Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Alcatel-Lucent Enterprise OmniSwitch with AOS 8.6.4.R11
CSEC2019023
IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
NSCIB-CC-196231-CR
name Alcatel-Lucent Enterprise OmniSwitch with AOS 8.6.4.R11 IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme SE NL
status active archived
not_valid_after 17.02.2026 19.11.2023
not_valid_before 17.02.2021 19.11.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20-%20ALE%20Enterprise.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-18-196231.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Alcatel-Lucent%20Enterprise%20OmniSwitch%20series%206465,%206560,%206860,%206865,%206900,%209900%20with%20AOS%208.6.4.R11.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-196231-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Alcatel-Lucent%20Enterprise%20OmniSwitch%20with%20AOS%208.6.R11%20Security%20Target%20for%20EAL2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-BAC-Lite]%202018_2000037746%20-%20Security%20Target%20Lite%20IDeal%20Pass%20v2.3-i%20JC%20(BAC%20Configuration)%20(v1.0,%202018-09-07).pdf
manufacturer ALE USA Inc Idemia
manufacturer_web https://www.al-enterprise.com/ https://www.idemia.com
security_level EAL2, ALC_FLR.2 ADV_TDS.4, ALC_CMS.5, ATE_DPT.3, ADV_INT.2, ADV_FSP.5, EAL4+, ALC_DVS.2, ALC_TAT.2
dgst d5fa8a7a4ee69ffd ce867531085e33f8
heuristics/cert_id CSEC2019023 NSCIB-CC-196231-CR
heuristics/cert_lab []
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ALC_CMS.5, AVA_VAN.5, ADV_TDS.4, ATE_DPT.3, ALC_DVS.2, ADV_ARC.1, ADV_FSP.5, ADV_INT.2, ALC_TAT.2, ADV_SPM.1
heuristics/extracted_versions 8.6.4 2.3
heuristics/report_references/directly_referencing {} ANSSI-CC-2018/27, NSCIB-CC-195748-CR
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0782-2012, ANSSI-CC-2016/66, NSCIB-CC-195748-CR, BSI-DSZ-CC-0782-V3-2017, BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2017/59, ANSSI-CC-2018/27, BSI-DSZ-CC-0782-V2-2015
heuristics/st_references/directly_referencing {} ANSSI-CC-2018/27
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27
heuristics/protection_profiles {} 60455fc9564e2545
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf
pdf_data/cert_filename CCRA - ALE Enterprise.pdf Signed certificate CC-18-196231.pdf
pdf_data/cert_keywords/cc_cert_id
  • SE:
    • CSEC2019023: 1
  • NL:
    • CC-18-196231: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2+: 1
  • EAL:
    • EAL2: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ADV:
    • ADV_FSP.5: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_DVS.2: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_DPT.3: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.M: 1
pdf_data/cert_keywords/eval_facility
  • atsec:
    • atsec: 1
  • BrightSight:
    • Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ICAO:
    • ICAO: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20210905105009+02'00'
  • /Creator: RICOH MP C4504ex
  • /ModDate: D:20210905113053+02'00'
  • /Producer: RICOH MP C4504ex
  • pdf_file_size_bytes: 911543
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20181119163400+01'00'
  • /Creator: BHC364e
  • /ModDate: D:20181119163400+01'00'
  • /Producer: KONICA MINOLTA bizhub C364e
  • /Title: BHC364e-20181119163400
  • pdf_file_size_bytes: 202344
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename Certification Report - Alcatel-Lucent Enterprise OmniSwitch series 6465, 6560, 6860, 6865, 6900, 9900 with AOS 8.6.4.R11.pdf Certification Report NSCIB-CC-196231-CR.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-196231-CR
    • cert_item: IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration
    • cert_lab: Brightsight
    • developer: IDEMIA
pdf_data/report_keywords/cc_cert_id
  • SE:
    • CSEC2019023: 22
  • FR:
    • ANSSI-CC-2018/27: 1
  • NL:
    • CC-19-180045: 1
    • CC-195748: 2
    • NSCIB-CC-196231-CR: 12
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
    • EAL2: 2
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.5: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMS.5: 2
    • ALC_DVS.2: 2
    • ALC_TAT.2: 2
  • ATE:
    • ATE_DPT.3: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.SERVICES_RELIABLE: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • T:
    • T.INFORMATION_FLOW_POLICY_VIOLATION: 1
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 2
  • Idemia:
    • IDEMIA: 6
  • Infineon:
    • Infineon: 3
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 4
  • BrightSight:
    • Brightsight: 2
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 8
    • SSHv2: 5
  • TLS:
    • SSL:
      • SSL: 1
      • SSLv2.0: 1
      • SSLv3.0: 1
    • TLS:
      • TLS: 6
      • TLS 1.2: 1
      • TLSv1.0: 1
      • TLSv1.1: 5
      • TLSv1.2: 5
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
  • Infineon:
    • v1.02.013: 4
pdf_data/report_keywords/vulnerability
  • ROCA:
    • ROCA: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • X509:
    • X.509: 1
  • ICAO:
    • ICAO: 6
  • ISO:
    • ISO/IEC 18013: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. 2.5 Documentation The following documentation is: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: MAAVA
  • /CreationDate: D:20210218173433+01'00'
  • /ModDate: D:20210218173433+01'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - Certification Report ALE Omniswitch v2
  • pdf_file_size_bytes: 766005
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author: p646
  • /CreationDate: D:20181120153406+01'00'
  • /Creator: PDFCreator Version 1.2.0
  • /Keywords:
  • /ModDate: D:20181120153406+01'00'
  • /Producer: GPL Ghostscript 9.0
  • /Subject:
  • /Title: Certification Report NSCIB-CC-196231-CR
  • pdf_file_size_bytes: 630780
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename Alcatel-Lucent Enterprise OmniSwitch with AOS 8.6.R11 Security Target for EAL2.pdf [ST-BAC-Lite] 2018_2000037746 - Security Target Lite IDeal Pass v2.3-i JC (BAC Configuration) (v1.0, 2018-09-07).pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2018/27: 2
  • NL:
    • CC-1: 6
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0055-2009: 1
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-PP-0035: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 115
  • EAL:
    • EAL4: 6
    • EAL4 augmented: 2
    • EAL5: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 4
    • ADV_INT.2: 4
    • ADV_SPM.1: 1
    • ADV_TDS.4: 4
  • AGD:
    • AGD_OPE: 10
    • AGD_PRE: 9
  • ALC:
    • ALC_CMS.5: 4
    • ALC_DVS.2: 5
    • ALC_TAT.2: 4
  • ATE:
    • ATE_DPT.3: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT.1: 8
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM.1: 21
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 14
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 14
    • FCS_CKM.4.1: 1
    • FCS_COP: 62
    • FCS_COP.1: 5
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 13
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT: 9
    • FCS_SSHC_EXT.1: 8
    • FCS_SSHS_EXT: 8
    • FCS_SSHS_EXT.1: 9
    • FCS_TLSC_EXT: 5
    • FCS_TLSC_EXT.2: 9
    • FCS_TLSS_EXT: 6
    • FCS_TLSS_EXT.2: 9
  • FDP:
    • FDP_ACC.1: 1
    • FDP_IFC: 18
    • FDP_IFC.1: 5
    • FDP_IFC.1.1: 2
    • FDP_IFF: 14
    • FDP_IFF.1: 4
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_PMG_EXT.1: 9
    • FIA_PMG_EXT.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 9
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 13
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 20
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 3
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 15
    • FMT_MTD.1: 2
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 2
    • FMT_SMR.2: 17
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 9
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT.1: 9
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM_EXT.1: 12
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT.1: 9
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 9
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 8
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 9
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 10
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 7
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 30
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 51
    • FCS_COP.1: 9
    • FCS_RND: 9
    • FCS_RND.1: 13
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 4
    • FDP_ITC: 2
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_UCT.1: 11
    • FDP_UCT.1.1: 1
    • FDP_UIT: 1
    • FDP_UIT.1: 10
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_API: 16
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 16
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 4
    • FIA_UAU.6: 12
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 8
    • FMT_LIM.1: 18
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 4
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 35
    • FMT_MTD.1: 5
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS.1: 1
    • FPT_EMS.1.1: 1
    • FPT_EMS.1.2: 1
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 3
    • A.LIMITED_FUNCTIONALITY: 3
    • A.PHYSICAL_PROTECTION: 3
    • A.REGULAR_UPDATES: 3
    • A.RESIDUAL_INFORMATION: 3
    • A.SERVICES_RELIABLE: 3
    • A.TRUSTED_ADMINISTRATOR: 3
  • O:
    • O.ACCESS_BANNER: 4
    • O.ADMIN_ACCESS: 14
    • O.ADMIN_SESSION: 7
    • O.AUDIT: 12
    • O.COMMUNICATION_CHANNELS: 15
    • O.CRYPTOGRAPHY: 12
    • O.MEDIATE: 16
    • O.SELF_TESTS: 5
    • O.STRONG_PASSWORDS: 8
    • O.TRUSTED_UPDATES: 8
    • O.TSF_DATA_PROTECTION: 10
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 2
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.PHYSICAL: 2
    • OE.RESIDUAL_INFORMATION: 2
    • OE.SERVICES_RELIABLE: 2
    • OE.TRUSTED_ADMIN: 2
    • OE.UPDATES: 2
  • T:
    • T.INFORMATION_FLOW_POLICY_VIOLATION: 2
    • T.PASSWORD_CRACKING: 3
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 2
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 3
    • T.UNDETECTED_ACTIVITY: 3
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
    • T.UPDATE_COMPROMISE: 3
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 2
    • T.WEAK_CRYPTOGRAPHY: 3
  • A:
    • A.MRTD_: 1
  • OE:
    • OE.AA_MRTD: 6
    • OE.MRTD_: 2
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 10
  • Idemia:
    • IDEMIA: 16
  • Infineon:
    • Infineon: 22
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 110
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 15
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 5
      • HMAC-SHA-256: 5
      • HMAC-SHA-384: 4
      • HMAC-SHA-512: 4
  • AES_competition:
    • AES:
      • AES: 11
      • AES-: 1
      • AES-128: 1
  • DES:
    • 3DES:
      • 3DES: 7
      • Triple-DES: 13
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CMAC: 4
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 1
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 18
  • FF:
    • DH:
      • Diffie-Hellman: 13
    • DSA:
      • DSA: 1
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 12
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-2: 3
      • SHA-256: 18
      • SHA-384: 8
      • SHA-512: 11
      • SHA256: 2
      • SHA384: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 1
    • SHA2:
      • SHA-2: 2
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 2
      • SHA-512: 1
      • SHA224: 1
      • SHA256: 1
      • SHA384: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 28
  • MAC:
    • MAC: 24
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 2
  • SSH:
    • SSH: 64
    • SSHv2: 61
  • TLS:
    • SSL:
      • SSL: 4
      • SSL 2.0: 1
      • SSL 3.0: 1
      • SSLv2.0: 2
      • SSLv3.0: 2
    • TLS:
      • TLS: 81
      • TLS 1.0: 1
      • TLS 1.1: 2
      • TLS 1.2: 2
      • TLSv1.0: 2
      • TLSv1.1: 30
      • TLSv1.2: 30
  • PACE:
    • PACE: 16
  • PGP:
    • PGP: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 15
  • RNG:
    • RBG: 1
  • RNG:
    • RND: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CTR:
    • CTR: 5
  • GCM:
    • GCM: 7
  • CBC:
    • CBC: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-256: 1
    • P-224: 2
    • P-256: 15
    • P-384: 16
    • P-521: 16
    • secp256r1: 3
    • secp384r1: 3
    • secp521r1: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 35
  • Infineon:
    • v1.02.013: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 7
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 4
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 9
    • EF.DG1: 27
    • EF.DG13: 4
    • EF.DG14: 3
    • EF.DG15: 8
    • EF.DG16: 27
    • EF.DG2: 10
    • EF.DG3: 7
    • EF.DG4: 6
    • EF.DG5: 8
    • EF.SOD: 9
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS PUB 186-4: 4
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 3
  • RFC:
    • RFC 6125: 1
    • RFC2986: 3
    • RFC3268: 5
    • RFC3411: 2
    • RFC3526: 4
    • RFC4251: 3
    • RFC4252: 4
    • RFC4253: 4
    • RFC4254: 2
    • RFC4344: 2
    • RFC4346: 3
    • RFC4492: 10
    • RFC5246: 7
    • RFC5280: 5
    • RFC5288: 5
    • RFC5289: 17
    • RFC5591: 2
    • RFC5656: 2
    • RFC5759: 3
    • RFC5953: 2
    • RFC6125: 2
    • RFC6668: 2
    • RFC6960: 3
    • RFC8017: 2
    • RFC8332: 2
    • RFC8422: 2
  • X509:
    • X.509: 18
  • BSI:
    • AIS31: 4
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-4: 2
    • FIPS 46-3: 2
    • FIPS PUB 197: 1
    • FIPS46: 1
  • ICAO:
    • ICAO: 20
  • ISO:
    • ISO/IEC 14443: 6
    • ISO/IEC 18013: 6
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
    • ISO/IEC15946-2: 1
  • RFC:
    • RFC 5639: 1
    • RFC-5639: 1
    • RFC3369: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security features: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: IDEMIA
  • /CreationDate: D:20180907132327+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: NSCIB-CC-196231, ASE Lite, ICAO, ePassport, BAC
  • /ModDate: D:20180907132327+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: ASE Lite 2018_2000037746, v1.0, 2018-09-07
  • /Title: Security Target Lite IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
  • pdf_file_size_bytes: 1486764
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 102
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different