name |
Alcatel-Lucent Enterprise OmniSwitch with AOS 8.6.4.R11 |
ST31-K330A Secure microcontroller revision F for Dual mode version (contact and contactless) or contactless-only version, optionally including the NesLib cryptographic library revision 3.2 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
SE |
FR |
status |
active |
archived |
not_valid_after |
17.02.2026 |
01.09.2019 |
not_valid_before |
17.02.2021 |
23.04.2013 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20-%20ALE%20Enterprise.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Alcatel-Lucent%20Enterprise%20OmniSwitch%20series%206465,%206560,%206860,%206865,%206900,%209900%20with%20AOS%208.6.4.R11.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_25en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Alcatel-Lucent%20Enterprise%20OmniSwitch%20with%20AOS%208.6.R11%20Security%20Target%20for%20EAL2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_K330A_F_Public_Neslib3_2_v1_00.pdf |
manufacturer |
ALE USA Inc |
STMicroelectronics S.A. |
manufacturer_web |
https://www.al-enterprise.com/ |
https://www.st.com/ |
security_level |
EAL2, ALC_FLR.2 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
d5fa8a7a4ee69ffd |
b49e764606a5de71 |
heuristics/cert_id |
CSEC2019023 |
ANSSI-CC-2013/25 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
AGD_PRE.1, ATE_COV.2, ALC_TAT.2, ALC_CMS.5, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ATE_DPT.3, ATE_IND.2, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ADV_ARC.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, ALC_CMC.4, ADV_IMP.1 |
heuristics/extracted_versions |
8.6.4 |
3.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
CCRA - ALE Enterprise.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210905105009+02'00'
- /Creator: RICOH MP C4504ex
- /ModDate: D:20210905113053+02'00'
- /Producer: RICOH MP C4504ex
- pdf_file_size_bytes: 911543
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
Certification Report - Alcatel-Lucent Enterprise OmniSwitch series 6465, 6560, 6860, 6865, 6900, 9900 with AOS 8.6.4.R11.pdf |
ANSSI-CC-2013_25en.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL5 Augmented ALC_DVS.2 and AVA_VAN.5
- cc_version: CC version 3.1 revision 4
- cert_id: ANSSI-CC-2013/25
- cert_item: ST31-K330A Secure microcontroller revision F for Dual mode version (contact and contactless) or contactless-only version, optionally including the NesLib cryptographic library revision 3.2
- cert_item_version: Maskset reference K330A , internal revision F
- cert_lab: Serma Technologies 30 Avenue Gustave Eiffel, 33608 Pessac Cedex, France
- developer: STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Sponsor STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: BSI_PP_0035-2007], version v1.0 Security IC Platform Protection Profile
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
- EAL2: 2
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 2
- EAL 5 augmented: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.SERVICES_RELIABLE: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.INFORMATION_FLOW_POLICY_VIOLATION: 1
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- SSL: 1
- SSLv2.0: 1
- SSLv3.0: 1
- TLS:
- TLS: 6
- TLS 1.2: 1
- TLSv1.0: 1
- TLSv1.1: 5
- TLSv1.2: 5
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
- Neslib:
- NesLib 3.2: 2
- NesLib v3.2: 1
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
- X509:
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: MAAVA
- /CreationDate: D:20210218173433+01'00'
- /ModDate: D:20210218173433+01'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - Certification Report ALE Omniswitch v2
- pdf_file_size_bytes: 766005
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2013_25en
- pdf_file_size_bytes: 290867
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
Alcatel-Lucent Enterprise OmniSwitch with AOS 8.6.R11 Security Target for EAL2.pdf |
ST_K330A_F_Public_Neslib3_2_v1_00.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 2
- EAL4: 1
- EAL5: 18
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ATE:
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT.1: 8
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 21
- FCS_CKM.1.1: 1
- FCS_CKM.2: 14
- FCS_CKM.2.1: 1
- FCS_CKM.4: 14
- FCS_CKM.4.1: 1
- FCS_COP: 62
- FCS_COP.1: 5
- FCS_COP.1.1: 4
- FCS_RBG_EXT.1: 13
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT: 9
- FCS_SSHC_EXT.1: 8
- FCS_SSHS_EXT: 8
- FCS_SSHS_EXT.1: 9
- FCS_TLSC_EXT: 5
- FCS_TLSC_EXT.2: 9
- FCS_TLSS_EXT: 6
- FCS_TLSS_EXT.2: 9
- FDP:
- FDP_ACC.1: 1
- FDP_IFC: 18
- FDP_IFC.1: 5
- FDP_IFC.1.1: 2
- FDP_IFF: 14
- FDP_IFF.1: 4
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_PMG_EXT.1: 9
- FIA_PMG_EXT.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 9
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 13
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 20
- FMT_MOF.1: 3
- FMT_MOF.1.1: 3
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 15
- FMT_MTD.1: 2
- FMT_MTD.1.1: 2
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 2
- FMT_SMR.2: 17
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 9
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 12
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 9
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTA_SSL.4: 8
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 9
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 10
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 24
- FCS_CKM.4: 4
- FCS_COP.1: 25
- FCS_RNG: 1
- FCS_RNG.1: 5
- FDP:
- FDP_ACC.1: 2
- FDP_ACC.2: 11
- FDP_ACF.1: 11
- FDP_CKM.2: 1
- FDP_IFC.1: 9
- FDP_ITC.1: 3
- FDP_ITC.2: 2
- FDP_ITT.1: 6
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 7
- FMT_LIM.2: 8
- FMT_MSA.1: 9
- FMT_MSA.2: 1
- FMT_MSA.3: 9
- FMT_SMF.1: 7
- FMT_SMR.1: 2
- FPT:
- FPT_FLS.1: 7
- FPT_ITT.1: 5
- FPT_PHP.3: 6
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 3
- A.LIMITED_FUNCTIONALITY: 3
- A.PHYSICAL_PROTECTION: 3
- A.REGULAR_UPDATES: 3
- A.RESIDUAL_INFORMATION: 3
- A.SERVICES_RELIABLE: 3
- A.TRUSTED_ADMINISTRATOR: 3
- O:
- O.ACCESS_BANNER: 4
- O.ADMIN_ACCESS: 14
- O.ADMIN_SESSION: 7
- O.AUDIT: 12
- O.COMMUNICATION_CHANNELS: 15
- O.CRYPTOGRAPHY: 12
- O.MEDIATE: 16
- O.SELF_TESTS: 5
- O.STRONG_PASSWORDS: 8
- O.TRUSTED_UPDATES: 8
- O.TSF_DATA_PROTECTION: 10
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 2
- OE.NO_GENERAL_PURPOSE: 2
- OE.PHYSICAL: 2
- OE.RESIDUAL_INFORMATION: 2
- OE.SERVICES_RELIABLE: 2
- OE.TRUSTED_ADMIN: 2
- OE.UPDATES: 2
- T:
- T.INFORMATION_FLOW_POLICY_VIOLATION: 2
- T.PASSWORD_CRACKING: 3
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 2
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 3
- T.UNDETECTED_ACTIVITY: 3
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
- T.UPDATE_COMPROMISE: 3
- T.WEAK_AUTHENTICATION_ENDPOINTS: 2
- T.WEAK_CRYPTOGRAPHY: 3
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Philips:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 5
- HMAC-SHA-256: 5
- HMAC-SHA-384: 4
- HMAC-SHA-512: 4
|
- AES_competition:
- AES:
- AES: 14
- AES-: 1
- AES-128: 1
- AES-192: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-256: 18
- SHA-384: 8
- SHA-512: 11
- SHA256: 2
- SHA384: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 5
- SHA-256: 5
- SHA-384: 5
- SHA-512: 3
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- SSH:
- TLS:
- SSL:
- SSL: 4
- SSL 2.0: 1
- SSL 3.0: 1
- SSLv2.0: 2
- SSLv3.0: 2
- TLS:
- TLS: 81
- TLS 1.0: 1
- TLS 1.1: 2
- TLS 1.2: 2
- TLSv1.0: 2
- TLSv1.1: 30
- TLSv1.2: 30
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- NIST P-256: 1
- P-224: 2
- P-256: 15
- P-384: 16
- P-521: 16
- secp256r1: 3
- secp384r1: 3
- secp521r1: 3
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 3
- TLS_RSA_WITH_AES_256_GCM_SHA384: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 9
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 8
- Physical Probing: 4
- physical probing: 3
- side channel: 6
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 186-4: 4
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 2
- ISO/IEC 9796-2: 1
- PKCS:
- RFC:
- RFC 6125: 1
- RFC2986: 3
- RFC3268: 5
- RFC3411: 2
- RFC3526: 4
- RFC4251: 3
- RFC4252: 4
- RFC4253: 4
- RFC4254: 2
- RFC4344: 2
- RFC4346: 3
- RFC4492: 10
- RFC5246: 7
- RFC5280: 5
- RFC5288: 5
- RFC5289: 17
- RFC5591: 2
- RFC5656: 2
- RFC5759: 3
- RFC5953: 2
- RFC6125: 2
- RFC6668: 2
- RFC6960: 3
- RFC8017: 2
- RFC8332: 2
- RFC8422: 2
- X509:
|
- BSI:
- CC:
- CCMB-2012-09-001: 3
- CCMB-2012-09-002: 10
- CCMB-2012-09-003: 2
- FIPS:
- FIPS PUB 140-2: 7
- FIPS PUB 180-1: 4
- FIPS PUB 180-2: 3
- FIPS PUB 186: 2
- FIPS PUB 197: 3
- FIPS PUB 46-3: 3
- ISO:
- ISO/IEC 10116: 5
- ISO/IEC 10118-: 2
- ISO/IEC 14443: 2
- ISO/IEC 14888: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 4
- ISO/IEC 9797: 1
- ISO/IEC 9797-1: 3
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 26 The Security IC Embedded Software (ES) is in User ROM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib when it is embedded. 27 The TOE optionally comprises a specific: 1
- ES) is in User ROM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib when it is embedded: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Alejandro Masino (generated by CCTool version 2.8.4.48)
- /CreationDate: D:20210209163010Z
- /Creator: Unknown
- /Keywords: ALE USA Inc., ALE, Alcatel-Lucent Enterprise, OmniSwitch, Alcatel-Lucent Operating System, AOS, OmniSwitch 6465, OmniSwitch 6560, OmniSwitch 6860, OmniSwitch 6865, OmniSwitch 6900, OmniSwitch 9900, OS6465, OS6560, OS6860, OS6865, OS6900, OS9900
- /ModDate: D:20210218173531+01'00'
- /Producer: XEP 4.25.502
- /Subject: Alcatel-Lucent Enterprise OmniSwitch series 6465, 6560, 6860, 6865, 6900, 9900 with AOS 8.6.4.R11
- /Title: Alcatel-Lucent Enterprise OmniSwitch with AOS 8.6.R11 Security Target for EAL2 (version 3.2 as of 2021-02-03)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 1536487
- pdf_hyperlinks: http://www.ietf.org/rfc/rfc4346.txt, https://www.niap-ccevs.org/MMO/PP/CPP_ND_V2.1.pdf, http://www.ietf.org/rfc/rfc6125.txt, http://www.ietf.org/rfc/rfc3268.txt, http://www.ietf.org/rfc/rfc5759.txt, http://www.ietf.org/rfc/rfc5656.txt, http://www.ietf.org/rfc/rfc4344.txt, http://www.ietf.org/rfc/rfc2986.txt, http://www.ietf.org/rfc/rfc8017.txt, http://www.ietf.org/rfc/rfc5280.txt, http://www.ietf.org/rfc/rfc5953.txt, http://www.ietf.org/rfc/rfc6668.txt, http://www.ietf.org/rfc/rfc8422.txt, http://www.ietf.org/rfc/rfc4492.txt, http://www.ietf.org/rfc/rfc6960.txt, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf, http://www.ietf.org/rfc/rfc4251.txt, http://www.ietf.org/rfc/rfc5246.txt, http://www.ietf.org/rfc/rfc4252.txt, http://www.ietf.org/rfc/rfc5591.txt, http://www.ietf.org/rfc/rfc5288.txt, http://www.ietf.org/rfc/rfc4253.txt, http://www.ietf.org/rfc/rfc3526.txt, http://www.ietf.org/rfc/rfc4254.txt, http://www.ietf.org/rfc/rfc8332.txt, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf, http://www.ietf.org/rfc/rfc5289.txt, http://www.ietf.org/rfc/rfc3411.txt
- pdf_is_encrypted: False
- pdf_number_of_pages: 110
|
- /Author: Christiane DROULERS
- /CreationDate: D:20130326100008Z
- /Creator: FrameMaker 7.2
- /ModDate: D:20130326100008Z
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: SMD_SR31Zxxx_V1_0.book
- pdf_file_size_bytes: 604201
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 52
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |