Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung Galaxy Devices on Android 10 - Spring
CCEVS-VR-11042-2020
AKD eID 2.0 SSCD
NSCIB-CC-2300144-01-CR
name Samsung Galaxy Devices on Android 10 - Spring AKD eID 2.0 SSCD
category Mobility ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US NL
status archived active
not_valid_after 30.04.2022 30.09.2029
not_valid_before 30.04.2020 30.09.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11042-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300144-01-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11042-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300144-01-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11042-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300144-01-ST_Lite_v2.4.pdf
manufacturer Samsung Electronics Co., Ltd. AKD d.o.o.
manufacturer_web https://www.samsung.com https://www.akd.hr
security_level {} EAL4+, ALC_DVS.2, AVA_VAN.5
dgst f628c89a64a0e7b5 5a7ffad9f27b5ca5
heuristics/cert_id CCEVS-VR-11042-2020 NSCIB-CC-2300144-01-CR
heuristics/cert_lab US
heuristics/cpe_matches cpe:2.3:o:samsung:android:10.0:-:*:*:*:*:*:* {}
heuristics/related_cves CVE-2023-21426, CVE-2023-21441, CVE-2023-21436, CVE-2023-21437, CVE-2023-21430, CVE-2023-21421, CVE-2023-21429, CVE-2023-21425, CVE-2023-21420 {}
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 10 2.0
heuristics/report_references/directly_referencing {} NSCIB-CC-2300127-01-CR
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1149-V3-2023, NSCIB-CC-2300127-01-CR, BSI-DSZ-CC-1149-2022, BSI-DSZ-CC-1149-V2-2023
heuristics/scheme_data
  • category: Mobility, Virtual Private Network
  • certification_date: 30.04.2020
  • evaluation_facility: Gossamer Security Solutions
  • expiration_date: 30.04.2022
  • id: CCEVS-VR-VID11042
  • product: Samsung Galaxy Devices on Android 10 - Spring
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11042
  • vendor: Samsung Electronics Co., Ltd.
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1149-V3-2023, NSCIB-CC-2300127-01-CR
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1149-V3-2023, NSCIB-CC-2300127-01-CR
heuristics/protection_profiles df09b703c88c665a, c88af12926be2779, f4474c6c73660987 d9553e7194783182, d918b28fd7bb5d79, 4a814d0e3c9f9082, 1f7ea2e05de5b88b, 27abdb9c6ab375a7
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf
pdf_data/cert_filename st_vid11042-ci.pdf NSCIB-CC-2300144-01-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11042-2020: 1
  • NL:
    • NSCIB-2300144-01: 1
    • NSCIB-CC-2300144-01: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL2: 1
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.3: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
  • Riscure:
    • Riscure: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 18045:2008: 1
pdf_data/cert_metadata
  • /CreationDate: D:20200519123948-04'00'
  • /ModDate: D:20200519123948-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181995
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Haak
  • /CreationDate: D:20241013115200+01'00'
  • /Creator: Microsoft® Word 2021
  • /ModDate: D:20241013115200+01'00'
  • /Producer: Microsoft® Word 2021
  • /Title: NSCIB Certificate
  • pdf_file_size_bytes: 96238
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11042-vr.pdf NSCIB-CC-2300144-01-CR.pdf
pdf_data/report_frontpage
  • NL:
  • US:
    • cert_id: CCEVS-VR-11042-2020
    • cert_item: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 10 - Spring
    • cert_lab: US NIAP
  • NL:
    • cert_id: NSCIB-CC-2300144-01-CR
    • cert_item: AKD eID 2.0 SSCD
    • cert_lab: Riscure B.V.
    • developer: AKD d.o.o
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-11042-2020: 1
  • NL:
    • NSCIB-2300144-01: 1
    • NSCIB-CC-2300127-01: 1
    • NSCIB-CC-2300144-01-CR: 12
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0076-: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL6+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 21
  • Samsung:
    • Samsung: 60
  • NXP:
    • NXP: 1
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
  • Riscure:
    • Riscure: 3
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA-PSS: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 11
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Fault Injection: 1
  • SCA:
    • side-channel: 1
  • other:
    • JHAS: 1
    • JIL: 3
    • JIL-AAPS: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 4: 5
pdf_data/report_keywords/standard_id
  • PKCS:
    • PKCS #1: 1
  • X509:
    • X.509: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Knox-specific claims made in this evaluation. All other functionality provided by the container is out of scope. 7 Documentation The following documents were available with the TOE for evaluation: Samsung: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: comptont
  • /CreationDate: D:20200519122942-04'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20200519122942-04'00'
  • /Producer: Microsoft® Word 2013
  • pdf_file_size_bytes: 1153840
  • pdf_hyperlinks: https://web.nvd.nist.gov/view/vuln/search
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename st_vid11042-st.pdf NSCIB-CC-2300144-01-ST_Lite_v2.4.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1149-V3-2023: 2
  • NL:
    • NSCIB-CC-2300127-01-CR: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 3
    • BSI-CC-PP-0071-2012-MA-01: 2
    • BSI-CC-PP-0072-2012-MA-01: 2
    • BSI-CC-PP-0075-2012-MA-01: 3
    • BSI-CC-PP-0076-: 1
    • BSI-CC-PP-0076-2013-MA-01: 2
    • BSI-PP-0035-2007: 1
  • other:
    • PP-SSCD-6: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 2
  • EAL:
    • EAL 4+: 2
    • EAL4: 13
    • EAL4 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 3
    • ALC_CMS: 1
    • ALC_CMS.1: 4
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 5
  • ADV:
    • ADV_ARC.1: 4
    • ADV_FSP.4: 3
    • ADV_IMP.1: 3
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 3
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL: 2
    • FAU_SEL.1: 1
    • FAU_SEL.1.1: 1
    • FAU_STG: 4
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 12
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 11
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.2.1: 2
    • FCS_CKM_EXT.3: 5
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 1
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 1
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP.1: 52
    • FCS_RBG_EXT: 6
    • FCS_RBG_EXT.1: 14
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_RBG_EXT.2: 1
    • FCS_RBG_EXT.2.1: 1
    • FCS_SRV_EXT: 7
    • FCS_SRV_EXT.1.1: 1
    • FCS_SRV_EXT.2.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 2
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 2
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 17
    • FCS_TLSC_EXT.1: 6
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 1
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF_EXT: 10
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 2
    • FDP_ACF_EXT.2.1: 1
    • FDP_ACF_EXT.3.1: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 1
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 2
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 3
    • FDP_IFC_EXT.1: 1
    • FDP_IFC_EXT.1.1: 1
    • FDP_PBA_EXT: 3
    • FDP_PBA_EXT.1: 1
    • FDP_PBA_EXT.1.1: 1
    • FDP_RIP: 2
    • FDP_RIP.2: 1
    • FDP_RIP.2.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 2
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 3
    • FDP_UPC_EXT.1: 1
    • FDP_UPC_EXT.1.1: 1
    • FDP_UPC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 3
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 15
    • FIA_BLT_EXT.1: 1
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 1
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 2
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.6: 1
    • FIA_BLT_EXT.6.1: 1
    • FIA_BMG_EXT: 3
    • FIA_BMG_EXT.1: 17
    • FIA_BMG_EXT.6: 1
    • FIA_BMG_EXT.6.1: 1
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 1
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 3
    • FIA_PSK_EXT.1: 1
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 1
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 9
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.4: 1
    • FIA_UAU_EXT.4.1: 1
    • FIA_UAU_EXT.4.2: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF_EXT: 4
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 9
    • FMT_SMF: 4
    • FMT_SMF.1: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 7
    • FMT_SMF_EXT.1.1: 9
    • FMT_SMF_EXT.2: 1
    • FMT_SMF_EXT.2.1: 2
    • FMT_SMF_EXT.3: 4
    • FMT_SMF_EXT.3.1: 1
  • FPT:
    • FPT_AEX_EXT: 19
    • FPT_AEX_EXT.1: 1
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 1
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_AEX_EXT.5: 1
    • FPT_AEX_EXT.5.1: 1
    • FPT_AEX_EXT.5.2: 1
    • FPT_AEX_EXT.6.1: 1
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 1
    • FPT_BBD_EXT.1.1: 1
    • FPT_JTA_EXT: 3
    • FPT_JTA_EXT.1: 1
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 1
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 1
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 1
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 1
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 13
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 10
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 2
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 2
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC_EXT: 8
    • FTP_ITC_EXT.1: 2
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 4
    • FCS_CKM.2: 2
    • FCS_CKM.4: 17
    • FCS_CKM.4.1: 1
    • FCS_COP: 58
    • FCS_COP.1: 9
  • FDP:
    • FDP_ACC: 40
    • FDP_ACC.1: 27
    • FDP_ACF: 27
    • FDP_ACF.1: 25
    • FDP_DAU: 8
    • FDP_DAU.1: 1
    • FDP_DAU.2: 2
    • FDP_IFC.1: 14
    • FDP_ITC: 8
    • FDP_ITC.1: 12
    • FDP_ITC.2: 9
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_SDI: 17
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
    • FDP_UCT: 9
    • FDP_UCT.1: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 6
    • FIA_API.1: 11
    • FIA_API.1.1: 2
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 3
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 13
    • FMT_MSA.1: 7
    • FMT_MSA.2: 7
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 8
    • FMT_MSA.4.1: 1
    • FMT_MTD: 14
    • FMT_MTD.1: 2
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 8
    • FPT_EMS.1: 11
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ICT: 2
    • FTP_ITC: 28
    • FTP_ITC.1: 17
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • A:
    • A.CGA: 3
    • A.CSP: 4
    • A.SCA: 3
  • OE:
    • OE.HID_VAD: 10
pdf_data/st_keywords/vendor
  • Broadcom:
    • Broadcom: 6
  • Qualcomm:
    • Qualcomm: 43
  • Samsung:
    • Samsung: 172
  • NXP:
    • NXP: 9
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 21
  • constructions:
    • MAC:
      • HMAC: 11
  • AES_competition:
    • AES:
      • AES: 21
  • constructions:
    • MAC:
      • CMAC: 8
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 4
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 15
  • FF:
    • DH:
      • DH: 6
      • DHE: 1
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 2048: 2
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 11
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • Diffie-Hellman: 8
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA2:
      • SHA256: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA256: 1
      • SHA384: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 12
    • IKEv1: 14
    • IKEv2: 11
  • IPsec:
    • IPsec: 41
  • TLS:
    • TLS:
      • TLS: 46
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 2
  • VPN:
    • VPN: 102
  • PACE:
    • PACE: 15
  • PGP:
    • PGP: 1
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 7
  • RNG:
    • RBG: 14
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 5
  • XTS:
    • XTS: 2
  • CBC:
    • CBC: 7
pdf_data/st_keywords/ecc_curve
  • NIST:
    • secp256r1: 2
    • secp384r1: 2
  • NIST:
    • NIST P-256: 1
    • NIST P-384: 1
    • P-256: 1
    • P-384: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 22
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • fault injection: 1
    • physical tampering: 5
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 1
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 6
  • IBM:
    • SE: 4
  • other:
    • Kinibi: 1
    • TEE: 25
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 4: 9
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 197: 9
    • FIPS PUB 197: 2
  • NIST:
    • SP 800-108: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS 2: 1
    • PKCS#12: 2
  • RFC:
    • RFC 2246: 1
    • RFC 2560: 2
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 3602: 2
    • RFC 4106: 2
    • RFC 4109: 1
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4346: 1
    • RFC 4945: 2
    • RFC 5216: 1
    • RFC 5246: 9
    • RFC 5280: 4
    • RFC 5282: 2
    • RFC 5288: 1
    • RFC 5289: 6
    • RFC 5759: 1
    • RFC 6125: 1
    • RFC 6379: 2
  • X509:
    • X.509: 9
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS 186-4: 3
    • FIPS 197: 5
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 11770-3: 3
    • ISO/IEC 14443: 2
    • ISO/IEC 14888-3: 3
    • ISO/IEC 7816-3: 1
  • NIST:
    • NIST SP 800-38B: 2
  • PKCS:
    • PKCS#15: 2
  • RFC:
    • RFC 5639: 2
pdf_data/st_keywords/javacard_packages
  • com:
    • com.samsung.android.knox.net.vpn: 1
  • java:
    • java.security.cert: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • antenna, card body or carrier are irrelevant for the secure operation of the TOE and are therefore out of scope of the TOE. To be powered and able to communicate, the TOE requires a reader and the terminal: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: hmnye
  • /CreationDate: D:20200817105001-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20200817105001-04'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title: Microsoft Word - Samsung-MDFPP-Galaxy-Devices-on-Android-10-Spring-ST-v1.1-0710
  • pdf_file_size_bytes: 777149
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 89
  • /Author: Vesna Brigić Mikuc
  • /CreationDate: D:20240920222037+02'00'
  • /Creator: Microsoft® Word 2019
  • /Keywords: Common Criteria Security Target Secure Signature Creation Device SSCD Qualified Electronic Signature/Seal Creation Device QSCD
  • /ModDate: D:20240920222037+02'00'
  • /Producer: Microsoft® Word 2019
  • /Title: Security Target Lite AKD eID 2.0 SSCD v2.3
  • pdf_file_size_bytes: 1278868
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different