name |
Fortinet FortiProxy v1.0 |
CardOS V5.3 QES, V1.0 |
category |
Network and Network-Related Devices and Systems |
Products for Digital Signatures |
scheme |
CA |
DE |
status |
archived |
archived |
not_valid_after |
08.08.2024 |
01.09.2019 |
not_valid_before |
08.08.2019 |
06.08.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-475%20CT%20v1.0.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-475%20CR%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0921a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-475%20ST%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0921b_pdf.pdf |
manufacturer |
Fortinet, Inc. |
Atos IT Solutions and Services GmbH |
manufacturer_web |
https://www.fortinet.com/ |
https://www.de.atos.net |
security_level |
{} |
EAL4+, AVA_VAN.5 |
dgst |
bb31977fded40970 |
60c5f6b486bdffeb |
heuristics/cert_id |
383-4-475 |
BSI-DSZ-CC-0921-2014 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
cpe:2.3:a:fortinet:fortiproxy:1.0.1:*:*:*:*:*:*:*, cpe:2.3:a:fortinet:fortiproxy:1.0.5:*:*:*:*:*:*:*, cpe:2.3:a:fortinet:fortiproxy:1.0.4:*:*:*:*:*:*:*, cpe:2.3:a:fortinet:fortiproxy:1.0.6:*:*:*:*:*:*:*, cpe:2.3:a:fortinet:fortiproxy:1.0.0:*:*:*:*:*:*:*, cpe:2.3:a:fortinet:fortiproxy:1.0.2:*:*:*:*:*:*:*, cpe:2.3:a:fortinet:fortiproxy:1.0.7:*:*:*:*:*:*:*, cpe:2.3:a:fortinet:fortiproxy:1.0.3:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2023-45583, CVE-2023-36641, CVE-2021-42755, CVE-2018-13383, CVE-2024-26010, CVE-2021-43074, CVE-2023-36640, CVE-2023-22640, CVE-2021-42757, CVE-2022-22299, CVE-2023-22639, CVE-2018-13381, CVE-2024-26011, CVE-2023-22641, CVE-2021-22128, CVE-2019-17656, CVE-2018-13380, CVE-2021-26110, CVE-2021-22130, CVE-2022-42475, CVE-2022-42474, CVE-2018-13382, CVE-2022-41331, CVE-2023-41677, CVE-2021-44170, CVE-2024-21762, CVE-2022-43947, CVE-2021-43072, CVE-2024-48885, CVE-2023-33305, CVE-2024-48884, CVE-2020-6648, CVE-2023-29181, CVE-2018-13379, CVE-2023-29180 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
1.0 |
1.0, 5.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-2012 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1193-2024 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1193-2024 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
48ac4778e4272298 |
d918b28fd7bb5d79 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf |
pdf_data/cert_filename |
383-4-475 CT v1.0.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20190122115136-04'00'
- /Creator: Adobe Illustrator CC 22.0 (Windows)
- /ModDate: D:20190809134920-04'00'
- /Producer: Adobe PDF library 15.00
- /Title: cyber-centre-product-evaluation-certificate-e-bg
- pdf_file_size_bytes: 1848669
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
383-4-475 CR v1.0.pdf |
0921a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0921-2014
- cert_item: CardOS V5.3 QES, V1.0
- cert_lab: BSI
- developer: Atos IT Solutions and Services GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782: 1
- BSI-DSZ-CC-0782-2012: 2
- BSI-DSZ-CC-0782-2012-MA-01: 4
- BSI-DSZ-CC-0921-2014: 27
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 4
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 6
- EAL 4 augmented: 3
- EAL 5: 2
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 2
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 2
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 4
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FIA:
- FIA_AFL: 3
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 9
- Infineon Technologies AG: 5
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
- TÜViT: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 4
- TDEA: 1
- TDES: 5
- Triple-DES: 1
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-2: 5
- SHA-256: 6
- SHA-384: 3
- SHA-512: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 3
- brainpoolP384r1: 3
- NIST:
- Curve P-256: 4
- Curve P-384: 4
- P-256: 5
- P-384: 5
- curve P-256: 1
- curve P-384: 1
- secp256r1: 2
- secp384r1: 2
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS140-2: 1
- ISO:
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 2
- AIS 34: 2
- AIS 36: 3
- AIS 38: 1
- FIPS:
- ISO:
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- & Release Notes 'CardOS V5.3 QES, V1.0', Edition 05/2014, Atos IT Solutions and Services GmbH, (confidential document) [15] Administrator Guidance 'CardOS V5.3 QES, V1.0', Revision 1.20, 07 May 2014, Atos IT Solutions: 1
- ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜV Informationstechnik GmbH, (confidential document) [12] Configuration List 'CardOS V5.3 QES, V1.0', Revision 1.30, 30 July 2014, Atos IT Solutions: 1
- GmbH, (confidential document) [17] Application Digital Signature 'CardOS V5.3 QES, V1.0', Revision 1.10, 07 May 2014, Atos IT: 1
- Services GmbH, (confidential document) [13] Users Manual CardOS V5.3, Edition 05/2014, Atos IT Solutions and Services GmbH, (confidential: 1
- Services GmbH, (confidential document) [16] User Guidance 'CardOS V5.3 QES, V1.0', Revision 1.30, 02 May 2014, Atos IT Solutions and: 1
- Technical Report BSI-DSZ-CC-0921-2014, Version 3.0, 31 July 2014, TÜV Informationstechnik GmbH, (confidential document) [9] Certification Report BSI-DSZ-CC-0782-2012 for Infineon Security Controller M7892 B11 with: 1
- and Services GmbH, (confidential document) [18] ISO 7816 Part 3: Electronic Signals and Transmission Protocols – ISO/IEC 7816-3:1997/Amd: 1
|
pdf_data/report_metadata |
- /Author: Clark, Cory P.
- /Comments: 1.0
- /Company: CSEC-CSTC
- /CreationDate: D:20190815095759-04'00'
- /Creator: Acrobat PDFMaker 17 for Word
- /ModDate: D:20190815095805-04'00'
- /Producer: Adobe PDF Library 15.0
- /SourceModified: D:20190815135711
- pdf_file_size_bytes: 724230
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
|
pdf_data/st_filename |
383-4-475 ST v1.0.pdf |
0921b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-2012-MA-01: 6
- BSI-DSZ-CC-921: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0059-2009-MA-01: 1
- BSI-CC-PP-0035-2007: 2
- BSI-CC-PP-0059-: 3
- BSI-CC-PP-0059-2009-MA-: 2
- BSI-CC-PP-0059-2009-MA-01: 45
- BSI-CC-PP-0071: 4
- BSI-CC-PP-0071-2012: 2
- BSI-PP-0006-2002: 1
- BSI-PP-0035: 4
- BSI-PP0059-2009: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 4+: 1
- EAL 6+: 3
- EAL4: 8
- EAL4 augmented: 5
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 10
- ASE_CCL.1: 1
- ASE_ECD: 5
- ASE_ECD.1: 1
- ASE_INT: 16
- ASE_INT.1: 1
- ASE_OBJ: 11
- ASE_OBJ.2: 1
- ASE_REQ: 33
- ASE_REQ.2: 1
- ASE_SPD: 6
- ASE_SPD.1: 1
- ASE_TSS: 17
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 19
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 10
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 2
- FAU_STG_EXT.2: 5
- FAU_STG_EXT.2.1: 1
- FCO:
- FCO_CPC_EXT: 2
- FCO_CPC_EXT.1: 9
- FCO_CPC_EXT.1.1: 3
- FCO_CPC_EXT.1.2: 3
- FCO_CPC_EXT.1.3: 2
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.2: 23
- FCS_CKM.2.1: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 73
- FCS_COP.1: 9
- FCS_DTLS: 2
- FCS_DTLS_EXT.1.1: 1
- FCS_DTLS_EXT.2.1: 1
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 21
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 3
- FCS_SSHC: 2
- FCS_SSHC_EXT: 1
- FCS_SSHC_EXT.1: 6
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHC_EXT.1.2: 1
- FCS_SSHC_EXT.1.3: 1
- FCS_SSHC_EXT.1.4: 1
- FCS_SSHC_EXT.1.5: 3
- FCS_SSHC_EXT.1.6: 1
- FCS_SSHC_EXT.1.7: 1
- FCS_SSHC_EXT.1.8: 1
- FCS_SSHC_EXT.1.9: 1
- FCS_SSHS: 1
- FCS_SSHS_EXT: 2
- FCS_SSHS_EXT.1: 10
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.2: 3
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 3
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSC_EXT: 5
- FCS_TLSC_EXT.1: 8
- FCS_TLSC_EXT.1.1: 4
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2: 9
- FCS_TLSC_EXT.2.1: 2
- FCS_TLSC_EXT.2.2: 2
- FCS_TLSC_EXT.2.3: 2
- FCS_TLSC_EXT.2.4: 2
- FCS_TLSC_EXT.2.5: 2
- FCS_TLSS_EXT: 5
- FCS_TLSS_EXT.1: 11
- FCS_TLSS_EXT.1.1: 5
- FCS_TLSS_EXT.1.2: 2
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.2: 6
- FCS_TLSS_EXT.2.1: 2
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FCS_TLSS_EXT.2.4: 2
- FCS_TLSS_EXT.2.5: 1
- FCS_TLSS_EXT.2.6: 1
- FCS_TLS_EXT.1.1: 2
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 9
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 3
- FIA_UAU_EXT.2: 11
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT: 4
- FIA_UIA_EXT.1: 10
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FMT:
- FMT_MOF: 11
- FMT_MOF.1: 4
- FMT_MTD: 8
- FMT_MTD.1: 4
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.2: 7
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 3
- FPT_APW_EXT.1: 9
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_ITT: 4
- FPT_ITT.1: 4
- FPT_PTD: 1
- FPT_SKP_EXT: 3
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 2
- FPT_STM: 2
- FPT_STM_EXT: 1
- FPT_STM_EXT.1: 8
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 3
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 3
- FPT_TST_EXT.2: 7
- FPT_TST_EXT.2.1: 1
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 8
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 3
- FPT_TUD_EXT.1.3: 8
- FPT_TUD_EXT.2: 7
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 2
- FTA_SSL_EXT.1: 10
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 8
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_ITC_EXT.1.1: 1
- FTP_TRP: 8
- FTP_TRP.1: 2
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM: 62
- FCS_CKM.1: 26
- FCS_CKM.2: 6
- FCS_CKM.4: 33
- FCS_CKM.4.1: 1
- FCS_COP: 98
- FCS_COP.1: 15
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 55
- FDP_ACC.1: 23
- FDP_ACF: 39
- FDP_ACF.1: 25
- FDP_IFC.1: 11
- FDP_ITC.1: 20
- FDP_ITC.2: 20
- FDP_ITT.1: 1
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_SDI: 19
- FDP_SDI.1: 3
- FDP_SDI.2: 5
- FIA:
- FIA_AFL: 54
- FIA_AFL.1: 14
- FIA_API: 17
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_UAU.1: 21
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA: 28
- FMT_MSA.1: 7
- FMT_MSA.2: 12
- FMT_MSA.2.1: 1
- FMT_MSA.3: 25
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 8
- FMT_MSA.4.1: 1
- FMT_MTD: 40
- FMT_MTD.1: 3
- FMT_SMF.1: 39
- FMT_SMF.1.1: 1
- FMT_SMR.1: 29
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 8
- FPT_EMS.1: 22
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 14
- FPT_TST.1.1: 6
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_: 1
- A.LIMITED_: 1
- A.NO_THRU_: 1
- A.PHYSICAL_: 1
- A.REGULAR_: 1
- A.RESIDUAL_: 1
- A.TRUSTED_: 1
- OE:
- OE.ADMIN_CREDEN: 1
- OE.NO_GENERAL_: 1
- OE.NO_THRU_: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFO: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_: 1
- T.PASSWORD_CRACKING: 3
- T.SECURITY_: 2
- T.SECURITY_FUNCTIONAL: 2
- T.UNAUTHORIZED_: 1
- T.UNAUTHORIZED_ADMINIS: 1
- T.UNDETECTED_: 1
- T.UNDETECTED_ACTIVITY: 2
- T.UNTRUSTED_: 1
- T.UNTRUSTED_COMMUNI: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
- T.UPDATE_: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_: 2
- T.WEAK_AUTHENTICATIO: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- A.CGA: 4
- A.III: 2
- A.SCA: 5
- OE:
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 17
- Infineon Technologies: 1
- Infineon Technologies AG: 3
- NXP:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 23
- AES-: 3
- AES-128: 2
- constructions:
- MAC:
- HMAC: 12
- HMAC-SHA-256: 3
- HMAC-SHA-384: 4
- HMAC-SHA-512: 4
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 7
- TDES: 15
- Triple-DES: 10
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 11
- DHE: 4
- Diffie-Hellman: 17
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 2
- SHA-512: 6
- SHA256: 12
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 11
- SHA-256: 15
- SHA-384: 8
- SHA-512: 6
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 4
- IKEv1: 12
- IKEv2: 12
- IPsec:
- SSH:
- TLS:
- DTLS:
- DTLS: 75
- DTLS 1.0: 9
- DTLS 1.2: 9
- DTLS v1.0: 4
- DTLS v1.2: 4
- SSL:
- SSL: 9
- SSL 2.0: 4
- SSL 3.0: 4
- TLS:
- TLS: 106
- TLS 1.0: 4
- TLS 1.1: 9
- TLS 1.2: 7
- TLS v1.0: 2
- TLS1.1: 1
- TLS1.2: 1
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 10
- P-384: 6
- P-521: 4
- curve P-384: 2
- secp256r1: 6
- secp384r1: 4
- secp521r1: 4
|
- Brainpool:
- brainpoolP256r1: 5
- brainpoolP384r1: 5
- NIST:
- Curve P-256: 4
- Curve P-384: 4
- P-256: 8
- P-384: 8
- secp256r1: 3
- secp384r1: 3
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 4
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
- TLS_RSA_WITH_AES_128_CBC_SHA: 12
- TLS_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_RSA_WITH_AES_256_CBC_SHA: 4
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- physical tampering: 5
- SCA:
- DPA: 2
- SPA: 3
- physical probing: 2
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 186-4: 4
- FIPS140-2: 1
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 5
- ISO/IEC 9796-2: 1
- NIST:
- PKCS:
- RFC:
- RFC 2818: 8
- RFC 2986: 2
- RFC 3268: 8
- RFC 3526: 3
- RFC 3602: 2
- RFC 4106: 1
- RFC 4109: 1
- RFC 4251: 1
- RFC 4253: 7
- RFC 4301: 2
- RFC 4304: 1
- RFC 4346: 6
- RFC 4347: 9
- RFC 4492: 8
- RFC 4868: 2
- RFC 4945: 1
- RFC 5246: 18
- RFC 5280: 13
- RFC 5282: 1
- RFC 5289: 8
- RFC 5759: 1
- RFC 5996: 2
- RFC 6125: 9
- RFC 6187: 1
- RFC 6347: 13
- RFC 6960: 1
- RFC 8017: 1
- X509:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. FCS_SSHC_EXT.1.2 The TSF shall ensure that the SSH: 1
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. FCS_SSHS_EXT.1.2 The TSF shall ensure that the SSH: 1
- out of scope: 2
|
- OutOfScope:
- no longer needed for any tasks concerning Application for QES. It has to be deleted. 10. Step 22 is out of scope of the TOE. 28 Security Target 'CardOS V5.3 QES, V1.0', Rev. 1.61, Edition 07/2014 Copyright © Atos: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Lachlan Turner
- /CreationDate: D:20190625213148+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20190625213148+00'00'
- /Subject: FortiProxy 1.0
- /Title: Fortinet
- pdf_file_size_bytes: 1248984
- pdf_hyperlinks: http://docs.fortinet.com/fortiproxy, http://www.arkinfosec.net/
- pdf_is_encrypted: False
- pdf_number_of_pages: 103
|
- /Author: Atos IT Solutions and Services GmbH
- /CreationDate: D:20140723191014+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, Security Target, CardOS
- /ModDate: D:20140723191641+02'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Security Target CardOS V5.3 QES (SSCD for QES)
- /Title: Security Target 'CardOS V5.3 QES, V1.0', Rev. 1.61, Edition 07/2014
- pdf_file_size_bytes: 530532
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 102
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |