Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Oracle Linux 9.3
653-EWA
Swissbit TSE SMAERS Firmware
BSI-DSZ-CC-1121-V2-2021
name Oracle Linux 9.3 Swissbit TSE SMAERS Firmware
category Operating Systems Other Devices and Systems
scheme CA DE
not_valid_after 14.02.2030 12.03.2029
not_valid_before 14.02.2025 12.03.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/653-EWA%20CT%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1121V2c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/653-EWA%20CR%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1121V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/653-EWA%20ST%20v1.5.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1121V2b_pdf.pdf
manufacturer Oracle Corporation Swissbit AG
manufacturer_web https://www.oracle.com https://www.swissbit.com/de/
security_level {} EAL2
dgst be8e046b00e33ce3 6cdbbb18e35a7857
heuristics/cert_id 653-EWA BSI-DSZ-CC-1121-V2-2021
heuristics/cert_lab [] BSI
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ALC_CMS.2, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2
heuristics/extracted_versions 9.3 -
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1121-2019, BSI-DSZ-CC-1118-2020
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1059-V2-2019, BSI-DSZ-CC-1118-2020, BSI-DSZ-CC-1121-2019
heuristics/scheme_data
  • certification_date: 14.02.2025
  • level: PP_OS_V4.3, PKG_TLS_V1.1, PKG_SSH_V1.0
  • product: Oracle Linux 9.3
  • vendor: Oracle Corporation
  • category: Fiscalisation
  • cert_id: BSI-DSZ-CC-1121-V2-2021
  • certification_date: 12.03.2021
  • enhanced:
    • applicant: Swissbit AG Industriestraße 4 9552 Bronschhofen Schweiz
    • assurance_level: EAL2
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1121V2c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 12.03.2021
    • description: The Target of Evaluation (TOE) is a SMAERS Applet with a small additional part of Hardware. The TOE exists in three different physical configurations (micro SD, SD or USB-Token). Their differences are solely based on the physical form factor and a different controller.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-1121-V2-2021-MA-01 (Ausstellungsdatum / Certification Date 31.03.2023) Maintenance Report / Maintenancereport Die Swissbit TSE SMAERS Firmware selbst hat sich nicht geändert, einzig die Umgebung welches bei der USB Version zu einer neuen Versionsnummer führt.', 'description': 'Swissbit TSE SMAERS Firmware'}), frozendict({'id': 'BSI-DSZ-CC-1121-V2-2021', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-1121-2019-RA-01', 'description': 'The result of the original certification has been confirmed.'}), frozendict({'id': 'BSI-DSZ-CC-1121-2019 (19.12.2019)', 'description': 'Certificate'})]
    • evaluation_facility: MTG AG
    • expiration_date: 11.03.2029
    • product: Swissbit TSE SMAERS Firmware
    • protection_profile: Security Module Application for Electronic Record-keeping Systems (SMAERS) Version 0.7.5, 6 March 2019, BSI-CC-PP-0105-2019
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1121V2a_pdf.pdf?__blob=publicationFile&v=2
  • product: Swissbit TSE SMAERS Firmware
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Fiskalisierung/1121_1121V2.html
  • vendor: Swissbit AG
heuristics/protection_profiles c40ae795865a0dba, ed9c9d74c3710878, 3d6ad6fde534f6c6 faf328d504ee2404
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0105b_pdf.pdf
pdf_data/cert_filename 653-EWA CT v1.0.pdf 1121V2c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 653-EWA: 1
  • DE:
    • BSI-DSZ-CC-1121-V2-2021: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0105-2019: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Clark, Cory P.
  • /CreationDate: D:20250218135452-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: 03c3dcc6-6bfd-4194-a625-fb83b8d0389e
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2023-05-16T11:46:20Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250218135452-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 185393
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20210323152435+01'00'
  • /Creator: Writer
  • /Keywords: Common Criteria, Certification, Zertifizierung, Registrierkasse, TSE, PP 105, Swissbit AG
  • /ModDate: D:20210323152545+01'00'
  • /Producer: LibreOffice 6.3
  • /Subject: Common Criteria Certification
  • /Title: Certificate BSI-DSZ-CC-1121-V2-2021
  • pdf_file_size_bytes: 250799
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 653-EWA CR v1.0.pdf 1121V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • CA:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 2 SOGIS Recognition Agreement
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1121-V2-2021
    • cert_item: Swissbit TSE SMAERS Firmware
    • cert_lab: BSI
    • developer: Swissbit AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security Module Application for Electronic Record- keeping Systems (SMAERS) Version 0.7.5, 6 March 2019, BSI-CC-PP-0105-2019
  • CA:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1118-2020: 3
    • BSI-DSZ-CC-1121-2019: 2
    • BSI-DSZ-CC-1121-V2-2021: 15
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0105-2019: 1
    • BSI-CC-PP-0105-2019: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 6
    • EAL 4: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL: 2
    • ALC_DEL.1: 1
    • ALC_FLR: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • MTG:
    • MTG AG: 3
  • TSystems:
    • T-Systems International: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • TLS:
    • TLS:
      • TLS: 1
  • PACE:
    • PACE: 8
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
    • BSI TR-03116: 4
    • BSI TR-03151: 2
    • BSI TR-03153: 2
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • BSI:
    • AIS 20: 1
    • AIS 32: 1
    • AIS 46: 1
    • AIS14: 1
    • AIS19: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 197: 2
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 1
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 7816-6: 1
  • NIST:
    • NIST SP 800-38B: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. The user of the OS is not willfully negligent or hostile, and uses the software in: 1
    • out of scope: 1
  • ConfidentialDocument:
    • Report, Version 2.4, 11 March 2021, ETR Part Summary, MTG AG Prüfstelle für IT-Sicherheit, (confidential document) [8] Security Module Application for Electronic Record-keeping Systems (SMAERS) Version 0.7.5, 6: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /Author: Clark, Cory P.
  • /CreationDate: D:20250218133709-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: f4235719-a1a3-4fb4-8b18-a47ac84bac11
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2022-07-20T10:41:47Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250218133709-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 336111
  • pdf_hyperlinks: https://www.cisa.gov/known-exploited-vulnerabilities-catalog, mailto:[email protected], https://linux.oracle.com/security/, https://nvd.nist.gov/vuln/search
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename 653-EWA ST v1.5.pdf 1121V2b_pdf.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
    • ALC_TSU_EXT.1: 8
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_FSP: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 1
  • FCS:
    • FCS_CKM.1: 4
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 9
    • FCS_CKM_EXT.4.1: 3
    • FCS_CKM_EXT.4.2: 2
    • FCS_COP: 27
    • FCS_COP.1: 4
    • FCS_DTLS_EXT.1: 1
    • FCS_RBG_EXT.1: 8
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SSHC_EXT.1: 10
    • FCS_SSHC_EXT.1.1: 2
    • FCS_SSHS_EXT.1: 8
    • FCS_SSHS_EXT.1.1: 2
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSH_EXT.1: 10
    • FCS_SSH_EXT.1.1: 2
    • FCS_SSH_EXT.1.2: 4
    • FCS_SSH_EXT.1.3: 3
    • FCS_SSH_EXT.1.4: 3
    • FCS_SSH_EXT.1.5: 3
    • FCS_SSH_EXT.1.6: 3
    • FCS_SSH_EXT.1.7: 3
    • FCS_SSH_EXT.1.8: 3
    • FCS_STO_EXT.1: 10
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 11
    • FCS_TLSC_EXT.1.1: 3
    • FCS_TLSC_EXT.1.2: 3
    • FCS_TLSC_EXT.1.3: 3
    • FCS_TLSC_EXT.5: 7
    • FCS_TLSC_EXT.5.1: 3
    • FCS_TLSS_EXT: 5
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLS_EXT.1: 3
  • FDP:
    • FDP_ACF_EXT.1: 8
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT.1: 7
    • FDP_IFC_EXT.1.1: 2
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 7
    • FMT_MOF_EXT.1.1: 2
    • FMT_SMF_EXT.1: 7
    • FMT_SMF_EXT.1.1: 4
  • FPT:
    • FPT_ACF_EXT.1: 7
    • FPT_ACF_EXT.1.1: 2
    • FPT_ACF_EXT.1.2: 2
    • FPT_ASLR_EXT.1: 7
    • FPT_ASLR_EXT.1.1: 2
    • FPT_SBOP_EXT.1: 7
    • FPT_SBOP_EXT.1.1: 2
    • FPT_TST_EXT.1: 8
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT.1: 8
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.2: 7
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
  • FTP:
    • FTP_ITC_EXT.1: 7
    • FTP_ITC_EXT.1.1: 2
    • FTP_TRP: 1
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN.1: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 8
    • FCS_COP.1.1: 1
    • FCS_RNG.1: 5
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 25
    • FDP_ACC.1: 23
    • FDP_ACF: 14
    • FDP_ACF.1: 15
    • FDP_DAU: 4
    • FDP_ETC: 15
    • FDP_ETC.2: 7
    • FDP_IFC.1: 16
    • FDP_ITC: 20
    • FDP_ITC.1: 5
    • FDP_ITC.2: 18
    • FDP_RIP: 7
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_ATD: 1
    • FIA_ATD.1: 7
    • FIA_UAU: 6
    • FIA_UAU.1: 5
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 2
    • FIA_UAU.6: 5
    • FIA_UID: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 2
    • FIA_USB: 1
    • FIA_USB.1: 4
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 2
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 4
    • FMT_MSA: 2
    • FMT_MSA.1: 16
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 5
    • FMT_MSA.2.1: 3
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4: 11
    • FMT_MSA.4.1: 2
    • FMT_MTD: 21
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 10
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TDC: 1
    • FPT_TDC.1: 14
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 2
    • FPT_TEE: 1
    • FPT_TEE.1: 25
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
    • FPT_TRP.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 12
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 9
    • FTP_ITC.1: 10
    • FTP_TRP.1: 6
pdf_data/st_keywords/cc_claims
  • A:
    • A.PLATFORM: 3
    • A.PROPER_ADMIN: 3
    • A.PROPER_USER: 3
  • O:
    • O.ACCOUNTABILITY: 3
    • O.INTEGRITY: 5
    • O.MANAGEMENT: 5
    • O.PROTECTED_COMMS: 5
    • O.PROTECTED_STORAGE: 3
  • OE:
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 2
    • T.LOCAL_ATTACK: 2
    • T.NETWORK_ATTACK: 6
    • T.NETWORK_EAVESDROP: 4
  • A:
    • A.C: 1
    • A.CSP: 1
    • A.V: 1
  • O:
    • O.G: 1
    • O.I: 1
    • O.IA: 1
    • O.IAA: 4
    • O.T: 2
    • O.TEE: 9
    • O.TST: 2
  • OE:
    • OE.CSP: 3
    • OE.ERS: 3
    • OE.SUCP: 2
  • T:
    • T.M: 5
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
      • AES-: 1
  • constructions:
    • MAC:
      • HMAC: 8
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 6
      • AES-256: 2
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
  • ECC:
    • ECC:
      • ECC: 7
    • ECDSA:
      • ECDSA: 1
pdf_data/st_keywords/pq_crypto
  • LMS:
    • LMS: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 10
      • SHA-384: 8
      • SHA-512: 9
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSH: 73
    • SSHv2: 1
  • TLS:
    • DTLS:
      • DTLS: 2
    • TLS:
      • TLS: 50
      • TLS 1.1: 1
      • TLS 1.2: 3
      • TLS v1.2: 5
  • VPN:
    • VPN: 11
  • PACE:
    • PACE: 21
  • TLS:
    • TLS:
      • TLS: 6
      • TLS 1.2: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 6
  • RNG:
    • RBG: 5
  • RNG:
    • RNG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 4
  • GCM:
    • GCM: 4
  • GCM:
    • GCM: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-384: 14
    • P-521: 10
    • secp384r1: 4
    • secp521r1: 4
  • Brainpool:
    • brainpoolP256r1: 3
    • brainpoolP384r1: 1
    • brainpoolP512r1: 1
  • NIST:
    • Curve P-256: 1
    • Curve P-384: 1
    • Curve P-521: 1
    • P-256: 1
    • P-384: 1
    • P-521: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 16
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102-1: 1
    • BSI TR-03111: 1
    • BSI TR-03116: 1
    • BSI TR-03116-5: 1
    • BSI TR-03145: 1
    • BSI TR-03151: 1
    • BSI TR-03153: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
  • other:
    • TEE: 9
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 186-5: 12
  • NIST:
    • NIST SP 800-38A: 9
    • NIST SP 800-38D: 3
    • NIST SP 800-57: 4
    • SP 800-186: 1
  • RFC:
    • RFC 3526: 1
    • RFC 4251: 4
    • RFC 4252: 8
    • RFC 4253: 13
    • RFC 4256: 1
    • RFC 4344: 5
    • RFC 5246: 9
    • RFC 5280: 5
    • RFC 5288: 7
    • RFC 5289: 14
    • RFC 5647: 6
    • RFC 5656: 40
    • RFC 5759: 1
    • RFC 6066: 1
    • RFC 6125: 3
    • RFC 6187: 12
    • RFC 6668: 8
    • RFC 6960: 1
    • RFC 6961: 1
    • RFC 8268: 5
    • RFC 8332: 24
    • RFC 8603: 2
    • RFC 8709: 6
    • RFC 8731: 2
  • X509:
    • X.509: 16
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-4: 1
    • FIPS 186-4: 1
    • FIPS 197: 1
    • FIPS PUB 198-1: 1
  • ICAO:
    • ICAO: 1
  • ISO:
    • ISO/IEC 18033-3: 1
    • ISO/IEC 21827:2008: 1
    • ISO/IEC 7816-3: 1
  • NIST:
    • NIST SP 800-38B: 1
    • SP 800-38E: 1
  • RFC:
    • RFC-2986: 1
    • RFC-5246: 2
    • RFC-5280: 1
    • RFC-5639: 4
    • RFC-6816: 1
    • RFC-8446: 2
  • X509:
    • X.509: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/st_metadata
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different