Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
KAYTUS Server Baseboard Management Controller 7.11.00
597-EWA
nCipher nShield Solo XC Hardware Security Module v12.50.7
NSCIB-CC-163968-CR
name KAYTUS Server Baseboard Management Controller 7.11.00 nCipher nShield Solo XC Hardware Security Module v12.50.7
category Other Devices and Systems Products for Digital Signatures
scheme CA NL
status active archived
not_valid_after 08.01.2030 19.11.2024
not_valid_before 08.01.2025 19.11.2019
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/597-EWA%20CT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-19-163968.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/597-EWA%20CR%20v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification_Report_NSCIB-CC-163968-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Kaytus%20ST%20v27a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-163968-ST-1.0.pdf
manufacturer Kaytus Systems PTE. Ltd. nCipher Security Ltd.
manufacturer_web https://www.kaytus.com/ https://www.ncipher.com/
security_level EAL2+, ALC_FLR.2 EAL4+, ALC_FLR.2, AVA_VAN.5
dgst fd631373f8af87d5 0f312e270b3632b2
heuristics/cert_id 597-EWA NSCIB-CC-163968-CR
heuristics/cert_lab []
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ALC_FLR.2, AVA_VAN.5, ATE_IND.2
heuristics/extracted_versions 7.11.00 12.50.7
heuristics/scheme_data
  • certification_date: 08.01.2025
  • level: EAL 2+ (ALC_FLR.2)
  • product: KAYTUS Server Baseboard Management Controller 7.11.00
  • vendor: KAYTUS Systems Pte Ltd.
heuristics/protection_profiles {} ee319f4a624019b0
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-PP-2016_05 PP.pdf
pdf_data/cert_filename 597-EWA CT.pdf Signed certificate CC-19-163968.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 597-EWA: 1
  • FR:
    • ANSSI-CC-PP-2016/5: 1
  • NL:
    • CC-19-163968: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2016/5: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2+: 1
  • EAL:
    • EAL2: 1
    • EAL4: 1
    • EAL4 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
  • ALC:
    • ALC_FLR.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • BrightSight:
    • Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Sinitski, Kiril
  • /CreationDate: D:20250113101018-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: 03c3dcc6-6bfd-4194-a625-fb83b8d0389e
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2023-05-16T11:46:20Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250113101018-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 388115
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20191119143204+01'00'
  • /Creator: C458-M&S
  • /ModDate: D:20191119143204+01'00'
  • /Producer: KONICA MINOLTA bizhub C458
  • /Title: C458-M&S19111914310
  • pdf_file_size_bytes: 187387
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 597-EWA CR v1.1.pdf Certification_Report_NSCIB-CC-163968-CR.pdf
pdf_data/report_frontpage
  • NL:
  • CA:
  • NL:
    • cert_id: NSCIB-CC-163968-CR
    • cert_item: nShield Solo XC Hardware Security Module v12.50.7
    • cert_lab: Brightsight
    • developer: nCipher Security Limited
  • CA:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-PP-2016/5: 1
  • NL:
    • NSCIB-CC-163968-CR: 12
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2016/5: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2+: 1
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 3
    • EAL4 augmented: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
  • ALC:
    • ALC_FLR.2: 2
  • ATE:
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_COP: 1
  • FTP:
    • FTP_TRP: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • BrightSight:
    • Brightsight: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • other:
    • JIL: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • BSI:
    • AIS 31: 2
  • ISO:
    • ISO/IEC 19790:2012: 1
  • NIST:
    • SP 800-90A: 3
pdf_data/report_metadata
  • /Author: Sinitski, Kiril
  • /CreationDate: D:20250117085109-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: f4235719-a1a3-4fb4-8b18-a47ac84bac11
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2022-07-20T10:41:47Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250117085110-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 619531
  • pdf_hyperlinks: https://www.cisa.gov/known-exploited-vulnerabilities-catalog, mailto:[email protected], https://nvd.nist.gov/, https://www.kaytus.com/en/2745970/index.html
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename Kaytus ST v27a.pdf NSCIB-CC-163968-ST-1.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL2+: 1
  • EAL:
    • EAL4: 7
    • EAL4 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ALC:
    • ALC_FLR.2: 7
  • AVA:
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 7
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM.4: 3
    • FCS_COP.1: 7
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 7
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.1: 13
    • FTA_SSL.1.1: 2
    • FTA_SSL.1.2: 2
    • FTA_SSL.4: 7
    • FTA_SSL.4.1: 1
    • FTA_TSE.1: 7
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 1
    • FAU_STG.2: 5
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
    • FCS_RNG: 12
    • FCS_RNG.1: 5
  • FDP:
    • FDP_ACC: 15
    • FDP_ACC.1: 10
    • FDP_ACF: 14
    • FDP_ACF.1: 12
    • FDP_IFC: 10
    • FDP_IFC.1: 7
    • FDP_IFF: 9
    • FDP_IFF.1: 10
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU: 13
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6: 2
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA: 22
    • FMT_MSA.1: 5
    • FMT_MSA.3: 9
    • FMT_MTD: 12
    • FMT_MTD.1: 2
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 4
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 4
    • FPT_PHP.3.1: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TST_EXT.1: 9
    • FPT_TST_EXT.1.1: 1
  • FTP:
    • FTP_TRP: 15
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.LOCATE: 3
    • A.MANAGE: 2
  • O:
    • O.ACCESS: 9
    • O.ADMIN: 9
    • O.AUDIT: 7
    • O.PROTECT: 11
  • OE:
    • OE.PERSONNEL: 4
    • OE.PHYSICAL: 4
  • T:
    • T.CONFIG: 3
    • T.UNAUTH: 2
  • OE:
    • OE.U: 1
  • OT:
    • OT.A: 1
    • OT.B: 1
    • OT.R: 1
    • OT.RNG: 3
  • R:
    • R.RAD: 1
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC-SHA-256: 1
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • TDEA: 1
      • Triple-DES: 4
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 3
      • HMAC: 2
      • HMAC-SHA-224: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 10
  • TLS:
    • TLS:
      • TLS: 1
      • TLS v1.2: 6
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RNG: 30
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 1
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 2
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP160r1: 1
    • brainpoolP160t1: 1
    • brainpoolP192r1: 1
    • brainpoolP192t1: 1
    • brainpoolP224r1: 3
    • brainpoolP224t1: 3
    • brainpoolP256r1: 3
    • brainpoolP256t1: 3
    • brainpoolP320r1: 3
    • brainpoolP320t1: 3
    • brainpoolP384r1: 3
    • brainpoolP384t1: 3
    • brainpoolP512r1: 3
    • brainpoolP512t1: 3
  • NIST:
    • B-233: 1
    • B-283: 3
    • B-409: 3
    • B-571: 2
    • K-233: 1
    • K-283: 3
    • K-409: 3
    • K-571: 2
    • NIST B-163: 1
    • NIST B-233: 2
    • NIST K-163: 1
    • NIST K-233: 2
    • NIST P-192: 1
    • NIST P-224: 2
    • P-192: 1
    • P-224: 4
    • P-256: 6
    • P-384: 6
    • P-521: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 2
    • physical tampering: 2
  • SCA:
    • side-channels: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 197: 1
    • FIPS PUB 198: 1
  • NIST:
    • NIST SP 800-38A: 1
  • PKCS:
    • PKCS #1: 1
  • BSI:
    • AIS 20: 1
    • AIS 31: 9
    • AIS31: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 140-2: 6
    • FIPS 180-4: 1
    • FIPS 186-4: 2
    • FIPS 197: 2
    • FIPS 198-1: 1
  • ISO:
    • ISO/IEC 19790:2012: 1
  • NIST:
    • NIST SP 800-22: 1
    • NIST SP 800-90A: 3
    • SP 800-108: 1
    • SP 800-38A: 1
    • SP 800-38B: 1
    • SP 800-38C: 1
    • SP 800-38D: 1
    • SP 800-38F: 1
    • SP 800-56A: 2
    • SP 800-67: 1
    • SP 800-90A: 3
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 2
    • PKCS#11: 2
  • RFC:
    • RFC 8017: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Impath, out of scope) with a remote Hardserver (typically on an application server or PC: 1
    • for the TOE. The Hardserver instance in the Connect XC establishes a secure channel (Impath, out of scope) with a remote Hardserver (typically on an application server or PC), which also includes libraries: 1
    • out of scope: 3
    • support higher level APIs, for example, but not limited to NFKM, PKCS#11, MSCAPI, etc. These are out of scope of the TOE. Figure 1 Configuration 1: TOE in Connect XC Page 8 of 66 nShield Solo XC HSM Security: 1
    • support higher level APIs, for example, but not limited to, NFKM, PKCS#11, MSCAPI, etc. These are out of scope of the TOE. Figure 2 Configuration 2: TOE in host server nShield Solo XC HSM Security Target Page: 1
pdf_data/st_metadata
  • /Author: Steve Jackson
  • /CreationDate: D:20250116063843-05'00'
  • /ModDate: D:20250116063843-05'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - Kaytus ST v27a.docx
  • pdf_file_size_bytes: 1117042
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 41
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different