name |
Oracle Linux 9.3 |
SafeNet eToken - Athena IDProtect/OS755 Java Card on Atmel AT90SC25672RCT-USB Microcontroller embedding IDSign applet |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
FR |
status |
active |
archived |
not_valid_after |
14.02.2030 |
01.09.2019 |
not_valid_before |
14.02.2025 |
04.03.2011 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/653-EWA%20CT%20v1.0.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/653-EWA%20CR%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-03fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/653-EWA%20ST%20v1.5.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-03en.pdf |
manufacturer |
Oracle Corporation |
Athena Smartcard Solutions Inc. / Inside Secure S.A. |
manufacturer_web |
https://www.oracle.com |
https://www.athena-scs.com/ |
security_level |
{} |
EAL4+, AVA_VAN.5 |
dgst |
be8e046b00e33ce3 |
b073ef869fe6ab90 |
heuristics/cert_id |
653-EWA |
ANSSI-CC-2011/03 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, AGD_ADM.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, AVA_VLA.4, ADV_FSP.4, ATE_IND.2, ADV_LLD.1, ASE_CCL.1, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
9.3 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2012/43, ANSSI-CC-2011/45 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2006/30 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2012/43, ANSSI-CC-2011/45 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2006/30 |
heuristics/scheme_data |
- certification_date: 14.02.2025
- level: PP_OS_V4.3, PKG_TLS_V1.1, PKG_SSH_V1.0
- product: Oracle Linux 9.3
- vendor: Oracle Corporation
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2006/30 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2006/30 |
heuristics/protection_profiles |
c40ae795865a0dba, ed9c9d74c3710878, 3d6ad6fde534f6c6 |
9863a376f3bb4175, 40002c3611fc465f |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0005b.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf |
pdf_data/cert_filename |
653-EWA CT v1.0.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Clark, Cory P.
- /CreationDate: D:20250218135452-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: 03c3dcc6-6bfd-4194-a625-fb83b8d0389e
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2023-05-16T11:46:20Z
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
- /ModDate: D:20250218135452-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 185393
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
653-EWA CR v1.0.pdf |
ANSSI-CC_2011-03fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 2
- cert_id: ANSSI-CC-2011/03
- cert_item: SafeNet eToken (Smartcard or USB token) Version 9.1 Athena IDProtect/OS755 Java Card on Atmel AT90SC25672RCT-USB Microcontroller embedding IDSign applet
- cert_item_version: - Athena IDProtect/OS755 Java Card : release date 0113, release level 0109 - Atmel AT90SC25672RCT-USB Microcontroller : AT58829, révision D - Atmel Toolbox version: 00.03.11.05 - Athena IDSign applet : version 3.0, build 001
- cert_lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected]
- developer: Athena Smartcard Solutions Inc. 1-14-16, Motoyokoyama-cho Hachioji-shi, Tokyo, 192-0063, Japan Inside Secure S.A. Maxwell Building - Scottish Enterprise technology Park, East Kilbride, G75 0QR, Scotland, United Kingdom Commanditaire SafeNet Inc. 4690 Millenium Drive, Belcamp, MD 21017, USA
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2006_30: 2
- ANSSI-CC-2011/03: 19
- ANSSI-CC-PP-1998_06: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- BSI:
- BSI-PP- 0005-2002: 1
- BSI-PP- 0006-2002: 1
- BSI-PP-0005-: 1
- BSI-PP-0005-2002: 3
- BSI-PP-0006-: 1
- BSI-PP-0006-2002: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 3
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_MSU.3: 2
- AVA_VAN: 1
- AVA_VAN.5: 3
- AVA_VLA.4: 2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
- AtmelToolbox:
- ATMEL Toolbox 00.03.11.05: 3
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
- ATMEL:
- ATMEL AT90SC25672RCT-USB: 3
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. The user of the OS is not willfully negligent or hostile, and uses the software in: 1
- out of scope: 1
|
|
pdf_data/report_metadata |
- /Author: Clark, Cory P.
- /CreationDate: D:20250218133709-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: f4235719-a1a3-4fb4-8b18-a47ac84bac11
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2022-07-20T10:41:47Z
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
- /ModDate: D:20250218133709-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 336111
- pdf_hyperlinks: https://www.cisa.gov/known-exploited-vulnerabilities-catalog, mailto:[email protected], https://linux.oracle.com/security/, https://nvd.nist.gov/vuln/search
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /CreationDate: D:20110330183157+02'00'
- /Keywords:
- /ModDate: D:20110330183157+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- pdf_file_size_bytes: 200123
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
653-EWA ST v1.5.pdf |
ANSSI-CC-cible_2011-03en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- AU:
- Certification Report 2006/30: 1
- FR:
- Certification Report 2006/30: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0005-2002: 1
- BSI-PP-0006-2002: 1
- BSI-PP-002-2001: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 4+: 7
- EAL4: 7
- EAL4 augmented: 2
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ALC_TSU_EXT.1: 8
- ATE:
- AVA:
|
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 3
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_ADM.1: 1
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- AGD_USR.1: 1
- ALC:
- ALC_CMC.4: 3
- ALC_CMS.4: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 3
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.3: 1
- AVA_SOF.1: 2
- AVA_VAN: 1
- AVA_VAN.5: 10
- AVA_VLA.4: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 3
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 1
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.4: 9
- FCS_CKM_EXT.4.1: 3
- FCS_CKM_EXT.4.2: 2
- FCS_COP: 27
- FCS_COP.1: 4
- FCS_DTLS_EXT.1: 1
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSHC_EXT.1: 10
- FCS_SSHC_EXT.1.1: 2
- FCS_SSHS_EXT.1: 8
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.3: 1
- FCS_SSH_EXT.1: 10
- FCS_SSH_EXT.1.1: 2
- FCS_SSH_EXT.1.2: 4
- FCS_SSH_EXT.1.3: 3
- FCS_SSH_EXT.1.4: 3
- FCS_SSH_EXT.1.5: 3
- FCS_SSH_EXT.1.6: 3
- FCS_SSH_EXT.1.7: 3
- FCS_SSH_EXT.1.8: 3
- FCS_STO_EXT.1: 10
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT.1: 11
- FCS_TLSC_EXT.1.1: 3
- FCS_TLSC_EXT.1.2: 3
- FCS_TLSC_EXT.1.3: 3
- FCS_TLSC_EXT.5: 7
- FCS_TLSC_EXT.5.1: 3
- FCS_TLSS_EXT: 5
- FCS_TLSS_EXT.1.1: 1
- FCS_TLS_EXT.1: 3
- FDP:
- FDP_ACF_EXT.1: 8
- FDP_ACF_EXT.1.1: 1
- FDP_IFC_EXT.1: 7
- FDP_IFC_EXT.1.1: 2
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT.1: 7
- FMT_MOF_EXT.1.1: 2
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 4
- FPT:
- FPT_ACF_EXT.1: 7
- FPT_ACF_EXT.1.1: 2
- FPT_ACF_EXT.1.2: 2
- FPT_ASLR_EXT.1: 7
- FPT_ASLR_EXT.1.1: 2
- FPT_SBOP_EXT.1: 7
- FPT_SBOP_EXT.1.1: 2
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT.1: 8
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.2: 7
- FPT_TUD_EXT.2.1: 2
- FPT_TUD_EXT.2.2: 2
- FTP:
- FTP_ITC_EXT.1: 7
- FTP_ITC_EXT.1.1: 2
- FTP_TRP: 1
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FCS:
- FCS_ACC.1: 1
- FCS_CKM.1: 2
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 3
- FCS_CKM.4.1: 1
- FCS_COP.1: 7
- FDP:
- FDP_ACC.1: 7
- FDP_ACF.1: 21
- FDP_ETC.1: 3
- FDP_ITC.1: 8
- FDP_RIP.1: 1
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 5
- FDP_UCT.1: 4
- FDP_UIT.1: 11
- FIA:
- FIA_AFL.1: 1
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 1
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID.1: 2
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 3
- FMT_MSA.1: 3
- FMT_MSA.2: 1
- FMT_MSA.2.1: 1
- FMT_MSA.3: 1
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 1
- FMT_MTD.1.1: 1
- FMT_SMF.1: 1
- FMT_SMF.1.1: 1
- FMT_SMR.1: 1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 1
- FPT_FLS.1.1: 1
- FPT_PHP.1: 1
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 1
- FPT_PHP.3.1: 1
- FPT_TEE.1: 1
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
- FPT_TST.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 24
- FTP_TRP: 4
- FTP_TRP.1: 8
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 3
- A.PROPER_ADMIN: 3
- A.PROPER_USER: 3
- O:
- O.ACCOUNTABILITY: 3
- O.INTEGRITY: 5
- O.MANAGEMENT: 5
- O.PROTECTED_COMMS: 5
- O.PROTECTED_STORAGE: 3
- OE:
- OE.PLATFORM: 3
- OE.PROPER_ADMIN: 3
- OE.PROPER_USER: 3
- T:
- T.LIMITED_PHYSICAL_ACCESS: 2
- T.LOCAL_ATTACK: 2
- T.NETWORK_ATTACK: 6
- T.NETWORK_EAVESDROP: 4
|
- A:
- OE:
- OT:
- OT.CCLI_END: 1
- OT.PATCH_END: 1
- OT.PATCH_SEC: 1
- T:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 8
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA2:
- SHA-256: 10
- SHA-384: 8
- SHA-512: 9
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- DTLS:
- TLS:
- TLS: 50
- TLS 1.1: 1
- TLS 1.2: 3
- TLS v1.2: 5
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-384: 14
- P-521: 10
- secp384r1: 4
- secp521r1: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
- AtmelToolbox:
- Atmel Toolbox 00.03.11.05: 3
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 186-4: 1
- FIPS PUB 186-5: 12
- NIST:
- NIST SP 800-38A: 9
- NIST SP 800-38D: 3
- NIST SP 800-57: 4
- SP 800-186: 1
- RFC:
- RFC 3526: 1
- RFC 4251: 4
- RFC 4252: 8
- RFC 4253: 13
- RFC 4256: 1
- RFC 4344: 5
- RFC 5246: 9
- RFC 5280: 5
- RFC 5288: 7
- RFC 5289: 14
- RFC 5647: 6
- RFC 5656: 40
- RFC 5759: 1
- RFC 6066: 1
- RFC 6125: 3
- RFC 6187: 12
- RFC 6668: 8
- RFC 6960: 1
- RFC 6961: 1
- RFC 8268: 5
- RFC 8332: 24
- RFC 8603: 2
- RFC 8709: 6
- RFC 8731: 2
- X509:
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- FIPS:
- FIPS 140-2: 4
- FIPS PUB 140-2: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-: 2
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- RSA:
- ALG_RSA_NOPAD: 1
- ALG_RSA_PCKS1: 1
- ALG_RSA_SHA_ISO9796: 1
- ALG_RSA_SHA_PKCS1: 1
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- out of scope: 1
|
- OutOfScope:
- a manner that any subsequent change of the data is detectable The SafeNet eToken Java applet is out of scope of the TOE. This Java Card applet is used to provide cryptographic and secure storage services to: 1
- out of scope: 1
|
pdf_data/st_metadata |
|
- /CreationDate: D:20110315145300+01'00'
- /Keywords:
- /ModDate: D:20110315145300+01'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 1045407
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |