Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belkin F1DN102KVM-DC-4, F1DN202KVM-DC-4, F1DN104KVM-DC-4, F1DN204KVM-DC-4, F1DN108KVM-DC-4, F1DN208KVM-DC-4, F1DN104KVMDCU-4, F1DN204KVMDCU-4, F1DN104MVKVMDC4, F1DN108MVKVMDC4, F1DN104MKVMDC-4, F1DN108MKVMDC-4 Firmware Version 44444-D5D5
667-EWA
KONA2 D2320N ePassport [EAC configuration] version 01 revision 03 patch 00
2015-31-INF-1653
name Belkin F1DN102KVM-DC-4, F1DN202KVM-DC-4, F1DN104KVM-DC-4, F1DN204KVM-DC-4, F1DN108KVM-DC-4, F1DN208KVM-DC-4, F1DN104KVMDCU-4, F1DN204KVMDCU-4, F1DN104MVKVMDC4, F1DN108MVKVMDC4, F1DN104MKVMDC-4, F1DN108MKVMDC-4 Firmware Version 44444-D5D5 KONA2 D2320N ePassport [EAC configuration] version 01 revision 03 patch 00
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA ES
status active archived
not_valid_after 05.03.2030 20.07.2021
not_valid_before 05.03.2025 20.07.2016
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/667-EWA%20CT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2015-31-CCRA.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/667-EWA%20CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2015-31-INF-1653.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/667-EWA%20ST%20v1.2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2015-31-ST_lite.pdf
manufacturer Belkin International, Inc. KONA I Co., Ltd.
manufacturer_web https://www.belkin.com https://www.konai.com/
security_level {} ALC_DVS.2, EAL5+, AVA_VAN.5
dgst d8cfef67e94e0372 55712fa621f61d5f
heuristics/cert_id 667-EWA 2015-31-INF-1653
heuristics/extracted_sars ALC_CMS.1, ASE_CCL.1, ASE_INT.1, ADV_FSP.1, AGD_PRE.1, AVA_VAN.1, ASE_ECD.1, ASE_SPD.1, ASE_REQ.2, ATE_IND.1, ASE_TSS.1, ALC_CMC.1, ASE_OBJ.2, AGD_OPE.1 AVA_VAN.5, ADV_ARC.1, ATE_COV.2, ADV_FSP.5, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ADV_IMP.1, ADV_TDS.4, ASE_REQ.2, ADV_SPM.1, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ALC_DEL.1, ASE_OBJ.2, ADV_DPT.3, ASE_INT.1, ADV_INT.2, ALC_TAT.2, ASE_SPD.1, ATE_FUN.1, ALC_CMS.5, ALC_CMC.4, ALC_LCD.1
heuristics/extracted_versions 44444, 4 01, 00, 03
heuristics/report_references/directly_referencing {} ANSSI-CC-2015/66
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2015/66
heuristics/scheme_data
  • certification_date: 05.03.2025
  • level: PP_PSD_V4.0, MOD_KM_V1.0, MOD_VI_V1.0, MOD_UA_V1.0
  • product: Belkin F1DN102KVM-DC-4, F1DN202KVM-DC-4, F1DN104KVM-DC-4, F1DN204KVM-DC-4, F1DN108KVM-DC-4, F1DN208KVM-DC-4, F1DN104KVMDCU-4, F1DN204KVMDCU-4, F1DN104MVKVMDC4, F1DN108MVKVMDC4, F1DN104MKVMDC-4, F1DN108MKVMDC-4 Firmware Version 44444-D5D5
  • vendor: Belkin International, Inc.
heuristics/protection_profiles 814f66c77bc7f33b, 48f73a122587b992, 76f8f05a35d87f59, 42cf355b24450489 78bcc246f0f43034
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_ua_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056b.pdf
pdf_data/cert_filename 667-EWA CT.pdf 2015-31-CCRA.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 667-EWA: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL5: 1
    • EAL5 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • T:
    • T.I: 1
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/cert_metadata
  • /Author: Sinitski, Kiril
  • /CreationDate: D:20250307140618-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: 03c3dcc6-6bfd-4194-a625-fb83b8d0389e
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2023-05-16T11:46:20Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250307140618-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 390416
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20171205122107+01'00'
  • pdf_file_size_bytes: 777819
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 667-EWA CR.pdf 2015-31-INF-1653.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2015-31-INF-1653 v2: 1
  • FR:
    • ANSSI-CC-2015/66: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056: 4
    • BSI-PP-0055: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL5: 9
    • EAL5 augmented: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 10
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
    • AVA_VAN.5: 10
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP: 4
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_UCT.1: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_API.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.4: 1
    • FIA_UAU.5: 1
    • FIA_UAU.6: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MTD: 8
    • FMT_MTD.3: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_PHP.3: 1
    • FPT_TST.1: 1
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.BAC_PP: 1
    • OE.MRTD_: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Applus:
    • Applus Laboratories: 3
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • Physical Tampering: 1
  • other:
    • JIL: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • ICAO:
    • ICAO: 7
  • ISO:
    • ISO/IEC 14443: 2
pdf_data/report_metadata
  • /Author: Sinitski, Kiril
  • /CreationDate: D:20250307135915-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: f4235719-a1a3-4fb4-8b18-a47ac84bac11
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2022-07-20T10:41:47Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250307135915-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 823239
  • pdf_hyperlinks: https://www.cisa.gov/known-exploited-vulnerabilities-catalog, http://www.belkin.com/, mailto:[email protected], https://nvd.nist.gov/vuln/search, https://www.belkin.com/support-article/?articleNum=275531
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /CreationDate: D:20171023172733+02'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20171023172733+02'00'
  • /Producer: Microsoft® Word 2013
  • pdf_file_size_bytes: 670604
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename 667-EWA ST v1.2.pdf 2015-31-ST_lite.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 2
    • EAL5: 7
    • EAL5 augmented: 2
    • EAL5+: 2
    • EAL6: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_FLR: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 2
    • ADV_DPT.3: 1
    • ADV_FSP.4: 2
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_SPM.1: 1
    • ADV_TDS.3: 2
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DVS.2: 7
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_DPT: 1
    • ATE_DPT.1: 2
  • AVA:
    • AVA_VAN.3: 2
    • AVA_VAN.4: 1
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_APC_EXT: 30
    • FDP_APC_EXT.1: 17
    • FDP_CDS_EXT: 1
    • FDP_CDS_EXT.1: 10
    • FDP_CDS_EXT.1.1: 2
    • FDP_FIL_EXT: 23
    • FDP_FIL_EXT.1: 6
    • FDP_IPC_EXT: 1
    • FDP_IPC_EXT.1: 6
    • FDP_IPC_EXT.1.1: 1
    • FDP_IPC_EXT.1.2: 1
    • FDP_PDC_EXT: 34
    • FDP_PDC_EXT.1: 33
    • FDP_PDC_EXT.1.1: 1
    • FDP_PDC_EXT.2: 7
    • FDP_PDC_EXT.3: 5
    • FDP_PDC_EXT.4: 10
    • FDP_PDC_EXT.4.1: 1
    • FDP_PWR_EXT: 1
    • FDP_PWR_EXT.1: 10
    • FDP_PWR_EXT.1.1: 1
    • FDP_RDR_EXT: 1
    • FDP_RDR_EXT.1: 10
    • FDP_RDR_EXT.1.1: 1
    • FDP_RIP: 5
    • FDP_RIP.1: 1
    • FDP_RIP_EXT: 1
    • FDP_RIP_EXT.1: 5
    • FDP_RIP_EXT.1.1: 1
    • FDP_SPR_EXT: 7
    • FDP_SPR_EXT.1: 1
    • FDP_SWI_EXT: 1
    • FDP_SWI_EXT.1: 6
    • FDP_SWI_EXT.1.1: 1
    • FDP_SWI_EXT.2: 12
    • FDP_SWI_EXT.2.1: 1
    • FDP_SWI_EXT.2.2: 1
    • FDP_SWI_EXT.3: 10
    • FDP_SWI_EXT.3.1: 1
    • FDP_TER_EXT: 1
    • FDP_TER_EXT.1: 5
    • FDP_TER_EXT.1.1: 1
    • FDP_TER_EXT.2: 5
    • FDP_TER_EXT.2.1: 1
    • FDP_TER_EXT.3: 5
    • FDP_TER_EXT.3.1: 1
    • FDP_TER_EXT.3.2: 1
    • FDP_UAI_EXT: 1
    • FDP_UAI_EXT.1: 5
    • FDP_UAI_EXT.1.1: 1
    • FDP_UDF_EXT: 12
    • FDP_UDF_EXT.1: 2
  • FPT:
    • FPT_FLS_EXT: 1
    • FPT_FLS_EXT.1: 6
    • FPT_FLS_EXT.1.1: 2
    • FPT_NTA_EXT: 1
    • FPT_NTA_EXT.1: 4
    • FPT_NTA_EXT.1.1: 1
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
    • FPT_STM.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
  • FTA:
    • FTA_CIN_EXT: 1
    • FTA_CIN_EXT.1: 7
    • FTA_CIN_EXT.1.1: 1
    • FTA_CIN_EXT.1.2: 1
    • FTA_CIN_EXT.1.3: 1
  • FAU:
    • FAU_SAR.1: 1
    • FAU_SAS: 2
    • FAU_SAS.1: 5
    • FAU_SAS.1.1: 1
    • FAU_SEL.1.1: 1
  • FCS:
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 13
    • FCS_COP.1: 8
    • FCS_RND: 2
    • FCS_RND.1: 7
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 2
    • FDP_IFF: 1
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_UCT.1: 3
    • FDP_UCT.1.1: 2
    • FDP_UIT.1: 3
    • FDP_UIT.1.1: 2
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 2
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_UAU.1: 3
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 3
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 3
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 5
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 2
    • FMT_LIM.1: 8
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 8
    • FMT_LIM.2.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD: 25
    • FMT_MTD.1: 10
    • FMT_MTD.3: 3
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 4
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_PHYSICAL: 1
    • A.NO_SPECIAL: 1
    • A.NO_SPECIAL_ANALOG: 1
    • A.NO_TEMPEST: 2
    • A.NO_WIRELESS: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 2
    • A.TRUSTED: 1
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED: 1
    • A.USER_ALLOWED_ACCESS: 1
  • O:
    • O.ANTI_TAMPERING: 2
    • O.AUTHORIZED: 2
    • O.COMPUTER: 5
    • O.EMULATED_INPUT: 3
    • O.LEAK: 1
    • O.LEAK_PREVENTION: 1
    • O.NO_OTHER: 3
    • O.NO_TOE_ACCESS: 2
    • O.NO_USER: 1
    • O.NO_USER_DATA: 1
    • O.PERIPHERAL: 1
    • O.PERIPHERAL_PORTS: 1
    • O.PROTECTED: 1
    • O.PROTECTED_EDID: 3
    • O.REJECT: 4
    • O.SELF_TEST: 4
    • O.SELF_TEST_FAIL: 2
    • O.SESSION: 5
    • O.TAMPER: 1
    • O.TAMPER_EVIDENT: 2
    • O.UNIDIRECTIONAL: 7
    • O.USER: 4
    • O.USER_DATA: 2
  • OE:
    • OE.NO_SPECIAL: 1
    • OE.NO_SPECIAL_ANALOG: 1
    • OE.NO_TEMPEST: 2
    • OE.NO_WIRELESS: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 3
    • OE.TRUSTED: 2
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.DATA_LEAK: 2
    • T.FAILED: 2
    • T.LOGICAL: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 2
    • T.RESIDUAL: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED: 1
    • T.UNINTENDED_USE: 1
  • A:
    • A.MRTD_: 1
  • OE:
    • OE.BAC-PP: 2
    • OE.BAC_PP: 2
    • OE.MRTD_: 3
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • Triple-DES: 5
    • DES:
      • DES: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 6
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-2: 1
      • SHA-224: 2
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical Tampering: 1
    • physical tampering: 8
  • FI:
    • Malfunction: 4
    • Physical Tampering: 6
    • malfunction: 1
  • SCA:
    • physical probing: 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 2
pdf_data/st_keywords/device_model
  • STM:
    • STM32:
      • STM32F070C6T6: 2
      • STM32F070RBT6: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 4
    • EF.DG1: 6
    • EF.DG14: 2
    • EF.DG15: 1
    • EF.DG16: 5
    • EF.DG2: 3
    • EF.DG3: 11
    • EF.DG4: 11
    • EF.DG5: 2
    • EF.SOD: 4
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • BSI:
    • AIS31: 1
  • FIPS:
    • FIPS 180-2: 1
  • ICAO:
    • ICAO: 19
  • ISO:
    • ISO/IEC 9796-2: 1
    • ISO/IEC15946-2: 1
  • PKCS:
    • PKCS1: 1
    • PKCS3: 1
  • RFC:
    • RFC 2631: 1
pdf_data/st_metadata
  • /Author: KONA SCMS Development Team
  • /CreationDate: D:20170303161515+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20170303161515+09'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: System Description
  • /Title: System Description
  • pdf_file_size_bytes: 896536
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 43
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different