name |
IAS Router Series: IAS STEW, IAS KG-RU, IAS Router MICRO |
Samsung SSP01 of S5E9830 with Specific IC Dedicated Software Revision 1.1 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
ES |
status |
archived |
active |
not_valid_after |
21.12.2017 |
18.03.2026 |
not_valid_before |
21.12.2015 |
18.03.2021 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10625-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-59%20CCRA.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10625-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-59%20INF-3424.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10625-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-59%20ST_lite.pdf |
manufacturer |
Information Assurance Specialists |
Samsung Electronics Co., Ltd. |
manufacturer_web |
https://www.iaspecialists.com/ |
https://www.samsung.com |
security_level |
{} |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
c657491abdc44669 |
8070163bf63b0e18 |
heuristics/cert_id |
CCEVS-VR-VID-10625-2015 |
2018-59-INF-3424 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AVA_VAN.2, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
1.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Network Device, Virtual Private Network
- certification_date: 21.12.2015
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date: 21.12.2017
- id: CCEVS-VR-VID10625
- product: IAS Router Series: IAS STEW, IAS KG-RU, IAS Router MICRO
- scheme: US
- url: https://www.niap-ccevs.org/product/10625
- vendor: Information Assurance Specialists, Inc
|
- category: Smart Cards and similiar devices
- certification_date: 18.03.2021
- enhanced:
- category: Smart Cards and similiar devices
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1100
- certification_date: 18.03.2021
- description: The Target of Evaluation (TOE), the SSP01 of S5E9830 with Specific IC Dedicated Software Revision 1.1 secure subsystem, is a Hard macro instantiated within an SOC which is composed of a processing unit, security components, hardware circuit for testing purpose during the manufacturing process and volatile and non-volatile memories (hardware). The main security features of the TOE are: Security sensors or detectors including High and Low Temperature detectors, High and Low Supply Voltage detectors, Supply Voltage Glitch detector and Laser detector Active Shields against physical intrusive attacks Dedicated hardware mechanisms against side-channel attacks Secure TDES and AES Symmetric Cryptography support PARITY/ CRC-32 calculators One Hardware Digital True Random Number Generator (DTRNG) that fulfills Test Procedure A specified by AIS31 standard. The IC Dedicated Software includes: DTRNG library built around Hardware DTRNG together with corresponding DTRNG application notes. This library fulfills the criteria of Test Procedure A specified by AIS31 standard. Secure Boot Loader is a loader for copying the embedded software from an external FLASH storage into the internal SRAM.
- evaluation_facility: Applus Laboratories
- level: EAL5 + ALC_DVS.2 + AVA_VAN.5
- manufacturer: Samsung Electronics Co., Ltd
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1101
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1099
- type: Product
- manufacturer: Samsung Electronics Co., Ltd
- product: Samsung SSP01 of S5E9830 with Specific IC Dedicated Software Revision 1.1
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/655-samsung-ssp01-of-s5e9830-with-specific-ic-dedicated-software-revision-1-1
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
bb67fb1b4f10e7a5, ac9abe3d5c5a31f0 |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
st_vid10625-ci.pdf |
2018-59 CCRA.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10625-2015: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20151222091011-05'00'
- /ModDate: D:20151222091011-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 178551
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 729339
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
st_vid10625-vr.pdf |
2018-59 INF-3424.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10625-2015
- cert_item: Information Assurance Specialists, Inc. IAS Router
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10625-2015: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL5: 8
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FDP:
- FDP_ACC: 1
- FDP_ACF: 1
- FDP_IFC.1: 1
- FDP_SDC.1: 1
- FDP_SDR.1: 1
- FDP_UIT.1: 1
- FIA:
- FMT:
- FMT_LIM: 4
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_PHP.3: 1
- FRU:
- FTP:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.ADDRESS_FILTERING: 1
- O.AUTHENTICATION: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.DISPLAY_BANNER: 2
- O.FAIL_SECURE: 1
- O.PORT_FILTERING: 1
- O.PROTECTED_COMMUNICATIONS: 2
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 2
- O.TOE_ADMINISTRATION: 2
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 2
- OE:
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.DATA_INTEGRITY: 1
- T.NETWORK_ACCESS: 1
- T.NETWORK_DISCLOSURE: 1
- T.NETWORK_MISUSE: 1
- T.REPLAY_ATTACK: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 5
- HMAC-SHA-256: 3
- HMAC-SHA-384: 3
- HMAC-SHA-512: 3
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA256: 6
|
- SHA:
- SHA2:
- SHA-256: 1
- SHA-512: 1
- SHA384: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 11
- TLSv1.0: 1
- TLSv1.1: 1
- TLSv1.2: 2
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
- NIST:
- P-256: 6
- P-384: 6
- P-521: 2
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- NIST:
- RFC:
- RFC 2818: 2
- RFC 5424: 2
- RFC 5905: 1
- RFC 5996: 1
- RFC 6379: 1
- X509:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
st_vid10625-st.pdf |
2018-59 ST_lite.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084: 1
- BSI-CC-PP-0084-: 1
- BSI-PP-0084: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL5: 6
- EAL5 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 8
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.1: 3
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 3
- ASE_INT.1: 4
- ASE_OBJ.1: 1
- ASE_REQ.1: 3
- ATE:
- AVA:
- AVA_VAN.1: 2
- AVA_VAN.2: 1
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_FSP: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ADV_VAN: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 2
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.1.2: 1
- FCS_CKM_EXT.4: 5
- FCS_CKM_EXT.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 40
- FCS_COP.1.1: 5
- FCS_RBG_EXT.1: 9
- FCS_RBG_EXT.1.1: 3
- FCS_RBG_EXT.1.2: 3
- FCS_TLS_EXT.1: 6
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT: 1
- FIA_PSK_EXT.1: 4
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 2
- FIA_PSK_EXT.1.3: 3
- FIA_PSK_EXT.1.4: 1
- FIA_UAU.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 8
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MTD: 2
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 2
- FMT_SMR.2.3: 2
- FPT:
- FPT_APW_EXT.1: 5
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 5
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 2
- FPT_TST_EXT.1.2: 2
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 1
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 1
- FAU_SAS: 8
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.4: 5
- FCS_COP: 15
- FCS_COP.1: 9
- FCS_RNG: 6
- FCS_RNG.1: 15
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 8
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF: 11
- FDP_ACF.1: 19
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 23
- FDP_IFC.1.1: 1
- FDP_IFF.1: 3
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FDP_ITT: 1
- FDP_ITT.1: 18
- FDP_ITT.1.1: 1
- FDP_SDC: 4
- FDP_SDC.1: 14
- FDP_SDC.1.1: 2
- FDP_SDI: 1
- FDP_SDI.1: 2
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_SDR: 5
- FDP_SDR.1: 11
- FDP_SDR.1.1: 2
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 6
- FIA_API.1: 12
- FIA_API.1.1: 2
- FMT:
- FMT_LIM: 82
- FMT_LIM.1: 12
- FMT_LIM.1.1: 1
- FMT_LIM.2: 11
- FMT_LIM.2.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 16
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_ETD: 1
- FPT_FLS: 1
- FPT_FLS.1: 21
- FPT_FLS.1.1: 1
- FPT_ITT: 1
- FPT_ITT.1: 16
- FPT_ITT.1.1: 1
- FPT_PHP: 2
- FPT_PHP.3: 20
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT: 1
- FRU_FLT.1: 1
- FRU_FLT.2: 16
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.ADDRESS_FILTERING: 2
- O.AUTHENTICATION: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 2
- O.DISPLAY_BANNER: 2
- O.FAIL_SECURE: 1
- O.PORT_FILTERING: 1
- O.PROTECTED_COMMUNICATIONS: 2
- O.RESIDUAL_INFORMATION_CLEARING: 2
- O.SESSION_LOCK: 2
- O.SYSTEM_MONITORING: 3
- O.TOE_ADMINISTRATION: 3
- O.TSF_SELF_TEST: 2
- O.VERIFIABLE_UPDATES: 2
- OE:
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.DATA_INTEGRITY: 1
- T.NETWORK_ACCESS: 1
- T.NETWORK_DISCLOSURE: 1
- T.NETWORK_MISUSE: 1
- T.REPLAY_ATTACK: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
- O:
- O.AES: 5
- O.MEM_ACCESS: 1
- O.RND: 6
- O.TDES: 7
- T:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 11
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
- HMAC-SHA-512: 3
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 14
- Triple-DES: 6
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 15
- DHE: 1
- Diffie-Hellman: 8
- DSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 6
- SHA-384: 4
- SHA-512: 5
- SHA256: 9
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 45
- IKEv1: 27
- IKEv2: 21
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 34
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 1
- TLSv1.0: 1
- TLSv1.1: 1
- TLSv1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 16
- P-384: 12
- P-521: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 26
- malfunction: 10
- physical tampering: 2
- SCA:
- DPA: 3
- Leak-Inherent: 21
- Physical Probing: 4
- Physical probing: 2
- SPA: 2
- physical probing: 8
- side-channel: 2
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140-2: 2
- FIPS 186-2: 2
- FIPS 186-3: 8
- FIPS 186-4: 1
- FIPS PUB 186-2: 2
- FIPS PUB 186-3: 9
- FIPS PUB 197: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- NIST SP 800-57A: 1
- NIST SP 800-63: 1
- NIST SP 800-90: 1
- SP 800-56B: 2
- SP 800-90A: 1
- SP 800-90B: 1
- RFC:
- RFC 2246: 1
- RFC 2409: 1
- RFC 2460: 3
- RFC 2560: 1
- RFC 2818: 3
- RFC 2986: 1
- RFC 3602: 1
- RFC 4106: 1
- RFC 4109: 2
- RFC 4301: 2
- RFC 4303: 1
- RFC 4304: 1
- RFC 4346: 1
- RFC 4868: 3
- RFC 4945: 1
- RFC 5246: 1
- RFC 5280: 1
- RFC 5424: 4
- RFC 5430: 1
- RFC 5759: 1
- RFC 5905: 1
- RFC 5996: 2
- RFC 6379: 2
- RFC 768: 3
- RFC 791: 3
- RFC 793: 3
- RFC792: 1
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 6
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 1
- FIPS PUB 180-3: 3
- FIPS197: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Kenji Yoshino
- /Category: Proprietary and Confidential
- /Comments:
- /Company:
- /CreationDate: D:20151221121600-08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Developer (full): Information Assurance Specialists, Inc.
- /Developer (short): IAS
- /Developer Address: P.O. Box 8944
- /Developer City/State/Zip: Turnersville, NJ 08012
- /Keywords: Network Device, VPN Gateway, IPse
- /ModDate: D:20151221121622-08'00'
- /Producer: Adobe PDF Library 10.0
- /Publish Date: D:20151221
- /SourceModified: D:20151221201534
- /Subject: IAS Router
- /Title: IAS Router Security Target
- /Version: 1.0
- pdf_file_size_bytes: 745525
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 91
|
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 1094224
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 91
|
state/cert/convert_garbage |
True |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |