Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
iDeras Unified Threat Management (UTM) v5.02
ISCB-5-RPT-C045-CR-v1a
IDEMIA TnD v5.1 on ID-One Cosmo X (EAC Configuration)
NSCIB-CC-2300062-02-CR2
name iDeras Unified Threat Management (UTM) v5.02 IDEMIA TnD v5.1 on ID-One Cosmo X (EAC Configuration)
category Boundary Protection Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme MY NL
status archived active
not_valid_after 04.11.2018 23.11.2028
not_valid_before 04.11.2013 23.11.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300062-02-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C045-CR-v1a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300062-02-CR2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2013-10-18-iDeras-ST-v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FQR%20220%201726%20Ed%202%20-%20Public%20Security%20Target%20TnD%20v5.1%20on%20ID-One%20Cosmo%20X%20Platform%20(EAC%20Configuration).pdf
manufacturer Infosys Gateway Sdn Bhd Idemia
manufacturer_web https://www.infosysgateway.com.my https://www.idemia.com
security_level EAL2 EAL5+, AVA_VAN.5, ALC_DVS.2
dgst c0bf0d3a99d94f0a 84e91ad536aa3810
heuristics/cert_id ISCB-5-RPT-C045-CR-v1a NSCIB-CC-2300062-02-CR2
heuristics/cert_lab []
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2
heuristics/extracted_versions 5.02 5.1
heuristics/report_references/directly_referencing {} NSCIB-CC-2300050-01-CR
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022, ANSSI-CC-2023/06, NSCIB-CC-2300050-01-CR
heuristics/scheme_data
  • cert_no: 2013-008-C045
  • certification_date: 04.11.2013
  • developer: Infosys Gateway Sdn Bhd
  • enhanced:
    • assurance_level: EAL2
    • category: Boundary Protection Devices and Systems
    • cert_id: C045
    • certification_date: 04.11.2013
    • developer: Izzati Rasheeqa Abdullah Infosys Gateway Sdn BhdUnit 808, 8th Floor, Block E, Phileo Damansara I,No.9, Jalan 16/11, Off Jalan Damansara,46350 Petaling Jaya, Selangor Darul EhsanMALAYSIA URL: http://www.infosysgateway.com.myEmail: [email protected]: +603 7931 5800Fax: +603 7958 1930
    • expiration_date: 04.11.2018
    • mutual_recognition: MyCC
    • product: iDeras Unified Threat Management (UTM) v5.02
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C045/ISCB-5-RPT-C045-CR-v1a.pdf
    • scope: The Target of Evaluation (TOE) is iDeras Unified Threat Management (UTM) v5.02 or known as iDeras. The TOE is a Unified Threat Management (UTM) or hybrid solution consists of firewall packet filtering technology, offering server hosting services, network security with management features, and gateway security management within a single appliance. The scope of the evaluation only covers network gateway functions that are responsible to manage the enterprise network traffic flow. The TOE includes other supporting features that are not part of TOE scope such as Intrusion Detection/Prevention, antimalware, content filtering, VPN, network management, hosting server, and other features specified in Section 2.6.3 of the Security Target. The scope of evaluation covers major security features as follows: Identification and Authentication - TOE administrator can access TOE by providing username and password in the Webconfig interface and CLI interface. TOE administrator will be granted role based on built-in Groups, access to services and pages within Webconfig. Password for each administrator account is governed by password policy. TOE administrator is able to modify the existing configurable settings as per required by the organisational security policies implemented or enforced. User Data Protection – The TOE has capabilities of protecting internal network from external network intrusion by using information flow controls between internal and external network. The TOE will check the inbound and outbound IP network protocols, contents and ports before allowing or rejecting the IP network and packets. TOE Administrator can configure packet filter rules and policies based on the subject and information security attributes. By default, all external (internet) traffic will be blocked. TOE administrator can configure any services, ports and protocols that are accessible between Internet and internal networks. Security Management - TOE features can be managed through Webconfig and CLI by the TOE administrator. User of TOE, whom is assigned with TOE administrator roles, is configurable using built-in feature by assigning to administrator account “admin”. TOE administrator could enable, disable, modify the behaviour of services controlled by TOE packet filtering rules, user attributes values, network setting, time-of-day web access, NTP Time server, backup and restore configuration setting, restart and shutdown functions, password policies, and related functions of TOE. Security Audit - The TOE will generate audit records for selected security events in several log files and categories. Each audited events will be recorded along with date and time of event, account user who performed the event, event name, system filename related to event and other event details. Audit record can be viewed by TOE administrator but it cannot be edited. TOE Administrator could select and filter the logs for easy viewing. TOE will create a new log file to store the audit records if the size limit is reached for a single log file. Limitation of the log storage is based on the internal hard disk equipped within the TOE appliance. Protection of the TSF - The security audit functions will generate audit records of events along with date and time of event. To ensure a reliable date and time, TOE enforce the time stamps to be taken from a reliable source from the environment. TOE prevents modification of date and time manually.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C045/2013-10-18-iDeras-ST-v1.3.pdf
    • type: Boundary Protection Devices and Systems
  • expiration_date: 04.11.2018
  • level: EAL2
  • product: iDeras Unified Threat Management (UTM) v5.02
  • recognition: MyCC
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/59
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-2300050-01-CR
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-2300050-01-CR
heuristics/protection_profiles {} a33327d40f253f46
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf
pdf_data/cert_filename NSCIB-CC-2300062-02-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • NSCIB-2300062-02: 1
    • NSCIB-CC-2300062-02: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL2: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.3: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
  • Idemia:
    • IDEMIA: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ICAO:
    • ICAO: 1
  • ISO:
    • ISO/IEC 15408-1: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 18045:2008: 1
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Microsoft Office User
  • /CreationDate: D:20231215190331+00'00'
  • /Creator: Microsoft® Word 2021
  • /ModDate: D:20231215190331+00'00'
  • /Producer: Microsoft® Word 2021
  • /Title: NSCIB Certificate
  • pdf_file_size_bytes: 90341
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename ISCB-5-RPT-C045-CR-v1a.pdf NSCIB-CC-2300062-02-CR2.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-2300062-02-CR2
    • cert_item: TnD v5.1 on ID-One Cosmo X (EAC Configuration
    • cert_lab: SGS Brightsight B.V.
    • developer: IDEMIA
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C045-CR-v1a: 31
  • NL:
    • NSCIB-2300062-02: 1
    • NSCIB-CC-2300050-01: 1
    • NSCIB-CC-2300062-02-CR2: 14
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0056: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 10
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL4: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 2
    • EAL6+: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_IMP: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_PRE: 4
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 3
pdf_data/report_keywords/vendor
  • Idemia:
    • IDEMIA: 4
  • Infineon:
    • Infineon: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 3
  • SGS:
    • SGS: 3
    • SGS Brightsight: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES128: 2
      • AES192: 2
      • AES256: 2
  • DES:
    • 3DES:
      • 3DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 7
  • TLS:
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 3
  • PACE:
    • PACE: 4
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 2
    • JIL-AAPS: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • ICAO:
    • ICAO: 7
  • ISO:
    • ISO/IEC 18013: 6
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.5: 1
pdf_data/report_metadata
  • /Author: Norhazimah
  • /CreationDate: D:20131112100545+08'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20131112100545+08'00'
  • /Producer: Acrobat Distiller 10.1.8 (Windows)
  • /Title: Microsoft Word - ISCB-5-RPT-C045-CR-v1a _web_
  • pdf_file_size_bytes: 337164
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 31
pdf_data/st_filename 2013-10-18-iDeras-ST-v1.3.pdf FQR 220 1726 Ed 2 - Public Security Target TnD v5.1 on ID-One Cosmo X Platform (EAC Configuration).pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI_DSZ-CC-1107-V3-2022: 1
  • NL:
    • CC-1: 3
    • CC-2: 3
    • CC-3: 3
    • NSCIB-CC-2300050-01: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055-2009: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0099-2017: 1
    • BSI-PP-0056: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 6
  • EAL:
    • EAL 5: 1
    • EAL 5+: 1
    • EAL5: 7
    • EAL5 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 8
    • ADV_IMP.1: 9
    • ADV_INT.2: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 8
  • AGD:
    • AGD_OPE: 6
    • AGD_OPE.1: 6
    • AGD_PRE: 8
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 10
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • APE:
    • APE_SRE: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.3: 10
    • FAU_GEN.3.1: 2
    • FAU_GEN.3.2: 2
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 5
    • FAU_SAR.3.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 5
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 3
    • FIA_SOS.1: 4
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 3
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_SAE.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM: 1
    • FPT_STM.1: 1
    • FPT_STM.2: 10
    • FPT_STM.2.1: 2
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 4
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 30
    • FCS_CKM.1: 10
    • FCS_CKM.2: 2
    • FCS_CKM.4: 27
    • FCS_CKM.4.1: 1
    • FCS_COP: 67
    • FCS_COP.1: 7
    • FCS_RND: 2
    • FCS_RND.1: 15
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 3
  • FDP:
    • FDP_ACC.1: 21
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 2
    • FDP_ITC: 1
    • FDP_ITC.1: 7
    • FDP_ITC.2: 7
    • FDP_UCT: 9
    • FDP_UCT.1: 1
    • FDP_UIT: 9
    • FDP_UIT.1: 2
  • FIA:
    • FIA_API: 13
    • FIA_API.1: 12
    • FIA_API.1.1: 2
    • FIA_UAU: 35
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 12
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 2
    • FIA_UAU.6: 1
    • FIA_UID.1: 17
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 3
    • FMT_LIM.1: 16
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 15
    • FMT_LIM.2.1: 2
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 114
    • FMT_MTD.1: 13
    • FMT_MTD.3: 7
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 39
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 38
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 13
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_TRP.1: 6
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.CONN: 2
    • A.FLOW: 2
    • A.MGMT: 2
    • A.PHY: 2
    • A.TIMEBACK: 2
    • A.USER: 2
  • O:
    • O.ACCESSLOG: 3
    • O.AUDIT: 3
    • O.CONFIG: 4
    • O.EXPLOIT: 4
    • O.NOAUTH: 4
  • OE:
    • OE.ADMIN: 3
    • OE.CONN: 3
    • OE.FLOW: 2
    • OE.MGMT: 3
    • OE.PHY: 2
    • OE.TIMEBACK: 2
    • OE.USER: 3
  • T:
    • T.ACCESSLOG: 2
    • T.AUDIT: 2
    • T.CONFIG: 2
    • T.EXPLOIT: 2
    • T.NOAUTH: 2
    • T.REMOTE: 2
    • T.SPOOF: 2
  • A:
    • A.MRTD_: 1
  • OE:
    • OE.AA_MRTD: 7
    • OE.BAC_PP: 6
    • OE.MRTD_: 6
  • OT:
    • OT.DBI: 13
pdf_data/st_keywords/vendor
  • Idemia:
    • IDEMIA: 133
  • Infineon:
    • Infineon: 5
  • Morpho:
    • Morpho: 1
  • Oberthur:
    • Oberthur Technologies: 1
pdf_data/st_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
      • AES128: 5
      • AES192: 4
      • AES256: 5
  • DES:
    • 3DES:
      • 3DES: 9
      • Triple-DES: 5
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 2
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 11
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 3
  • RSA:
    • RSA 1536: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 7
      • SHA1: 2
    • SHA2:
      • SHA-224: 4
      • SHA-256: 6
      • SHA-384: 4
      • SHA-512: 4
      • SHA2: 2
      • SHA224: 1
      • SHA256: 1
      • SHA384: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 2
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 8
  • PACE:
    • PACE: 30
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 6
    • Physical Tampering: 3
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 3
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 4
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 8
    • EF.DG1: 17
    • EF.DG13: 1
    • EF.DG14: 4
    • EF.DG15: 2
    • EF.DG16: 17
    • EF.DG2: 6
    • EF.DG3: 20
    • EF.DG4: 19
    • EF.DG5: 5
    • EF.SOD: 8
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-004: 1
  • RFC:
    • RFC28: 1
  • CC:
    • CCMB-2017-04-002: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-3: 1
  • ICAO:
    • ICAO: 22
  • ISO:
    • ISO/IEC 11770-2: 1
    • ISO/IEC 14443: 6
    • ISO/IEC 18013: 10
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9796-2: 1
    • ISO/IEC15946-2: 1
  • PKCS:
    • PKCS#1: 3
    • PKCS#3: 1
  • RFC:
    • RFC 5639: 1
    • RFC-5639: 1
    • RFC3369: 1
  • SCP:
    • SCP02: 1
    • SCP03: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.5: 1
pdf_data/st_metadata
  • /CreationDate: D:20131018102426+08'00'
  • /Producer: doPDF Ver 7.3 Build 387 (Windows 7 Enterprise Edition (SP 1) - Version: 6.1.7601 (x86))
  • pdf_file_size_bytes: 275746
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 45
  • /Author: Nicolas LOKIEC
  • /CreationDate: D:20240207160745+01'00'
  • /Creator: Microsoft® Word pour Microsoft 365
  • /MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_ActionId: da65b66f-24ec-4c30-9898-e3d31b1aea91
  • /MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_ContentBits: 0
  • /MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_Enabled: true
  • /MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_Method: Privileged
  • /MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_Name: Unclassified
  • /MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_SetDate: 2024-02-07T15:02:24Z
  • /MSIP_Label_5f8610cf-4e4f-4168-a9a0-556235a89a9b_SiteId: 7694d41c-5504-43d9-9e40-cb254ad755ec
  • /ModDate: D:20240207160745+01'00'
  • /Producer: Microsoft® Word pour Microsoft 365
  • /Subject: FQR 550 0160
  • /Title: Security Target TnD v5.1 on ID-One Cosmo X (EAC Configuration)
  • pdf_file_size_bytes: 1388806
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 98
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different