Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SM4148 LSI module for Smart Card
BSI-DSZ-CC-0389-2007
McAfee® Email Gateway (MEG) software v7.0.1, running on VMware server
383-4-241
name SM4148 LSI module for Smart Card McAfee® Email Gateway (MEG) software v7.0.1, running on VMware server
category ICs, Smart Cards and Smart Card-Related Devices and Systems Other Devices and Systems
scheme DE CA
not_valid_after 01.09.2019 19.04.2018
not_valid_before 04.07.2007 11.12.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0389a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-241%20CR%20v1.1e.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0389b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-241%20ST%202.1.pdf
manufacturer Sharp Corporation McAfee, Inc.
manufacturer_web https://sharp-world.com/ https://www.mcafee.com/
security_level ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 EAL2+, ALC_FLR.2
dgst d253d626039e05b7 b1a403b8d648c3b0
heuristics/cert_id BSI-DSZ-CC-0389-2007 383-4-241
heuristics/cert_lab BSI CANADA
heuristics/cpe_matches {} cpe:2.3:a:mcafee:email_gateway:7.0.1:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:email_gateway:7.0:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2020-7268, CVE-2012-4581, CVE-2016-8005, CVE-2012-4586, CVE-2012-4582, CVE-2012-4585, CVE-2012-4584, CVE-2012-4596, CVE-2009-1348, CVE-2015-1619, CVE-2012-4595, CVE-2012-4583, CVE-2012-4580, CVE-2012-4597, CVE-2013-6349
heuristics/extracted_sars ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, AVA_CCA.1, ADV_SPM.1, AVA_MSU.3 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions - 7.0.1
pdf_data/report_filename 0389a.pdf 383-4-241 CR v1.1e.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0389-2007
    • cert_item: SM4148 LSI module for Smart Card
    • cert_lab: BSI
    • developer: Sharp Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • CA:
  • DE:
  • CA:
    • cert_id: 383-4-241-CR
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0389: 3
    • BSI-DSZ-CC-0389-2007: 20
  • CA:
    • 383-4-241-CR: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0002-2001: 1
    • BSI-PP-0002-2001: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 14
    • EAL4 augmented: 3
    • EAL4+: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL 2: 6
    • EAL 2 augmented: 2
    • EAL 2+: 3
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 2
    • ACM_CAP: 2
    • ACM_CAP.4: 2
    • ACM_SCP: 2
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 2
    • ADO_IGS: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.2: 5
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 2
    • ALC_TAT: 2
    • ALC_TAT.1: 2
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_SOF.1: 1
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_COP.1: 1
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_IFC.1: 1
    • FDP_ITT.1: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA.1: 2
    • FMT_MSA.3: 1
    • FMT_SMF.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
    • FPT_SEP.1: 1
  • FRU:
    • FRU_FLT.2: 1
  • FAU:
    • FAU_STG_EXT.1: 1
    • FAU_STG_EXT.3: 1
  • FCS:
    • FCS_CKM_EXT.4: 1
    • FCS_RGB_EXT.1: 1
    • FCS_SSH_EXT.1: 1
    • FCS_TLS_EXT.1: 1
  • FDP:
    • FDP_CMM_EXT.1: 1
    • FDP_CMM_EXT.2: 1
  • FIA:
    • FIA_PMG_EXT.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UIA_EXT.1: 1
  • FPT:
    • FPT_APW_EXT.1: 1
    • FPT_SKP.1: 1
    • FPT_TST_EXT.1: 1
    • FPT_TUD_EXT.1: 1
  • FTA:
    • FTA_SSL_EXT.1: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • Philips:
    • Philips: 1
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 4
  • EWA:
    • EWA-Canada: 4
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 11
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 3
  • RNG:
    • RNG: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 2
    • Malfunction: 1
  • SCA:
    • DPA: 1
    • Physical Probing: 1
    • physical probing: 1
    • side channel: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 25: 1
    • AIS 26: 2
    • AIS 34: 2
    • AIS20: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
    • ISO/IEC15408: 2005: 1
  • FIPS:
    • FIPS 140-2: 2
    • FIPS 180-2: 1
    • FIPS 186-2: 3
    • FIPS 197: 1
    • FIPS 198: 1
    • FIPS 46-3: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, version 2.0, April 20th , 2007, Evaluation Technical Report SHARP SM4148 Module –EAL4+ (confidential document) [9] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
    • version 1.5, 11 April 2007, SM4148 LSI for IC cards Security Target, Sharp Corporation (confidential document) B-17 Certification Report BSI-DSZ-CC-0389-2007 [7] Security Target BSI-DSZ-CC-0389, version 1.5: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /CreationDate: D:20070705092911+02'00'
  • /Creator: Acrobat PDFMaker 8.0 für Word
  • /Keywords: Common Criteria, Certification, Zertifizierung, Sharp Corporation, SM4148 LSI module for Smart Card,
  • /ModDate: D:20070705094112+02'00'
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • /SourceModified: D:20070705071826
  • /Title: Certification Report BSI-DSZ-CC-0389-2007
  • pdf_file_size_bytes: 285406
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
  • /Author: User
  • /CCEF: EWA-Canada
  • /CR date: 10 December 2013
  • /CR version: 1.1
  • /Certificate date: 11 December 2012
  • /Company: CSEC-CSTC
  • /CreationDate: D:20131210121402-05'00'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /Developer name: McAfee, Inc.
  • /Document number: 383-4-241-CR
  • /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of McAfee, Inc. McAfee® Email Gateway Version 7.0.1 Version 1.2, 16 October 2012
  • /Evaluation completion date: 16 October 2012
  • /ModDate: D:20131210121407-05'00'
  • /Producer: Adobe PDF Library 9.0
  • /ST Title: McAfee® Email Gateway Version 7.0.1 EAL 2 + ALC_FLR.2 Security Target
  • /ST date: 28 October 2013
  • /ST version: 2.1
  • /SourceModified: D:20131210170825
  • /Sponsor: McAfee, Inc.
  • /TOE Version: 7.0.1
  • /TOE name and version: McAfee® Email Gateway (MEG) software v7.0.1, running on VMware Server
  • /TOE short name: MEG v7.0.1
  • /Title: EAL 2 Evaluation of <TOE name and version>
  • pdf_file_size_bytes: 102886
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
pdf_data/st_filename 0389b.pdf 383-4-241 ST 2.1.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 3
  • EAL:
    • EAL 2: 3
    • EAL2: 2
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.2: 4
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
  • ALC:
    • ALC_DVS.2: 4
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA.1: 1
    • AVA_MSU.3: 4
    • AVA_SOF: 3
    • AVA_SOF.1: 1
    • AVA_VLA.4: 4
  • ADO:
    • ADO_OPE: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 6
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM.1: 4
    • FCS_CKM.4: 4
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
    • FCS_RND.1: 5
    • FCS_RND.1.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 9
    • FDP_ITC.1: 6
    • FDP_ITC.2: 3
    • FDP_ITT.1: 6
  • FMT:
    • FMT_LIM.1: 5
    • FMT_LIM.2: 4
    • FMT_MSA.1: 13
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 4
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 4
  • FPT:
    • FPT_FLS.1: 5
    • FPT_ITT.1: 7
    • FPT_PHP.3: 5
    • FPT_SEP.1: 5
  • FRU:
    • FRU_FLT.2: 5
  • FAU:
    • FAU_ARP.1: 12
    • FAU_ARP.1.1: 1
    • FAU_GEN: 11
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 1
    • FAU_STG: 7
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 14
    • FAU_STG.3.1: 2
    • FAU_STG_EXT: 1
    • FAU_STG_EXT.1: 13
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 20
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 11
    • FCS_CKM_EXT.4: 16
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 40
    • FCS_COP.1.1: 5
    • FCS_COP.2: 1
    • FCS_RBG: 3
    • FCS_RBG_EXT: 1
    • FCS_RBG_EXT.1: 10
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_RGB_EXT.1: 1
    • FCS_SSH: 3
    • FCS_SSH_EXT: 1
    • FCS_SSH_EXT.1: 11
    • FCS_SSH_EXT.1.1: 2
    • FCS_SSH_EXT.1.2: 2
    • FCS_SSH_EXT.1.3: 2
    • FCS_SSH_EXT.1.4: 2
    • FCS_SSH_EXT.1.5: 2
    • FCS_SSH_EXT.1.6: 2
    • FCS_SSH_EXT.1.7: 2
    • FCS_TLS: 3
    • FCS_TLS_EXT: 1
    • FCS_TLS_EXT.1: 15
    • FCS_TLS_EXT.1.1: 2
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF: 2
    • FDP_CMM.2.1: 1
    • FDP_CMM_EXT: 4
    • FDP_CMM_EXT.1: 39
    • FDP_CMM_EXT.1.1: 5
    • FDP_CMM_EXT.2: 48
    • FDP_CMM_EXT.2.1: 4
    • FDP_IFC: 3
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF: 5
    • FDP_IFF.1: 4
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 10
    • FDP_ITC.2: 8
    • FDP_RIP.2: 7
    • FDP_RIP.2.1: 1
    • FDP_UCT: 3
    • FDP_UCT.1: 4
    • FDP_UCT.1.1: 1
  • FIA:
    • FIA_PMG: 3
    • FIA_PMG_EXT: 1
    • FIA_PMG_EXT.1: 12
    • FIA_PMG_EXT.1.1: 2
    • FIA_UAU: 5
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 1
    • FIA_UAU_EXT.2: 12
    • FIA_UAU_EXT.2.1: 2
    • FIA_UIA: 2
    • FIA_UIA_EXT: 2
    • FIA_UIA_EXT.1: 14
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
    • FIA_UID: 1
    • FIA_UID.1: 3
    • FIA_UID_EXT.1: 1
  • FMT:
    • FMT_MOF.1: 24
    • FMT_MOF.1.1: 3
    • FMT_MSA.3: 2
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 10
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW: 2
    • FPT_APW_EXT: 2
    • FPT_APW_EXT.1: 9
    • FPT_APW_EXT.1.1: 3
    • FPT_APW_EXT.1.2: 2
    • FPT_CKM.1: 1
    • FPT_ITT: 1
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
    • FPT_SKP: 2
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 10
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TST: 4
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 8
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD: 3
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 17
  • FTA:
    • FTA_SSL: 4
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 7
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT: 1
    • FTA_SSL_EXT.1: 11
    • FTA_SSL_EXT.1.1: 2
    • FTA_TAB.1: 9
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.MEM_ACCESS: 2
    • O.RND: 1
  • T:
    • T.RND: 1
  • A:
    • A.NO_BYPASS: 1
    • A.NO_GENERAL_PURPOSE: 3
    • A.NO_MALW: 1
    • A.PHYSICAL: 1
    • A.SEC_UPDATES: 3
    • A.TRUSTED_ADMIN: 3
  • O:
    • O.AUDIT_PROTECT: 9
    • O.AUDIT_REVIEW: 7
    • O.DECRYP: 5
    • O.DISPLAY_BANNER: 4
    • O.MAL_CONTENT: 4
    • O.NOSUB: 1
    • O.PROTECTED_COMMUNICATI: 2
    • O.PROTECTED_COMMUNICATIONS: 6
    • O.RESIDUAL_INFORMATION_C: 2
    • O.RESIDUAL_INFORMATION_CLEARING: 3
    • O.S: 3
    • O.SECURE_CHK: 5
    • O.SECURE_MAIL: 5
    • O.SESSION_LOCK: 5
    • O.SYSTEM_MONITORING: 7
    • O.TIME_STAMPS: 5
    • O.TOE_ADMINISTRATION: 4
    • O.TSF_SELFTEST: 1
    • O.TSF_SELF_TEST: 5
    • O.VERIFIABLE: 6
    • O.VERIFIABLE_UPDATES: 3
  • OE:
    • OE.ADMIN_SESSION: 3
    • OE.NOSUB: 7
    • OE.NO_BYPASS: 2
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.NO_MALW: 4
    • OE.PHYSICAL: 2
    • OE.SEC_UPDATES: 4
    • OE.TRUSTED_ADMIN: 3
  • T:
    • T.ADMIN_ERROR: 4
    • T.AUDIT_: 3
    • T.AUDIT_COMP: 1
    • T.BAD_DAT: 4
    • T.MAL_AGENT: 4
    • T.MAL_MSG: 2
    • T.TSF_FAILURE: 2
    • T.UNAUTHORIZED_: 2
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 3
    • T.UNDETECTED_A: 1
    • T.UNDETECTED_ACTIONS: 3
    • T.UNID_ACTION: 2
    • T.USER_DATA_RE: 1
    • T.USER_DATA_REUSE: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 5
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • TDES: 1
    • DES:
      • DES: 24
  • AES_competition:
    • AES:
      • AES: 8
      • AES-256: 1
  • DES:
    • 3DES:
      • TDES: 1
  • constructions:
    • MAC:
      • HMAC: 2
      • HMAC-SHA-256: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • DH: 1
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 6
    • SHA2:
      • SHA-256: 5
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • PGP:
    • PGP: 5
  • SSH:
    • SSH: 45
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 33
      • TLS 1.0: 5
      • TLS 1.1: 1
      • TLS 1.2: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 4
  • RNG:
    • RBG: 5
    • RNG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
  • libgcrypt:
    • libgcrypt: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 3
    • Malfunction: 4
  • SCA:
    • DPA: 3
    • Leak-Inherent: 7
    • SPA: 2
  • other:
    • JIL-AAPS: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS20: 3
  • FIPS:
    • FIPS PUB 46-3: 1
    • FIPS46-3: 1
  • ISO:
    • ISO/IEC 7816: 4
  • FIPS:
    • FIPS 140: 2
    • FIPS 140-2: 1
    • FIPS PUB 186-2: 1
    • FIPS PUB 197: 1
  • NIST:
    • NIST SP 800-38A: 1
    • SP 800-90B: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 2246: 3
    • RFC 2818: 2
    • RFC 4253: 1
    • RFC 4346: 1
    • RFC 5246: 1
pdf_data/st_metadata
  • /CreationDate: D:20070531192506+09'00'
  • /ModDate: D:20070806162718+02'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Title: SM4148 LSI FOR IC CARDS SECURITY TARGET
  • pdf_file_size_bytes: 154908
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
  • /Author: Primasec
  • /CreationDate: D:20131218092508-05'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20131218092508-05'00'
  • /Producer: Microsoft® Office Word 2007
  • /Title: McAfee MEG7 ST
  • pdf_file_size_bytes: 1436856
  • pdf_hyperlinks: http://www.openssh.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 86
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different