Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software 8.0.1-02
JISEC-CC-CRP-C0536
Samsung Galaxy Devices with Android 8 & 8.1
CCEVS-VR-10927-2018
name Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software 8.0.1-02 Samsung Galaxy Devices with Android 8 & 8.1
category Access Control Devices and Systems Mobility
scheme JP US
not_valid_after 13.02.2022 20.12.2020
not_valid_before 13.02.2017 20.12.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10927-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10927-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10927-st.pdf
manufacturer Hitachi, Ltd. Samsung Electronics Co., Ltd.
manufacturer_web https://www.hitachi.com/ https://www.samsung.com
security_level EAL2+, ALC_FLR.1 {}
dgst bd28ac0feda9039e dbe773de3de5497b
heuristics/cert_id JISEC-CC-CRP-C0536 CCEVS-VR-10927-2018
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:samsung:android:8.1:-:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-25369, CVE-2021-25395, CVE-2021-25489, CVE-2025-20934, CVE-2021-25487, CVE-2021-25370, CVE-2021-25394
heuristics/extracted_sars AGD_OPE.1, AGD_PRE.1, ATE_COV.1, ADV_FSP.2, ASE_INT.1, ADV_ARC.1, ASE_SPD.1, ALC_DEL.1, ASE_TSS.1, ATE_FUN.1, ASE_REQ.2, ASE_OBJ.2, ATE_IND.2, ALC_CMS.2, AVA_VAN.2, ALC_CMC.2, ASE_CCL.1, ALC_FLR.1, ADV_TDS.1, ASE_ECD.1 AGD_OPE.1, ADV_FSP.1, AGD_PRE.1, ALC_CMC.1, ALC_TSU_EXT.1, AVA_VAN.1, ALC_CMS.1, ATE_IND.1
heuristics/extracted_versions 8.0.1 8.1
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0536
  • certification_date: 01.02.2017
  • claim: EAL2+ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0536_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is Hitachi Device Manager software and Hitachi Tiered Storage Manager software. The TOE has functionality to manage the input or modification of information that expresses a storage system configuration (abbreviated hereafter to storage resource information). TOE security functionality The TOE provides the following security functionality: - Identification/authentication functionality(The TOE also makes it possible to use external authentication functionality provided by external authentication servers, and to use functionality for linking with external authentication groups.) - Access control functionality for storage resource information and for warning banner information - Warning banner functionality
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software
    • product_type: Access Control Device and Systems
    • report_link: https://www.ipa.go.jp/en/security/c0536_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0536_est.pdf
    • toe_version: 8.0.1-02
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.03.2022
  • supplier: Hitachi, Ltd.
  • toe_japan_name: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0536_it5576.html
  • toe_overseas_name: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02
heuristics/protection_profiles {} c88af12926be2779, df09b703c88c665a, f4474c6c73660987
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf
pdf_data/cert_filename c0536_eimg.pdf st_vid10927-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10927-2018: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL 2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
  • ALC:
    • ALC_FLR: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_metadata
  • /CreationDate: D:20170911161211+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /ModDate: D:20170911161350+09'00'
  • /Producer: Adobe PDF Library 11.0
  • /Title:
  • pdf_file_size_bytes: 453124
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
  • /CreationDate: D:20181221112350-05'00'
  • /ModDate: D:20181221112350-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 183757
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0536_erpt.pdf st_vid10927-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-10927-2018
    • cert_item: Samsung Electronics Co., Ltd. 416 Maetan-3dong, Yeongtong-gu, Suwon-si, Gyeonggi-do, 443-742 Korea Samsung Galaxy Devices on Android 8.0 and 8.1
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0536-01: 1
    • Certification No. C0536: 1
  • US:
    • CCEVS-VR-10927-2018: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMINISTRATORS: 1
    • A.CLIENTS: 1
    • A.NETWORKS: 1
    • A.PASSWORD: 1
    • A.PHYSICAL: 2
    • A.SECURE_CHANNEL: 1
    • A.SRV_MGMT: 1
  • T:
    • T.ILLEGAL_ACCESS: 1
    • T.UNAUTHORISED_ACCESS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Qualcomm:
    • Qualcomm: 18
  • Samsung:
    • Samsung: 50
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA-PSS: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 13
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • PKCS:
    • PKCS #1: 1
  • X509:
    • X.509: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Knox-specific claims made in this evaluation. All other functionality provided by the container is out of scope. 7 Documentation The following documents were available with the TOE for evaluation: Samsung: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20171211090255+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20171211090339+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 207872
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 34
  • /CreationDate: D:20181221111626-05'00'
  • /ModDate: D:20181221111626-05'00'
  • pdf_file_size_bytes: 641683
  • pdf_hyperlinks: https://web.nvd.nist.gov/view/vuln/search
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename c0536_est.pdf st_vid10927-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 8
    • EAL2 augmented: 3
  • EAL:
    • EAL 1: 4
    • EAL 1 augmented: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 4
    • ALC_CMS: 1
    • ALC_CMS.1: 5
    • ALC_TSU_EXT: 2
    • ALC_TSU_EXT.1: 11
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL: 2
    • FAU_SEL.1: 1
    • FAU_SEL.1.1: 1
    • FAU_STG: 4
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 12
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 11
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 1
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.3: 6
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 2
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 1
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 47
    • FCS_RBG_EXT: 6
    • FCS_RBG_EXT.1: 13
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_RBG_EXT.2: 1
    • FCS_RBG_EXT.2.1: 1
    • FCS_SRV_EXT: 4
    • FCS_SRV_EXT.1: 1
    • FCS_SRV_EXT.1.1: 1
    • FCS_SRV_EXT.2: 1
    • FCS_SRV_EXT.2.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 2
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 2
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 14
    • FCS_TLSC_EXT.1: 11
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF_EXT: 5
    • FDP_ACF_EXT.1: 2
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 1
    • FDP_ACF_EXT.2: 1
    • FDP_ACF_EXT.2.1: 1
    • FDP_ACF_EXT.3: 1
    • FDP_ACF_EXT.3.1: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 1
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 2
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 3
    • FDP_IFC_EXT.1: 1
    • FDP_IFC_EXT.1.1: 1
    • FDP_PBA_EXT: 2
    • FDP_PBA_EXT.1: 1
    • FDP_PBA_EXT.1.1: 1
    • FDP_RIP: 2
    • FDP_RIP.2: 1
    • FDP_RIP.2.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 2
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 3
    • FDP_UPC_EXT.1: 1
    • FDP_UPC_EXT.1.1: 1
    • FDP_UPC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT: 4
    • FIA_AFL_EXT.1: 2
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 14
    • FIA_BLT_EXT.1: 1
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 1
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.6: 1
    • FIA_BLT_EXT.6.1: 1
    • FIA_BMG_EXT.1: 14
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 1
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 3
    • FIA_PSK_EXT.1: 1
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 1
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 6
    • FIA_UAU.5: 1
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.7: 1
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 9
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.4: 1
    • FIA_UAU_EXT.4.1: 1
    • FIA_UAU_EXT.4.2: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 1
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 9
    • FMT_SMF: 4
    • FMT_SMF.1: 1
    • FMT_SMF_EXT: 10
    • FMT_SMF_EXT.1: 8
    • FMT_SMF_EXT.1.1: 9
    • FMT_SMF_EXT.2: 1
    • FMT_SMF_EXT.2.1: 1
    • FMT_SMF_EXT.3: 3
    • FMT_SMF_EXT.3.1: 1
  • FPT:
    • FPT_AEX_EXT: 15
    • FPT_AEX_EXT.1: 1
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 1
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 1
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_AEX_EXT.5: 1
    • FPT_AEX_EXT.5.1: 1
    • FPT_AEX_EXT.5.2: 1
    • FPT_AEX_EXT.6: 1
    • FPT_AEX_EXT.6.1: 1
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 1
    • FPT_BBD_EXT.1.1: 1
    • FPT_JTA_EXT: 3
    • FPT_JTA_EXT.1: 1
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 1
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 1
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 1
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 1
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 13
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 10
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 4
    • FTA_SSL_EXT.1: 1
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 2
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 2
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_BLT_EXT: 1
    • FTP_ITC_EXT: 7
    • FTP_ITC_EXT.1: 3
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMINISTRATORS: 4
    • A.CLIENTS: 3
    • A.NETWORKS: 3
    • A.PASSWORD: 4
    • A.PHYSICAL: 4
    • A.SECURE_CHANNEL: 3
    • A.SRV_MGMT: 4
  • O:
    • O.BANNER: 6
    • O.MGMT: 9
    • O.PASSWORD: 7
  • T:
    • T.ILLEGAL_ACCESS: 4
    • T.UNAUTHORISED_ACCESS: 3
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
    • Microsoft Corporation: 4
  • Broadcom:
    • Broadcom: 2
  • Qualcomm:
    • Qualcomm: 20
  • Samsung:
    • Samsung: 118
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
      • AES-: 2
      • AES-128: 1
      • AES-256: 17
  • constructions:
    • MAC:
      • HMAC: 11
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 4
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 14
  • FF:
    • DH:
      • DH: 6
      • DHE: 1
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 2048: 3
    • RSA-PSS: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF: 1
    • PBKDF2: 1
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-256: 21
      • SHA-384: 2
      • SHA-512: 5
      • SHA256: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 12
    • IKEv1: 12
    • IKEv2: 11
  • IPsec:
    • IPsec: 40
  • TLS:
    • TLS:
      • TLS: 43
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 2
  • VPN:
    • VPN: 96
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 7
  • RNG:
    • RBG: 13
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 6
  • XTS:
    • XTS: 6
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 14
    • P-384: 10
    • P-521: 8
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 23
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
  • ARM:
    • TrustZone: 9
  • IBM:
    • SE: 2
  • other:
    • Kinibi: 1
    • TEE: 23
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS 180-4: 6
    • FIPS 186-4: 7
    • FIPS 197: 8
    • FIPS 198-1: 5
    • FIPS PUB 186-4: 7
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-132: 1
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 800-108: 4
    • SP 800-132: 1
    • SP 800-38A: 2
    • SP 800-38C: 1
    • SP 800-38E: 2
    • SP 800-38F: 1
    • SP 800-56A: 1
    • SP 800-90A: 4
  • PKCS:
    • PKCS #1: 1
    • PKCS 1: 2
    • PKCS 2: 1
    • PKCS#12: 2
  • RFC:
    • RFC 2560: 2
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 3602: 2
    • RFC 4106: 2
    • RFC 4109: 1
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4346: 1
    • RFC 4492: 2
    • RFC 4945: 2
    • RFC 5216: 1
    • RFC 5246: 11
    • RFC 5280: 3
    • RFC 5282: 2
    • RFC 5288: 1
    • RFC 5289: 8
    • RFC 5430: 2
    • RFC 5759: 1
    • RFC 6125: 1
    • RFC 6379: 2
  • X509:
    • X.509: 6
pdf_data/st_keywords/javacard_packages
  • com:
    • com.samsung.android.knox.net.vpn: 1
  • java:
    • java.security.cert: 1
pdf_data/st_metadata
  • /CreationDate: D:20171130192201+09'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20171130192201+09'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1103262
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different