name |
Motorola Network Router, S6000 and GGM 8000 with EOS version 16.9 |
Samsung SSP01 of S5E9830 with Specific IC Dedicated Software Revision 1.1 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
ES |
status |
archived |
active |
not_valid_after |
23.03.2019 |
18.03.2026 |
not_valid_before |
23.03.2017 |
18.03.2021 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10738-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-59%20CCRA.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10738-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-59%20INF-3424.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10738-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-59%20ST_lite.pdf |
manufacturer |
Motorola Solutions, Inc. |
Samsung Electronics Co., Ltd. |
manufacturer_web |
https://www.motorolasolutions.com |
https://www.samsung.com |
security_level |
{} |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
ff6a1bf1b2337dd8 |
8070163bf63b0e18 |
heuristics/cert_id |
CCEVS-VR-VID-10738-2017 |
2018-59-INF-3424 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
16.9 |
1.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Network Device
- certification_date: 23.03.2017
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date: 23.03.2019
- id: CCEVS-VR-VID10738
- product: Motorola Network Router, S6000 and GGM 8000 with EOS version 16.9
- scheme: US
- url: https://www.niap-ccevs.org/product/10738
- vendor: Motorola Mobility LLC
|
- category: Smart Cards and similiar devices
- certification_date: 18.03.2021
- enhanced:
- category: Smart Cards and similiar devices
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1100
- certification_date: 18.03.2021
- description: The Target of Evaluation (TOE), the SSP01 of S5E9830 with Specific IC Dedicated Software Revision 1.1 secure subsystem, is a Hard macro instantiated within an SOC which is composed of a processing unit, security components, hardware circuit for testing purpose during the manufacturing process and volatile and non-volatile memories (hardware). The main security features of the TOE are: Security sensors or detectors including High and Low Temperature detectors, High and Low Supply Voltage detectors, Supply Voltage Glitch detector and Laser detector Active Shields against physical intrusive attacks Dedicated hardware mechanisms against side-channel attacks Secure TDES and AES Symmetric Cryptography support PARITY/ CRC-32 calculators One Hardware Digital True Random Number Generator (DTRNG) that fulfills Test Procedure A specified by AIS31 standard. The IC Dedicated Software includes: DTRNG library built around Hardware DTRNG together with corresponding DTRNG application notes. This library fulfills the criteria of Test Procedure A specified by AIS31 standard. Secure Boot Loader is a loader for copying the embedded software from an external FLASH storage into the internal SRAM.
- evaluation_facility: Applus Laboratories
- level: EAL5 + ALC_DVS.2 + AVA_VAN.5
- manufacturer: Samsung Electronics Co., Ltd
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1101
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1099
- type: Product
- manufacturer: Samsung Electronics Co., Ltd
- product: Samsung SSP01 of S5E9830 with Specific IC Dedicated Software Revision 1.1
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/655-samsung-ssp01-of-s5e9830-with-specific-ic-dedicated-software-revision-1-1
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
c7cf611c6bb1e4b0 |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
st_vid10738-ci.pdf |
2018-59 CCRA.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10738-2017: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- UL:
- UL Verification Services: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20170324094121-04'00'
- /ModDate: D:20170324094152-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 179923
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 729339
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
st_vid10738-vr.pdf |
2018-59 INF-3424.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10738-2017
- cert_item: Motorola Solutions, Inc. Motorola Network Devices, S6000 and GGM 8000 with EOS version 16.9
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10738-2017: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL5: 8
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FDP:
- FDP_ACC: 1
- FDP_ACF: 1
- FDP_IFC.1: 1
- FDP_SDC.1: 1
- FDP_SDR.1: 1
- FDP_UIT.1: 1
- FIA:
- FMT:
- FMT_LIM: 4
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_PHP.3: 1
- FRU:
- FTP:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SEC: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTE: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY: 2
- T.UNAUTHORIZED_ADMINIST: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICA: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_E: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- UL:
- UL Verification Services: 6
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 1
- SHA-512: 1
- SHA384: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- X509:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20170324091015-04'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Keywords:
- /ModDate: D:20170324091018-04'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20170324131003
- /Subject:
- /Title: D
- pdf_file_size_bytes: 318224
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
|
pdf_data/st_filename |
st_vid10738-st.pdf |
2018-59 ST_lite.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084: 1
- BSI-CC-PP-0084-: 1
- BSI-PP-0084: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL5: 6
- EAL5 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 3
- ALC_CMS.1: 3
- ASE:
- ASE_CCL.1: 7
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_FSP: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ADV_VAN: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 3
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 4
- FAU_STG_EXT.1.3: 10
- FAU_STG_EXT.2: 5
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 5
- FCS_CKM.2: 6
- FCS_CKM.2.1: 3
- FCS_CKM.4: 5
- FCS_COP: 1
- FCS_COP.1: 26
- FCS_COP.1.1: 12
- FCS_PMG_EXT.1: 1
- FCS_RBG_EXT.1: 5
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 4
- FCS_SSHS_EXT.1: 4
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 2
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.2: 1
- FIA:
- FIA_PGM_EXT.1: 1
- FIA_PMG_EXT.1: 1
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 2
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 8
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 28
- FMT_MOF.1.1: 14
- FMT_MTD: 4
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 2
- FPT:
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 2
- FPT_TST_EXT.2: 3
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FPT_TUD_EXT.2: 1
- FPT_TUD_EXT.2.2: 2
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 2
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 1
- FAU_SAS: 8
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.4: 5
- FCS_COP: 15
- FCS_COP.1: 9
- FCS_RNG: 6
- FCS_RNG.1: 15
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 8
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF: 11
- FDP_ACF.1: 19
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 23
- FDP_IFC.1.1: 1
- FDP_IFF.1: 3
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FDP_ITT: 1
- FDP_ITT.1: 18
- FDP_ITT.1.1: 1
- FDP_SDC: 4
- FDP_SDC.1: 14
- FDP_SDC.1.1: 2
- FDP_SDI: 1
- FDP_SDI.1: 2
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_SDR: 5
- FDP_SDR.1: 11
- FDP_SDR.1.1: 2
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 6
- FIA_API.1: 12
- FIA_API.1.1: 2
- FMT:
- FMT_LIM: 82
- FMT_LIM.1: 12
- FMT_LIM.1.1: 1
- FMT_LIM.2: 11
- FMT_LIM.2.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 16
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_ETD: 1
- FPT_FLS: 1
- FPT_FLS.1: 21
- FPT_FLS.1.1: 1
- FPT_ITT: 1
- FPT_ITT.1: 16
- FPT_ITT.1.1: 1
- FPT_PHP: 2
- FPT_PHP.3: 20
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT: 1
- FRU_FLT.1: 1
- FRU_FLT.2: 16
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SEC: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTE: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY: 2
- T.UNAUTHORIZED_ADMINIST: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICA: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_E: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- O:
- O.AES: 5
- O.MEM_ACCESS: 1
- O.RND: 6
- O.TDES: 7
- T:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
- UL:
- UL Verification Services: 2
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 10
- AES-: 1
- AES-128: 1
- constructions:
- MAC:
- HMAC: 11
- HMAC-SHA-256: 3
- HMAC-SHA-384: 3
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 14
- Triple-DES: 6
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 1
- SHA-256: 11
- SHA-384: 7
- SHA-512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 37
- IKEv1: 51
- IKEv2: 18
- IPsec:
- SSH:
- TLS:
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 15
- P-384: 13
- P-521: 8
- curve P-256: 1
- curve P-384: 3
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 26
- malfunction: 10
- physical tampering: 2
- SCA:
- DPA: 3
- Leak-Inherent: 21
- Physical Probing: 4
- Physical probing: 2
- SPA: 2
- physical probing: 8
- side-channel: 2
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 140-2: 10
- FIPS 186-4: 4
- FIPS PUB 186-4: 5
- ISO:
- ISO/IEC 10118: 2
- ISO/IEC 14888-: 1
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-131A: 1
- NIST SP 800-56B: 1
- NIST SP 800-57: 2
- SP 800-131A: 1
- SP 800-56A: 1
- SP 800-56B: 1
- SP 800-90: 2
- PKCS:
- RFC:
- RFC 2409: 1
- RFC 2986: 1
- RFC 3602: 2
- RFC 4109: 1
- RFC 4251: 1
- RFC 4253: 4
- RFC 4301: 4
- RFC 4303: 1
- RFC 4868: 2
- RFC 4945: 1
- RFC 5280: 3
- RFC 5647: 4
- RFC 5759: 1
- RFC 5996: 2
- RFC 6668: 1
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 6
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 1
- FIPS PUB 180-3: 3
- FIPS197: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. FCS_SSHS_EXT.1.2 The TSF shall ensure that the SSH: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: Bethany Henderson
- /Company: Motorola
- /CreationDate: D:20170324090837-04'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Date completed: July 28, 2016
- /ModDate: D:20170324090852-04'00'
- /Producer: Adobe PDF Library 11.0
- /Revision: 1.0
- /SourceModified: D:20170323180102
- pdf_file_size_bytes: 907819
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 98
|
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 1094224
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 91
|
state/cert/convert_garbage |
True |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |