Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Red Hat Enterprise Linux 9.4
CCEVS-VR-VID-11526-2025
Samsung SSP01 of S5E9830 with Specific IC Dedicated Software Revision 1.1
2018-59-INF-3424
name Red Hat Enterprise Linux 9.4 Samsung SSP01 of S5E9830 with Specific IC Dedicated Software Revision 1.1
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US ES
not_valid_after 25.02.2027 18.03.2026
not_valid_before 25.02.2025 18.03.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-59%20CCRA.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-59%20INF-3424.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-59%20ST_lite.pdf
manufacturer Red Hat, Inc. Samsung Electronics Co., Ltd.
manufacturer_web https://www.redhat.com https://www.samsung.com
security_level {} EAL5+, ALC_DVS.2, AVA_VAN.5
dgst f2266dfa9a9ef195 8070163bf63b0e18
heuristics/cert_id CCEVS-VR-VID-11526-2025 2018-59-INF-3424
heuristics/cert_lab US []
heuristics/cpe_matches cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.4_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2023-5633, CVE-2022-24805, CVE-2024-9676, CVE-2022-24807, CVE-2024-3049, CVE-2024-6387, CVE-2023-5992, CVE-2024-9675, CVE-2022-24809, CVE-2023-6606, CVE-2024-1488, CVE-2022-24806, CVE-2022-24808, CVE-2023-4911, CVE-2023-47038 {}
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 9.4 1.1
heuristics/scheme_data
  • category: Smart Cards and similiar devices
  • certification_date: 18.03.2021
  • enhanced:
    • category: Smart Cards and similiar devices
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1100
    • certification_date: 18.03.2021
    • description: The Target of Evaluation (TOE), the SSP01 of S5E9830 with Specific IC Dedicated Software Revision 1.1 secure subsystem, is a Hard macro instantiated within an SOC which is composed of a processing unit, security components, hardware circuit for testing purpose during the manufacturing process and volatile and non-volatile memories (hardware). The main security features of the TOE are: Security sensors or detectors including High and Low Temperature detectors, High and Low Supply Voltage detectors, Supply Voltage Glitch detector and Laser detector Active Shields against physical intrusive attacks Dedicated hardware mechanisms against side-channel attacks Secure TDES and AES Symmetric Cryptography support PARITY/ CRC-32 calculators One Hardware Digital True Random Number Generator (DTRNG) that fulfills Test Procedure A specified by AIS31 standard. The IC Dedicated Software includes: DTRNG library built around Hardware DTRNG together with corresponding DTRNG application notes. This library fulfills the criteria of Test Procedure A specified by AIS31 standard. Secure Boot Loader is a loader for copying the embedded software from an external FLASH storage into the internal SRAM.
    • evaluation_facility: Applus Laboratories
    • level: EAL5 + ALC_DVS.2 + AVA_VAN.5
    • manufacturer: Samsung Electronics Co., Ltd
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1101
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1099
    • type: Product
  • manufacturer: Samsung Electronics Co., Ltd
  • product: Samsung SSP01 of S5E9830 with Specific IC Dedicated Software Revision 1.1
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/655-samsung-ssp01-of-s5e9830-with-specific-ic-dedicated-software-revision-1-1
heuristics/protection_profiles c40ae795865a0dba, ed9c9d74c3710878, 3d6ad6fde534f6c6 cf0f01bcd7be3e9c
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename st_vid11526-ci.pdf 2018-59 CCRA.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11526-2025: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/cert_keywords/eval_facility
  • Lightship:
    • Lightship Security: 1
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_metadata
  • /Producer: WeasyPrint 62.3
  • /Title: VID11526-FINAL CERT
  • pdf_file_size_bytes: 136330
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 729339
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid11526-vr.pdf 2018-59 INF-3424.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID11526-2025
    • cert_item: for the Red Hat Enterprise Linux 9.4
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11526-2025: 1
  • ES:
    • 2018-59-INF-3424- v1: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL5: 8
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 8
    • ALC_FLR: 3
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 9
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_COP: 2
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACF: 1
    • FDP_IFC.1: 1
    • FDP_SDC.1: 1
    • FDP_SDR.1: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_API.1: 1
  • FMT:
    • FMT_LIM: 4
    • FMT_MSA.1: 1
    • FMT_SMF.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_PHP.3: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 1
  • Samsung:
    • Samsung: 9
pdf_data/report_keywords/eval_facility
  • Lightship:
    • Lightship Security: 5
  • Applus:
    • Applus Laboratories: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • TDES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-512: 1
      • SHA384: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 5
    • SSHv2: 4
  • TLS:
    • TLS:
      • TLS: 6
      • TLSv1.2: 1
  • VPN:
    • VPN: 2
pdf_data/report_keywords/randomness
  • TRNG:
    • DTRNG: 9
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • side-channel: 1
  • other:
    • JIL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • X509:
    • X.509: 1
  • BSI:
    • AIS31: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile and uses the: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: Wojcik, Robert C.
  • /CreationDate: D:20250228095622-05'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20250228095622-05'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 343345
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename st_vid11526-st.pdf 2018-59 ST_lite.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084: 1
    • BSI-CC-PP-0084-: 1
    • BSI-PP-0084: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL5: 6
    • EAL5 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 5
    • ADV_FSP: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
    • ADV_VAN: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 2
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 11
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 6
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP: 31
    • FCS_COP.1: 4
    • FCS_RBG_EXT: 8
    • FCS_RBG_EXT.1: 6
    • FCS_SSHC_EXT.1: 6
    • FCS_SSHC_EXT.1.1: 1
    • FCS_SSHS_EXT.1: 7
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSH_EXT.1: 11
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
    • FCS_SSH_EXT.1.8: 1
    • FCS_STO_EXT.1: 5
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 5
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.3: 5
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.5: 5
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT.1: 4
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLS_EXT.1: 6
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_ACF_EXT.1: 5
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT.1: 1
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 4
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF_EXT.1: 4
    • FMT_SMF_EXT.1.1: 3
  • FPT:
    • FPT_ACF_EXT.1: 4
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT: 9
    • FPT_ASLR_EXT.1: 3
    • FPT_SBOP_EXT.1: 4
    • FPT_SBOP_EXT.1.1: 1
    • FPT_SRP_EXT.1: 4
    • FPT_SRP_EXT.1.1: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.2: 4
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTA:
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 6
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 1
    • FAU_SAS: 8
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.4: 5
    • FCS_COP: 15
    • FCS_COP.1: 9
    • FCS_RNG: 6
    • FCS_RNG.1: 15
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 8
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 1
    • FDP_ACF: 11
    • FDP_ACF.1: 19
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 23
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_ITT: 1
    • FDP_ITT.1: 18
    • FDP_ITT.1.1: 1
    • FDP_SDC: 4
    • FDP_SDC.1: 14
    • FDP_SDC.1.1: 2
    • FDP_SDI: 1
    • FDP_SDI.1: 2
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_SDR: 5
    • FDP_SDR.1: 11
    • FDP_SDR.1.1: 2
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 6
    • FIA_API.1: 12
    • FIA_API.1.1: 2
  • FMT:
    • FMT_LIM: 82
    • FMT_LIM.1: 12
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 11
    • FMT_LIM.2.1: 1
    • FMT_MSA: 2
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_ETD: 1
    • FPT_FLS: 1
    • FPT_FLS.1: 21
    • FPT_FLS.1.1: 1
    • FPT_ITT: 1
    • FPT_ITT.1: 16
    • FPT_ITT.1.1: 1
    • FPT_PHP: 2
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT: 1
    • FRU_FLT.1: 1
    • FRU_FLT.2: 16
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.PLATFORM: 3
    • A.PROPER_: 2
    • A.PROPER_ADMIN: 2
    • A.PROPER_USER: 2
  • O:
    • O.ACCOUNTABILITY: 6
    • O.INTEGRITY: 6
    • O.MANAGEMENT: 6
    • O.PROTECTED_: 7
    • O.PROTECTED_COMMS: 2
    • O.PROTECTED_STORAGE: 1
  • OE:
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
  • T:
    • T.LIMITED_: 2
    • T.LOCAL_: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_: 3
    • T.NETWORK_ATTACK: 5
    • T.NETWORK_EAVESDROP: 2
  • O:
    • O.AES: 5
    • O.MEM_ACCESS: 1
    • O.RND: 6
    • O.TDES: 7
  • T:
    • T.RND: 5
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 18
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-: 1
      • AES-256: 1
      • AES256: 1
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 27
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 14
      • Triple-DES: 6
    • DES:
      • DES: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 1
  • RSA:
    • RSA 2048: 6
    • RSA 3072: 1
    • RSA 4096: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 6
      • SHA-384: 4
      • SHA-512: 7
      • SHA256: 8
      • SHA384: 2
      • SHA512: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 3
  • KEX:
    • Key Exchange: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 71
    • SSHv2: 5
  • TLS:
    • DTLS:
      • DTLS: 1
    • TLS:
      • TLS: 44
      • TLS 1.1: 1
      • TLS 1.2: 1
      • TLSv1.2: 2
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 12
  • RNG:
    • RBG: 2
  • RNG:
    • RND: 11
    • RNG: 1
  • TRNG:
    • DTRNG: 23
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 2
  • ECB:
    • ECB: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-384: 10
    • P-521: 10
    • secp384r1: 2
    • secp521r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 10
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 26
    • malfunction: 10
    • physical tampering: 2
  • SCA:
    • DPA: 3
    • Leak-Inherent: 21
    • Physical Probing: 4
    • Physical probing: 2
    • SPA: 2
    • physical probing: 8
    • side-channel: 2
    • timing attacks: 1
  • other:
    • reverse engineering: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 186-4: 2
    • FIPS PUB 180-4: 2
    • FIPS PUB 186-4: 6
    • FIPS PUB 198-1: 1
    • FIPS186-4: 6
  • NIST:
    • NIST SP 800-38A: 3
    • NIST SP 800-38D: 2
    • NIST SP 800-56A: 2
    • NIST SP 800-57: 2
    • NIST SP 800-90A: 2
  • RFC:
    • RFC 4251: 1
    • RFC 4252: 2
    • RFC 4253: 3
    • RFC 4344: 1
    • RFC 5246: 1
    • RFC 5280: 4
    • RFC 5288: 2
    • RFC 5289: 4
    • RFC 5647: 1
    • RFC 5656: 10
    • RFC 6066: 1
    • RFC 6125: 1
    • RFC 6668: 2
    • RFC 8268: 4
    • RFC 8332: 6
  • X509:
    • X.509: 5
  • BSI:
    • AIS31: 7
  • CC:
    • CCMB-2017-04-001: 6
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 197: 1
    • FIPS PUB 180-3: 3
    • FIPS197: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Milad Torabi
  • /CreationDate: D:20250127134212-08'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20250127134212-08'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: Red Hat Enterprise Linux 9.4
  • /Title: Red Hat
  • pdf_file_size_bytes: 644575
  • pdf_hyperlinks: mailto:[email protected], https://www.lightshipsec.com/, https://access.redhat.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 53
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 1094224
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 91
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different