280: 5
    • RFC 5289: 16
    • RFC 5751: 2
    • RFC 6125: 3
    • RFC5280: 1
    • RFC5759: 1
  • X509:
    • X.509: 9
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 2
    • FIPS 197: 1
    • FIPS 198-1: 1
pdf_data/st_keywords/javacard_packages
  • com:
    • com.android: 26
    • com.android.support: 1
pdf_data/st_metadata
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different