Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Siemens RUGGEDCOM ROS v4.2.2.F running on the M969F, RS900F, RS900GF, RS900GPF, RS940GF, M2100F, RSG2100F, RSG2100PF, M2200F, RSG2200F, RSG2300F, RSG2300PF, RS400F, RS416F, RS416PF, RSG2488F switches
CCEVS-VR-VID-10877-2018
MultiApp V4 JavaCard Virtual Machine
ANSSI-CC-2020/33
name Siemens RUGGEDCOM ROS v4.2.2.F running on the M969F, RS900F, RS900GF, RS900GPF, RS940GF, M2100F, RSG2100F, RSG2100PF, M2200F, RSG2200F, RSG2300F, RSG2300PF, RS400F, RS416F, RS416PF, RSG2488F switches MultiApp V4 JavaCard Virtual Machine
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
status archived active
not_valid_after 21.08.2020 22.04.2027
not_valid_before 21.08.2018 28.05.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10877-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2020_33-s01.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10877-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_33fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10877-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_anssi_cc_2020-33.pdf
manufacturer Siemens Canada Ltd. Gemalto
manufacturer_web https://www.siemens.com https://www.gemalto.com/
security_level {} EAL7
dgst d832f21299727366 dfa48e7ac54d10f0
heuristics/cert_id CCEVS-VR-VID-10877-2018 ANSSI-CC-2020/33
heuristics/cert_lab US SERMA
heuristics/cpe_matches cpe:2.3:h:siemens:ruggedcom_rsg2100f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs900gf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2488f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs416pf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs900gpf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_m2200f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2300f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2300pf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_m969f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs900f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs400f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2100pf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2200f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_m2100f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs940gf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs416f:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ALC_LCD.2, ASE_INT.1, ADV_LCD.2, ALC_DVS.2, ASE_ECD.1, ADV_TAT.3, ASE_TSS.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ADV_FSP.6, ATE_FUN.2, ALC_TAT.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, ADV_ARC.1, ALC_CMC.5, ADV_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ATE_DPT.4, ADV_INT.3, ALC_CMS.1, ASE_CCL.1, ADV_TDS.6, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 4.2.2 -
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0891-V4-2019, ANSSI-CC-2017/76
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2017/07, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-0891-V3-2018, ANSSI-CC-2017/76, ANSSI-CC-2017/54, BSI-DSZ-CC-0891-V2-2016
heuristics/scheme_data
  • category: Network Device
  • certification_date: 21.08.2018
  • evaluation_facility: COACT, Inc. Labs
  • expiration_date: 21.08.2020
  • id: CCEVS-VR-VID10877
  • product: Siemens RUGGEDCOM ROS v4.2.2.F running on the M969F, RS900F, RS900GF, RS900GPF, RS940GF, M2100F, RSG2100F, RSG2100PF, M2200F, RSG2200F, RSG2300F, RSG2300PF, RS400F, RS416F, RS416PF, RSG2488F switches
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10877
  • vendor: Siemens Canada Ltd.
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0891-V2-2016
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0891-V2-2016
heuristics/protection_profiles 48ac4778e4272298 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf {}
pdf_data/cert_filename st_vid10877-ci.pdf certificat-anssi-cc-2020_33-s01.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10877-2018: 1
  • FR:
    • ANSSI-CC-2020/33-S01: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL7: 1
pdf_data/cert_keywords/eval_facility
  • Serma:
    • SERMA: 2
pdf_data/cert_metadata
  • /CreationDate: D:20180823111041-04'00'
  • /ModDate: D:20180823111041-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 183909
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: DUCLOS Charlene
  • /CreationDate: D:20220429113327+02'00'
  • /Creator: Microsoft® Word 2019
  • /Keywords: version x.x, révision x
  • /ModDate: D:20220429113327+02'00'
  • /Producer: Microsoft® Word 2019
  • /Title: ANSSI-CC-2020/33
  • pdf_file_size_bytes: 251233
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid10877-vr.pdf anssi-cc-2020_33fr.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-VID10877-2018
    • cert_item: Siemens Canada Ltd. RUGGEDCOM Rugged Operating System (ROS) V4.2.2.F Running on the M2100F, M2200F, M969F, RSG2100F, RSG2100PF, RSG2200F, RSG2300F, RSG2300PF, RSG2488F, RS400F, RS416F, RS416PF, RS900F, RS900GF, RS900GPF, and RS940GF RUGGEDCOM switches
    • cert_lab: US NIAP
  • FR:
    • cc_security_level: EAL 7
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2020/33
    • cert_item: MultiApp V4 JavaCard Virtual Machine
    • cert_item_version: Référence 4.0.1
    • cert_lab: Serma Safety & Security 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France
    • developer: Gemalto 6 rue de la verrerie, 92190 Meudon, France Trusted Labs 6 rue de la verrerie, 92190 Meudon, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la verrerie, 92190 Meudon, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Néant
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10877-2018: 1
  • DE:
    • BSI-DSZ-CC-0891-V4-2019: 1
  • FR:
    • ANSSI-CC-2017/76: 2
    • ANSSI-CC-2017/76-S01: 1
    • ANSSI-CC-2020/33: 15
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 3: 1
    • EAL 5: 2
    • EAL 7: 7
    • EAL2: 1
    • EAL5: 2
    • EAL7: 2
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 4
    • AGD_PRE: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 4
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 16
  • Gemalto:
    • Gemalto: 3
  • Infineon:
    • Infineon: 2
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Safety & Security: 1
  • TrustedLabs:
    • Trusted Labs: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 9
  • TLS:
    • TLS:
      • TLS: 2
  • PACE:
    • PACE: 3
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_metadata
  • /CreationDate: D:20180822131120-04'00'
  • /ModDate: D:20180822131120-04'00'
  • pdf_file_size_bytes: 690785
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: Pat
  • /CreationDate: D:20200604113216+02'00'
  • /Creator: PDF24 Creator
  • /ModDate: D:20200604113216+02'00'
  • /Producer: GPL Ghostscript 9.26
  • /Title: Microsoft Word - ANSSI-CC-2020_33fr.doc
  • pdf_file_size_bytes: 481052
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
pdf_data/st_filename st_vid10877-st.pdf cible_anssi_cc_2020-33.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0891-V2-2016: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5+: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
    • EAL7: 8
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 6
    • ADV_CMC.5: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 2
    • ADV_FSP.4: 3
    • ADV_FSP.6: 11
    • ADV_IMP.1: 5
    • ADV_IMP.2: 6
    • ADV_INT.3: 4
    • ADV_LCD.2: 1
    • ADV_SPM.1: 7
    • ADV_TAT.3: 1
    • ADV_TDS.1: 1
    • ADV_TDS.3: 3
    • ADV_TDS.4: 3
    • ADV_TDS.6: 15
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 6
    • AGD_PRE: 1
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.5: 7
    • ALC_CMS.1: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 6
    • ALC_LCD.1: 3
    • ALC_LCD.2: 6
    • ALC_TAT.1: 2
    • ALC_TAT.3: 10
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 3
    • ATE_COV.3: 5
    • ATE_DPT.1: 1
    • ATE_DPT.4: 4
    • ATE_FUN.1: 6
    • ATE_FUN.2: 5
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 15
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 1
    • FAU_STG_EXT.1: 13
    • FAU_STG_EXT.1.1: 2
    • FAU_STG_EXT.1.2: 2
    • FAU_STG_EXT.1.3: 2
  • FCS:
    • FCS_CKM.1: 35
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 16
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 1
    • FCS_COP: 65
    • FCS_COP.1: 13
    • FCS_RBG_EXT.1: 19
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SSHS_EXT.1: 20
    • FCS_SSHS_EXT.1.1: 2
    • FCS_SSHS_EXT.1.2: 2
    • FCS_SSHS_EXT.1.3: 2
    • FCS_SSHS_EXT.1.4: 2
    • FCS_SSHS_EXT.1.5: 2
    • FCS_SSHS_EXT.1.6: 2
    • FCS_SSHS_EXT.1.7: 2
    • FCS_SSHS_EXT.1.8: 2
    • FCS_TLSS_EXT: 3
    • FCS_TLSS_EXT.1: 15
    • FCS_TLSS_EXT.1.1: 2
    • FCS_TLSS_EXT.1.2: 2
    • FCS_TLSS_EXT.1.3: 2
    • FCS_TLS_EXT.1: 2
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT.1: 13
    • FIA_PMG_EXT.1.1: 2
    • FIA_UAU.1: 3
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 13
    • FIA_UAU_EXT.2.1: 2
    • FIA_UIA_EXT.1: 19
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
    • FIA_UID.1: 4
  • FMT:
    • FMT_MOF: 8
    • FMT_MOF.1: 1
    • FMT_MTD: 9
    • FMT_MTD.1: 1
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 4
    • FMT_SMR.2: 10
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 13
    • FPT_APW_EXT.1.1: 2
    • FPT_APW_EXT.1.2: 2
    • FPT_ITT.1: 2
    • FPT_PTD: 1
    • FPT_SKP_EXT.1: 12
    • FPT_SKP_EXT.1.1: 2
    • FPT_SSP.1: 1
    • FPT_STM.1: 3
    • FPT_STM_EXT.1: 15
    • FPT_STM_EXT.1.1: 2
    • FPT_STM_EXT.1.2: 2
    • FPT_TST: 1
    • FPT_TST_EXT.1: 12
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT.1: 14
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 2
  • FTA:
    • FTA_SSL: 1
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 8
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT: 2
    • FTA_SSL_EXT.1: 12
    • FTA_SSL_EXT.1.1: 2
    • FTA_TAB.1: 15
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 10
    • FTP_TRP.1: 3
  • FAU:
    • FAU_ARP.1: 16
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 2
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 3
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC: 22
    • FDP_ACC.1: 4
    • FDP_ACC.2: 2
    • FDP_ACF: 19
    • FDP_ACF.1: 6
    • FDP_IFC: 15
    • FDP_IFC.1: 5
    • FDP_IFF: 13
    • FDP_IFF.1: 8
    • FDP_ITC: 2
    • FDP_RIP: 16
    • FDP_ROL: 12
    • FDP_ROL.1: 3
    • FDP_SDI.1: 1
    • FDP_SDI.2: 3
    • FDP_UIT: 2
  • FIA:
    • FIA_ATD: 8
    • FIA_ATD.1: 1
    • FIA_UAU: 1
    • FIA_UID: 4
    • FIA_UID.1: 1
    • FIA_USB: 2
  • FMT:
    • FMT_MSA: 54
    • FMT_MSA.1: 5
    • FMT_MSA.2: 3
    • FMT_MSA.3: 10
    • FMT_MTD: 16
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_REV: 1
    • FMT_SMF: 14
    • FMT_SMF.1: 4
    • FMT_SMR: 18
    • FMT_SMR.1: 8
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 2
  • FPT:
    • FPT_FLS: 21
    • FPT_FLS.1: 4
    • FPT_ITT: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 1
    • FPT_RCV: 10
    • FPT_RCV.3: 7
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 1
  • FTP:
    • FTP_ITC: 2
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
  • A:
    • A.ALARM-ENV: 4
    • A.APPLET: 5
    • A.CIPHER: 4
    • A.DELETION: 8
    • A.FIREWALL-ENV: 4
    • A.GLOBAL_ARRAYS_CONFI: 1
    • A.GLOBAL_ARRAYS_CONFID: 3
    • A.INSTALL-ENV: 4
    • A.KEY-MNGT: 4
    • A.LOAD: 4
    • A.OBJ-: 1
    • A.OBJ-DELETION: 3
    • A.OPERATE-ENV: 4
    • A.PIN-MNGT: 4
    • A.REALLOCATION: 4
    • A.RESOURCES: 4
    • A.SID: 4
    • A.TRANSACTION: 4
    • A.VERIFICATION: 5
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 3
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 15
    • O.APPLET: 1
    • O.CARD-MANAGEMENT: 1
    • O.DELETION: 1
    • O.FIREWALL: 15
    • O.GLOBAL_ARRAYS_CONFID: 2
    • O.GLOBAL_ARRAYS_INTEG: 3
    • O.INSTALL: 8
    • O.JAVAOBJECT: 31
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.NATIVE: 11
    • O.OBJ-DELETION: 1
    • O.OPERATE: 16
    • O.PIN-: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.RND: 4
    • O.SCP: 3
    • O.SID: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.ALARM-ENV: 2
    • OE.APPLET: 4
    • OE.CARD-MANAGEMENT: 1
    • OE.CARD_MANAGEMENT: 15
    • OE.CIPHER: 7
    • OE.CODE-EVIDENCE: 10
    • OE.DELETION: 3
    • OE.FIREWALL-ENV: 4
    • OE.GLOBAL_ARRAYS_CONFID: 4
    • OE.GLOBAL_ARRAYS_INTEG: 1
    • OE.INSTALL-ENV: 2
    • OE.KEY-MNGT: 5
    • OE.LOAD: 7
    • OE.OBJ-DELETION: 5
    • OE.OPERATE: 1
    • OE.OPERATE-ENV: 4
    • OE.PIN-MNGT: 7
    • OE.REALLOCATION: 4
    • OE.RESOURCES: 6
    • OE.RND: 4
    • OE.SCP: 22
    • OE.SID: 8
    • OE.TRANSACTION: 5
    • OE.VERIFICATION: 26
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 12
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 9
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.RND: 4
    • OSP.VERIFICATION: 4
  • OT:
    • OT.GLOBAL_ARRAYS_INTEG: 1
  • R:
    • R.JAVA: 5
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 3
    • T.EXE-CODE: 8
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
    • T.RESOURCES: 3
    • T.SID: 8
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 18
  • Gemalto:
    • Gemalto: 66
  • Infineon:
    • Infineon: 1
pdf_data/st_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
  • TrustedLabs:
    • Trusted Labs: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 33
  • constructions:
    • MAC:
      • HMAC: 11
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 6
    • ECDH:
      • ECDH: 5
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 10
  • FF:
    • DH:
      • DH: 5
      • DHE: 1
      • Diffie-Hellman: 13
  • RSA:
    • RSA 2048: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 12
    • SHA2:
      • SHA-224: 4
      • SHA-256: 14
      • SHA-384: 11
      • SHA-512: 13
      • SHA256: 3
pdf_data/st_keywords/crypto_scheme
  • AEAD:
    • AEAD: 1
  • MAC:
    • MAC: 9
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
  • SSH:
    • SSH: 94
  • TLS:
    • DTLS:
      • DTLS: 1
    • SSL:
      • SSL: 6
      • SSL 2.0: 2
      • SSL 3.0: 2
    • TLS:
      • TLS: 51
      • TLS 1.0: 2
      • TLS 1.1: 3
      • TLS 1.2: 3
      • TLS v1.0: 1
      • TLS v1.1: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 16
  • RNG:
    • RBG: 2
  • RNG:
    • RND: 12
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
  • CTR:
    • CTR: 14
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 12
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 10
    • P-384: 10
    • P-521: 12
    • secp256r1: 3
    • secp384r1: 3
    • secp521r1: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • fault induction: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 3
    • physical probing: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 2
    • FIPS 197: 2
    • FIPS 198-1: 1
    • FIPS PUB 186-4: 3
  • ISO:
    • ISO/IEC 18031:2011: 4
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-38D: 1
    • NIST SP 800-56A: 1
    • NIST SP 800-90A: 1
    • SP 800-135: 1
    • SP 800-52: 1
    • SP 800-56A: 2
    • SP 800-56B: 1
    • SP 800-57: 1
  • PKCS:
    • PKCS #1: 2
  • RFC:
    • RFC 2818: 3
    • RFC 2986: 2
    • RFC 3268: 4
    • RFC 3526: 3
    • RFC 4253: 2
    • RFC 4346: 2
    • RFC 4492: 2
    • RFC 5246: 6
    • RFC 5280: 5
    • RFC 5289: 2
    • RFC 5759: 1
    • RFC 6069: 1
    • RFC 6960: 1
    • RFC24: 1
  • X509:
    • X.509: 22
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.4: 4
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 1
    • javacard.framework.service: 1
    • javacard.security: 1
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives OE.SCP.RECOVERY and OE.SCP.SUPPORT are: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Maria Christofi
  • /CreationDate: D:20200309171000+01'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: Security Target, CC
  • /ModDate: D:20200309171000+01'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: Security Target
  • /Title: Security Target: Formal assurance for MultiAppV4 JCS
  • pdf_file_size_bytes: 1571623
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different