| name |
THD89 1.0.3 Secure Element version 1.0 |
Cisco Aggregation Services Router (ASR) 1000 Series running IOS XE version 2.4.2t |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Boundary Protection Devices and Systems |
| scheme |
ES |
US |
| status |
active |
archived |
| not_valid_after |
26.09.2028 |
01.11.2014 |
| not_valid_before |
26.09.2023 |
27.06.2011 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36_Certificado.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36%20INF-4157.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10361-vr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36%20ST_lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10361-st.pdf |
| manufacturer |
Tongxin Microelectronics Co., Ltd. |
Cisco Systems, Inc. |
| manufacturer_web |
https://www.tsinghuaic.com/english/article/article.asp?id=483248&bid=8610# |
https://www.cisco.com |
| security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL4+, ALC_FLR.2 |
| dgst |
f030b4c2adc03fa7 |
4faedf83e4faff5c |
| heuristics/cert_id |
2021-36-INF-4157 |
CCEVS-VR-10361-2011 |
| heuristics/cert_lab |
[] |
US |
| heuristics/cpe_matches |
{} |
cpe:2.3:o:cisco:ios_xe:2.4.2:*:*:*:*:*:*:* |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
CVE-2023-20056, CVE-2017-6739, CVE-2015-6282, CVE-2016-6415, CVE-2012-4623, CVE-2017-6738, CVE-2017-6742, CVE-2013-6981, CVE-2023-20097, CVE-2018-0188, CVE-2017-6741, CVE-2011-3282, CVE-2021-1616, CVE-2020-3444, CVE-2018-0194, CVE-2013-6692, CVE-2013-5472, CVE-2011-3274, CVE-2021-1382, CVE-2018-0184, CVE-2021-1625, CVE-2013-5475, CVE-2018-0182, CVE-2012-0381, CVE-2018-0190, CVE-2017-12228, CVE-2018-0185, CVE-2012-0384, CVE-2019-16009, CVE-2016-1409, CVE-2018-0195, CVE-2018-0193, CVE-2018-0189, CVE-2023-20076, CVE-2014-3409, CVE-2013-0149, CVE-2021-1384, CVE-2023-44487, CVE-2017-6737, CVE-2021-34729, CVE-2016-6393, CVE-2018-0186, CVE-2017-6740, CVE-2018-0183, CVE-2017-6743, CVE-2012-0386, CVE-2014-2146, CVE-2024-20271, CVE-2014-3354, CVE-2015-0685, CVE-2011-3272, CVE-2020-3516, CVE-2012-0382, CVE-2017-6736 |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 |
ADV_INT.1, ADV_TDS.3, AVA_VAN.3, ATE_FUN.1, ALC_CMC.4, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, AGD_USR.1, ALC_LCD.1, ALC_FLR.2, ATE_COV.3, ALC_DVS.1, ALC_TAT.1, ALC_CSC.4, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
1.0, 1.0.3 |
2.4.2 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
NSCIB-CC-2400034-01-CR, NSCIB-CC-2400175-01-CR |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
NSCIB-CC-2400034-01-CR, NSCIB-CC-2400175-01-CR |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- category: Smart Cards and similiar devices
- certification_date: 26.09.2023
- enhanced:
- category: Smart Cards and similiar devices
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1876
- certification_date: 26.09.2023
- description: Renovación de certificado (12/08/2025) The TOE consists of hardware and IC dedicated software. The hardware is based on a 32-bit secure CPU with ROM (Non-Volatile Read-Only Memory), NVM (Non-volatile Programmable Memory) and RAM (Volatile Memory). The hardware of the TOE also incorporates communication peripherals and cryptographic coprocessors for execution and acceleration of symmetric and asymmetric cryptographic algorithms. The IC dedicated software consists of boot code and 3 libraries of cryptographic services. Among all the possibilities offered by these software and hardware requirements, the configuration selected for the evaluation is the following: TYPE NAME VERSION PACKAGE Hardware THD89 1.0.3 Module Software Crypto Library 2.1.0 SW library in ROM Crypto SU Library 2.2.0 SW library in NVM CryptoECCSec Library 1.0.0 SW library in NVM Boot code 1.0 Boot code in ROM Header file 0.1 cryptolib.h The TOE TOE THD89 1.0.3 Secure Element version 1.0 has gone through a Certificate Renewal process according to certification procedure PO-005. This process consists in updating the analysis of the certified product’s resistance against updated state of the art attack methods and vulnerabilities. The resistance to attacks has been re-assessed in the course of the Certificate Renewal process, and therefore the date to be considered as an archived certificate is reset in the certificate product list of the certification body considering the date of the renewal of the certificate.
- evaluation_facility: Applus Laboratories
- level: EAL5 + ALC_DVS.2 + AVA_VAN.5
- manufacturer: Tongxin Microelectronics Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2316
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1875
- type: Product
- manufacturer: Tongxin Microelectronics Co., Ltd.
- product: THD89 1.0.3 Secure Element version 1.0
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/998-thd89-1-0-3-secure-element-version-1-0
|
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10361/
- categories: ['Firewall', ' Router', ' Virtual Private Network']
- category: Firewall
- certification_date: 27.06.2011
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10361
- product: Cisco Aggregation Services Router (ASR) 1000 Series running IOS XE version 2.4.2t
- scheme: US
- url: https://www.niap-ccevs.org/products/10361
- vendor: Cisco Systems, Inc.
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
cf0f01bcd7be3e9c |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
{} |
| pdf_data/cert_filename |
2021-36_Certificado.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20230904141829+02'00'
- /ModDate: D:20230904141829+02'00'
- /Producer: GPL Ghostscript 9.27
- pdf_file_size_bytes: 887800
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
| pdf_data/report_filename |
2021-36 INF-4157.pdf |
st_vid10361-vr.pdf |
| pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-10361-2011
- cert_item: Cisco Systems, Inc, 170 West Tasman Dr., San Jose, CA 95134 Aggregation Services Router (ASR) 1000 Series
- cert_lab: US NIAP
|
| pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-S-0201-2022: 1
- ES:
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL5: 8
- ITSEC:
|
- EAL:
- EAL 4: 9
- EAL 4 augmented: 2
- EAL4: 2
- EAL4 augmented: 1
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_COP.1: 4
- FCS_RNG.1: 1
- FDP:
- FDP_ITT.1: 1
- FDP_SDC.1: 1
- FMT:
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FRU:
|
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 1
- FCS_COP.1: 4
- FPT:
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 103
- Cisco Systems: 2
- Cisco Systems, Inc: 2
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
- Brainpool:
- brainpoolP224r1: 1
- brainpoolP256r1: 1
- brainpoolP512r1: 1
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: 9308
- /CreationDate: D:20230925160654+02'00'
- /Creator: Microsoft® Word LTSC
- /ModDate: D:20230925160654+02'00'
- /Producer: Microsoft® Word LTSC
- pdf_file_size_bytes: 418348
- pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /Author: Tammy Compton
- /CreationDate: D:20110706125258
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110706125258
- /Producer: Microsoft® Office Word 2007
- /Title: Validation Report for N7K
- pdf_file_size_bytes: 315972
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
| pdf_data/st_filename |
2021-36 ST_lite.pdf |
st_vid10361-st.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 1
- EAL5: 4
- EAL5 augmented: 2
- EAL5+: 4
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 3
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 19
- ADV_FSP.4: 3
- ADV_IMP.1: 3
- ADV_IMP.2: 2
- ADV_INT.1: 1
- ADV_TDS.3: 11
- AGD:
- AGD_OPE.1: 10
- AGD_PRE.1: 8
- AGD_USR.1: 2
- ALC:
- ALC_CMC.4: 6
- ALC_CMS.4: 5
- ALC_CSC.4: 1
- ALC_DEL.1: 5
- ALC_DVS.1: 6
- ALC_FLR.2: 9
- ALC_LCD.1: 6
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 4
- ATE_COV.3: 3
- ATE_DPT: 1
- ATE_DPT.1: 7
- ATE_FUN.1: 5
- ATE_IND.2: 5
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.4: 9
- FCS_COP.1: 34
- FCS_COP.1.1: 4
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_IFC.1: 5
- FDP_ITC.1: 9
- FDP_ITC.2: 9
- FDP_ITT.1: 7
- FDP_SDC.1: 6
- FDP_SDC.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FPT:
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_ITT.1: 7
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FRU:
|
- FAU:
- FAU_ARP: 4
- FAU_ARP.1: 9
- FAU_ARP.1.1: 1
- FAU_ARP_ACK.1: 1
- FAU_GEN: 5
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAA: 5
- FAU_SAA.1: 8
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 14
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_SAR.3: 10
- FAU_SAR.3.1: 1
- FAU_SEL: 3
- FAU_SEL.1: 8
- FAU_SEL.1.1: 1
- FAU_STG: 3
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 2
- FAU_STG.3: 8
- FAU_STG.3.1: 1
- FAU_UAU.1: 1
- FAU_UID.2: 1
- FCS:
- FCS_CKM.1: 45
- FCS_CKM.1.1: 2
- FCS_CKM.2: 13
- FCS_CKM.2.1: 1
- FCS_CKM.4: 31
- FCS_CKM.4.1: 1
- FCS_COP.1: 57
- FCS_COP.1.1: 5
- FDP:
- FDP_ACC.1: 4
- FDP_ACF.1: 1
- FDP_IFC: 1
- FDP_IFC.1: 51
- FDP_IFC.1.1: 3
- FDP_IFF: 1
- FDP_IFF.1: 41
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 4
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_IFF.1.6: 3
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.2: 12
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 3
- FIA_ATD.1: 17
- FIA_ATD.1.1: 2
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UID.1: 3
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FIA_USB.1: 12
- FMT:
- FMT_MOF.1: 76
- FMT_MOF.1.1: 8
- FMT_MSA: 1
- FMT_MSA.1: 28
- FMT_MSA.1.1: 3
- FMT_MSA.2: 3
- FMT_MSA.3: 29
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_MTD.1: 48
- FMT_MTD.1.1: 4
- FMT_MTD.2: 28
- FMT_MTD.2.1: 3
- FMT_MTD.2.2: 3
- FMT_REV.1: 10
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SMF.1: 32
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.2: 34
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ITA.1: 9
- FPT_ITA.1.1: 1
- FPT_ITC.1: 9
- FPT_ITC.1.1: 1
- FPT_ITI.1: 9
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_RCV.1: 10
- FPT_RCV.1.1: 1
- FPT_RCV.2: 9
- FPT_RCV.2.1: 1
- FPT_RCV.2.2: 1
- FPT_RPL.1: 11
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_RSA.1: 1
- FPT_STM.1: 15
- FPT_STM.1.1: 1
- FPT_TDC.1: 6
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TRP: 1
- FPT_TST: 1
- FPT_TST.1: 26
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FRU_RSA.1: 28
- FRU_RSA.1.1: 2
- FTA:
- FTA_SSL: 2
- FTA_SSL.1: 11
- FTA_SSL.1.1: 2
- FTA_SSL.1.2: 2
- FTA_SSL.2: 8
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTA_SSL.3: 10
- FTA_SSL.3.1: 1
- FTA_TAB.1: 9
- FTA_TAB.1.1: 1
- FTA_TSE.1: 7
- FTA_TSE.1.1: 3
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 41
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 5
- FTP_TRP.1: 37
- FTP_TRP.1.1: 5
- FTP_TRP.1.2: 5
- FTP_TRP.1.3: 6
|
| pdf_data/st_keywords/cc_claims |
- O:
- O.AES: 7
- O.ECC: 6
- O.RND: 3
- O.RSA: 7
- O.TDES: 8
- T:
|
- A:
- A.AVAILABILI: 1
- A.AVAILABILITY: 2
- A.NO_GENER: 1
- A.NO_GENERAL_PURPOSE: 2
- A.NO_TOE_BY: 1
- A.NO_TOE_BYPASS: 2
- A.PHYSICAL: 3
- O:
- O.ADMIN_ROLE: 6
- O.AUDIT_GENER: 1
- O.AUDIT_GENERAT: 1
- O.AUDIT_GENERATION: 4
- O.AUDIT_PROTEC: 1
- O.AUDIT_PROTECT: 1
- O.AUDIT_PROTECTION: 3
- O.AUDIT_REVIE: 1
- O.AUDIT_REVIEW: 4
- O.CHANGE_MAN: 2
- O.CHANGE_MANA: 1
- O.CHANGE_MANAGEMENT: 4
- O.CORRECT_: 6
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTOGRAPH: 4
- O.CRYPTOGRAPHIC: 1
- O.CRYPTOGRAPHIC_: 2
- O.CRYPTOGRAPHIC_FUNCTIONS: 4
- O.CRYPTOGRAPHY: 1
- O.CRYPTOGRAPHY_: 2
- O.CRYPTOGRAPHY_VALIDATED: 1
- O.DISPLAY_BAN: 2
- O.DISPLAY_BANNE: 1
- O.DISPLAY_BANNER: 4
- O.DOCUMENT_KEY_LEAKAGE: 1
- O.FUNCTIONAL_TESTING: 1
- O.HA: 5
- O.INTEGRITY: 5
- O.MAINT_MODE: 6
- O.MANAGE: 6
- O.MANAGE_INFO: 1
- O.MANAGE_INFOR: 1
- O.MEDIATE: 7
- O.MEDIATE_INFO: 2
- O.MEDIATE_INFOR: 1
- O.MEDIATE_INFORMATION_FLOW: 2
- O.PEER_AUTHEN: 1
- O.PEER_AUTHENTI: 1
- O.PEER_AUTHENTICATION: 4
- O.PEER_AUTHENTICTION: 2
- O.PROTECT_IN_T: 1
- O.PROTECT_IN_TR: 1
- O.PROTECT_IN_TRANSIT: 3
- O.PROTOCOLS: 5
- O.REPLAY_DETE: 1
- O.REPLAY_DETECT: 1
- O.REPLAY_DETECTION: 5
- O.RESIDUAL_INF: 6
- O.RESIDUAL_INFO: 1
- O.RESIDUAL_INFORMATION: 8
- O.RESOURCE_SH: 1
- O.RESOURCE_SHA: 1
- O.RESOURCE_SHARING: 3
- O.ROBUST_ADMI: 2
- O.ROBUST_ADMIN_: 1
- O.ROBUST_ADMIN_GUIDANCE: 2
- O.ROBUST_TOE_: 4
- O.ROBUST_TOE_AC: 1
- O.ROBUST_TOE_ACCESS: 8
- O.SELF_PROTECT: 3
- O.SELF_PROTECTIO: 1
- O.SELF_PROTECTION: 5
- O.SOUND_DESIG: 2
- O.SOUND_DESIGN: 6
- O.SOUND_IMPLE: 1
- O.SOUND_IMPLEM: 1
- O.SOUND_IMPLEMENTATION: 3
- O.THOROUGH_: 1
- O.THOROUGH_FU: 2
- O.THOROUGH_FUNCTIONAL_: 2
- O.THOROUGH_FUNCTIONAL_TESTING: 2
- O.TIME_STAMPS: 4
- O.TRUSTED_PAT: 4
- O.TRUSTED_PATH: 7
- O.USER_GUIDAN: 2
- O.USER_GUIDANCE: 6
- O.VULNERABILIT: 4
- O.VULNERABILITY: 1
- O.VULNERABILITY_ANALYSIS_TEST: 7
- OE:
- OE.AVAILABILITY: 2
- OE.CRYPTANALYTIC: 4
- OE.NO_GENERAL_PURPO: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_TOE_BYPASS: 2
- OE.PHYSICAL: 2
- T:
- T.ADDRESS_M: 1
- T.ADDRESS_MASQUERADE: 2
- T.ADMIN_ERR: 1
- T.ADMIN_ERROR: 3
- T.ADMIN_ROG: 1
- T.ADMIN_ROGUE: 3
- T.AUDIT_: 1
- T.AUDIT_COMPROMISE: 2
- T.CRYPTO_: 1
- T.CRYPTO_COMPROMISE: 3
- T.EAVESDROP: 3
- T.FLAWED_DE: 1
- T.FLAWED_DESIGN: 2
- T.FLAWED_IM: 1
- T.FLAWED_IMPLEMENTATION: 2
- T.MALICIOUS_: 1
- T.MALICIOUS_TSF_: 2
- T.MASQUERA: 1
- T.MASQUERADE: 2
- T.NORECOVER: 1
- T.NORECOVERY: 3
- T.POOR_TEST: 3
- T.REPLAY: 3
- T.RESIDUAL_D: 1
- T.RESIDUAL_DATA: 2
- T.RESOURCE_: 1
- T.RESOURCE_EXHAUSTION: 2
- T.SPOOFING: 3
- T.UNATTENDE: 1
- T.UNATTENDED_SESSION: 2
- T.UNAUTHORI: 2
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_PEER: 2
- T.UNIDENTIFI: 1
- T.UNIDENTIFIED_ACTIONS: 2
- T.UNKNOWN_: 1
- T.UNKNOWN_STATE: 2
|
| pdf_data/st_keywords/vendor |
|
- Cisco:
- Cisco: 141
- Cisco Systems, Inc: 2
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 29
- Triple-DES: 3
- DES:
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- Brainpool:
- brainpoolP224r1: 3
- brainpoolP256r1: 1
- brainpoolP320r1: 3
- brainpoolP384r1: 1
- brainpoolP512r1: 1
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 7
- malfunction: 3
- physical tampering: 1
- SCA:
- Leak-Inherent: 5
- Physical Probing: 2
- physical probing: 4
- side channel: 1
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ISO:
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-67: 1
- RFC:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 38
- FIPS 180-2: 1
- FIPS PUB 140-2: 5
- NIST:
- NIST SP 800-56: 2
- NIST SP 800-57: 3
- SP 800-56: 2
- PKCS:
- PKCS#1: 2
- PKCS#12: 1
- PKCS#7: 2
- RFC:
- RFC 2404: 1
- RFC 2406: 5
- RFC 2409: 7
- RFC 2560: 1
- RFC 3280: 1
- RFC 3457: 4
- RFC 3547: 3
- RFC 792: 1
- RFC2409: 2
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /CreationDate: D:20230627103637+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20230627103637+02'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 780001
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
- /Author: Cisco
- /CreationDate: D:20110706125434
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110706125434
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 1521286
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 133
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |