Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
VMware Workspace ONE Boxer Email Client 5.4
CCEVS-VR-VID-10840
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 )
ANSSI-CC-2023/57
name VMware Workspace ONE Boxer Email Client 5.4 IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 )
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
status archived active
not_valid_after 27.06.2021 09.02.2029
not_valid_before 27.06.2019 09.02.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10840-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_57fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10840-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_57fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10840-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_57en.pdf
manufacturer VMware Inc. THALES DIS FRANCE SA
manufacturer_web https://www.vmware.com https://www.thalesgroup.com/en/europe/france
security_level {} EAL5+, ALC_DVS.2, AVA_VAN.5
dgst ba98236dc7090775 cecfb5207379a342
heuristics/cert_id CCEVS-VR-VID-10840 ANSSI-CC-2023/57
heuristics/cert_lab US []
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ALC_DVS.2, AVA_VAN.5
heuristics/extracted_versions 5.4 1.1, 4.1, 1.1.1, 4.4.2
heuristics/report_references/directly_referencing {} ANSSI-CC-2023/20, ANSSI-CC-2023/30
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2023/20, ANSSI-CC-2023/30
heuristics/scheme_data
  • category: Application Software, Email Client
  • certification_date: 27.06.2019
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 27.06.2021
  • id: CCEVS-VR-VID10840
  • product: VMware Workspace ONE Boxer Email Client 5.4
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10840
  • vendor: VMware, LLC
heuristics/st_references/directly_referencing {} ANSSI-CC-2023/20
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2023/20
heuristics/protection_profiles 1aeebf1c5963b606 d9553e7194783182, d918b28fd7bb5d79, ed9c9d74c3710878, 4a814d0e3c9f9082, 1f7ea2e05de5b88b, 27abdb9c6ab375a7
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_app_v1.2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf
pdf_data/cert_filename st_vid10840-ci.pdf Certificat-CC-2023_57fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10840-2019: 1
  • FR:
    • ANSSI-CC-2023/57: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
  • Serma:
    • SERMA: 2
pdf_data/cert_metadata
  • /CreationDate: D:20190703103801-04'00'
  • /ModDate: D:20190703103936-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 188325
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author:
  • /Category:
  • /Comments: ANSSI-CC-CER-F-14_v14.8
  • /Company: SGDSN
  • /CreationDate: D:20240215115407+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords: version x.x, révision x
  • /ModDate: D:20240215115408+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • /SourceModified: D:20240215105356
  • /Title: ANSSI-CC-2023/57
  • pdf_file_size_bytes: 122264
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid10840-vr.pdf ANSSI-CC-2023_57fr.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-VID10840
    • cert_item: VMware Workspace ONE Boxer Email Client 5.4
    • cert_lab: US NIAP
  • FR:
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10840: 1
  • FR:
    • ANSSI-CC-2023/20: 1
    • ANSSI-CC-2023/30: 1
    • ANSSI-CC-2023/57: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0071-2012-MA-01: 2
    • BSI-CC-PP-0072-2012-MA-01: 2
    • BSI-CC-PP-0075-2012-MA-01: 2
    • BSI-CC-PP-0076-2013-MA-01: 2
    • BSI-PP-0084-2014: 1
  • other:
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
    • PP-SSCD-Part4: 2
    • PP-SSCD-Part5: 2
    • PP-SSCD-Part6: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_TSU_EXT.1: 1
  • AGD:
    • AGD_CPS: 2
    • AGD_OPE: 1
    • AGD_USE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM_EXT.5.3: 1
    • FCS_COP.1: 1
    • FCS_RBG_EXT.1.1: 1
    • FCS_STO_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.FLAWED_ADDON: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Samsung:
    • Samsung: 1
  • Gemalto:
    • Gemalto: 1
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 3
  • CESTI:
    • CESTI: 1
  • Serma:
    • SERMA: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC-SHA-256: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 8
      • TLS v1.2: 2
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 2
pdf_data/report_keywords/cipher_mode
  • CTR:
    • CTR: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 1
pdf_data/report_metadata
  • /CreationDate: D:20190703073405-04'00'
  • /ModDate: D:20190703073405-04'00'
  • pdf_file_size_bytes: 972360
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
pdf_data/st_filename st_vid10840-st.pdf ANSSI-cible-CC-2023_57en.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/20: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-CC-PP-0084-2014: 1
  • other:
    • PP-SSCD: 6
    • PP-SSCD-: 1
    • PP-SSCD-KG: 41
    • PP-SSCD-KI: 30
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5+: 1
    • EAL5: 3
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE.1: 11
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 5
    • ALC_CMS.1: 6
    • ALC_TSU_EXT.1: 8
  • ATE:
    • ATE_IND.1: 6
  • AVA:
    • AVA_VAN.1: 7
  • ALC:
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_AEX_EXT.1.1: 1
    • FCS_CKM: 3
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 6
    • FCS_CKM_EXT: 6
    • FCS_CKM_EXT.1: 6
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.3: 4
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.4: 6
    • FCS_CKM_EXT.5: 10
    • FCS_CKM_EXT.5.1: 3
    • FCS_CKM_EXT.5.3: 2
    • FCS_COP.1: 28
    • FCS_COP.1.1: 4
    • FCS_COP_EXT: 2
    • FCS_COP_EXT.2: 9
    • FCS_COP_EXT.2.1: 2
    • FCS_IVG_EXT: 2
    • FCS_IVG_EXT.1: 4
    • FCS_IVG_EXT.1.1: 1
    • FCS_KYC_EXT: 2
    • FCS_KYC_EXT.1: 5
    • FCS_KYC_EXT.1.1: 1
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 3
    • FCS_RBG_EXT.2: 3
    • FCS_RBG_EXT.2.1: 1
    • FCS_RBG_EXT.2.2: 1
    • FCS_STO_EXT.1: 22
    • FCS_STO_EXT.1.1: 5
    • FCS_TLSC_EXT: 6
    • FCS_TLSC_EXT.1: 12
    • FCS_TLSC_EXT.1.1: 5
    • FCS_TLSC_EXT.1.2: 5
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.1.4: 2
    • FCS_TLSC_EXT.2: 4
    • FCS_TLSC_EXT.2.1: 4
    • FCS_TLSC_EXT.4: 5
    • FCS_TLSC_EXT.4.1: 2
    • FCS_TLSS_EXT.1: 1
    • FCS_TLSS_EXT.1.1: 4
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLSS_EXT.1.4: 1
    • FCS_TLSS_EXT.1.5: 1
    • FCS_TLSS_EXT.2.4: 1
    • FCS_TLS_EXT.2.1: 1
    • FCS_TLS_EXT.4.1: 1
  • FDP:
    • FDP_DAR_EXT: 3
    • FDP_DAR_EXT.1: 4
    • FDP_DEC_EXT.1: 8
    • FDP_DEC_EXT.1.1: 2
    • FDP_DEC_EXT.1.2: 2
    • FDP_NET_EXT: 2
    • FDP_NET_EXT.1: 3
    • FDP_NET_EXT.1.1: 1
    • FDP_NOT_EXT: 2
    • FDP_NOT_EXT.1: 3
    • FDP_NOT_EXT.1.1: 1
  • FIA:
    • FIA_SASL_EXT.1: 3
  • FMT:
    • FMT_CFG_EXT: 2
    • FMT_CFG_EXT.1: 4
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 1
    • FMT_MEC_EXT: 2
    • FMT_MEC_EXT.1: 6
    • FMT_MEC_EXT.1.1: 3
    • FMT_MOD_EXT.1: 2
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 3
  • FPR:
    • FPR_ANO_EXT: 2
    • FPR_ANO_EXT.1: 3
    • FPR_ANO_EXT.1.1: 1
  • FPT:
    • FPT_AEX_EXT: 2
    • FPT_AEX_EXT.1: 3
    • FPT_AEX_EXT.1.1: 2
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 3
    • FPT_AEX_EXT.1.4: 2
    • FPT_AEX_EXT.1.5: 2
    • FPT_AON_EXT: 2
    • FPT_AON_EXT.1: 3
    • FPT_AON_EXT.1.1: 1
    • FPT_API_EXT: 2
    • FPT_API_EXT.1: 3
    • FPT_API_EXT.1.1: 1
    • FPT_LIB_EXT: 2
    • FPT_LIB_EXT.1: 3
    • FPT_LIB_EXT.1.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 2
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 1
    • FPT_TUD_EXT.1.6: 1
  • FTP:
    • FTP_DIT_EXT.1: 12
    • FTP_DIT_EXT.1.1: 2
    • FTP_ITC_EXT: 2
    • FTP_ITC_EXT.1: 4
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
  • FCS:
    • FCS_CKM: 47
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 4
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 2
    • FCS_COP: 26
    • FCS_COP.1: 6
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 44
    • FDP_ACC.1: 28
    • FDP_ACC.1.1: 4
    • FDP_ACF: 32
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_AFC: 1
    • FDP_DAU: 10
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_IFC.1: 18
    • FDP_ITC: 11
    • FDP_ITC.1: 8
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 8
    • FDP_RIP: 2
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
    • FDP_SDI: 17
    • FDP_SDI.1: 2
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_UCT: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 17
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 5
    • FIA_API.1: 14
    • FIA_API.1.1: 2
    • FIA_UAU: 20
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UID: 20
    • FIA_UID.1: 10
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 62
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4: 3
    • FMT_MSA.4.1: 2
    • FMT_MTD: 16
    • FMT_MTD.1: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 26
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 36
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 13
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_TST: 2
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ICT: 2
    • FTP_ITC: 38
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 4
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 4
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.ADDON_INTEGRITY: 1
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.FLAWED_ADDON: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
  • A:
    • A.APPLET: 2
    • A.CGA: 3
    • A.CSP: 4
    • A.SCA: 3
    • A.VERIFICATION: 2
  • OE:
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
    • OE.HID_VAD: 1
    • OE.HI_VAD: 2
    • OE.VERIFICATION: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Samsung:
    • Samsung: 10
  • Gemalto:
    • Gemalto: 1
  • Samsung:
    • Samsung: 7
  • Thales:
    • Thales: 12
    • Thales Group: 62
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
      • AES-: 1
      • AES-128: 1
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 4
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 4
    • DES:
      • DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 2
    • SHA2:
      • SHA-256: 5
      • SHA-384: 4
      • SHA-512: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 48
      • TLS 1.2: 2
      • TLS v1.2: 6
      • TLSv1.2: 2
  • VPN:
    • VPN: 1
  • PACE:
    • PACE: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 16
  • RNG:
    • RBG: 1
    • RNG: 1
  • RNG:
    • RND: 1
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • CTR:
    • CTR: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 4
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_RSA_WITH_AES_128_CBC_SHA: 4
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 2
  • OpenSSL:
    • OpenSSL: 18
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 1
    • fault injection: 1
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • Leak-Inherent: 1
    • SPA: 1
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-009-001: 1
    • CCMB-2012-009-002: 1
    • CCMB-2012-009-003: 1
    • CCMB-2012-009-004: 1
  • FIPS:
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 6
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
  • NIST:
    • NIST SP 800-132: 2
    • NIST SP 800-38A: 1
    • NIST SP 800-38F: 4
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 3
    • SP 800-56B: 1
  • RFC:
    • RFC 2560: 2
    • RFC 5246: 6
    • RFC 5280: 5
    • RFC 5289: 16
    • RFC 5751: 2
    • RFC 6125: 3
    • RFC5280: 1
    • RFC5759: 1
  • X509:
    • X.509: 9
  • CC:
    • CCMB-2012-04-003: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS197: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 3
pdf_data/st_keywords/javacard_packages
  • com:
    • com.android: 26
    • com.android.support: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • by authorized users. The functionalities of IAS Classic V4.4.2 other than the ones from SSCD are out of scope of the TOE perimeter. MOC Server application provides biometric authentication of the signatory: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: D1418852
  • /CreationDate: D:20230928155442+02'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /Keywords: 16-03-2018
  • /ModDate: D:20230928155442+02'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: 1.1
  • /Title: MultiApp V4.1: IAS EN Core & Extensions Security Target
  • pdf_file_size_bytes: 1252729
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different