Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ADSS PKI Server v8
OCSI/CERT/CCL/07/2022/RC
Belkin F1DN102KVM-DC-4, F1DN202KVM-DC-4, F1DN104KVM-DC-4, F1DN204KVM-DC-4, F1DN108KVM-DC-4, F1DN208KVM-DC-4, F1DN104KVMDCU-4, F1DN204KVMDCU-4, F1DN104MVKVMDC4, F1DN108MVKVMDC4, F1DN104MKVMDC-4, F1DN108MKVMDC-4 Firmware Version 44444-D5D5
667-EWA
name ADSS PKI Server v8 Belkin F1DN102KVM-DC-4, F1DN202KVM-DC-4, F1DN104KVM-DC-4, F1DN204KVM-DC-4, F1DN108KVM-DC-4, F1DN208KVM-DC-4, F1DN104KVMDCU-4, F1DN204KVMDCU-4, F1DN104MVKVMDC4, F1DN108MVKVMDC4, F1DN104MKVMDC-4, F1DN108MKVMDC-4 Firmware Version 44444-D5D5
category Key Management Systems Other Devices and Systems
scheme IT CA
not_valid_after 17.04.2028 05.03.2030
not_valid_before 17.04.2023 05.03.2025
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FP_cr_adss-pki-server-v8_v1.0_en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/667-EWA%20CT.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_adss-pki-server-v8_v1.0_en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/667-EWA%20CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_adss-pki-server-v8_v9.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/667-EWA%20ST%20v1.2.pdf
manufacturer Ascertia Ltd. Belkin International, Inc.
manufacturer_web https://www.ascertia.com/ https://www.belkin.com
security_level EAL4+, ALC_FLR.3 {}
dgst d16928d6b4a6cd39 d8cfef67e94e0372
heuristics/cert_id OCSI/CERT/CCL/07/2022/RC 667-EWA
heuristics/extracted_sars ASE_INT.1, ALC_TAT.1, ADV_FSP.4, ASE_SPD.1, ASE_CCL.1, ADV_TDS.3, ALC_CMC.4, ALC_LCD.1, ATE_COV.2, ASE_REQ.2, ASE_OBJ.2, ASE_TSS.1, AGD_PRE.1, ASE_ECD.1, ALC_DEL.1, ATE_FUN.1, ADV_IMP.1, AGD_OPE.1, ALC_FLR.3, AVA_VAN.3, ALC_DVS.1, ADV_ARC.1, ATE_DPT.1, ALC_CMS.4, ATE_IND.2 ATE_IND.1, ASE_ECD.1, AVA_VAN.1, AGD_PRE.1, ASE_INT.1, AGD_OPE.1, ALC_CMS.1, ADV_FSP.1, ASE_REQ.2, ASE_SPD.1, ALC_CMC.1, ASE_OBJ.2, ASE_CCL.1, ASE_TSS.1
heuristics/extracted_versions - 44444, 4
heuristics/scheme_data
  • certification_date: 05.03.2025
  • level: PP_PSD_V4.0, MOD_KM_V1.0, MOD_VI_V1.0, MOD_UA_V1.0
  • product: Belkin F1DN102KVM-DC-4, F1DN202KVM-DC-4, F1DN104KVM-DC-4, F1DN204KVM-DC-4, F1DN108KVM-DC-4, F1DN208KVM-DC-4, F1DN104KVMDCU-4, F1DN204KVMDCU-4, F1DN104MVKVMDC4, F1DN108MVKVMDC4, F1DN104MKVMDC-4, F1DN108MKVMDC-4 Firmware Version 44444-D5D5
  • vendor: Belkin International, Inc.
heuristics/protection_profiles {} 814f66c77bc7f33b, 48f73a122587b992, 42cf355b24450489, 76f8f05a35d87f59
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_ua_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf
pdf_data/cert_filename FP_cr_adss-pki-server-v8_v1.0_en.pdf 667-EWA CT.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 667-EWA: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL4: 1
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 4
pdf_data/cert_metadata
  • /Author: t.inzerilli
  • /CreationDate: D:20230419150931+02'00'
  • /ModDate: D:20230419150931+02'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Certification Report "ADSS PKI Server v8".pdf
  • pdf_file_size_bytes: 132059
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Sinitski, Kiril
  • /CreationDate: D:20250307140618-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: 03c3dcc6-6bfd-4194-a625-fb83b8d0389e
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2023-05-16T11:46:20Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250307140618-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 390416
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename cr_adss-pki-server-v8_v1.0_en.pdf 667-EWA CR.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
pdf_data/report_keywords/cc_cert_id
  • IT:
    • OCSI/CERT/CCL/07/2022/RC: 31
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL2: 4
    • EAL4: 12
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.J: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Thales:
    • Thales: 1
pdf_data/report_keywords/eval_facility
  • CCLab:
    • CCLab Software Laboratory: 5
  • EWA:
    • EWA-Canada: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • constructions:
    • MAC:
      • HMAC: 8
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 17
      • TLS v1.2: 4
  • VPN:
    • VPN: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-03110-1: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 6
    • ISO/IEC 18045:2008: 2
  • X509:
    • X.509: 4
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_metadata
  • /Author: OCSI
  • /CreationDate: D:20230419124733+02'00'
  • /Creator: Microsoft® Word per Microsoft 365
  • /ModDate: D:20230419124733+02'00'
  • /Producer: Microsoft® Word per Microsoft 365
  • /Title: Certification Report "ADSS PKI Server v8"
  • pdf_file_size_bytes: 645621
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 31
  • /Author: Sinitski, Kiril
  • /CreationDate: D:20250307135915-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: f4235719-a1a3-4fb4-8b18-a47ac84bac11
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2022-07-20T10:41:47Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250307135915-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 823239
  • pdf_hyperlinks: https://www.cisa.gov/known-exploited-vulnerabilities-catalog, http://www.belkin.com/, mailto:[email protected], https://www.belkin.com/support-article/?articleNum=275531, https://nvd.nist.gov/vuln/search
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename st_adss-pki-server-v8_v9.pdf 667-EWA ST v1.2.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL4: 5
    • EAL4+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_FLR: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ADP_EXT: 1
    • FAU_ADP_EXT.1: 12
    • FAU_ADP_EXT.1.1: 1
    • FAU_GCR_EXT: 1
    • FAU_GCR_EXT.1: 6
    • FAU_GCR_EXT.1.1: 3
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_SCR_EXT: 1
    • FAU_SCR_EXT.1: 7
    • FAU_SCR_EXT.1.1: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
    • FAU_STG_EXT: 1
    • FAU_STG_EXT.1: 7
    • FAU_STG_EXT.1.1: 1
  • FCO:
    • FCO_NRO_EXT: 1
    • FCO_NRO_EXT.2: 7
    • FCO_NRO_EXT.2.1: 1
    • FCO_NRO_EXT.2.2: 1
    • FCO_NRO_EXT.2.3: 1
    • FCO_NRO_EXT.2.4: 1
    • FCO_NRO_EXT.2.5: 1
    • FCO_NRR_EXT: 1
    • FCO_NRR_EXT.2: 5
    • FCO_NRR_EXT.2.1: 1
  • FCS:
    • FCS_CDP_EXT: 1
    • FCS_CDP_EXT.1: 20
    • FCS_CDP_EXT.1.1: 2
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 9
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 1
    • FCS_CKM_EXT: 5
    • FCS_CKM_EXT.1: 19
    • FCS_CKM_EXT.1.1: 3
    • FCS_CKM_EXT.4: 10
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 9
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.7: 9
    • FCS_CKM_EXT.7.1: 1
    • FCS_CKM_EXT.7.2: 1
    • FCS_CKM_EXT.7.3: 1
    • FCS_CKM_EXT.7.4: 1
    • FCS_CKM_EXT.8: 10
    • FCS_CKM_EXT.8.1: 1
    • FCS_CKM_EXT.8.2: 1
    • FCS_CKM_EXT.8.3: 1
    • FCS_COP.1: 54
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT: 1
    • FCS_RBG_EXT.1: 19
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_STG_EXT: 1
    • FCS_STG_EXT.1: 9
    • FCS_STG_EXT.1.1: 1
    • FCS_TLSC_EXT: 1
    • FCS_TLSC_EXT.2: 9
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.2.2: 1
    • FCS_TLSC_EXT.2.3: 1
    • FCS_TLSC_EXT.2.4: 1
    • FCS_TLSC_EXT.2.5: 1
    • FCS_TLSS_EXT: 2
    • FCS_TLSS_EXT.1: 10
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLSS_EXT.1.2: 1
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLSS_EXT.2: 8
    • FCS_TLSS_EXT.2.1: 1
    • FCS_TLSS_EXT.2.2: 1
    • FCS_TLSS_EXT.2.3: 1
    • FCS_TLSS_EXT.2.4: 2
    • FCS_TLSS_EXT.2.5: 1
    • FCS_TLSS_EXT.2.6: 1
  • FDP:
    • FDP_CER_EXT: 3
    • FDP_CER_EXT.1: 9
    • FDP_CER_EXT.1.1: 1
    • FDP_CER_EXT.1.2: 1
    • FDP_CER_EXT.1.3: 1
    • FDP_CER_EXT.2: 6
    • FDP_CER_EXT.2.1: 1
    • FDP_CER_EXT.3: 7
    • FDP_CER_EXT.3.1: 1
    • FDP_CRL_EXT: 1
    • FDP_CRL_EXT.1: 8
    • FDP_CRL_EXT.1.1: 1
    • FDP_CSI_EXT: 1
    • FDP_CSI_EXT.1: 7
    • FDP_CSI_EXT.1.1: 1
    • FDP_CSI_EXT.1.2: 1
    • FDP_ITT.1: 10
    • FDP_ITT.1.1: 2
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
    • FDP_STG_EXT: 1
    • FDP_STG_EXT.1: 7
  • FIA:
    • FIA_ESTS_EXT: 1
    • FIA_ESTS_EXT.1: 13
    • FIA_ESTS_EXT.1.1: 1
    • FIA_ESTS_EXT.1.2: 1
    • FIA_ESTS_EXT.1.3: 1
    • FIA_ESTS_EXT.1.4: 1
    • FIA_UAU_EXT: 1
    • FIA_UAU_EXT.1: 8
    • FIA_UAU_EXT.1.1: 1
    • FIA_UIA_EXT: 1
    • FIA_UIA_EXT.1: 10
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UIA_EXT.1.3: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_MOF.1: 48
    • FMT_MOF.1.1: 5
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 10
    • FMT_SMR.2.1: 3
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 9
    • FPT_ITT.1.1: 2
    • FPT_KST_EXT: 2
    • FPT_KST_EXT.1: 7
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 8
    • FPT_KST_EXT.2.1: 1
    • FPT_RCV.1: 7
    • FPT_RCV.1.1: 1
    • FPT_SKP_EXT: 1
    • FPT_SKP_EXT.1: 8
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.2: 9
    • FPT_TST_EXT.2.1: 1
    • FPT_TST_EXT.2.2: 1
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 8
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.1.4: 1
  • FTA:
    • FTA_SSL.4: 8
    • FTA_SSL.4.1: 1
    • FTA_TAB.1: 6
    • FTA_TAB.1.1: 2
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FDP:
    • FDP_APC_EXT: 30
    • FDP_APC_EXT.1: 17
    • FDP_CDS_EXT: 1
    • FDP_CDS_EXT.1: 10
    • FDP_CDS_EXT.1.1: 2
    • FDP_FIL_EXT: 23
    • FDP_FIL_EXT.1: 6
    • FDP_IPC_EXT: 1
    • FDP_IPC_EXT.1: 6
    • FDP_IPC_EXT.1.1: 1
    • FDP_IPC_EXT.1.2: 1
    • FDP_PDC_EXT: 34
    • FDP_PDC_EXT.1: 33
    • FDP_PDC_EXT.1.1: 1
    • FDP_PDC_EXT.2: 7
    • FDP_PDC_EXT.3: 5
    • FDP_PDC_EXT.4: 10
    • FDP_PDC_EXT.4.1: 1
    • FDP_PWR_EXT: 1
    • FDP_PWR_EXT.1: 10
    • FDP_PWR_EXT.1.1: 1
    • FDP_RDR_EXT: 1
    • FDP_RDR_EXT.1: 10
    • FDP_RDR_EXT.1.1: 1
    • FDP_RIP: 5
    • FDP_RIP.1: 1
    • FDP_RIP_EXT: 1
    • FDP_RIP_EXT.1: 5
    • FDP_RIP_EXT.1.1: 1
    • FDP_SPR_EXT: 7
    • FDP_SPR_EXT.1: 1
    • FDP_SWI_EXT: 1
    • FDP_SWI_EXT.1: 6
    • FDP_SWI_EXT.1.1: 1
    • FDP_SWI_EXT.2: 12
    • FDP_SWI_EXT.2.1: 1
    • FDP_SWI_EXT.2.2: 1
    • FDP_SWI_EXT.3: 10
    • FDP_SWI_EXT.3.1: 1
    • FDP_TER_EXT: 1
    • FDP_TER_EXT.1: 5
    • FDP_TER_EXT.1.1: 1
    • FDP_TER_EXT.2: 5
    • FDP_TER_EXT.2.1: 1
    • FDP_TER_EXT.3: 5
    • FDP_TER_EXT.3.1: 1
    • FDP_TER_EXT.3.2: 1
    • FDP_UAI_EXT: 1
    • FDP_UAI_EXT.1: 5
    • FDP_UAI_EXT.1.1: 1
    • FDP_UDF_EXT: 12
    • FDP_UDF_EXT.1: 2
  • FPT:
    • FPT_FLS_EXT: 1
    • FPT_FLS_EXT.1: 6
    • FPT_FLS_EXT.1.1: 2
    • FPT_NTA_EXT: 1
    • FPT_NTA_EXT.1: 4
    • FPT_NTA_EXT.1.1: 1
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
    • FPT_STM.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
  • FTA:
    • FTA_CIN_EXT: 1
    • FTA_CIN_EXT.1: 7
    • FTA_CIN_EXT.1.1: 1
    • FTA_CIN_EXT.1.2: 1
    • FTA_CIN_EXT.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 2
  • O:
    • O.AUDIT_LOSS_RESPONSE: 3
    • O.AUDIT_PROTECTION: 4
    • O.CERTIFICATES: 3
    • O.CONFIGURATION_MANAGEME: 1
    • O.CONFIGURATION_MANAGEMEN: 1
    • O.CONFIGURATION_MANAGEMENT: 2
    • O.DISPLAY_BANNER: 2
    • O.INTEGRITY_PROTECTION: 3
    • O.NON_REPUDIATION: 3
    • O.PROTECTED_COMMUNICATION: 1
    • O.PROTECTED_COMMUNICATIONS: 3
    • O.RECOVERY: 4
    • O.RESIDUAL_INFORMATION_CLEARING: 3
    • O.SYSTEM_MONITORING: 3
    • O.TOE_ADMINISTRATION: 4
    • O.TSF_SELF_TEST: 3
    • O.VERIFIABLE_UPDATES: 4
  • OE:
    • OE.AUDIT_RETENTION: 3
    • OE.AUDIT_STORAGE: 2
    • OE.CERT_REPOSITORY: 3
    • OE.CRYPTOGRAPHY: 4
    • OE.NO_GENERAL_PURPOSE: 3
    • OE.PHYSICAL: 3
    • OE.SESSION_PROTECTION_LOCAL: 3
    • OE.SESSION_PROTECTION_REMO: 1
    • OE.SESSION_PROTECTION_REMOT: 1
    • OE.SESSION_PROTECTION_REMOTE: 1
    • OE.TOE_ADMINISTRATION: 5
    • OE.TRUSTED_ADMIN: 3
    • OE.TRUSTED_PLATFORM: 4
  • T:
    • T.PRIVILEGED_USER_ERROR: 3
    • T.TSF_FAILURE: 2
    • T.UNAUTHENTICATED_TRANSACTION: 1
    • T.UNAUTHENTICATED_TRANSACTIONS: 2
    • T.UNAUTHORIZED_ACCE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 3
    • T.UNDETECTED_ACTIONS: 2
    • T.USER_DATA_REUSE: 3
    • T.WEAK_CRYPTO: 3
  • A:
    • A.NO_PHYSICAL: 1
    • A.NO_SPECIAL: 1
    • A.NO_SPECIAL_ANALOG: 1
    • A.NO_TEMPEST: 2
    • A.NO_WIRELESS: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 2
    • A.TRUSTED: 1
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED: 1
    • A.USER_ALLOWED_ACCESS: 1
  • O:
    • O.ANTI_TAMPERING: 2
    • O.AUTHORIZED: 2
    • O.COMPUTER: 5
    • O.EMULATED_INPUT: 3
    • O.LEAK: 1
    • O.LEAK_PREVENTION: 1
    • O.NO_OTHER: 3
    • O.NO_TOE_ACCESS: 2
    • O.NO_USER: 1
    • O.NO_USER_DATA: 1
    • O.PERIPHERAL: 1
    • O.PERIPHERAL_PORTS: 1
    • O.PROTECTED: 1
    • O.PROTECTED_EDID: 3
    • O.REJECT: 4
    • O.SELF_TEST: 4
    • O.SELF_TEST_FAIL: 2
    • O.SESSION: 5
    • O.TAMPER: 1
    • O.TAMPER_EVIDENT: 2
    • O.UNIDIRECTIONAL: 7
    • O.USER: 4
    • O.USER_DATA: 2
  • OE:
    • OE.NO_SPECIAL: 1
    • OE.NO_SPECIAL_ANALOG: 1
    • OE.NO_TEMPEST: 2
    • OE.NO_WIRELESS: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 3
    • OE.TRUSTED: 2
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.DATA_LEAK: 2
    • T.FAILED: 2
    • T.LOGICAL: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 2
    • T.RESIDUAL: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED: 1
    • T.UNINTENDED_USE: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Thales:
    • Thales: 2
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 16
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 23
      • HMAC-SHA-256: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDSA:
      • ECDSA: 10
  • FF:
    • DH:
      • DH: 1
      • DHE: 1
      • Diffie-Hellman: 6
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 1
    • SHA2:
      • SHA-2: 1
      • SHA-256: 4
      • SHA-384: 4
      • SHA-512: 5
      • SHA256: 1
    • SHA3:
      • SHA-3: 1
      • SHA3-256: 1
      • SHA3-384: 1
      • SHA3-512: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 3
  • PGP:
    • PGP: 1
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 2
      • SSL 2.0: 2
      • SSL 3.0: 3
      • SSL2.0: 1
    • TLS:
      • TLS: 66
      • TLS 1.0: 2
      • TLS 1.1: 3
      • TLS 1.2: 4
      • TLS v1.2: 5
      • TLS1.0: 1
  • VPN:
    • VPN: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 1
  • RNG:
    • RBG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CCM:
    • CCM: 2
  • GCM:
    • GCM: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 4
    • P-521: 4
    • secp256r1: 5
    • secp384r1: 5
    • secp521r1: 5
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical Tampering: 1
    • physical tampering: 8
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/device_model
  • STM:
    • STM32:
      • STM32F070C6T6: 2
      • STM32F070RBT6: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 2
    • FIPS 201-2: 1
    • FIPS PUB 186-4: 4
  • ICAO:
    • ICAO: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-57: 2
  • RFC:
    • RFC 2818: 1
    • RFC 3268: 6
    • RFC 4346: 3
    • RFC 4492: 4
    • RFC 5019: 1
    • RFC 5246: 6
    • RFC 5280: 8
    • RFC 5288: 6
    • RFC 5289: 11
    • RFC 6125: 1
    • RFC 6960: 7
    • RFC 7030: 4
    • RFC 8017: 1
    • RFC 8603: 1
    • RFC 8954: 2
  • X509:
    • X.509: 13
    • x.509: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_keywords/javacard_packages
  • java:
    • java.security: 1
pdf_data/st_metadata
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different