Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series
KECS-CISS-1035-2020
Microsoft Windows 10 and Windows Server 2012 R2
2015-27-INF-1539
name Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series Microsoft Windows 10 and Windows Server 2012 R2
category Multi-Function Devices Operating Systems
scheme KR ES
not_valid_after 26.08.2025 05.04.2021
not_valid_before 26.08.2020 05.04.2016
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CISS-1035-2020_CR_EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_windows10.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CISS-1035-2020_ST_EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_windows10.pdf
manufacturer HP Inc. Microsoft Corporation
manufacturer_web https://www8.hp.com/hpnext/tags/hp-inc#.Vjdf803sn4g https://www.microsoft.com
security_level EAL2+, ALC_FLR.2 {}
dgst d5eaadb952636ef2 b737ca21ffacf8a0
heuristics/cert_id KECS-CISS-1035-2020 2015-27-INF-1539
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, AGD_PRE.1, AVA_VAN.1, ATE_COV.1, ATE_FUN.1, ASE_SPD.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, ALC_TSU_EXT.1, ADV_FSP.1
heuristics/extracted_versions - 2012, 10
heuristics/scheme_data
  • category: Digital Multifunction Printer
  • cert_id: KECS-CISS-1035-2020
  • certification_date: 26.08.2020
  • enhanced:
    • assurance_level: EAL2+
    • cc_version: CC V3.1 R5
    • cert_id: KECS-CISS-1035-2020
    • cert_link: https://itscc.kr/file/download.do?file=KPR100000001577
    • certification_date: 26.08.2020
    • developer: HP Printing Korea Co., Ltd
    • expiration_date: 26.08.2025
    • holder: HP Inc.
    • maintenance_update: [frozendict({'name': 'Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series Assurance maintenance1', 'certification_date': datetime.date(2023, 11, 9), 'cert_id': 'KECS-CISS-1035a-2020', 'maintenance_link': 'https://itscc.kr/file/download.do?file=KPR200000001712', 'target_link': 'https://itscc.kr/file/download.do?file=KPR200000001713'})]
    • product: Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series
    • product_type: Digital Multifunction Printer
    • protection_profile: U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std.2600.2-2009)
    • report_link: https://itscc.kr/file/download.do?file=KPR100000001569
    • target_link: https://itscc.kr/file/download.do?file=KPR100000001570
  • level: EAL2+
  • product: Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series
  • product_link: https://itscc.kr/certprod/view.do?product_id=1035&product_class=4
  • vendor: HP Inc.
heuristics/st_references/directly_referenced_by {} 383-4-390
heuristics/st_references/indirectly_referenced_by {} 383-4-390
heuristics/protection_profiles 154ef77c252799ee 1edd61e3f1f2ce0d
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0058b.pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_os_v4.1.pdf
pdf_data/report_filename KECS-CISS-1035-2020_CR_EN.pdf cr_windows10.pdf
pdf_data/report_keywords/cc_cert_id
  • KR:
    • KECS-CISS-1035-2020: 1
  • ES:
    • 2015-27-INF-1539 v1: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 2
    • EAL2+: 5
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 3
    • ADV_TDS.1: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 5
  • AVA:
    • AVA_VAN.2: 5
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_sfr
  • FPT:
    • FPT_FDI_EXP: 1
    • FPT_FDI_EXP.1: 1
  • FAU:
    • FAU_GEN.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM_EXT.3: 1
    • FCS_COP.1: 4
    • FCS_RBG_EXT.1: 1
    • FCS_STO_EXT.1: 1
    • FCS_TLSC_EXT.1: 1
    • FCS_TLSC_EXT.2: 1
    • FCS_TLSC_EXT.3: 1
    • FCS_TLSC_EXT.4: 1
  • FDP:
    • FDP_ACF_EXT.1: 1
    • FDP_IFC_EXT.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_UAU.5: 1
  • FMT:
    • FMT_MOF_EXT.1: 1
  • FPT:
    • FPT_ACF_EXT.1: 1
    • FPT_ASLR_EXT.1: 1
    • FPT_SBOP_EXT.1: 1
    • FPT_SRP_EXT.1: 1
    • FPT_TST_EXT.1: 1
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.2: 1
  • FTA:
    • FTA_TAB.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 1
    • FTP_TRP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACC: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 12
  • Microsoft:
    • Microsoft: 46
pdf_data/report_keywords/eval_facility
  • KSEL:
    • KSEL: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 1
  • TLS:
    • TLS:
      • TLS: 5
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • X509:
    • X.509: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and MINISTERIO: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20160406120736+02'00'
  • /Producer: doPDF Ver 8.4 Build 935
  • pdf_file_size_bytes: 658272
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename KECS-CISS-1035-2020_ST_EN.pdf st_windows10.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 8
    • EAL2 augmented: 6
    • EAL3: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 12
    • ADV_FSP.1: 3
    • ADV_FSP.2: 16
    • ADV_TDS.1: 15
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 13
    • AGD_PRE: 1
    • AGD_PRE.1: 9
  • ALC:
    • ALC_CMC.2: 9
    • ALC_CMS.1: 1
    • ALC_CMS.2: 7
    • ALC_DEL.1: 6
    • ALC_FLR.2: 23
  • APE:
    • APE_ECD: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SPD: 1
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 13
    • ASE_INT.1: 15
    • ASE_OBJ.2: 12
    • ASE_REQ.1: 2
    • ASE_REQ.2: 14
    • ASE_SPD.1: 9
    • ASE_TSS.1: 6
  • ATE:
    • ATE_COV.1: 7
    • ATE_FUN.1: 11
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 35
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 29
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 10
    • FDP_IFC.2: 7
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 16
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 31
    • FMT_MSA.1.1: 4
    • FMT_MSA.3: 31
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 31
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 4
    • FCS_CKM.2: 8
    • FCS_CKM.2.1: 3
    • FCS_CKM.4: 1
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.3: 7
    • FCS_CKM_EXT.3.1: 1
    • FCS_COP.1: 43
    • FCS_COP.1.1: 5
    • FCS_DTLS_EXT: 1
    • FCS_DTLS_EXT.1: 1
    • FCS_RBG_EXT: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_STO_EXT: 1
    • FCS_STO_EXT.1: 6
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 7
    • FCS_TLSC_EXT.1.1: 2
    • FCS_TLSC_EXT.1.2: 2
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.2: 6
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.3: 7
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.4: 6
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLS_EXT: 1
    • FCS_TLS_EXT.1: 1
    • FCS_TLS_EXT.2: 1
    • FCS_TLS_EXT.3: 1
  • FDP:
    • FDP_ACF_EXT: 1
    • FDP_ACF_EXT.1: 6
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT: 1
    • FDP_IFC_EXT.1: 6
    • FDP_IFC_EXT.1.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU: 1
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF_EXT: 1
    • FMT_MOF_EXT.1: 6
    • FMT_MOF_EXT.1.1: 1
  • FPT:
    • FPT_ACF_EXT: 1
    • FPT_ACF_EXT.1: 6
    • FPT_ACF_EXT.1.1: 2
    • FPT_ACF_EXT.1.2: 2
    • FPT_ASLR_EXT: 1
    • FPT_ASLR_EXT.1: 6
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT: 1
    • FPT_SBOP_EXT.1: 6
    • FPT_SBOP_EXT.1.1: 1
    • FPT_SRP_EXT: 1
    • FPT_SRP_EXT.1: 6
    • FPT_SRP_EXT.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.2: 6
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 6
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT: 1
    • FTP_ITC_EXT.1: 10
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 4
    • A.ADMIN: 8
    • A.USER: 4
  • D:
    • D.CONF: 7
    • D.DOC: 15
    • D.FUNC: 8
    • D.PROT: 4
  • O:
    • O.AUDIT: 6
    • O.AUDIT_ACCESS: 6
    • O.AUDIT_STORAG: 1
    • O.AUDIT_STORAGE: 5
    • O.CONF: 12
    • O.DOC: 13
    • O.FUNC: 6
    • O.INTERFACE: 6
    • O.PROT: 6
    • O.SOFTWARE: 6
    • O.USER: 12
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 4
    • OE.AUDIT_ACCESS: 4
    • OE.AUDIT_STORAGE: 4
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 14
  • T:
    • T.CONF: 8
    • T.DOC: 8
    • T.FUNC: 4
    • T.PROT: 4
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.ACCOUNTABILITY: 1
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 9
  • Cisco:
    • Cisco: 1
  • Microsoft:
    • Microsoft: 145
    • Microsoft Corporation: 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3DES: 2
  • AES_competition:
    • AES:
      • AES: 19
      • AES-128: 1
      • AES-256: 4
    • RC:
      • RC4: 1
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 13
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 12
    • ECDH:
      • ECDH: 4
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 13
  • FF:
    • DH:
      • DH: 3
      • DHE: 1
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 8
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA-1: 5
      • SHA1: 2
    • SHA2:
      • SHA-2: 1
      • SHA-256: 11
      • SHA-384: 3
      • SHA-512: 3
      • SHA256: 4
      • SHA384: 3
      • SHA512: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 15
  • KA:
    • Key Agreement: 1
    • Key agreement: 1
  • KEX:
    • Key Exchange: 6
  • MAC:
    • MAC: 19
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IKE:
    • IKE: 7
    • IKEv1: 2
    • IKEv2: 2
  • IPsec:
    • IPsec: 19
  • PGP:
    • PGP: 1
  • TLS:
    • DTLS:
      • DTLS: 1
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 81
      • TLS 1.0: 2
      • TLS 1.1: 2
      • TLS 1.2: 4
  • VPN:
    • VPN: 20
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 7
    • PRNG: 2
  • RNG:
    • RBG: 7
    • RNG: 7
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 2
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-192: 2
    • P-256: 10
    • P-384: 10
    • P-521: 10
    • secp256r1: 2
    • secp384r1: 2
    • secp512r1: 1
    • secp521r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_NULL_WITH_NULL_NULL: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 197: 1
  • FIPS:
    • FIPS 140: 1
    • FIPS 180-4: 2
    • FIPS 186-4: 15
    • FIPS 197: 3
    • FIPS 198-1: 1
    • FIPS 198-2: 1
  • ISO:
    • ISO/IEC 2900-2: 1
  • NIST:
    • NIST SP 800-56A: 2
    • NIST SP 800-56B: 2
    • NIST SP 800-57: 1
    • NIST SP 800-90: 2
    • NIST SP 800-90A: 1
    • NIST SP 800-90B: 1
    • SP 800-56A: 1
    • SP 800-90: 1
  • PKCS:
    • PKCS #7: 1
  • RFC:
    • RFC 2246: 2
    • RFC 2396: 1
    • RFC 2560: 1
    • RFC 2818: 1
    • RFC 3268: 1
    • RFC 3546: 2
    • RFC 4366: 1
    • RFC 4492: 5
    • RFC 4681: 1
    • RFC 5246: 8
    • RFC 5280: 4
    • RFC 5289: 8
    • RFC 5759: 1
    • RFC 6066: 1
    • RFC 6125: 1
  • X509:
    • X.509: 15
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • kernel. Software loaded for execution directly by the platform (e.g. first-stage bootloaders) is out of scope. For each additional category of executable code verified before execution, the evaluator will: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: tech@epoche
  • /CreationDate: D:20160406100555+02'00'
  • /ModDate: D:20160406100555+02'00'
  • /Producer: Bullzip PDF Printer / www.bullzip.com / Freeware Edition
  • /Title: Microsoft Word - Windows 10 Security Target - Public _March 30 2016_ _FINAL_.docx
  • pdf_file_size_bytes: 833656
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 97
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different