name |
IAS Router Series: IAS STEW, IAS KG-RU, IAS Router MICRO |
Microcontrôleur MS6001 révision E embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèqueWear Levelling version 06.03.02.02 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
FR |
status |
archived |
archived |
not_valid_after |
21.12.2017 |
06.04.2025 |
not_valid_before |
21.12.2015 |
29.01.2018 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10625-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2018_02-s01.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10625-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_02fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10625-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_02en.pdf |
manufacturer |
Information Assurance Specialists |
Wisekey |
manufacturer_web |
https://www.iaspecialists.com/ |
https://www.wisekey.com |
security_level |
{} |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
c657491abdc44669 |
ff1e497a4f732f43 |
heuristics/cert_id |
CCEVS-VR-VID-10625-2015 |
ANSSI-CC-2018/02 |
heuristics/cert_lab |
US |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AVA_VAN.2, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
06.04.01.07, 06.03.02.02 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2020/20 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2016/16 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2020/20 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2016/16 |
heuristics/scheme_data |
- category: Network Device, Virtual Private Network
- certification_date: 21.12.2015
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date: 21.12.2017
- id: CCEVS-VR-VID10625
- product: IAS Router Series: IAS STEW, IAS KG-RU, IAS Router MICRO
- scheme: US
- url: https://www.niap-ccevs.org/product/10625
- vendor: Information Assurance Specialists, Inc
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
bb67fb1b4f10e7a5, ac9abe3d5c5a31f0 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
{} |
pdf_data/cert_filename |
st_vid10625-ci.pdf |
certificat-anssi-cc-2018_02-s01.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10625-2015: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20151222091011-05'00'
- /ModDate: D:20151222091011-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 178551
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: jchuzel
- /CreationDate: D:20220906094656+02'00'
- /ModDate: D:20220906094656+02'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - PS-certificat-ANSSI-CC-2018_02-S01
- pdf_file_size_bytes: 1258024
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
st_vid10625-vr.pdf |
anssi-cc-2018_02fr.pdf |
pdf_data/report_frontpage |
- FR:
- US:
- cert_id: CCEVS-VR-VID10625-2015
- cert_item: Information Assurance Specialists, Inc. IAS Router
- cert_lab: US NIAP
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2018/02
- cert_item: Microcontrôleur MS6001 révision E embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèque Wear Levelling version 06.03.02.02
- cert_item_version: Part number 0x44, hardware revision E, Toolbox Library version 0x06040107, Wear Levelling Library version 0x06030202
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Wisekey Semiconductors Arteparc Bachasson, Bât. A, rue de la carrière de Bachasson, 13590 Meyreuil, France. Commanditaire Wisekey Semiconductors Arteparc Bachasson, Bât. A, rue de la carrière de Bachasson, 13590 Meyreuil, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014, le 19 février 2014 avec conformité au “ Package 1 : Loader dedicated for usage by authorized users only
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10625-2015: 1
|
- FR:
- ANSSI-CC-2016/16: 3
- ANSSI-CC-2018/02: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.ADDRESS_FILTERING: 1
- O.AUTHENTICATION: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.DISPLAY_BANNER: 2
- O.FAIL_SECURE: 1
- O.PORT_FILTERING: 1
- O.PROTECTED_COMMUNICATIONS: 2
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 2
- O.TOE_ADMINISTRATION: 2
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 2
- OE:
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.DATA_INTEGRITY: 1
- T.NETWORK_ACCESS: 1
- T.NETWORK_DISCLOSURE: 1
- T.NETWORK_MISUSE: 1
- T.REPLAY_ATTACK: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 5
- HMAC-SHA-256: 3
- HMAC-SHA-384: 3
- HMAC-SHA-512: 3
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA256: 6
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 11
- TLSv1.0: 1
- TLSv1.1: 1
- TLSv1.2: 2
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
- NIST:
- P-256: 6
- P-384: 6
- P-521: 2
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- NIST:
- RFC:
- RFC 2818: 2
- RFC 5424: 2
- RFC 5905: 1
- RFC 5996: 1
- RFC 6379: 1
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
st_vid10625-st.pdf |
anssi-cible-cc-2018_02en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 2
- EAL4+: 1
- EAL5: 9
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 8
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.1: 3
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 3
- ASE_INT.1: 4
- ASE_OBJ.1: 1
- ASE_REQ.1: 3
- ATE:
- AVA:
- AVA_VAN.1: 2
- AVA_VAN.2: 1
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 2
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.1.2: 1
- FCS_CKM_EXT.4: 5
- FCS_CKM_EXT.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 40
- FCS_COP.1.1: 5
- FCS_RBG_EXT.1: 9
- FCS_RBG_EXT.1.1: 3
- FCS_RBG_EXT.1.2: 3
- FCS_TLS_EXT.1: 6
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT: 1
- FIA_PSK_EXT.1: 4
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 2
- FIA_PSK_EXT.1.3: 3
- FIA_PSK_EXT.1.4: 1
- FIA_UAU.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 8
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MTD: 2
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 2
- FMT_SMR.2.3: 2
- FPT:
- FPT_APW_EXT.1: 5
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 5
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 2
- FPT_TST_EXT.1.2: 2
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 1
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 1
- FAU_SAS: 1
- FAU_SAS.1: 13
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.4: 12
- FCS_COP: 17
- FCS_COP.1: 15
- FCS_COP.1.1: 13
- FCS_RNG.1: 19
- FDP:
- FDP_ACC.1: 1
- FDP_IFC.1: 22
- FDP_IFC.1.1: 1
- FDP_IFF.1: 3
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_ITT.1: 22
- FDP_ITT.1.1: 1
- FDP_SDC: 1
- FDP_SDC.1: 11
- FDP_SDC.1.1: 1
- FDP_SDI.1: 3
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_API: 1
- FIA_API.1: 11
- FIA_API.1.1: 1
- FMT:
- FMT_LIM: 17
- FMT_LIM.1: 28
- FMT_LIM.1.1: 1
- FMT_LIM.2: 29
- FMT_LIM.2.1: 1
- FPT:
- FPT_FLS.1: 24
- FPT_FLS.1.1: 1
- FPT_ITT.1: 20
- FPT_ITT.1.1: 1
- FPT_PHP.3: 25
- FPT_PHP.3.1: 1
- FPT_SDI.2: 2
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 20
- FRU_FLT.2.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.ADDRESS_FILTERING: 2
- O.AUTHENTICATION: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 2
- O.DISPLAY_BANNER: 2
- O.FAIL_SECURE: 1
- O.PORT_FILTERING: 1
- O.PROTECTED_COMMUNICATIONS: 2
- O.RESIDUAL_INFORMATION_CLEARING: 2
- O.SESSION_LOCK: 2
- O.SYSTEM_MONITORING: 3
- O.TOE_ADMINISTRATION: 3
- O.TSF_SELF_TEST: 2
- O.VERIFIABLE_UPDATES: 2
- OE:
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.DATA_INTEGRITY: 1
- T.NETWORK_ACCESS: 1
- T.NETWORK_DISCLOSURE: 1
- T.NETWORK_MISUSE: 1
- T.REPLAY_ATTACK: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 11
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
- HMAC-SHA-512: 3
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 15
- DHE: 1
- Diffie-Hellman: 8
- DSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 6
- SHA-384: 4
- SHA-512: 5
- SHA256: 9
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 3
- SHA-384: 3
- SHA-512: 3
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 45
- IKEv1: 27
- IKEv2: 21
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 34
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 1
- TLSv1.0: 1
- TLSv1.1: 1
- TLSv1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 16
- P-384: 12
- P-521: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Fault Injection: 1
- Malfunction: 19
- malfunction: 8
- physical tampering: 2
- SCA:
- Leak-Inherent: 14
- Physical Probing: 1
- Physical probing: 1
- physical probing: 4
- side channel: 2
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140-2: 2
- FIPS 186-2: 2
- FIPS 186-3: 8
- FIPS 186-4: 1
- FIPS PUB 186-2: 2
- FIPS PUB 186-3: 9
- FIPS PUB 197: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- NIST SP 800-57A: 1
- NIST SP 800-63: 1
- NIST SP 800-90: 1
- SP 800-56B: 2
- SP 800-90A: 1
- SP 800-90B: 1
- RFC:
- RFC 2246: 1
- RFC 2409: 1
- RFC 2460: 3
- RFC 2560: 1
- RFC 2818: 3
- RFC 2986: 1
- RFC 3602: 1
- RFC 4106: 1
- RFC 4109: 2
- RFC 4301: 2
- RFC 4303: 1
- RFC 4304: 1
- RFC 4346: 1
- RFC 4868: 3
- RFC 4945: 1
- RFC 5246: 1
- RFC 5280: 1
- RFC 5424: 4
- RFC 5430: 1
- RFC 5759: 1
- RFC 5905: 1
- RFC 5996: 2
- RFC 6379: 2
- RFC 768: 3
- RFC 791: 3
- RFC 793: 3
- RFC792: 1
- X509:
|
- BSI:
- FIPS:
- FIPS 180-4: 5
- FIPS 186-4: 4
- FIPS 197: 1
- ISO:
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-67: 2
- SP 800-38A: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Kenji Yoshino
- /Category: Proprietary and Confidential
- /Comments:
- /Company:
- /CreationDate: D:20151221121600-08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Developer (full): Information Assurance Specialists, Inc.
- /Developer (short): IAS
- /Developer Address: P.O. Box 8944
- /Developer City/State/Zip: Turnersville, NJ 08012
- /Keywords: Network Device, VPN Gateway, IPse
- /ModDate: D:20151221121622-08'00'
- /Producer: Adobe PDF Library 10.0
- /Publish Date: D:20151221
- /SourceModified: D:20151221201534
- /Subject: IAS Router
- /Title: IAS Router Security Target
- /Version: 1.0
- pdf_file_size_bytes: 745525
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 91
|
|
state/cert/convert_garbage |
True |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |