Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Rambus AES-ECB-DPA-FIA cores HW3.0
NSCIB-CC-0397779-CR
Aruba Remote Access Point Version 6.5.0-FIPS
CCEVS-VR-VID-10766-2017
name Rambus AES-ECB-DPA-FIA cores HW3.0 Aruba Remote Access Point Version 6.5.0-FIPS
category ICs, Smart Cards and Smart Card-Related Devices and Systems Other Devices and Systems
scheme NL US
status active archived
not_valid_after 29.07.2027 26.02.2019
not_valid_before 29.07.2022 26.02.2017
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-certificate%2022-0397779.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10766-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0397779-CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10766-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-lite][revC]AES-ECB-32-DPA-FIA_V3.0_ST-Lite-RevC).pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10766-st.pdf
manufacturer Rambus Inc. Aruba Networks
manufacturer_web https://www.rambus.com/ https://www.arubanetworks.com
security_level EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5 {}
dgst de8f81504d9aea23 295664c1a6d49362
heuristics/cert_id NSCIB-CC-0397779-CR CCEVS-VR-VID-10766-2017
heuristics/cert_lab US
heuristics/extracted_sars ALC_DEL.1, ATE_FUN.1, ALC_CMS.4, AVA_VAN.5, ASE_INT.1, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, ASE_CCL.1, ADV_ARC.1, ATE_COV.2, ASE_SPD.1, ATE_IND.2, ATE_DPT.2, ALC_CMC.4, ALC_TAT.1, ASE_ECD.1, AGD_PRE.1, ASE_TSS.1, ADV_IMP.1, ALC_DVS.2, ASE_REQ.2, ALC_LCD.1, ASE_OBJ.2 ALC_CMS.1, AGD_OPE.1, AVA_VAN.1, AGD_PRE.1, ALC_CMC.1, ATE_IND.1, ADV_FSP.1
heuristics/extracted_versions 3.0 6.5.0
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10766/
  • categories: ['Virtual Private Network']
  • category: Virtual Private Network
  • certification_date: 26.02.2017
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 26.02.2019
  • id: CCEVS-VR-VID10766
  • product: Aruba Remote Access Point Version 6.5.0-FIPS
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10766
  • vendor: Aruba, a Hewlett Packard Enterprise Company
heuristics/protection_profiles {} db7434eb64f09c94
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_vpn_ipsec_client_v1.4.pdf
pdf_data/cert_filename NSCIB-certificate 22-0397779.pdf st_vid10766-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-22-0397779: 1
  • US:
    • CCEVS-VR-VID10766-2017: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR.3: 1
  • ATE:
    • ATE_DPT.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
  • Leidos:
    • Leidos: 1
pdf_data/cert_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • VPN:
    • VPN: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/report_filename NSCIB-CC-0397779-CR.pdf st_vid10766-vr.pdf
pdf_data/report_frontpage
  • NL:
    • cert_id: NSCIB-CC-0397779-CR
    • cert_item: AES-ECB-DPA-FIA cores HW3.0
    • cert_lab: SGS Brightsight B.V.
    • developer: Rambus Inc
  • US:
  • NL:
  • US:
    • cert_id: CCEVS-VR-VID10766-2017
    • cert_item: for Aruba Remote Access Point Version 6.5.0-FIPS
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-0397779-CR: 11
  • US:
    • CCEVS-VR-VID10766-2017: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 6
    • EAL4 augmented: 3
    • EAL4+: 7
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_DVS.2: 2
  • ATE:
    • ATE_DPT.2: 2
    • ATE_FUN: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 5
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 6
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
  • Leidos:
    • Leidos: 7
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
      • AES-: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 2
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 32
  • VPN:
    • VPN: 41
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
  • PRNG:
    • DRBG: 1
  • RNG:
    • RBG: 6
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Fault Injection: 1
    • fault injection: 2
  • SCA:
    • DPA: 2
    • side-channel: 1
  • other:
    • JIL: 2
    • JIL-AAPS: 2
    • JIL-AM: 2
pdf_data/report_keywords/standard_id
  • NIST:
    • NIST SP 800-131A: 5
  • RFC:
    • RFC 5280: 1
  • X509:
    • X.509: 1
pdf_data/report_metadata
  • /CreationDate: D:20170301145630-05'00'
  • /ModDate: D:20170301145630-05'00'
  • pdf_file_size_bytes: 516212
  • pdf_hyperlinks: http://www.niap-ccevs.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename [ST-lite][revC]AES-ECB-32-DPA-FIA_V3.0_ST-Lite-RevC).pdf st_vid10766-st.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 6
    • EAL4 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 3
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_FSP.4: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 2
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.2: 7
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 7
  • ADV:
    • ADV_FSP: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
  • ATE:
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 8
    • FCS_COP.1: 7
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_IFC.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 2
    • FDP_ITC.1: 14
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 2
  • FMT:
    • FMT_MSA.3: 2
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
  • FRU:
    • FRU_FLT.2: 7
    • FRU_FLT.2.1: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 2
    • FCS_CKM_EXT: 8
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 21
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 2
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 1
    • FDP_RIP.2: 5
    • FDP_RIP.2.1: 1
  • FMT:
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 2
  • FPT:
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.1.2: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTP:
    • FTP_ITC: 3
    • FTP_ITC.1: 2
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.AES: 6
  • OE:
    • OE.NO_TOE_BYPASS: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_CONFIG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 27
      • AES-128: 1
      • AES-256: 1
  • AES_competition:
    • AES:
      • AES: 12
      • AES128: 1
  • DES:
    • 3DES:
      • Triple-DES: 3
  • constructions:
    • MAC:
      • HMAC: 5
      • HMAC-SHA-256: 4
      • HMAC-SHA-384: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 30
  • FF:
    • DH:
      • DH: 15
      • Diffie-Hellman: 12
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 2048: 5
    • RSA2048: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 6
      • SHA1: 2
    • SHA2:
      • SHA-256: 6
      • SHA-384: 4
      • SHA256: 3
      • SHA384: 2
      • SHA512: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • KEX:
    • Key Exchange: 1
pdf_data/st_keywords/crypto_protocol
  • PGP:
    • PGP: 1
  • IKE:
    • IKE: 24
    • IKEv1: 2
    • IKEv2: 29
  • IPsec:
    • IPsec: 69
  • VPN:
    • VPN: 52
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 3
  • PRNG:
    • DRBG: 12
    • PRNG: 1
  • RNG:
    • RBG: 4
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CFB:
    • CFB: 1
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 4
  • CBC:
    • CBC: 2
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 24
    • P-384: 18
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Fault Injection: 1
    • fault injection: 1
    • malfunction: 1
  • SCA:
    • DPA: 3
    • side-channel: 1
    • template attacks: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-0004: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 197: 2
  • NIST:
    • NIST SP 800-38A: 3
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 3
    • FIPS 186-4: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 11
    • FIPS PUB 197: 2
    • FIPS PUB 198-1: 1
  • NIST:
    • NIST SP 800-131A: 1
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-56A: 2
    • NIST SP 800-57: 1
    • SP 800-38D: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 2104: 1
    • RFC 2560: 1
    • RFC 3602: 3
    • RFC 4106: 3
    • RFC 4301: 3
    • RFC 4303: 1
    • RFC 4868: 2
    • RFC 4945: 2
    • RFC 5280: 6
    • RFC 6379: 1
  • X509:
    • X.509: 6
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 205 in [PP] This refinement is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP] This refinement is out of scope: 1
    • This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP] This refinement is applicable without any adjustments. It must be: 1
    • This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP] This refinement is applicable without any adjustments. Guidance documents: 1
    • contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP] This refinement refers to mechanisms against physical attacks that require: 1
    • in the development environment as defined above. ALC_CMS 199 in [PP] This refinement is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery: 1
    • is out of scope for the TOE 241 in [PP] This refinement refers to downloading of embedded software. This refinement: 1
    • must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP] This refinement relates to physical testing. This refinement is out of: 1
    • of the layout or tests besides the TSFI. This refinement is regarded out of scope for the TOE, as physical attacks are not in scope and there is no layout to be verified. 218 in [PP: 1
    • out of scope: 14
    • out of scope for the TOE. AVA_VAN 245 in [PP] This refinement is applicable without any adjustments, but it has: 1
    • to identify the TOE in line with FAU_SAS.1, which is not claimed in this ST. This refinement is out of scope for the TOE. 240 in [PP] This refinement refers to configuration in Phase 2 or Phase 7. This: 1
    • to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP] This refinement refers to features that do not provide functionality but: 1
    • transitions of power save modes if provided by the TOE. 210 in [PP] This refinement in [PP] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP] This: 1
pdf_data/st_metadata
  • /CreationDate: D:20220704125503-07'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220704125503-07'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 466125
  • pdf_hyperlinks: mailto:[email protected], https://www.rambus.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different