Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure
ISCB-3-RPT-C123-CR-v1
SUSE Linux Enterprise Server 15 SP2
BSI-DSZ-CC-1151-2021
name YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure SUSE Linux Enterprise Server 15 SP2
category Data Protection Operating Systems
scheme MY DE
not_valid_after 17.02.2027 08.07.2026
not_valid_before 17.02.2022 08.07.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C123-CERTIFICATE-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1151c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-3-RPT-C123-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1151a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/YOUTECH256SKI%20Security%20Target-1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1151b_pdf.pdf
manufacturer You Tech Solutions Sdn Bhd SUSE Linux Products Gmbh
manufacturer_web https://www.youtech.com.my https://www.suse.com/
security_level EAL2 EAL4+, ALC_FLR.3
dgst f43b594a6bd62ea6 7cb27850ab09a7a8
heuristics/cert_id ISCB-3-RPT-C123-CR-v1 BSI-DSZ-CC-1151-2021
heuristics/cert_lab [] BSI
heuristics/cpe_matches {} cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:ltss:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:business_critical_linux:-:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:15:sp3:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:sap:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:15:sp3:*:*:*:sap:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:-:*:*
heuristics/related_cves {} CVE-2018-17962, CVE-2020-8025, CVE-2002-20001, CVE-2023-29552, CVE-2022-27239, CVE-2019-18897, CVE-2020-15706, CVE-2023-23005, CVE-2018-12116, CVE-2019-18903, CVE-2020-15705, CVE-2021-4034, CVE-2019-18901, CVE-2019-18902, CVE-2020-8013, CVE-2021-45082, CVE-2020-15707, CVE-2018-20105, CVE-2018-12122
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 2.5, 9.78 15
heuristics/scheme_data
heuristics/protection_profiles {} 70cdc8b0cf910af7
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0067b_pdf.pdf
pdf_data/cert_filename ISCB-5-CERT-C123-CERTIFICATE-v1.pdf 1151c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1151-2021: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0067-2010: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 4 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20220303132121+08'00'
  • /Creator: ISCB Printer
  • /ModDate: D:20220303132121+08'00'
  • /Producer: KONICA MINOLTA bizhub C360i
  • /Title: SISCB Print22030313210
  • pdf_file_size_bytes: 93221
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20210713065016+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Linux-basiertes Betriebssystem, Operating System Protection Profile, Virtualization"
  • /ModDate: D:20210713071716+02'00'
  • /Producer: LibreOffice 6.3
  • /Subject: SUSE Linux EnterpriseServer 15 SP2
  • /Title: Certificate BSI-DSZ-CC-1151-2021
  • pdf_file_size_bytes: 248027
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename ISCB-3-RPT-C123-CR-v1.pdf 1151a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.3
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1151-2021
    • cert_item: SUSE Linux Enterprise Server Version 15 SP2
    • cert_lab: BSI
    • developer: SUSE Software Solutions Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Operating System Protection Profile, Version 2.0, 01 June 2010, BSI-CC-PP-0067-2010, OSPP Extended Package – Advanced Management, Version 2.0, 28 May 2010, OSPP Extended Package – Advanced Audit, Version 2.0, 28 May 2010, OSPP Extended Package – Virtualization, Version 2.0, 28 May 2010
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-3-RPT-C123-CR-v1: 31
  • DE:
    • BSI-DSZ-CC-1151-2021: 21
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0067-: 1
    • BSI-CC-PP-0067-2010: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL2: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL4+: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 3
    • ALC_FLR.3: 4
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RNG.1: 3
  • FTP:
    • FTP_ITC.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.IDLE: 1
    • A.USER: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • AES_competition:
    • AES:
      • AES: 14
  • constructions:
    • MAC:
      • HMAC: 18
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 11
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 3
  • PBKDF:
    • PBKDF2: 4
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 1
    • SHA2:
      • SHA-2: 3
      • SHA-256: 8
      • SHA-384: 8
      • SHA-512: 4
pdf_data/report_keywords/crypto_scheme
  • AEAD:
    • AEAD: 1
  • KA:
    • Key agreement: 1
  • KEX:
    • Key Exchange: 9
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 12
    • IKEv1: 2
    • IKEv2: 22
  • IPsec:
    • IPsec: 11
  • SSH:
    • SSH: 17
    • SSHv2: 3
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 3
  • XTS:
    • XTS: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • NIST P-256: 1
    • NIST P-384: 1
    • P-256: 13
    • P-384: 13
    • P-521: 6
pdf_data/report_keywords/crypto_library
  • NSS:
    • NSS: 1
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • Reverse Engineering: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 2
    • AIS 23: 1
    • AIS 32: 1
  • FIPS:
    • FIPS 186-4: 5
    • FIPS180-4: 14
    • FIPS186-4: 4
    • FIPS197: 3
    • FIPS198-1: 3
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • NIST:
    • SP 800-38A: 2
    • SP 800-38E: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 4253: 1
    • RFC 5996: 1
    • RFC2104: 3
    • RFC2404: 2
    • RFC2898: 1
    • RFC3447: 6
    • RFC3526: 2
    • RFC3602: 2
    • RFC3686: 1
    • RFC4106: 2
    • RFC4251: 2
    • RFC4252: 4
    • RFC4253: 9
    • RFC4303: 2
    • RFC4306: 3
    • RFC4307: 4
    • RFC4309: 2
    • RFC4344: 2
    • RFC4419: 2
    • RFC4595: 2
    • RFC4754: 2
    • RFC4868: 3
    • RFC5116: 3
    • RFC5282: 3
    • RFC5647: 2
    • RFC5656: 3
    • RFC5903: 3
    • RFC5930: 2
    • RFC5996: 7
    • RFC6668: 2
    • RFC7427: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Server 15, 16 November 2020 [11] Configuration list for the TOE, 10 June 2021, MASTER CM List (confidential document) 28 / 39 BSI-DSZ-CC-1151-2021 Certification Report C. Excerpts from the Criteria For the meaning: 1
    • Version 7, 02 July 2021, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) 7 specifically • AIS 1, Version 14, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /CreationDate: D:20220226075203Z00'00'
  • /Creator: Word
  • /ModDate: D:20220226075203Z00'00'
  • /Producer: macOS Version 11.6 (Build 20G165) Quartz PDFContext
  • /Title: ISCB-3-RPT-C123-CR-v1
  • pdf_file_size_bytes: 1101004
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 32
pdf_data/st_filename YOUTECH256SKI Security Target-1.0.pdf 1151b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1151: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 2
  • EAL:
    • EAL4: 3
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 5
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 18
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 8
    • FCS_COP.1: 6
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 6
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.3: 4
  • FPT:
    • FPT_STM.1: 3
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 9
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 8
    • FAU_STG.3.1: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 56
    • FCS_CKM.1.1: 5
    • FCS_CKM.2: 23
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 16
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 25
    • FCS_COP.1.1: 2
    • FCS_RNG: 2
    • FCS_RNG.1: 29
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 4
  • FDP:
    • FDP_ACC.1: 37
    • FDP_ACC.1.1: 3
    • FDP_ACC.2: 19
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 41
    • FDP_ACF.1.1: 5
    • FDP_ACF.1.2: 5
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 5
    • FDP_CDP: 5
    • FDP_CDP.1: 14
    • FDP_CDP.1.1: 2
    • FDP_ETC.2: 7
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 10
    • FDP_IFC.2: 20
    • FDP_IFC.2.1: 2
    • FDP_IFC.2.2: 2
    • FDP_IFF.1: 28
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_ITC.1: 1
    • FDP_ITC.2: 17
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 2
    • FDP_ITC.2.3: 2
    • FDP_ITC.2.4: 2
    • FDP_ITC.2.5: 2
    • FDP_RIP.2: 13
    • FDP_RIP.2.1: 1
    • FDP_RIP.3: 13
    • FDP_RIP.3.1: 1
    • FDP_UCT: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 20
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 12
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
    • FIA_USB.2: 7
    • FIA_USB.2.1: 1
    • FIA_USB.2.2: 1
    • FIA_USB.2.3: 1
    • FIA_USB.2.4: 1
  • FMT:
    • FMT_MSA.1: 48
    • FMT_MSA.1.1: 5
    • FMT_MSA.3: 51
    • FMT_MSA.3.1: 7
    • FMT_MSA.3.2: 7
    • FMT_MSA.4: 6
    • FMT_MSA.4.1: 1
    • FMT_MTD.1: 142
    • FMT_MTD.1.1: 21
    • FMT_REV.1: 15
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 34
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 43
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 22
    • FPT_TDC.1.1: 2
    • FPT_TDC.1.2: 2
  • FTA:
    • FTA_SSL.1: 7
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 7
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.IDLE: 2
    • A.USER: 3
  • O:
    • O.AUDIT: 4
    • O.DATA: 4
  • OE:
    • OE.IDLE: 4
    • OE.USER: 4
  • T:
    • T.AUDIT: 2
    • T.DATA: 2
    • T.SESSIONHIJACK: 3
  • A:
    • A.AUTHUSER: 3
    • A.CONNECT: 5
    • A.DETECT: 3
    • A.IT: 3
    • A.KEYS: 3
    • A.MANAGE: 5
    • A.PEER: 6
    • A.PHYSICAL: 4
    • A.TRAINEDUSER: 3
  • O:
    • O.ANALYZE_AUDIT: 5
    • O.AUDITING: 15
    • O.COMP: 31
    • O.CP: 17
    • O.CRYPTO: 18
    • O.DISCRETIONARY: 11
    • O.MANAGE: 26
    • O.NETWORK: 13
    • O.REMOTE_AUDIT: 8
    • O.ROLE: 17
    • O.SUBJECT: 11
    • O.TRUSTED_CHANNEL: 5
  • OE:
    • OE.ADMIN: 6
    • OE.INFO_PROTECT: 9
    • OE.INSTALL: 4
    • OE.IT: 4
    • OE.MAINTENANCE: 3
    • OE.PHYSICAL: 3
    • OE.RECOVER: 4
    • OE.REMOTE: 4
    • OE.TRUSTED: 5
  • T:
    • T.ACCESS: 25
    • T.COMM: 4
    • T.IA: 6
    • T.INFOFLOW: 4
    • T.RESTRICT: 3
    • T.ROLE: 6
    • T.UNOBSERVED_AUDIT: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 120
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
  • AES_competition:
    • AES:
      • AES: 21
      • AES-256: 1
      • AES128: 1
      • AES256: 1
  • DES:
    • 3DES:
      • Triple-DES: 1
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 12
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 20
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 21
    • DSA:
      • DSA: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 6
  • PBKDF:
    • PBKDF2: 5
  • SHA:
    • SHA1:
      • SHA-1: 6
      • SHA1: 1
    • SHA2:
      • SHA-2: 7
      • SHA-256: 5
      • SHA-384: 4
      • SHA-512: 4
      • SHA256: 1
      • SHA384: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 6
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 19
    • IKEv1: 1
    • IKEv2: 19
  • IPsec:
    • IPsec: 3
  • SSH:
    • SSH: 57
    • SSHv2: 8
  • TLS:
    • SSL:
      • SSL: 27
    • TLS:
      • TLS: 3
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 2
  • RNG:
    • RNG: 12
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 6
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 7
  • XTS:
    • XTS: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 4
    • P-521: 4
    • curve P-256: 2
    • curve P-384: 2
    • curve P-521: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 7
  • libgcrypt:
    • libgcrypt: 3
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 2
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
  • FIPS:
    • FIPS 140-2: 5
    • FIPS PUB 186-3: 2
    • FIPS PUB 186-4: 4
    • FIPS197: 2
  • RFC:
    • RFC 2460: 1
    • RFC 3484: 1
    • RFC 3542: 1
    • RFC 4213: 1
    • RFC 4252: 4
    • RFC 4253: 3
    • RFC 768: 1
    • RFC 791: 2
    • RFC 792: 1
    • RFC 793: 1
    • RFC2409: 2
    • RFC3526: 3
    • RFC3602: 3
    • RFC4106: 4
    • RFC4252: 6
    • RFC4253: 13
    • RFC4301: 4
    • RFC4303: 5
    • RFC4306: 4
    • RFC4307: 5
    • RFC4309: 4
    • RFC4419: 2
    • RFC4753: 2
    • RFC5114: 3
    • RFC5647: 2
    • RFC5656: 4
    • RFC6668: 2
    • RFC6954: 3
    • RFC7296: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • FCS_CKM.4 is not applicable for TOE requirement due to out of scope. FCS_CKM.4 is not applicable as the key management is out of scope. FAU_GEN.1 FPT_STM.1 No FPT_STM: 1
    • Yes - FCS_CKM.1 FCS_COP.1 FCS_CKM.4 Partial, FCS_CKM.4 is not applicable for TOE requirement due to out of scope. FCS_CKM.4 is not applicable as the key management is out of scope. FCS_COP.1 FCS_CKM.1 FCS_CKM.4: 1
    • out of scope: 4
  • OutOfScope:
    • DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
    • PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation: 1
    • as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also: 1
    • out of scope: 3
pdf_data/st_metadata
  • /Author: wlim
  • /CreationDate: D:20211127064514+08'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20211127064514+08'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure Security Target
  • /Title: YOUTech256SKI Token (v2.5) and YOUTech256SKI Cipher System (v9.78 build 504) with Secret Key Infrastructure Security Target
  • pdf_file_size_bytes: 637188
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 27
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different