Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Juniper Junos OS 20.2R1 for SRX345, SRX345-DUAL-AC, SRX380 and SRX1500
Certificate Number: 2020/131
SMARTY IQ-GPRS / LTE, Version 1.4
BSI-DSZ-CC-0822-V6-2024
name Juniper Junos OS 20.2R1 for SRX345, SRX345-DUAL-AC, SRX380 and SRX1500 SMARTY IQ-GPRS / LTE, Version 1.4
category Network and Network-Related Devices and Systems Other Devices and Systems
scheme AU DE
not_valid_after 11.01.2026 19.12.2032
not_valid_before 11.01.2021 20.12.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T013%20Cert%202020_131_OS.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0822V6c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T013-Certification%20Report%20V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0822V6a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20JunOS%2020.2R1%20SRX345,%20SRX345-DUAL-AC,%20SRX380,%20SRX1500%20SecurityTarget%20v1.4.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0822V6b_pdf.pdf
manufacturer Juniper Networks, Inc. Sagemcom Dr. Neuhaus GmbH
manufacturer_web https://www.juniper.net/ https://sagemcom.com
security_level {} EAL4+, ALC_FLR.2, AVA_VAN.5
dgst e8ade97b41f4ead3 4b7dcf610d994944
heuristics/cert_id Certificate Number: 2020/131 BSI-DSZ-CC-0822-V6-2024
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ATE_COV.2, ASE_TSS.1, ASE_INT.1, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ASE_REQ.2, ASE_CCL.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1
heuristics/extracted_versions 20.2 1.4
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0822-V5-2023
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0822-V2-2020, BSI-DSZ-CC-0822-V4-2023, BSI-DSZ-CC-0822-V3-2021, BSI-DSZ-CC-0822-V5-2023
heuristics/scheme_data
  • category: Intelligent measuring systems
  • cert_id: BSI-DSZ-CC-0822-V6-2024
  • certification_date: 20.12.2024
  • enhanced:
    • applicant: Sagemcom Dr. Neuhaus GmbH Papenreye 65 22453 Hamburg
    • assurance_level: EAL4+,AVA_VAN.5,ALC_FLR.2
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0822V6c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 20.12.2024
    • entries: [frozendict({'id': 'BSI-DSZ-CC-0822-V6-2024', 'description': 'The focus of this recertification was on the introduction of a new LTE-Modul for WAN-communication, the GWA-change process implementation following FNN requirements and the introduction of proxy-profiles and communication scenario HKS3 with SOCKSv5.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V5-2023', 'description': 'components.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V4-2023', 'description': 'The focus of this recertification was on the update of the operating system and some libraries, the implementation of changed and added tariff use cases (TAF 2, TAF 9, TAF 10, TAF 14), the support of IPv6 and the support of firmware download.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-RA-02', 'description': 'The CC-certificate BSI-DSZ-CC-0822-V3-2021 remains valid for 2 further years.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-RA-01', 'description': 'Successful Re-Assessment with update of the vulnerability analysis.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-MA-02', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021-MA-01', 'description': 'version number remains the same as the alternative components have the same behaviour as the original one.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V3-2021', 'description': 'The previoulsly certified TOE was changed and re-certified to implement minor security-relevant optimizations.'}), frozendict({'id': 'BSI-DSZ-CC-0822-V2-2020', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0822-2019-MA-01 (20.11.2019)', 'description': 'Certificate invalid'}), frozendict({'id': 'BSI-DSZ-CC-0822-2019 (25.09.2019)', 'description': 'Certificate invalid'})]
    • evaluation_facility: TÜV Informationstechnik GmbH
    • expiration_date: 19.12.2032
    • product: SMARTY IQ-LTE, Version 1.4
    • protection_profile: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0822V6a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0822V6b_pdf.html?nn=456626
  • product: SMARTY IQ-LTE, Version 1.4
  • subcategory: (Smart Meter Gateway)
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/0822_0822V2_0822V3_0822V4_0822V5_0822V6.html
  • vendor: Sagemcom Dr. Neuhaus GmbH
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0957-V2-2016
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0978-2016
heuristics/protection_profiles cf18fa171ef6e928, fa0610a54305df78 6346b04de6859db3
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPNGW_V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0073b_pdf.pdf
pdf_data/cert_filename EFT-T013 Cert 2020_131_OS.pdf 0822V6c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0822-V6-2024: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20210113153231+10'00'
  • /Creator: ACA75941.dpe.protected.mil.au
  • /ModDate: D:20210113153712+11'00'
  • /Producer: KONICA MINOLTA bizhub C308
  • /Title: SACA75941.d21011315320
  • pdf_file_size_bytes: 112707
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Federal Office for Information Security
  • /Keywords: "Common Criteria, Certification, Zertifizierung, SMGW, Smartmeter Gateway, Sagemcom, Dr. Neuhaus, Smart Grid"
  • /Subject: Common Criteria, Certification, Zertifizierung, SMGW, Smartmeter Gateway, Sagemcom, Dr. Neuhaus, Smart Grid
  • /Title: Certificate BSI-DSZ-CC-0822-V6-2024
  • pdf_file_size_bytes: 335622
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename EFT-T013-Certification Report V1.0.pdf 0822V6a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2 and AVA_VAN.5 valid until: 19 December 2032
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0822-V6-2024
    • cert_item: SMARTY IQ-LTE, Version 1.4
    • cert_lab: BSI
    • developer: Sagemcom Dr. Neuhaus GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0822-V5-2023: 3
    • BSI-DSZ-CC-0822-V6-2024: 14
    • BSI-DSZ-CC-0957-: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0073-2014: 3
    • BSI-CC-PP-0077-V2-2015: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 3
    • ALC_FLR.2: 4
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/eval_facility
  • Teron:
    • Teron Labs: 5
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-: 2
  • constructions:
    • MAC:
      • CMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDSA:
      • ECDSA: 3
pdf_data/report_keywords/hash_function
  • JH:
    • JH: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 3
  • IPsec:
    • IPsec: 8
  • SSH:
    • SSH: 3
    • SSHv2: 2
  • VPN:
    • VPN: 12
  • TLS:
    • TLS:
      • TLS: 12
pdf_data/report_keywords/randomness
  • RNG:
    • RBG: 2
pdf_data/report_keywords/cipher_mode
  • GCM:
    • GCM: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-03109: 1
    • BSI TR-03116: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 2
    • AIS 38: 1
    • AIS 46: 2
    • AIS 48: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 186: 1
    • FIPS180-4: 3
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • RFC:
    • RFC 2104: 1
    • RFC 5246: 1
    • RFC 5639: 1
    • RFC 5652: 1
    • RFC 8289: 1
    • RFC 8422: 1
    • RFC2104: 2
    • RFC4493: 6
    • RFC5084: 2
    • RFC5246: 6
    • RFC5288: 2
    • RFC5289: 3
    • RFC5639: 6
    • RFC5652: 4
    • RFC6033: 2
    • RFC6090: 4
    • RFC6161: 2
    • RFC8422: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 23 / 27 Certification Report BSI-DSZ-CC-0822-V6-2024 [9] Configuration list for the TOE (confidential documents): filelist_OS, 2024-11-12 filelist_sln8209, 2024-11-12 8209SE011_SMGw_CPU_USB, Version 3.3: 1
    • Technical Report BSI-DSZ-CC-0822-V6, Version 1, 2024-11-15, TÜV Informationstechnik GmbH, (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
pdf_data/st_filename Juniper JunOS 20.2R1 SRX345, SRX345-DUAL-AC, SRX380, SRX1500 SecurityTarget v1.4.pdf 0822V6b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0957-V2-2016: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0073: 4
    • BSI-CC-PP-0077-2013: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 5
    • EAL 4 augmented: 2
    • EAL4: 1
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 6
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 8
    • FAU_GEN.1: 13
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 5
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT: 2
    • FAU_STG_EXT.1: 4
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 9
    • FCS_CKM.1: 21
    • FCS_CKM.2: 20
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 1
    • FCS_COP: 37
    • FCS_COP.1: 7
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 9
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_RGB_EXT.1: 1
    • FCS_SSHC_EXT.1.1: 2
    • FCS_SSHC_EXT.1.5: 3
    • FCS_SSHC_EXT.1.7: 1
    • FCS_SSHC_EXT.1.9: 1
    • FCS_SSHS_EXT: 2
    • FCS_SSHS_EXT.1: 8
    • FCS_SSHS_EXT.1.1: 3
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 4
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 2
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT.1.1: 4
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSS_EXT: 1
    • FCS_TLSS_EXT.1.2: 1
    • FCS_TLSS_EXT.2.2: 1
    • FCS_TLSS_EXT.2.4: 1
    • FCS_TLSS_EXT.2.5: 1
  • FDP:
    • FDP_RIP: 2
    • FDP_RIP.2: 5
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 12
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT.1: 5
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_PSK_EXT.1.4: 1
    • FIA_UAU: 2
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 2
    • FIA_UAU_EXT.2: 6
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT: 2
    • FIA_UIA_EXT.1: 11
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UID.1: 3
  • FMT:
    • FMT_MOF: 20
    • FMT_MOF.1: 3
    • FMT_MTD: 13
    • FMT_MTD.1: 2
    • FMT_SMF: 27
    • FMT_SMF.1: 6
    • FMT_SMR: 2
    • FMT_SMR.1: 5
    • FMT_SMR.2: 12
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 2
    • FPT_APW_EXT.1: 6
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_FLS: 5
    • FPT_FLS.1: 2
    • FPT_ITT.1: 1
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 5
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM: 1
    • FPT_STM.1: 4
    • FPT_STM_EXT: 2
    • FPT_STM_EXT.1: 5
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT: 3
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.3: 3
    • FPT_TST_EXT.3.1: 1
    • FPT_TST_EXT.3.2: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 11
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL: 2
    • FTA_SSL.3: 10
    • FTA_SSL.4: 6
    • FTA_SSL_EXT: 2
    • FTA_SSL_EXT.1: 7
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 9
  • FTP:
    • FTP_ITC: 3
    • FTP_ITC.1: 28
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC.2: 6
    • FTP_TRP: 9
    • FTP_TRP.1: 3
    • FTP_TUD.1: 1
  • FAU:
    • FAU_ARP: 10
    • FAU_ARP.1: 1
    • FAU_CON.1.2: 1
    • FAU_GEN: 39
    • FAU_GEN.1: 17
    • FAU_GEN.2: 10
    • FAU_GEN.2.1: 1
    • FAU_SAA: 15
    • FAU_SAA.1: 4
    • FAU_SAR: 30
    • FAU_SAR.1: 6
    • FAU_STG: 34
    • FAU_STG.1: 8
    • FAU_STG.2: 10
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.3: 3
    • FAU_STG.4: 3
  • FCO:
    • FCO_NRO: 3
    • FCO_NRO.1: 1
    • FCO_NRO.2: 11
    • FCO_NRO.2.1: 1
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 1
  • FCS:
    • FCS_CKM: 51
    • FCS_CKM.1: 16
    • FCS_CKM.2: 6
    • FCS_CKM.4: 30
    • FCS_CKM.4.1: 1
    • FCS_COP: 68
    • FCS_COP.1: 11
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 9
    • FDP_ACC.2: 12
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 11
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 29
    • FDP_IFC.1: 12
    • FDP_IFC.2: 4
    • FDP_IFF: 26
    • FDP_IFF.1: 18
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_RIP: 2
    • FDP_RIP.1: 1
    • FDP_RIP.2: 8
    • FDP_RIP.2.1: 1
    • FDP_SDI: 2
    • FDP_SDI.1: 1
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 2
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UID: 3
    • FIA_UID.1: 8
    • FIA_UID.2: 14
    • FIA_UID.2.1: 1
    • FIA_USB: 3
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 64
    • FMT_MSA.1: 9
    • FMT_MSA.3: 12
    • FMT_SMF: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR: 3
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_CON: 6
    • FPR_CON.1: 12
    • FPR_CON.1.1: 3
    • FPR_CON.1.2: 3
    • FPR_PSE: 3
    • FPR_PSE.1: 9
    • FPR_PSE.1.1: 1
    • FPR_PSE.1.2: 1
    • FPR_PSE.1.3: 1
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 2
    • FPT_PHP: 3
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_RPL: 3
    • FPT_RPL.1: 10
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM: 3
    • FPT_STM.1: 20
    • FPT_STM.1.1: 1
    • FPT_TST: 3
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 32
    • FTP_ITC.1: 9
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.CONNECTIONS: 3
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINSTRATOR: 1
  • O:
    • O.ADDRESS_FILTERING: 1
    • O.AUTHENTICATION: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.FAIL_SECURE: 1
    • O.IPS_ANALYZE: 1
    • O.IPS_REACT: 1
    • O.PORT_FILTERING: 1
    • O.RESIDUAL_INFORMATION: 1
    • O.STATEFUL_TRAFFIC_FILTERING: 1
    • O.SYSTEM_MONITORING: 2
    • O.TOE_ADMINISTRATION: 2
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.CONNECTIONS: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 3
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.DATA_INTEGRITY: 1
    • T.MALICIOUS_TRAFFIC: 1
    • T.NETWORK_DOS: 1
    • T.PASSWORD_CRACKING: 1
    • T.REPLAY_ATTACK: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • OE:
    • OE.SM: 4
  • OSP:
    • OSP.SM: 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 31
      • AES-: 3
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 13
      • HMAC-SHA-256: 6
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 6
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 23
  • FF:
    • DH:
      • DH: 22
      • Diffie-Hellman: 7
  • RSA:
    • RSA 2048: 6
    • RSA 4096: 3
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 2
    • SHA2:
      • SHA-256: 13
      • SHA-384: 4
      • SHA-512: 1
  • JH:
    • JH: 1
  • SHA:
    • SHA2:
      • SHA-256: 3
      • SHA-384: 2
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • AEAD:
    • AEAD: 2
  • KEX:
    • Key Exchange: 4
    • Key exchange: 1
  • MAC:
    • MAC: 3
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 46
    • IKEv1: 19
    • IKEv2: 17
  • IPsec:
    • IPsec: 33
  • SSH:
    • SSH: 111
    • SSHv2: 12
  • TLS:
    • SSL:
      • SSL: 6
    • TLS:
      • TLS: 2
      • TLS1.1: 1
      • TLS1.2: 1
  • VPN:
    • VPN: 31
  • TLS:
    • TLS:
      • TLS: 40
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 16
    • PRNG: 1
  • RNG:
    • RBG: 3
    • RNG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 16
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 5
  • GCM:
    • GCM: 7
  • GCM:
    • GCM: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 36
    • P-384: 28
    • P-521: 8
  • NIST:
    • NIST P-256: 2
    • NIST P-384: 1
    • P-256: 2
    • P-384: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 2
  • FI:
    • malfunction: 3
    • physical tampering: 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 7586: 1
    • BSI TR-02102-2: 1
    • BSI TR-03109: 1
    • BSI TR-03109-1: 9
    • BSI TR-03109-2: 1
    • BSI TR-03109-3: 1
    • BSI TR-03109-4: 1
    • BSI TR-03111: 1
    • BSI TR-03116-3: 1
    • BSI TR-03116-4: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 180-4: 5
    • FIPS 186-4: 5
    • FIPS 197: 5
    • FIPS 198-1: 5
    • FIPS PUB 186-4: 9
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-56A: 2
    • SP 800-135: 2
    • SP 800-38A: 2
    • SP 800-38D: 2
    • SP 800-56: 3
    • SP 800-90A: 2
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 2409: 2
    • RFC 2460: 2
    • RFC 2463: 1
    • RFC 2986: 2
    • RFC 3513: 2
    • RFC 3526: 2
    • RFC 3602: 3
    • RFC 4106: 2
    • RFC 4109: 2
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4254: 1
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4306: 2
    • RFC 4443: 1
    • RFC 4868: 4
    • RFC 4945: 2
    • RFC 5280: 5
    • RFC 5282: 1
    • RFC 5656: 1
    • RFC 5735: 2
    • RFC 5996: 1
    • RFC 6668: 1
    • RFC 768: 2
    • RFC 791: 2
    • RFC 792: 2
    • RFC 793: 2
    • RFC 959: 1
    • RFC2460: 1
    • RFC3526: 2
    • RFC5656: 1
    • RFC768: 1
    • RFC791: 1
    • RFC793: 1
  • X509:
    • X.509: 10
  • BSI:
    • AIS20: 1
    • AIS31: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-4: 3
    • FIPS 197: 6
  • RFC:
    • RFC 2104: 4
    • RFC 4493: 5
    • RFC 5084: 3
    • RFC 5246: 4
    • RFC 5289: 4
    • RFC 5652: 1
    • RFC 5905: 3
    • RFC5246: 2
    • RFC5905: 1
pdf_data/st_keywords/javacard_api_const
  • curves:
    • SECP256R1: 2
    • SECP384R1: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • FTP) and Secure Socket Layer (SSL) are out of scope. The TOE includes cryptographic modules which implement the underlying cryptographic services: 1
    • out of scope: 1
    • to any information exchange. Telnet, File Transfer Protocol (FTP) and Secure Socket Layer (SSL) are out of scope. The TOE includes cryptographic modules which implement the underlying cryptographic services. The: 1
pdf_data/st_metadata
  • /Author: AnanthaKandiah
  • /CreationDate: D:20201105164628+11'00'
  • /ModDate: D:20201105164628+11'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - Juniper JunOS 20.2R1 SRX345, SRX345-DUAL-AC, SRX380, SRX1500 SecurityTarget v1.4.docx
  • pdf_file_size_bytes: 2301192
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 91
  • /Author: Federal Office for Information Security
  • /Keywords: Smart Meter System, Gateway, Common Criteria, Smart Meter Gateway PP
  • /Subject: Schutzprofil für die Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen
  • /Title: Sagemcom Dr. Neuhaus SMARTY IQ-LTE Security Target
  • pdf_file_size_bytes: 2020364
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 112
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different