Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
VMware ESXi 7.0 Update 3d
CCEVS-VR-VID-11249-2022
THD89 1.0.3 Secure Element version 1.0
2021-36-INF-4157
name VMware ESXi 7.0 Update 3d THD89 1.0.3 Secure Element version 1.0
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US ES
status archived active
not_valid_after 06.09.2024 26.09.2028
not_valid_before 06.09.2022 26.09.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11249-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36_Certificado.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11249-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36%20INF-4157.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11249-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36%20ST_lite.pdf
manufacturer VMware Inc. Tongxin Microelectronics Co., Ltd.
manufacturer_web https://www.vmware.com https://www.tsinghuaic.com/english/article/article.asp?id=483248&bid=8610#
security_level {} EAL5+, AVA_VAN.5, ALC_DVS.2
dgst eea19bafd2daa311 f030b4c2adc03fa7
heuristics/cert_id CCEVS-VR-VID-11249-2022 2021-36-INF-4157
heuristics/cert_lab US []
heuristics/cpe_matches cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3s:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:* {}
heuristics/related_cves CVE-2021-22041, CVE-2021-21995, CVE-2020-4004, CVE-2022-29901, CVE-2024-37086, CVE-2024-37085, CVE-2025-22225, CVE-2022-31699, CVE-2020-3976, CVE-2020-4005, CVE-2022-31681, CVE-2025-22224, CVE-2024-22254, CVE-2024-22252, CVE-2024-22273, CVE-2021-22045, CVE-2025-22226, CVE-2020-3999, CVE-2024-22255, CVE-2021-22040, CVE-2022-23825, CVE-2022-21166, CVE-2021-22042, CVE-2022-21125, CVE-2022-21123, CVE-2021-22043, CVE-2024-22253, CVE-2022-31696, CVE-2021-22050, CVE-2021-21994, CVE-2022-31705 {}
heuristics/extracted_sars ASE_CCL.1, AGD_PRE.1, AVA_VAN.1, ASE_OBJ.2, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ALC_CMS.1, ASE_TSS.1, ALC_TSU_EXT.1, ASE_REQ.2, ADV_FSP.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2
heuristics/extracted_versions 7.0 1.0, 1.0.3
heuristics/report_references/directly_referenced_by {} NSCIB-CC-2400034-01-CR, NSCIB-CC-2400175-01-CR
heuristics/report_references/indirectly_referenced_by {} NSCIB-CC-2400034-01-CR, NSCIB-CC-2400175-01-CR
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/11249/
  • categories: ['Virtualization']
  • category: Virtualization
  • certification_date: 06.09.2022
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 06.09.2024
  • id: CCEVS-VR-VID11249
  • product: VMware ESXi 7.0 Update 3d
  • scheme: US
  • url: https://www.niap-ccevs.org/products/11249
  • vendor: VMware, LLC
  • category: Smart Cards and similiar devices
  • certification_date: 26.09.2023
  • enhanced:
    • category: Smart Cards and similiar devices
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1876
    • certification_date: 26.09.2023
    • description: Renovación de certificado (12/08/2025) The TOE consists of hardware and IC dedicated software. The hardware is based on a 32-bit secure CPU with ROM (Non-Volatile Read-Only Memory), NVM (Non-volatile Programmable Memory) and RAM (Volatile Memory). The hardware of the TOE also incorporates communication peripherals and cryptographic coprocessors for execution and acceleration of symmetric and asymmetric cryptographic algorithms. The IC dedicated software consists of boot code and 3 libraries of cryptographic services. Among all the possibilities offered by these software and hardware requirements, the configuration selected for the evaluation is the following: TYPE NAME VERSION PACKAGE Hardware THD89 1.0.3 Module Software Crypto Library 2.1.0 SW library in ROM Crypto SU Library 2.2.0 SW library in NVM CryptoECCSec Library 1.0.0 SW library in NVM Boot code 1.0 Boot code in ROM Header file 0.1 cryptolib.h The TOE TOE THD89 1.0.3 Secure Element version 1.0 has gone through a Certificate Renewal process according to certification procedure PO-005. This process consists in updating the analysis of the certified product’s resistance against updated state of the art attack methods and vulnerabilities. The resistance to attacks has been re-assessed in the course of the Certificate Renewal process, and therefore the date to be considered as an archived certificate is reset in the certificate product list of the certification body considering the date of the renewal of the certificate.
    • evaluation_facility: Applus Laboratories
    • level: EAL5 + ALC_DVS.2 + AVA_VAN.5
    • manufacturer: Tongxin Microelectronics Co., Ltd.
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2316
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1875
    • type: Product
  • manufacturer: Tongxin Microelectronics Co., Ltd.
  • product: THD89 1.0.3 Secure Element version 1.0
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/998-thd89-1-0-3-secure-element-version-1-0
heuristics/protection_profiles c40ae795865a0dba, deb6fe6c7a4a2306, e80eb1652a0e6f6a cf0f01bcd7be3e9c
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_VIRTUALIZATION_BASE_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_SV_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename st_vid11249-ci.pdf 2021-36_Certificado.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11249-2022: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/eval_facility
  • Leidos:
    • Leidos: 1
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_metadata
  • /CreationDate: D:20220907110747-04'00'
  • /ModDate: D:20220907110747-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181409
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20230904141829+02'00'
  • /ModDate: D:20230904141829+02'00'
  • /Producer: GPL Ghostscript 9.27
  • pdf_file_size_bytes: 887800
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid11249-vr.pdf 2021-36 INF-4157.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID11249-2022
    • cert_item: for VMware ESXi 7.0 Update 3d
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11249-2022: 1
  • DE:
    • BSI-DSZ-CC-S-0201-2022: 1
  • ES:
    • 2021-36-INF-4157- v1: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL5: 8
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 8
    • ALC_FLR: 3
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 9
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_COP.1: 4
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ITT.1: 1
    • FDP_SDC.1: 1
  • FMT:
    • FMT_LIM.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
  • FRU:
    • FRU_FLT.2: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 6
  • Applus:
    • Applus Laboratories: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • TDES: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDSA:
      • ECDSA: 1
  • RSA:
    • RSA-CRT: 4
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 12
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 2
pdf_data/report_keywords/ecc_curve
  • Brainpool:
    • brainpoolP224r1: 1
    • brainpoolP256r1: 1
    • brainpoolP512r1: 1
pdf_data/report_keywords/crypto_library
  • Generic:
    • Crypto Library 2.1.0: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • other:
    • JIL: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_keywords/standard_id
  • NIST:
    • NIST SP 800-90A: 1
  • X509:
    • X.509: 1
  • FIPS:
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 7816: 4
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 5639: 1
pdf_data/report_metadata
  • /Author: 9308
  • /CreationDate: D:20230925160654+02'00'
  • /Creator: Microsoft® Word LTSC
  • /ModDate: D:20230925160654+02'00'
  • /Producer: Microsoft® Word LTSC
  • pdf_file_size_bytes: 418348
  • pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename st_vid11249-st.pdf 2021-36 ST_lite.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL5: 4
    • EAL5 augmented: 2
    • EAL5+: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 6
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 3
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 3
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT.1: 6
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP: 19
    • FCS_COP.1: 5
    • FCS_ENT_EXT.1: 4
    • FCS_ENT_EXT.1.1: 1
    • FCS_ENT_EXT.1.2: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_TLSC_EXT.1: 5
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.5: 4
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT.1: 5
    • FCS_TLSS_EXT.1.1: 2
    • FCS_TLSS_EXT.1.2: 1
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLS_EXT.1: 3
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_HAS_EXT.1: 1
    • FDP_HBI_EXT.1: 5
    • FDP_HBI_EXT.1.1: 1
    • FDP_PPR_EXT.1: 5
    • FDP_PPR_EXT.1.1: 1
    • FDP_PPR_EXT.1.2: 1
    • FDP_PPR_EXT.1.3: 1
    • FDP_RIP_EXT.1: 4
    • FDP_RIP_EXT.1.1: 1
    • FDP_RIP_EXT.2: 4
    • FDP_RIP_EXT.2.1: 1
    • FDP_VMS_EXT.1: 6
    • FDP_VMS_EXT.1.1: 3
    • FDP_VMS_EXT.1.2: 1
    • FDP_VMS_EXT.1.3: 1
    • FDP_VMS_EXT.1.4: 1
    • FDP_VNC_EXT.1: 5
    • FDP_VNC_EXT.1.1: 1
    • FDP_VNC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT.1: 5
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_PMG_EXT.1: 10
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 1
    • FIA_UIA_EXT.1: 4
    • FIA_UIA_EXT.1.1: 1
  • FMT:
    • FMT_MOF_EXT.1: 5
    • FMT_MOF_EXT.1.1: 2
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMO_EXT.1: 5
    • FMT_SMO_EXT.1.1: 1
  • FPT:
    • FPT_DVD_EXT.1: 4
    • FPT_DVD_EXT.1.1: 1
    • FPT_EEM_EXT.1: 4
    • FPT_EEM_EXT.1.1: 1
    • FPT_HAS_EXT.1: 3
    • FPT_HAS_EXT.1.1: 1
    • FPT_HAS_EXT.1.2: 1
    • FPT_HCL_EXT: 1
    • FPT_HCL_EXT.1: 3
    • FPT_HCL_EXT.1.1: 1
    • FPT_RDM_EXT.1: 6
    • FPT_RDM_EXT.1.1: 1
    • FPT_RDM_EXT.1.2: 1
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 5
    • FPT_TUD_EXT.2.1: 1
    • FPT_VDP_EXT.1: 4
    • FPT_VDP_EXT.1.1: 1
    • FPT_VDP_EXT.1.2: 1
    • FPT_VIV_EXT.1: 4
    • FPT_VIV_EXT.1.1: 1
    • FPT_VIV_EXT.1.2: 1
  • FTA:
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 7
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
    • FTP_UIF_EXT.1: 4
    • FTP_UIF_EXT.1.1: 1
    • FTP_UIF_EXT.2: 4
    • FTP_UIF_EXT.2.1: 1
  • FAU:
    • FAU_SAS.1: 6
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.4: 9
    • FCS_COP.1: 34
    • FCS_COP.1.1: 4
    • FCS_RNG.1: 7
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_IFC.1: 5
    • FDP_ITC.1: 9
    • FDP_ITC.2: 9
    • FDP_ITT.1: 7
    • FDP_SDC.1: 6
    • FDP_SDC.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
  • FPT:
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 7
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT.2: 8
pdf_data/st_keywords/cc_claims
  • O:
    • O.AUDIT: 1
    • O.CORRECTLY_APPLIED_: 1
    • O.DOMAIN_INTEGRITY: 1
    • O.MANAGEMENT_ACCES: 1
    • O.PATCHED_SOFTWARE: 1
    • O.PLATFORM_INTEGRITY: 1
    • O.RESOURCE_ALLOCATIO: 1
    • O.VMM_INTEGRITY: 1
    • O.VM_ENTROPY: 1
    • O.VM_ISOLATION: 1
  • OE:
    • OE.CONFIG: 1
    • OE.NON_MALICIOUS_US: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • O:
    • O.AES: 7
    • O.ECC: 6
    • O.RND: 3
    • O.RSA: 7
    • O.TDES: 8
  • T:
    • T.RND: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 10
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 32
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 29
      • Triple-DES: 3
    • DES:
      • DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 3
  • ECC:
    • ECC:
      • ECC: 33
    • ECDSA:
      • ECDSA: 1
  • RSA:
    • RSA-CRT: 19
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-256: 3
      • SHA-384: 3
      • SHA-512: 2
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • PKE:
    • PKE: 1
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • PGP:
    • PGP: 1
  • SSH:
    • SSH: 2
  • TLS:
    • SSL:
      • SSL: 1
      • SSL 2.0: 1
      • SSL 3.0: 1
    • TLS:
      • TLS: 65
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 7
  • RNG:
    • RBG: 2
  • RNG:
    • RND: 5
    • RNG: 6
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 2
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 8
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 10
    • P-384: 8
    • P-521: 10
    • secp256r1: 3
    • secp384r1: 3
    • secp521r1: 3
  • Brainpool:
    • brainpoolP224r1: 3
    • brainpoolP256r1: 1
    • brainpoolP320r1: 3
    • brainpoolP384r1: 1
    • brainpoolP512r1: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 4
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_RSA_WITH_AES_128_CBC_SHA: 4
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 4
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 4
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 4
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 15
  • Generic:
    • Crypto Library 2.1.0: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 7
    • malfunction: 3
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 5
    • Physical Probing: 2
    • physical probing: 4
    • side channel: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-4: 3
    • FIPS PUB 186-4: 8
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 2
  • NIST:
    • NIST SP 800-38A: 3
    • NIST SP 800-38D: 2
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 2
    • SP 800-57: 1
  • RFC:
    • RFC 2818: 2
    • RFC 5246: 8
    • RFC 5280: 3
    • RFC 5288: 4
    • RFC 5289: 12
    • RFC 5759: 1
    • RFC 6125: 1
    • RFC 8017: 2
  • X509:
    • X.509: 7
  • BSI:
    • AIS26: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 7816: 6
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-67: 1
  • RFC:
    • RFC 5639: 2
pdf_data/st_metadata
  • /CreationDate: D:20230627103637+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20230627103637+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 780001
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different