This page was not yet optimized for use on mobile
devices.
Keyper Hardware Security Module (HSM) v2.0:a) Enterprise (Hardware: 9720, Software: 011126)b) Professional (Hardware: 9720, Software: 010405)
CSV information
| Status | archived |
|---|---|
| Valid from | 04.01.2013 |
| Valid until | 04.01.2018 |
| Scheme | 🇲🇾 MY |
| Manufacturer | AEP Networks Ltd. |
| Category | Key Management Systems |
| Security level | EAL4+, AVA_VAN.5 |
Heuristics summary
Certificate ID: ISCB-5-RPT-C037-CR-v1a
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Libraries
OpenSSLSecurity level
EAL4, EAL4+Security Assurance Requirements (SAR)
AVA_VAN.5Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FCS_CKM.1, FCS_RND.1, FCS_CKM.2, FCS_CKM.4, FCS_COP, FDP_ACF, FDP_ACC, FDP_RIP.1, FDP_SDI.2, FIA_SOS.1, FIA_UAU.1, FIA_UID.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD, FPT_ITC.1, FPT_ITI.1, FPT_TST.1, FPT_FLS.1, FPT_RCV.1, FPT_PHP.2, FPT_PHP.3, FPT_STM.1Certificates
ISCB-5-RPT-C037-CR-v1aSide-channel analysis
SPA, DPAStandards
FIPS PUB 140-2, FIPS 140-2, PKCS11, PKCS#11, ISO/IEC15408, ISO/IEC 18045File metadata
| Title | C037 Certification Report |
|---|---|
| Subject | Keyper Hardware Security Module (HSM) v2.0 |
| Keywords | Keyper |
| Author | ISCB Department |
| Creation date | D:20130109091227+08'00' |
| Modification date | D:20130109091238+08'00' |
| Pages | 30 |
| Creator | Acrobat PDFMaker 10.1 for Word |
| Producer | Adobe PDF Library 10.0 |
Security target
Extracted keywords
Symmetric Algorithms
AES, E2, DES, TDES, 3DESAsymmetric Algorithms
DSAHash functions
SHA-1, SHA-2, MD5Schemes
MACRandomness
RNGLibraries
OpenSSLBlock cipher modes
ECBVendor
MicrosoftSecurity level
EAL4Claims
O.AUDIT_CM, O.CSP-Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_INT, ASE_REQ, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP, FCS_RND.1, FCS_RND, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_RND.1.1, FCS_RND.1.2, FCS_RNG.1, FDP_ACC, FDP_ACF, FDP_ETC.1, FDP_IFC, FDP_IFF, FDP_RIP.1, FDP_SDI.2, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_IFF.1, FDP_IFF.3, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_IFF.4, FIA_SOS.1, FIA_UAU.1, FIA_UID.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MTD, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FMT_MTD.1, FPT_FLS.1, FPT_ITC.1, FPT_ITI.1, FPT_PHP.2, FPT_PHP.3, FPT_RCV.1, FPT_STM.1, FPT_TST.1, FPT_FLS.1.1, FPT_ITC.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_PHP.1, FPT_PHP.2.1, FPT_PHP.2.2, FPT_PHP.2.3, FPT_PHP.3.1, FPT_RCV.1.1, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITCSide-channel analysis
Side-channel, Side-channels, side-channel, side-channels, side channel, physical tampering, Malfunction, malfunctionStandards
FIPS PUB 140-2, FIPS PUB 186-2, FIPS 140-2, NIST SP 800-90, PKCS11, PKCS#11, RFC 3447, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003File metadata
| Title | Keyper Hardware Security Module (HSM) v2.0 |
|---|---|
| Subject | Security Target |
| Author | Doug Stuart |
| Creation date | D:20121218144137+08'00' |
| Modification date | D:20121218144151+08'00' |
| Pages | 77 |
| Creator | Acrobat PDFMaker 10.1 for Word |
| Producer | Adobe PDF Library 10.0 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ISCB-5-RPT-C037-CR-v1aExtracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Scheme data
| Cert No | 2013-001-C037 | |
|---|---|---|
| Developer | AEP Networks Ltd. | |
| Level | EAL4+ AVA_VAN.5 | |
| Product | Keyper Hardware Security Module (HSM) v2.0: a) Enterprise (Hardware: 9720, Software: 011126) b) Professional (Hardware: 9720, Software: 010405) | |
| Certification Date | 04.01.2013 | |
| Expiration Date | 04.01.2018 | |
| Recognition | CCRA | |
| Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/98 | |
| Enhanced | ||
| Developer | AEP Networks Ltd. Knaves Beech Business Centre,Loudwater, Buckinghamshire,HP10 9UT,UNITED KINGDOM. URL: http://www.aepnetworks.com/Email: [email protected]: +44 1628 642 600Fax: +44 1628 642 605 | |
| Status | Archive | |
| Scope | Keyper Hardware Security Module (HSM) v2.0 or the Target of Evaluation (TOE) is a dedicated hardware product which provides secure digital signature services, cryptographic services and key management services to applications that reside on physically separate host computer systems. The TOE is a secure module that is contained within an outer casing. The outer casing includes a Keypad, LCD screen, smart card reader and a number of external ports; they are out of the evaluation scope. The TOE is tamper reactive; and has been validated against the requirements for the FIPS PUB 140-2 at level 4. Keyper Hardware Security Module (HSM) v2.0 is intended for use in a dedicated network with devices and applications that make use of its cryptographic functions. Keyper Hardware Security Module (HSM) v2.0 should be provided appropriate physical and logical protections. The TOE encompasses two models: AEP Keyper Enterprise (Hardware: 9720, Software: 011126) and AEP Keyper Professional (Hardware: 9720, Software: 010405). Both models share the same features and architecture (the only difference is performance), therefore both models shall be considered together. Two additional “High Availability” models also exist, however they are out of the scope of this evaluation. The functions of the TOE that are within the scope of evaluation covering: Secure generation, distribution and destruction of cryptographic keys. Secure storage and management of keys throughout their lifecycle. User authentication to facilitate controlled access to cryptographic key management and TOE management functions by trusted personnel only. Security management to enable role-based management of the core functions of the TOE. Access control for key management functions to ensure that only specified roles are permitted to perform defined tasks. Auditing of security relevant events to provide suitable accountability. Self-test of the core cryptographic functions and algorithms of the TOE. Tamper protection to ensure that the TOE is adequately protected from unauthorised physical access. | |
| Cert Id | C037 | |
| Category | Key Management System | |
| Assurance Level | EAL4+ AVA_VAN.5 | |
| Product | Keyper Hardware Security Module (HSM) v2.0: a) Enterprise (Hardware: 9720, Software: 011126) b) Professional (Hardware: 9720, Software: 010405) | |
| Certification Date | 04.01.2013 | |
| Expiration Date | 04.01.2018 | |
| Mutual Recognition | CCRA | |
| Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C037/AEP_Keyper_EAL4_ASE_1.3.pdf | |
| Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C037/ISCB-5-RPT-C037-CR-v1a.pdf | |
| Type | Web based frontend to the Microsoft Certification Authority (CA) services | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Key Management Systems",
"cert_link": null,
"dgst": "5f49aadb6b4baf28",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C037-CR-v1a",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2013-001-C037",
"certification_date": "2013-01-04",
"developer": "AEP Networks Ltd.",
"enhanced": {
"assurance_level": "EAL4+ AVA_VAN.5",
"category": "Key Management System",
"cert_id": "C037",
"certification_date": "2013-01-04",
"developer": "AEP Networks Ltd. Knaves Beech Business Centre,Loudwater, Buckinghamshire,HP10 9UT,UNITED KINGDOM. URL: http://www.aepnetworks.com/Email: [email protected]: +44 1628 642 600Fax: +44 1628 642 605",
"expiration_date": "2018-01-04",
"mutual_recognition": "CCRA",
"product": "Keyper Hardware Security Module (HSM) v2.0: a) Enterprise (Hardware: 9720, Software: 011126) b) Professional (Hardware: 9720, Software: 010405)",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C037/ISCB-5-RPT-C037-CR-v1a.pdf",
"scope": "Keyper Hardware Security Module (HSM) v2.0 or the Target of Evaluation (TOE) is a dedicated hardware product which provides secure digital signature services, cryptographic services and key management services to applications that reside on physically separate host computer systems. The TOE is a secure module that is contained within an outer casing. The outer casing includes a Keypad, LCD screen, smart card reader and a number of external ports; they are out of the evaluation scope. The TOE is tamper reactive; and has been validated against the requirements for the FIPS PUB 140-2 at level 4. Keyper Hardware Security Module (HSM) v2.0 is intended for use in a dedicated network with devices and applications that make use of its cryptographic functions. Keyper Hardware Security Module (HSM) v2.0 should be provided appropriate physical and logical protections. The TOE encompasses two models: AEP Keyper Enterprise (Hardware: 9720, Software: 011126) and AEP Keyper Professional (Hardware: 9720, Software: 010405). Both models share the same features and architecture (the only difference is performance), therefore both models shall be considered together. Two additional \u201cHigh Availability\u201d models also exist, however they are out of the scope of this evaluation. The functions of the TOE that are within the scope of evaluation covering: Secure generation, distribution and destruction of cryptographic keys. Secure storage and management of keys throughout their lifecycle. User authentication to facilitate controlled access to cryptographic key management and TOE management functions by trusted personnel only. Security management to enable role-based management of the core functions of the TOE. Access control for key management functions to ensure that only specified roles are permitted to perform defined tasks. Auditing of security relevant events to provide suitable accountability. Self-test of the core cryptographic functions and algorithms of the TOE. Tamper protection to ensure that the TOE is adequately protected from unauthorised physical access.",
"status": "Archive",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C037/AEP_Keyper_EAL4_ASE_1.3.pdf",
"type": "Web based frontend to the Microsoft Certification Authority (CA) services"
},
"expiration_date": "2018-01-04",
"level": "EAL4+ AVA_VAN.5",
"product": "Keyper Hardware Security Module (HSM) v2.0: a) Enterprise (Hardware: 9720, Software: 011126) b) Professional (Hardware: 9720, Software: 010405)",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/98"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "AEP Networks Ltd.",
"manufacturer_web": "https://www.aepnetworks.com/",
"name": "Keyper Hardware Security Module (HSM) v2.0:a) Enterprise (Hardware: 9720, Software: 011126)b) Professional (Hardware: 9720, Software: 010405)",
"not_valid_after": "2018-01-04",
"not_valid_before": "2013-01-04",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "cr-ISCB-5-RPT-C037-v1a.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C037-CR-v1a": 30
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL4": 5,
"EAL4+": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_GEN.2": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 1,
"FCS_COP": 3,
"FCS_RND.1": 1
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACF": 7,
"FDP_RIP.1": 1,
"FDP_SDI.2": 1
},
"FIA": {
"FIA_SOS.1": 1,
"FIA_UAU.1": 1,
"FIA_UID.1": 1
},
"FMT": {
"FMT_MSA.1": 1,
"FMT_MSA.2": 1,
"FMT_MSA.3": 1,
"FMT_MTD": 2,
"FMT_SMF.1": 1,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_ITC.1": 1,
"FPT_ITI.1": 1,
"FPT_PHP.2": 1,
"FPT_PHP.3": 1,
"FPT_RCV.1": 1,
"FPT_STM.1": 1,
"FPT_TST.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"DPA": 1,
"SPA": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS PUB 140-2": 2
},
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
},
"PKCS": {
"PKCS#11": 1,
"PKCS11": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "ISCB Department",
"/Category": "PUBLIC",
"/Caveat": "FINAL",
"/Classification": "PUBLIC",
"/Company": "CyberSecurity Malaysia",
"/CreationDate": "D:20130109091227+08\u002700\u0027",
"/Creator": "Acrobat PDFMaker 10.1 for Word",
"/Developer": "AEP Networks",
"/Document Type": "REPORT",
"/Identifier": "ISCB-5-RPT-C037-CR-v1a",
"/Index": "MyCB_TMP_011",
"/Keywords": "Keyper",
"/ModDate": "D:20130109091238+08\u002700\u0027",
"/Phase": "Release",
"/Producer": "Adobe PDF Library 10.0",
"/Project Code": "C037",
"/Released": "4 January 2013",
"/ST Title": "Security Target for the Keyper Hardware Security Module (HSM) v2.0",
"/ST Version": "v1.3",
"/SourceModified": "D:20130109011207",
"/Sponsor": "AEP Networks",
"/Subject": "Keyper Hardware Security Module (HSM) v2.0",
"/TOE Name": "Keyper Hardware Security Module (HSM) v2.0",
"/TOE Version": "version 2.0",
"/Title": "C037 Certification Report",
"/Version": "v1a",
"pdf_file_size_bytes": 442113,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.cybersecurity.my/mycc"
]
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 30
},
"st_filename": "st-AEP_Keyper_EAL4_ASE_1_3.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 8
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.AUDIT_CM": 1,
"O.CSP-": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 3,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL": 3,
"ASE_CCL.1": 1,
"ASE_ECD": 3,
"ASE_ECD.1": 1,
"ASE_INT": 3,
"ASE_INT.1": 1,
"ASE_OBJ": 3,
"ASE_OBJ.2": 1,
"ASE_REQ": 8,
"ASE_REQ.2": 1,
"ASE_SPD": 3,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL4": 10
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 12,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 9,
"FAU_GEN.2.1": 1
},
"FCS": {
"FCS_CKM.1": 24,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 20,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 24,
"FCS_CKM.4.1": 1,
"FCS_COP": 37,
"FCS_COP.1": 4,
"FCS_RND": 2,
"FCS_RND.1": 15,
"FCS_RND.1.1": 2,
"FCS_RND.1.2": 2,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC": 16,
"FDP_ACC.1": 6,
"FDP_ACF": 22,
"FDP_ACF.1": 4,
"FDP_ETC.1": 7,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC": 17,
"FDP_IFC.1": 6,
"FDP_IFF": 21,
"FDP_IFF.1": 3,
"FDP_IFF.3": 2,
"FDP_IFF.4": 2,
"FDP_ITC.1": 8,
"FDP_ITC.2": 8,
"FDP_RIP.1": 8,
"FDP_RIP.1.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 7,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_SOS.1": 8,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 9,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 15,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1": 2,
"FMT_MSA.3": 3,
"FMT_MTD": 20,
"FMT_MTD.1": 1,
"FMT_SMF.1": 15,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 14,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 12,
"FPT_FLS.1.1": 1,
"FPT_ITC": 1,
"FPT_ITC.1": 7,
"FPT_ITC.1.1": 1,
"FPT_ITI.1": 9,
"FPT_ITI.1.1": 1,
"FPT_ITI.1.2": 1,
"FPT_PHP.1": 1,
"FPT_PHP.2": 13,
"FPT_PHP.2.1": 1,
"FPT_PHP.2.2": 1,
"FPT_PHP.2.3": 1,
"FPT_PHP.3": 9,
"FPT_PHP.3.1": 1,
"FPT_RCV.1": 8,
"FPT_RCV.1.1": 1,
"FPT_STM.1": 8,
"FPT_STM.1.1": 1,
"FPT_TST.1": 21,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"malfunction": 3,
"physical tampering": 7
},
"SCA": {
"Side-channel": 5,
"Side-channels": 2,
"side channel": 1,
"side-channel": 3,
"side-channels": 4
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1
},
"FIPS": {
"FIPS 140-2": 2,
"FIPS PUB 140-2": 2,
"FIPS PUB 186-2": 5
},
"NIST": {
"NIST SP 800-90": 1
},
"PKCS": {
"PKCS#11": 1,
"PKCS11": 1
},
"RFC": {
"RFC 3447": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
},
"E2": {
"E2": 2
}
},
"DES": {
"3DES": {
"3DES": 4,
"TDES": 4
},
"DES": {
"DES": 8
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Doug Stuart",
"/Category": "ASE",
"/Company": "stratsec",
"/CreationDate": "D:20121218144137+08\u002700\u0027",
"/Creator": "Acrobat PDFMaker 10.1 for Word",
"/DEV_Fullname": "AEP Networks",
"/DEV_Shortname": "AEP",
"/DEV_Sponsor": "David Miller",
"/DOC_Classification": "COMMERCIAL-IN-CONFIDENCE",
"/DOC_Id": "KPR_EAL4_ASE",
"/DOC_Phase": "DRAFT",
"/DOC_Released": "13-DEC-2012",
"/DOC_Title": "Keyper HSM EAL4 Security Target",
"/DOC_Version": "1.3",
"/EVAL_CC": "3.1 (Rev 3)",
"/EVAL_EAL": "EAL4",
"/ModDate": "D:20121218144151+08\u002700\u0027",
"/Producer": "Adobe PDF Library 10.0",
"/SourceModified": "D:20121213065300",
"/Subject": "Security Target",
"/TOE_Fullname": "Keyper Hardware Security Module Version 2.0",
"/TOE_Shortname": "Keyper HSM",
"/TOE_Version": "2.0",
"/Title": "Keyper Hardware Security Module (HSM) v2.0",
"pdf_file_size_bytes": 737530,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 77
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr-ISCB-5-RPT-C037-v1a.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-AEP_Keyper_EAL4_ASE_1_3.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "62d3c7b451258e05e404178d4542c6529772349953f0bd763562425532cfd580",
"txt_hash": "e497d90d3f4bd87d2ee2ad74e8011964cd46face7eddc4845116dbd70a755d13"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "edb15ba5a7b02a5cfc8aca5dca1be188d6d4b7b36d0d7ebb076848c6569afca5",
"txt_hash": "540efd6f2e0f9d8de96809ee978f580b8c26592814e18dceabb7c52ef1531d93"
}
},
"status": "archived"
}