Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Red Hat Enterprise Linux 9.4
CCEVS-VR-VID-11526-2025
IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
NSCIB-CC-196231-CR
name Red Hat Enterprise Linux 9.4 IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US NL
status active archived
not_valid_after 25.02.2027 19.11.2023
not_valid_before 25.02.2025 19.11.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-18-196231.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-196231-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-BAC-Lite]%202018_2000037746%20-%20Security%20Target%20Lite%20IDeal%20Pass%20v2.3-i%20JC%20(BAC%20Configuration)%20(v1.0,%202018-09-07).pdf
manufacturer Red Hat, Inc. Idemia
manufacturer_web https://www.redhat.com https://www.idemia.com
security_level {} ADV_TDS.4, ALC_CMS.5, ATE_DPT.3, ADV_INT.2, ADV_FSP.5, EAL4+, ALC_DVS.2, ALC_TAT.2
dgst f2266dfa9a9ef195 ce867531085e33f8
heuristics/cert_id CCEVS-VR-VID-11526-2025 NSCIB-CC-196231-CR
heuristics/cert_lab US
heuristics/cpe_matches cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.4_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2023-5633, CVE-2022-24805, CVE-2024-9676, CVE-2022-24807, CVE-2024-3049, CVE-2024-6387, CVE-2023-5992, CVE-2024-9675, CVE-2022-24809, CVE-2023-6606, CVE-2024-1488, CVE-2022-24806, CVE-2022-24808, CVE-2023-4911, CVE-2023-47038 {}
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 ALC_CMS.5, AVA_VAN.5, ADV_TDS.4, ATE_DPT.3, ALC_DVS.2, ADV_ARC.1, ADV_FSP.5, ADV_INT.2, ALC_TAT.2, ADV_SPM.1
heuristics/extracted_versions 9.4 2.3
heuristics/report_references/directly_referencing {} ANSSI-CC-2018/27, NSCIB-CC-195748-CR
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0782-2012, ANSSI-CC-2016/66, NSCIB-CC-195748-CR, BSI-DSZ-CC-0782-V3-2017, BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2017/59, ANSSI-CC-2018/27, BSI-DSZ-CC-0782-V2-2015
heuristics/scheme_data
heuristics/st_references/directly_referencing {} ANSSI-CC-2018/27
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27
heuristics/protection_profiles c40ae795865a0dba, ed9c9d74c3710878, 3d6ad6fde534f6c6 60455fc9564e2545
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf
pdf_data/cert_filename st_vid11526-ci.pdf Signed certificate CC-18-196231.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11526-2025: 1
  • NL:
    • CC-18-196231: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_DVS.2: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_DPT.3: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.M: 1
pdf_data/cert_keywords/eval_facility
  • Lightship:
    • Lightship Security: 1
  • BrightSight:
    • Brightsight: 1
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_keywords/standard_id
  • ICAO:
    • ICAO: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Producer: WeasyPrint 62.3
  • /Title: VID11526-FINAL CERT
  • pdf_file_size_bytes: 136330
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20181119163400+01'00'
  • /Creator: BHC364e
  • /ModDate: D:20181119163400+01'00'
  • /Producer: KONICA MINOLTA bizhub C364e
  • /Title: BHC364e-20181119163400
  • pdf_file_size_bytes: 202344
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11526-vr.pdf Certification Report NSCIB-CC-196231-CR.pdf
pdf_data/report_frontpage
  • NL:
  • US:
    • cert_id: CCEVS-VR-VID11526-2025
    • cert_item: for the Red Hat Enterprise Linux 9.4
    • cert_lab: US NIAP
  • NL:
    • cert_id: NSCIB-CC-196231-CR
    • cert_item: IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration
    • cert_lab: Brightsight
    • developer: IDEMIA
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11526-2025: 1
  • FR:
    • ANSSI-CC-2018/27: 1
  • NL:
    • CC-19-180045: 1
    • CC-195748: 2
    • NSCIB-CC-196231-CR: 12
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMS.5: 2
    • ALC_DVS.2: 2
    • ALC_TAT.2: 2
  • ATE:
    • ATE_DPT.3: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 1
  • Idemia:
    • IDEMIA: 6
  • Infineon:
    • Infineon: 3
pdf_data/report_keywords/eval_facility
  • Lightship:
    • Lightship Security: 5
  • BrightSight:
    • Brightsight: 2
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 5
    • SSHv2: 4
  • TLS:
    • TLS:
      • TLS: 6
      • TLSv1.2: 1
  • VPN:
    • VPN: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
  • Infineon:
    • v1.02.013: 4
pdf_data/report_keywords/vulnerability
  • ROCA:
    • ROCA: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • X509:
    • X.509: 1
  • ICAO:
    • ICAO: 6
  • ISO:
    • ISO/IEC 18013: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile and uses the: 1
    • out of scope: 1
  • OutOfScope:
    • of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. 2.5 Documentation The following documentation is: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: Wojcik, Robert C.
  • /CreationDate: D:20250228095622-05'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20250228095622-05'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 343345
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
  • /Author: p646
  • /CreationDate: D:20181120153406+01'00'
  • /Creator: PDFCreator Version 1.2.0
  • /Keywords:
  • /ModDate: D:20181120153406+01'00'
  • /Producer: GPL Ghostscript 9.0
  • /Subject:
  • /Title: Certification Report NSCIB-CC-196231-CR
  • pdf_file_size_bytes: 630780
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename st_vid11526-st.pdf [ST-BAC-Lite] 2018_2000037746 - Security Target Lite IDeal Pass v2.3-i JC (BAC Configuration) (v1.0, 2018-09-07).pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2018/27: 2
  • NL:
    • CC-1: 6
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0055-2009: 1
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-PP-0035: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 6
    • EAL4 augmented: 2
    • EAL5: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 4
    • ADV_INT.2: 4
    • ADV_SPM.1: 1
    • ADV_TDS.4: 4
  • AGD:
    • AGD_OPE: 10
    • AGD_PRE: 9
  • ALC:
    • ALC_CMS.5: 4
    • ALC_DVS.2: 5
    • ALC_TAT.2: 4
  • ATE:
    • ATE_DPT.3: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 6
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP: 31
    • FCS_COP.1: 4
    • FCS_RBG_EXT: 8
    • FCS_RBG_EXT.1: 6
    • FCS_SSHC_EXT.1: 6
    • FCS_SSHC_EXT.1.1: 1
    • FCS_SSHS_EXT.1: 7
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSH_EXT.1: 11
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
    • FCS_SSH_EXT.1.8: 1
    • FCS_STO_EXT.1: 5
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 5
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.3: 5
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.5: 5
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT.1: 4
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLS_EXT.1: 6
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_ACF_EXT.1: 5
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT.1: 1
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 4
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF_EXT.1: 4
    • FMT_SMF_EXT.1.1: 3
  • FPT:
    • FPT_ACF_EXT.1: 4
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT: 9
    • FPT_ASLR_EXT.1: 3
    • FPT_SBOP_EXT.1: 4
    • FPT_SBOP_EXT.1.1: 1
    • FPT_SRP_EXT.1: 4
    • FPT_SRP_EXT.1.1: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.2: 4
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTA:
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 6
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 7
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 30
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 51
    • FCS_COP.1: 9
    • FCS_RND: 9
    • FCS_RND.1: 13
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 4
    • FDP_ITC: 2
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_UCT.1: 11
    • FDP_UCT.1.1: 1
    • FDP_UIT: 1
    • FDP_UIT.1: 10
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_API: 16
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 16
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 4
    • FIA_UAU.6: 12
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 8
    • FMT_LIM.1: 18
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 4
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 35
    • FMT_MTD.1: 5
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS.1: 1
    • FPT_EMS.1.1: 1
    • FPT_EMS.1.2: 1
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.PLATFORM: 3
    • A.PROPER_: 2
    • A.PROPER_ADMIN: 2
    • A.PROPER_USER: 2
  • O:
    • O.ACCOUNTABILITY: 6
    • O.INTEGRITY: 6
    • O.MANAGEMENT: 6
    • O.PROTECTED_: 7
    • O.PROTECTED_COMMS: 2
    • O.PROTECTED_STORAGE: 1
  • OE:
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
  • T:
    • T.LIMITED_: 2
    • T.LOCAL_: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_: 3
    • T.NETWORK_ATTACK: 5
    • T.NETWORK_EAVESDROP: 2
  • A:
    • A.MRTD_: 1
  • OE:
    • OE.AA_MRTD: 6
    • OE.MRTD_: 2
pdf_data/st_keywords/vendor
  • Idemia:
    • IDEMIA: 16
  • Infineon:
    • Infineon: 22
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-: 1
      • AES-256: 1
      • AES256: 1
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 11
      • AES-: 1
      • AES-128: 1
  • DES:
    • 3DES:
      • 3DES: 7
      • Triple-DES: 13
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CMAC: 4
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 1
  • RSA:
    • RSA 2048: 6
    • RSA 3072: 1
    • RSA 4096: 1
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 12
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 6
      • SHA-384: 4
      • SHA-512: 7
      • SHA256: 8
      • SHA384: 2
      • SHA512: 2
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 1
    • SHA2:
      • SHA-2: 2
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 2
      • SHA-512: 1
      • SHA224: 1
      • SHA256: 1
      • SHA384: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 3
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 24
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 71
    • SSHv2: 5
  • TLS:
    • DTLS:
      • DTLS: 1
    • TLS:
      • TLS: 44
      • TLS 1.1: 1
      • TLS 1.2: 1
      • TLSv1.2: 2
  • VPN:
    • VPN: 1
  • PACE:
    • PACE: 16
  • PGP:
    • PGP: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 12
  • RNG:
    • RBG: 2
  • RNG:
    • RND: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 2
  • CBC:
    • CBC: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-384: 10
    • P-521: 10
    • secp384r1: 2
    • secp521r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 10
  • Infineon:
    • v1.02.013: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 7
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 4
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 9
    • EF.DG1: 27
    • EF.DG13: 4
    • EF.DG14: 3
    • EF.DG15: 8
    • EF.DG16: 27
    • EF.DG2: 10
    • EF.DG3: 7
    • EF.DG4: 6
    • EF.DG5: 8
    • EF.SOD: 9
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 186-4: 2
    • FIPS PUB 180-4: 2
    • FIPS PUB 186-4: 6
    • FIPS PUB 198-1: 1
    • FIPS186-4: 6
  • NIST:
    • NIST SP 800-38A: 3
    • NIST SP 800-38D: 2
    • NIST SP 800-56A: 2
    • NIST SP 800-57: 2
    • NIST SP 800-90A: 2
  • RFC:
    • RFC 4251: 1
    • RFC 4252: 2
    • RFC 4253: 3
    • RFC 4344: 1
    • RFC 5246: 1
    • RFC 5280: 4
    • RFC 5288: 2
    • RFC 5289: 4
    • RFC 5647: 1
    • RFC 5656: 10
    • RFC 6066: 1
    • RFC 6125: 1
    • RFC 6668: 2
    • RFC 8268: 4
    • RFC 8332: 6
  • X509:
    • X.509: 5
  • BSI:
    • AIS31: 4
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-4: 2
    • FIPS 46-3: 2
    • FIPS PUB 197: 1
    • FIPS46: 1
  • ICAO:
    • ICAO: 20
  • ISO:
    • ISO/IEC 14443: 6
    • ISO/IEC 18013: 6
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
    • ISO/IEC15946-2: 1
  • RFC:
    • RFC 5639: 1
    • RFC-5639: 1
    • RFC3369: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
  • OutOfScope:
    • of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security features: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Milad Torabi
  • /CreationDate: D:20250127134212-08'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20250127134212-08'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: Red Hat Enterprise Linux 9.4
  • /Title: Red Hat
  • pdf_file_size_bytes: 644575
  • pdf_hyperlinks: mailto:[email protected], https://www.lightshipsec.com/, https://access.redhat.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 53
  • /Author: IDEMIA
  • /CreationDate: D:20180907132327+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: NSCIB-CC-196231, ASE Lite, ICAO, ePassport, BAC
  • /ModDate: D:20180907132327+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: ASE Lite 2018_2000037746, v1.0, 2018-09-07
  • /Title: Security Target Lite IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
  • pdf_file_size_bytes: 1486764
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 102
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different