Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Kaspersky Endpoint Security 10 for Windows with Kaspersky Full Disk Encryption 3.0 version 10.3.0.6294 AES256
2014-40-INF-2261
Juniper Junos OS 18.1R2 for QFX10002, QFX10008 and QFX10016
CCEVS-VR-VID-10930-2019
name Kaspersky Endpoint Security 10 for Windows with Kaspersky Full Disk Encryption 3.0 version 10.3.0.6294 AES256 Juniper Junos OS 18.1R2 for QFX10002, QFX10008 and QFX10016
category Other Devices and Systems Network and Network-Related Devices and Systems
scheme ES US
not_valid_after 24.04.2023 28.01.2021
not_valid_before 24.04.2018 28.01.2019
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-CCRA.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10930-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-INF-2261%20v3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10930-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10930-st.pdf
manufacturer Kaspersky Lab UK Ltd. Juniper Networks, Inc.
manufacturer_web https://www.kaspersky.co.uk/ https://www.juniper.net/
security_level EAL2+, ALC_FLR.1 {}
dgst f44160f29ebcdda3 1c43338984269361
heuristics/cert_id 2014-40-INF-2261 CCEVS-VR-VID-10930-2019
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*
heuristics/related_cves {} CVE-2020-1671, CVE-2020-1603, CVE-2021-0204, CVE-2023-36840, CVE-2019-0036, CVE-2023-36841, CVE-2021-0211, CVE-2018-0048, CVE-2021-0218, CVE-2018-0045, CVE-2023-36839, CVE-2020-1629, CVE-2019-0053, CVE-2022-22238, CVE-2021-31374, CVE-2022-22181, CVE-2023-28963, CVE-2021-0219, CVE-2020-1641, CVE-2020-1664, CVE-2018-0031, CVE-2023-44197, CVE-2023-44201, CVE-2021-0223, CVE-2024-21594, CVE-2019-0073, CVE-2021-0240, CVE-2014-9708, CVE-2021-0214, CVE-2020-1613, CVE-2021-0229, CVE-2019-0047, CVE-2021-0261, CVE-2021-0241, CVE-2020-1601, CVE-2021-0260, CVE-2019-0061, CVE-2022-22244, CVE-2020-1625, CVE-2021-0210, CVE-2024-39549, CVE-2020-1656, CVE-2023-0026, CVE-2023-28962, CVE-2024-39514, CVE-2020-1630, CVE-2021-31377, CVE-2020-1657, CVE-2023-28979, CVE-2022-22241, CVE-2021-0255, CVE-2022-22243, CVE-2020-1644, CVE-2023-44186, CVE-2020-1647, CVE-2020-1606, CVE-2023-36842, CVE-2004-0468, CVE-2023-44194, CVE-2019-0031, CVE-2024-21591, CVE-2019-0049, CVE-2019-0046, CVE-2021-0250, CVE-2021-0282, CVE-2020-10188, CVE-2020-1619, CVE-2023-44185, CVE-2020-1632, CVE-2021-0258, CVE-2020-1684, CVE-2022-22179, CVE-2024-39528, CVE-2018-0058, CVE-2022-22215, CVE-2023-28975, CVE-2022-22242, CVE-2018-0056, CVE-2021-31372, CVE-2019-0062, CVE-2021-0268, CVE-2021-0281, CVE-2018-15504, CVE-2024-39558, CVE-2023-44182, CVE-2020-1672, CVE-2021-0215, CVE-2023-44184, CVE-2022-22224, CVE-2024-39556, CVE-2021-0244, CVE-2020-1600, CVE-2019-0059, CVE-2022-22220, CVE-2023-4481, CVE-2021-0245, CVE-2020-1673, CVE-2021-31375, CVE-2021-0256, CVE-2021-0283, CVE-2020-1607, CVE-2022-22245, CVE-2023-44178, CVE-2021-0208, CVE-2024-30397, CVE-2023-22395, CVE-2020-1653, CVE-2022-22246, CVE-2018-0057, CVE-2020-1643, CVE-2021-0275, CVE-2019-0039, CVE-2019-0012, CVE-2023-44176, CVE-2023-22407, CVE-2021-0221, CVE-2024-39555, CVE-2020-1687, CVE-2020-1631, CVE-2024-30380, CVE-2022-22208, CVE-2019-0035, CVE-2024-39511, CVE-2022-22154, CVE-2023-44175, CVE-2018-15505, CVE-2021-0277, CVE-2023-22406, CVE-2023-28964, CVE-2023-44177, CVE-2004-0230, CVE-2024-39517, CVE-2022-22156, CVE-2021-0254, CVE-2021-31362, CVE-2020-1654, CVE-2020-1637, CVE-2019-0019, CVE-2022-22173, CVE-2019-0037, CVE-2021-0269, CVE-2022-22250, CVE-2023-36843, CVE-2021-0224, CVE-2023-22391, CVE-2021-31378
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1
heuristics/extracted_versions 10.3.0.6294, 3.0 18.1
heuristics/scheme_data
  • category: Network Device
  • certification_date: 28.01.2019
  • evaluation_facility: Acumen Security
  • expiration_date: 28.01.2021
  • id: CCEVS-VR-VID10930
  • product: Juniper Junos OS 18.1R2 for QFX10002, QFX10008 and QFX10016
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10930
  • vendor: Juniper Networks, Inc.
heuristics/protection_profiles {} 48ac4778e4272298
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf
pdf_data/cert_filename 2014-40-CCRA.pdf st_vid10930-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10930-2019: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL2 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
pdf_data/cert_keywords/cc_claims
  • T:
    • T.I: 1
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES256: 2
pdf_data/cert_metadata
  • /CreationDate: D:20180426105026+02'00'
  • pdf_file_size_bytes: 841525
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20190130140323-05'00'
  • /ModDate: D:20190130140323-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181078
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 2014-40-INF-2261 v3.pdf st_vid10930-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10930-2019
    • cert_item: for the Junos OS 18.1R2 for QFX10002, QFX10008 and QFX100016, Version 1.1
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2014-40-INF-2261 v3: 1
  • US:
    • CCEVS-VR-VID10930-2019: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 6
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 2
    • ALC_FLR.1: 5
    • ALC_FLR.2: 1
  • ASE:
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 1
    • FCS_COP.1: 4
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF.1: 3
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
  • FIA:
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MSA.1: 4
    • FMT_MSA.3: 4
    • FMT_MTD.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALIT: 2
    • T.UNAUTHORIZED_ADMINI: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNIC: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 8
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES256: 9
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 3
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 5
    • SSHv2: 1
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_metadata
  • /CreationDate: D:20190130140026-05'00'
  • /ModDate: D:20190130140026-05'00'
  • pdf_file_size_bytes: 730975
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
pdf_data/st_filename 2014-40-ST.pdf st_vid10930-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2+: 1
    • EAL2: 7
    • EAL2 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 8
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 25
    • FCS_CKM.2: 2
    • FCS_CKM.4: 18
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 33
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 37
    • FDP_ACF.1: 35
    • FDP_IFC.1: 13
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 8
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
  • FIA:
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 40
    • FMT_MSA.3: 42
    • FMT_MTD.1: 16
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 5
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT: 2
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 18
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 8
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP: 29
    • FCS_COP.1: 6
    • FCS_DTLS: 1
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 7
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT.1: 4
    • FCS_SSHC_EXT.1.8: 2
    • FCS_SSHC_EXT.1.9: 1
    • FCS_SSHS_EXT: 2
    • FCS_SSHS_EXT.1: 8
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 3
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 3
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 3
    • FCS_TLSC_EXT: 1
    • FCS_TLSC_EXT.1: 1
    • FCS_TLSC_EXT.1.1: 2
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.2: 1
    • FCS_TLSC_EXT.2.1: 2
    • FCS_TLSC_EXT.2.2: 1
    • FCS_TLSS_EXT.1: 1
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLSS_EXT.2: 3
    • FCS_TLSS_EXT.2.1: 1
    • FCS_TLSS_EXT.2.4: 2
    • FCS_TLSS_EXT.2.5: 2
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 2
    • FIA_UAU_EXT.2: 5
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT: 2
    • FIA_UIA_EXT.1: 11
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UID.1: 3
  • FMT:
    • FMT_MOF: 20
    • FMT_MOF.1: 3
    • FMT_MTD: 14
    • FMT_MTD.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 5
    • FMT_SMR.2: 12
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 2
    • FPT_APW_EXT.1: 5
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_ITT.1: 2
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 5
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 2
    • FPT_STM_EXT: 2
    • FPT_STM_EXT.1: 8
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 9
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 6
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTA:
    • FTA_SSL: 2
    • FTA_SSL.3: 7
    • FTA_SSL.4: 6
    • FTA_SSL_EXT: 2
    • FTA_SSL_EXT.1: 6
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 10
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 24
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC.2: 6
    • FTP_TRP: 8
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.AUTHORISED_USER: 4
    • A.PROTECT_ACCESS: 4
    • A.PROTECT_PASSWD: 4
    • A.SECURE_OPER: 4
    • A.SECURE_SERVER: 4
    • A.TRUST_ADMIN: 4
  • O:
    • O.ACCESS_: 1
    • O.ACCESS_DV: 5
    • O.LAUNCH: 5
    • O.SECURE_: 2
    • O.SECURE_DATA: 7
    • O.SECURE_MANAGEMENT: 2
    • O.VIRUS: 5
    • O.WEBACC: 6
  • OE:
    • OE.AUTHORISED_USER: 4
    • OE.PROTECT_ACCESS: 5
    • OE.PROTECT_PASSWD: 3
    • OE.SECURE_OPER: 3
    • OE.SECURE_SERVER: 6
    • OE.TRUST_ADMIN: 3
  • T:
    • T.ACCESS_CD: 3
    • T.ACCESS_DD: 4
    • T.ACCESS_KD: 3
    • T.KEY_DISCLOSURE: 4
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINSTRATOR: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 8
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
      • AES256: 1
  • constructions:
    • MAC:
      • HMAC: 8
  • AES_competition:
    • AES:
      • AES: 9
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 2
      • HMAC-SHA-512: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 9
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF: 1
    • PBKDF2: 3
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA256: 6
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 5
    • SHA2:
      • SHA-256: 5
      • SHA-384: 4
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 5
    • TLS:
      • TLS: 2
  • SSH:
    • SSH: 88
    • SSHv2: 11
  • TLS:
    • DTLS:
      • DTLS: 2
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 7
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
  • RNG:
    • RBG: 2
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 1
  • XTS:
    • XTS: 1
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 12
    • P-384: 8
    • P-521: 8
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 5
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 197: 1
    • FIPS 198-1: 1
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-90A: 2
    • SP 800-132: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 180-4: 3
    • FIPS 186-4: 2
    • FIPS 197: 2
    • FIPS 198-1: 3
    • FIPS PUB 186-4: 6
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 1
  • NIST:
    • SP 800-38A: 2
    • SP 800-56A: 1
    • SP 800-90A: 2
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
  • RFC:
    • RFC 3526: 2
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4254: 1
    • RFC 5280: 4
    • RFC 5656: 1
    • RFC 6187: 1
    • RFC 6668: 1
    • RFC3526: 1
    • RFC5656: 1
  • X509:
    • X.509: 7
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • By content categories and types of data. Two above mentioned checks together (this rule type is out of scope of evaluation). Multiple rules can be defined with relative priority, they will be applied based on: 1
    • out of scope: 3
    • path, application properties, application`s digital signature parameters, application category (out of scope of evalutation), active user. P a g e | 43 This metadata then are compared to active Application: 1
    • the one selected in the rule. Content categories are described in User Manual (this rule type is out of scope of evaluation). By type of data. When object is being downloaded from network its source URL is: 1
    • this rule type is out of scope of evaluation: 2
pdf_data/st_metadata
  • /Author: test
  • /CreationDate: D:20180220122537+03'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20180426102848+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 985996
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 47
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/extract_ok False True
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different