Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ST3 Ace (ST3 Ace Token Manager v1.0.13.927, ST3 Ace Middleware v1.0.13.910, and SecureCOS Firmware v5.2)
ISCB-5-RPT-C051-CR-v1a
Wind River Linux Secure 1.0
CCEVS-VR-VID-10430-2011
name ST3 Ace (ST3 Ace Token Manager v1.0.13.927, ST3 Ace Middleware v1.0.13.910, and SecureCOS Firmware v5.2) Wind River Linux Secure 1.0
category Products for Digital Signatures Operating Systems
scheme MY US
not_valid_after 20.12.2018 01.11.2014
not_valid_before 20.12.2013 05.04.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C051-CR-v1a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10430-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecureMetric%20ST3%20Ace%20Security%20Target%20v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10430-st.pdf
manufacturer SecureMetric Technology Sdn Bhd Wind River
manufacturer_web https://www.securemetric.com/ https://www.windriver.com/
security_level EAL2 EAL4+, ALC_FLR.3
dgst e8f4eb037a6f1f14 d2406afd03edb522
heuristics/cert_id ISCB-5-RPT-C051-CR-v1a CCEVS-VR-VID-10430-2011
heuristics/cert_lab [] US
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ADV_ARC.1, AGD_OPE.1, ALC_FLR.3
heuristics/extracted_versions 5.2, 1.0.13.910, 1.0.13.927 1.0
heuristics/scheme_data
  • cert_no: 2013-012-C051
  • certification_date: 20.12.2013
  • developer: SecureMetric Technology Sdn Bhd
  • enhanced:
    • assurance_level: EAL2
    • category: Products for Digital Signatures
    • cert_id: C051
    • certification_date: 20.12.2013
    • developer: Yau Wai Chung2-2, Incubator 2, Technology Park MalaysiaLebuhraya Puchong - Sg. Besi, Bukit Jalil57000 Kuala LumpurMALAYSIA URL: http://www.securemetric.comEmail: [email protected]: + 603-8996 8225Fax: + 603-8996 7225
    • expiration_date: 20.12.2018
    • mutual_recognition: MyCC
    • product: ST3 Ace (ST3 Ace Token Manager v1.0.13.927, ST3 Ace Middleware v1.0.13.910, and SecureCOS Firmware v5.2)
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C051/ISCB-5-RPT-C051-CR-v1a.pdf
    • scope: The Target of Evaluation (TOE) is ST3 Ace that consists of ST3 Ace Token Manager v1.0.13.927, ST3 Ace Middleware v1.0.13.910, and SecureCOS Firmware v5.2. The TOE provides secure storage to store digital certificate(s) and cryptographic keys. The ST3 Ace follows the PKCS#11 standard and implements authentication via PIN to prevent unauthorised access to the token. The TOE is comprised of the three following core components of the ST3 Ace product: SecureCOS Operating System: The operating system (firmware) embedded in a microprocessor smart chip based USB token. The firmware provides the core cryptographic functionality of the TOE. ST3 Ace Middleware: Two compiled binaries that utilise exported APIs to provide an interface to the core cryptographic security functionality of the TOE, providing developers with an easily accessible method for engaging PKI-related functionality to support the development of enterprise authentication and integrity solutions. ST3 Ace Token Manager: The TOE provides an application for the user to manage the cryptographic key security of the TOE. The middleware and Token Manager are installed on a host computer for third party application to communicate with SecureCOS and provides key security functionality of the TOE. The scope of evaluation covers major security functions described as below: Cryptographic Operations - The TOE provides cryptographic library, which includes 3DES, RSA, MD5 and SHA-1, for cryptographic operations that can be used by third party applications such as encryption and decryption of email. The third party applications are outside the TOE evaluation scope. The TOE also provides the functionality to digitally sign documents and files. User Authentication - The TOE allows authorised users to access the TOE once the user is successfully identified and authenticated by the TOE. TOE user has to provide correct user PIN in order to access to TOE. The TOE enforces token blocking after 6 failed authentication attempts and Security Officer (SO) PIN is needed to unblock the token and reset the user PIN. The integration with the Token Management System Registration Authority (TMS RA) will allow a user to unblock the TOE and reset the User PIN without to deliver the physical token to the token management team. However, Secure Code is required in order to submit the unblock request or reset user PIN via TMS RA. TMS RA is outside the scope of the evaluation. Security Management - The TOE provides management functions such as token management (name change, PIN change, unblock token) and object management (view object, export/import object).
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C051/SecureMetric%20ST3%20Ace%20Security%20Target%20v1.1.pdf
    • type: PKI-related security solutions that provides secure storage to store digital certificate(s) and cryptographic keys.
  • expiration_date: 20.12.2018
  • level: EAL2
  • product: ST3 Ace (ST3 Ace Token Manager v1.0.13.927, ST3 Ace Middleware v1.0.13.910, and SecureCOS Firmware v5.2)
  • recognition: MyCC
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/85
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10430/
  • categories: ['Operating System']
  • category: Operating System
  • certification_date: 05.04.2011
  • evaluation_facility: atsec information security corporation
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10430
  • product: Wind River Linux Secure 1.0
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10430
  • vendor: Wind River
heuristics/protection_profiles {} 1b3d0fa0ae86e5da
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_gpospp_v1.0.pdf
pdf_data/report_filename ISCB-5-RPT-C051-CR-v1a.pdf st_vid10430-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10430-2011
    • cert_item: Wind River Wind River Linux Secure 1.0
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C051-CR-v1a: 29
  • US:
    • CCEVS-VR-VID10430-2011: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL2: 7
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 2
    • EAL4: 10
    • EAL4 augmented: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 3
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.4.1: 1
    • FCS_COP: 4
  • FIA:
    • FIA_AFL.1.1: 1
    • FIA_ATD.1.1: 1
    • FIA_UAU.2.1: 1
  • FMT:
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 5
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 4
      • TDES: 6
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 5
  • SHA:
    • SHA1:
      • SHA-1: 5
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 2
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 3
    • SSHv2: 1
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 2
    • P-521: 2
pdf_data/report_keywords/crypto_library
  • NSS:
    • NSS: 6
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 180-2: 3
    • FIPS 46-3: 2
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • PKCS:
    • PKCS#11: 14
  • FIPS:
    • FIPS 140-2: 5
  • NIST:
    • NIST SP 800-53: 1
  • RFC:
    • RFC 2409: 1
    • RFC 3268: 1
    • RFC 4253: 1
pdf_data/report_metadata
  • /Author: ISCB Department
  • /Category: PUBLIC
  • /Caveat: FINAL
  • /Classification: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20131220170040+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Developer: SecureMetric Technology Sdn Bhd
  • /Document Type: CR
  • /Identifier: ISCB-5-RPT-C051-CR-v1a
  • /Index: MyCB_TMP_002
  • /Keywords: ST3 Ace
  • /ModDate: D:20131220170049+08'00'
  • /Phase: Release
  • /Producer: Adobe PDF Library 10.0
  • /Project Code: C051
  • /Released: 20 December 2013
  • /ST Date: 21 November 2013
  • /ST Title: ST3 Ace Security Target
  • /ST Version: 1.1
  • /SourceModified: D:20131220090019
  • /Sponsor: SecureMetric Technology Sdn Bhd
  • /Subject: ST3 Ace (ST3 Ace Token Manager v1.0.13.927, ST3 Ace Middleware v1.0.13.910, and SecureCOS Firmware v5.2)
  • /TOE Name: ST3 Ace
  • /TOE Version: ST3 Ace Token Manager (v1.0.13.927), ST3 Ace Middleware (v1.0.13.910), SecureCOS Firmware (v5.2)
  • /Title: C051 Certification Report
  • /Version: v1a
  • pdf_file_size_bytes: 421845
  • pdf_hyperlinks: mailto:[email protected], http://www.commoncriteriaportal.org/, http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 29
  • /Author: Don Phillips
  • /CreationDate: D:20110420131634
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110420131634
  • /Producer: Microsoft® Office Word 2007
  • /Title: Validators Report
  • pdf_file_size_bytes: 328563
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 31
pdf_data/st_filename SecureMetric ST3 Ace Security Target v1.1.pdf st_vid10430-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 9
  • EAL:
    • EAL4: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 4
    • ASE_ECD.1: 1
    • ASE_INT.1: 4
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 4
    • ASE_SPD.1: 4
    • ASE_TSS.1: 4
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_FLR.3: 3
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 15
    • FCS_CKM.1: 11
    • FCS_CKM.2: 4
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 1
    • FCS_COP: 25
    • FCS_COP.1: 5
  • FDP:
    • FDP_IFF: 2
    • FDP_ITC.1: 10
    • FDP_ITC.2: 10
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 4
  • FMT:
    • FMT_MTD: 18
    • FMT_MTD.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 3
    • FAU_GEN.1.2: 4
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 9
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 2
    • FAU_STG: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 8
    • FAU_STG.3.1: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
    • FAU_UAU.1: 2
    • FAU_UAU.6: 2
  • FCS:
    • FCS_BCM_EXT.1: 10
    • FCS_BCM_EXT.1.1: 1
    • FCS_CKM.1: 22
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 14
    • FCS_CKM.4.1: 1
    • FCS_COA_EXT.1: 6
    • FCS_COA_EXT.1.1: 1
    • FCS_COP.1: 34
    • FCS_COP.1.1: 3
    • FCS_RBG_EXT.1: 12
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 11
    • FDP_ACC.2: 17
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 32
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 7
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 9
    • FDP_IFC.2: 11
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF.1: 3
    • FDP_IFF.2: 5
    • FDP_IFF.2.1: 1
    • FDP_IFF.2.2: 1
    • FDP_IFF.2.3: 1
    • FDP_IFF.2.4: 1
    • FDP_IFF.2.5: 1
    • FDP_IFF.2.6: 1
    • FDP_ITC.1: 11
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 11
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_RIP: 2
    • FDP_RIP.2: 13
    • FDP_RIP.2.1: 1
    • FDP_RIP.3: 15
    • FDP_RIP.3.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_AFL_EXT.1: 10
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_ATD: 1
    • FIA_ATD.1: 14
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 15
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 12
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 12
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 3
    • FIA_USB.1.3: 3
  • FMT:
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 31
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 24
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4: 15
    • FMT_MSA.4.1: 2
    • FMT_MTD.1: 97
    • FMT_MTD.1.1: 14
    • FMT_REV.1: 23
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SAE.1: 7
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 24
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMR.2: 3
  • FPT:
    • FPT_ITT: 2
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_ITT.3: 7
    • FPT_ITT.3.1: 1
    • FPT_ITT.3.2: 1
    • FPT_RCV.1: 11
    • FPT_RCV.1.1: 1
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TRC_EXT.1: 8
    • FPT_TRC_EXT.1.1: 1
    • FPT_TRP_EXT.1: 2
    • FPT_TST.1: 1
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.1.2: 1
  • FRU:
    • FRU_RSA.1: 9
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_MCS.1: 13
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_SSL.1: 9
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 8
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_TAB.1: 9
    • FTA_TAB.1.1: 1
    • FTA_TAH.1: 7
    • FTA_TAH.1.1: 1
    • FTA_TAH.1.2: 1
    • FTA_TAH.1.3: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.HOST: 2
    • A.USER: 3
  • O:
    • O.AUTHENTICATE: 5
    • O.CRYPT: 4
    • O.DISCLOSURE: 1
    • O.KEYPROTECT: 3
    • O.MODIFY: 4
  • OE:
    • OE.AUTHDATA: 3
    • OE.INSTALL: 3
  • T:
    • T.COMINT: 3
    • T.DISCLOSURE: 2
    • T.IMPERSON: 3
    • T.MODIFY: 2
  • A:
    • A.CLEARANCE: 3
    • A.CONNECT: 5
    • A.PHYSICAL: 4
    • A.SENSITIVITY: 2
  • O:
    • O.ACCESS: 20
    • O.ACCESS_HISTORY: 5
    • O.ADMIN_ROLE: 6
    • O.AUDIT_GENERATION: 10
    • O.AUDIT_PROTECTION: 6
    • O.AUDIT_REVIEW: 10
    • O.CORRECT_TSF_OPERATION: 5
    • O.CRYPTOGRAPHIC_SERVICES: 13
    • O.DISCRETIONARY_ACCESS: 10
    • O.DISCRETIONARY_USER_CONTROL: 7
    • O.DISPLAY_BANNER: 5
    • O.MANAGE: 26
    • O.MANDATORY_ACCESS: 15
    • O.PROTECT: 18
    • O.RECOVERY: 7
    • O.REFERENCE_MONITOR: 10
    • O.RESIDUAL_INFORMATION: 6
    • O.RESOURCE_SHARING: 6
    • O.TSF_CRYPTOGRAPHIC_INTEGRITY: 4
    • O.USER_AUTHENTICATION: 10
    • O.USER_IDENTIFICATION: 8
  • OE:
    • OE.LABELING: 4
    • OE.PHYSICAL: 8
  • T:
    • T.ADMIN_ERROR: 3
    • T.ADMIN_ROGUE: 3
    • T.AUDIT_COMPROMISE: 6
    • T.CRYPTO_COMPROMISE: 2
    • T.MASQUERADE: 4
    • T.OPERATIONAL_ERRORS: 2
    • T.RESIDUAL_DATA: 3
    • T.RESOURCE_EXHAUSTION: 3
    • T.TSF_COMPROMISE: 4
    • T.UNATTENDED_SESSION: 3
    • T.UNAUTHORIZED_ACCESS: 4
    • T.UNIDENTIFIED_ACTIONS: 3
    • T.UNKNOWN_STATE: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 104
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3-DES: 1
      • TDES: 12
    • DES:
      • DES: 3
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 5
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 8
  • SHA:
    • SHA1:
      • SHA-1: 5
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-2: 1
      • SHA-224: 1
      • SHA-256: 3
      • SHA-512: 1
      • SHA2: 1
      • SHA384: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 17
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKEv1: 1
  • IPsec:
    • IPsec: 3
  • SSH:
    • SSH: 6
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 3
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RBG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 2
    • P-521: 2
pdf_data/st_keywords/crypto_library
  • NSS:
    • NSS: 24
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-2: 3
    • FIPS 46-3: 2
  • PKCS:
    • PKCS#11: 7
  • FIPS:
    • FIPS 140-2: 14
    • FIPS PUB 140-2: 3
    • FIPS PUB 186-3: 1
  • NIST:
    • NIST SP 800-57: 1
  • PKCS:
    • PKCS#11: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users by cannot be used to store: 1
    • out of scope: 1
pdf_data/st_metadata
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different