Keyper Hardware Security Module (HSM) v2.0:a) Enterprise (Hardware: 9720, Software: 011126)b) Professional (Hardware: 9720, Software: 010405)

CSV information ?

Status archived
Valid from 04.01.2013
Valid until 04.01.2018
Scheme 🇲🇾 MY
Manufacturer AEP Networks Ltd.
Category Key Management Systems
Security level EAL4+, AVA_VAN.5

Heuristics summary ?

Certificate ID: ISCB-5-RPT-C037-CR-v1a

Certificate ?

Certification report ?

Extracted keywords

Libraries
OpenSSL

Security level
EAL4, EAL4+
Security Assurance Requirements (SAR)
AVA_VAN.5
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FCS_CKM.1, FCS_RND.1, FCS_CKM.2, FCS_CKM.4, FCS_COP, FDP_ACF, FDP_ACC, FDP_RIP.1, FDP_SDI.2, FIA_SOS.1, FIA_UAU.1, FIA_UID.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD, FPT_ITC.1, FPT_ITI.1, FPT_TST.1, FPT_FLS.1, FPT_RCV.1, FPT_PHP.2, FPT_PHP.3, FPT_STM.1
Certificates
ISCB-5-RPT-C037-CR-v1a

Side-channel analysis
SPA, DPA

Standards
FIPS PUB 140-2, FIPS 140-2, PKCS11, PKCS#11, ISO/IEC15408, ISO/IEC 18045

File metadata

Title C037 Certification Report
Subject Keyper Hardware Security Module (HSM) v2.0
Keywords Keyper
Author ISCB Department
Creation date D:20130109091227+08'00'
Modification date D:20130109091238+08'00'
Pages 30
Creator Acrobat PDFMaker 10.1 for Word
Producer Adobe PDF Library 10.0

Security target ?

Extracted keywords

Symmetric Algorithms
AES, E2, DES, TDES, 3DES
Asymmetric Algorithms
DSA
Hash functions
SHA-1, SHA-2, MD5
Schemes
MAC
Randomness
RNG
Libraries
OpenSSL
Block cipher modes
ECB

Vendor
Microsoft

Security level
EAL4
Claims
O.AUDIT_CM, O.CSP-
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_INT, ASE_REQ, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP, FCS_RND.1, FCS_RND, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_RND.1.1, FCS_RND.1.2, FCS_RNG.1, FDP_ACC, FDP_ACF, FDP_ETC.1, FDP_IFC, FDP_IFF, FDP_RIP.1, FDP_SDI.2, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_IFF.1, FDP_IFF.3, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_IFF.4, FIA_SOS.1, FIA_UAU.1, FIA_UID.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MTD, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FMT_MTD.1, FPT_FLS.1, FPT_ITC.1, FPT_ITI.1, FPT_PHP.2, FPT_PHP.3, FPT_RCV.1, FPT_STM.1, FPT_TST.1, FPT_FLS.1.1, FPT_ITC.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_PHP.1, FPT_PHP.2.1, FPT_PHP.2.2, FPT_PHP.2.3, FPT_PHP.3.1, FPT_RCV.1.1, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITC

Side-channel analysis
Side-channel, Side-channels, side-channel, side-channels, side channel, physical tampering, Malfunction, malfunction

Standards
FIPS PUB 140-2, FIPS PUB 186-2, FIPS 140-2, NIST SP 800-90, PKCS11, PKCS#11, RFC 3447, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003

File metadata

Title Keyper Hardware Security Module (HSM) v2.0
Subject Security Target
Author Doug Stuart
Creation date D:20121218144137+08'00'
Modification date D:20121218144151+08'00'
Pages 77
Creator Acrobat PDFMaker 10.1 for Word
Producer Adobe PDF Library 10.0

Heuristics ?

Certificate ID: ISCB-5-RPT-C037-CR-v1a

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, ATE_DPT.1, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_TDS.3, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ATE_COV.2, AGD_OPE.1, ALC_DVS.1, ASE_ECD.1, ADV_FSP.4, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ASE_OBJ.2

Scheme data ?

Cert No 2013-001-C037
Developer AEP Networks Ltd.
Level EAL4+ AVA_VAN.5
Product Keyper Hardware Security Module (HSM) v2.0: a) Enterprise (Hardware: 9720, Software: 011126) b) Professional (Hardware: 9720, Software: 010405)
Certification Date 04.01.2013
Expiration Date 04.01.2018
Recognition CCRA
Url https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/98
Enhanced
Cert Id C037
Product Keyper Hardware Security Module (HSM) v2.0: a) Enterprise (Hardware: 9720, Software: 011126) b) Professional (Hardware: 9720, Software: 010405)
Developer AEP Networks Ltd. Knaves Beech Business Centre,Loudwater, Buckinghamshire,HP10 9UT,UNITED KINGDOM. URL: http://www.aepnetworks.com/Email: [email protected]: +44 1628 642 600Fax: +44 1628 642 605
Category Key Management System
Type Web based frontend to the Microsoft Certification Authority (CA) services
Scope Keyper Hardware Security Module (HSM) v2.0 or the Target of Evaluation (TOE) is a dedicated hardware product which provides secure digital signature services, cryptographic services and key management services to applications that reside on physically separate host computer systems. The TOE is a secure module that is contained within an outer casing. The outer casing includes a Keypad, LCD screen, smart card reader and a number of external ports; they are out of the evaluation scope. The TOE is tamper reactive; and has been validated against the requirements for the FIPS PUB 140-2 at level 4. Keyper Hardware Security Module (HSM) v2.0 is intended for use in a dedicated network with devices and applications that make use of its cryptographic functions. Keyper Hardware Security Module (HSM) v2.0 should be provided appropriate physical and logical protections. The TOE encompasses two models: AEP Keyper Enterprise (Hardware: 9720, Software: 011126) and AEP Keyper Professional (Hardware: 9720, Software: 010405). Both models share the same features and architecture (the only difference is performance), therefore both models shall be considered together. Two additional “High Availability” models also exist, however they are out of the scope of this evaluation. The functions of the TOE that are within the scope of evaluation covering: Secure generation, distribution and destruction of cryptographic keys. Secure storage and management of keys throughout their lifecycle. User authentication to facilitate controlled access to cryptographic key management and TOE management functions by trusted personnel only. Security management to enable role-based management of the core functions of the TOE. Access control for key management functions to ensure that only specified roles are permitted to perform defined tasks. Auditing of security relevant events to provide suitable accountability. Self-test of the core cryptographic functions and algorithms of the TOE. Tamper protection to ensure that the TOE is adequately protected from unauthorised physical access.
Assurance Level EAL4+ AVA_VAN.5
Certification Date 04.01.2013
Expiration Date 04.01.2018
Mutual Recognition CCRA
Target Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C037/AEP_Keyper_EAL4_ASE_1.3.pdf
Report Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C037/ISCB-5-RPT-C037-CR-v1a.pdf
Status Archive

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2013-01-04', 'expiration_date': '2018-01-04', 'enhanced': {'__update__': {'developer': 'AEP Networks Ltd. Knaves Beech Business Centre,Loudwater, Buckinghamshire,HP10 9UT,UNITED KINGDOM. URL: http://www.aepnetworks.com/Email: [email protected]: +44 1628 642 600Fax: +44 1628 642 605', 'scope': 'Keyper Hardware Security Module (HSM) v2.0 or the Target of Evaluation (TOE) is a dedicated hardware product which provides secure digital signature services, cryptographic services and key management services to applications that reside on physically separate host computer systems. The TOE is a secure module that is contained within an outer casing. The outer casing includes a Keypad, LCD screen, smart card reader and a number of external ports; they are out of the evaluation scope. The TOE is tamper reactive; and has been validated against the requirements for the FIPS PUB 140-2 at level 4. Keyper Hardware Security Module (HSM) v2.0 is intended for use in a dedicated network with devices and applications that make use of its cryptographic functions. Keyper Hardware Security Module (HSM) v2.0 should be provided appropriate physical and logical protections. The TOE encompasses two models: AEP Keyper Enterprise (Hardware: 9720, Software: 011126) and AEP Keyper Professional (Hardware: 9720, Software: 010405). Both models share the same features and architecture (the only difference is performance), therefore both models shall be considered together. Two additional “High Availability” models also exist, however they are out of the scope of this evaluation. The functions of the TOE that are within the scope of evaluation covering: Secure generation, distribution and destruction of cryptographic keys. Secure storage and management of keys throughout their lifecycle. User authentication to facilitate controlled access to cryptographic key management and TOE management functions by trusted personnel only. Security management to enable role-based management of the core functions of the TOE. Access control for key management functions to ensure that only specified roles are permitted to perform defined tasks. Auditing of security relevant events to provide suitable accountability. Self-test of the core cryptographic functions and algorithms of the TOE. Tamper protection to ensure that the TOE is adequately protected from unauthorised physical access.', 'certification_date': '2013-01-04', 'expiration_date': '2018-01-04'}}} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '62d3c7b451258e05e404178d4542c6529772349953f0bd763562425532cfd580', 'txt_hash': 'e497d90d3f4bd87d2ee2ad74e8011964cd46face7eddc4845116dbd70a755d13'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'edb15ba5a7b02a5cfc8aca5dca1be188d6d4b7b36d0d7ebb076848c6569afca5', 'txt_hash': '540efd6f2e0f9d8de96809ee978f580b8c26592814e18dceabb7c52ef1531d93'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 442113, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 30, '/Author': 'ISCB Department', '/Category': 'PUBLIC', '/Caveat': 'FINAL', '/Classification': 'PUBLIC', '/Company': 'CyberSecurity Malaysia', '/CreationDate': "D:20130109091227+08'00'", '/Creator': 'Acrobat PDFMaker 10.1 for Word', '/Developer': 'AEP Networks', '/Document Type': 'REPORT', '/Identifier': 'ISCB-5-RPT-C037-CR-v1a', '/Index': 'MyCB_TMP_011', '/Keywords': 'Keyper', '/ModDate': "D:20130109091238+08'00'", '/Phase': 'Release', '/Producer': 'Adobe PDF Library 10.0', '/Project Code': 'C037', '/Released': '4 January 2013', '/ST Title': 'Security Target for the Keyper Hardware Security Module (HSM) v2.0', '/ST Version': 'v1.3', '/SourceModified': 'D:20130109011207', '/Sponsor': 'AEP Networks', '/Subject': 'Keyper Hardware Security Module (HSM) v2.0', '/TOE Name': 'Keyper Hardware Security Module (HSM) v2.0', '/TOE Version': 'version 2.0', '/Title': 'C037 Certification Report', '/Version': 'v1a', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cybersecurity.my/mycc', 'mailto:[email protected]']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 737530, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 77, '/Author': 'Doug Stuart', '/Category': 'ASE', '/Company': 'stratsec', '/CreationDate': "D:20121218144137+08'00'", '/Creator': 'Acrobat PDFMaker 10.1 for Word', '/DEV_Fullname': 'AEP Networks', '/DEV_Shortname': 'AEP', '/DEV_Sponsor': 'David Miller', '/DOC_Classification': 'COMMERCIAL-IN-CONFIDENCE', '/DOC_Id': 'KPR_EAL4_ASE', '/DOC_Phase': 'DRAFT', '/DOC_Released': '13-DEC-2012', '/DOC_Title': 'Keyper HSM EAL4 Security Target', '/DOC_Version': '1.3', '/EVAL_CC': '3.1 (Rev 3)', '/EVAL_EAL': 'EAL4', '/ModDate': "D:20121218144151+08'00'", '/Producer': 'Adobe PDF Library 10.0', '/SourceModified': 'D:20121213065300', '/Subject': 'Security Target', '/TOE_Fullname': 'Keyper Hardware Security Module Version 2.0', '/TOE_Shortname': 'Keyper HSM', '/TOE_Version': '2.0', '/Title': 'Keyper Hardware Security Module (HSM) v2.0', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'MY': {'ISCB-5-RPT-C037-CR-v1a': 30}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 5, 'EAL4+': 3}}, 'cc_sar': {'AVA': {'AVA_VAN.5': 7}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1, 'FAU_GEN.2': 1}, 'FCS': {'FCS_CKM.1': 1, 'FCS_RND.1': 1, 'FCS_CKM.2': 1, 'FCS_CKM.4': 1, 'FCS_COP': 3}, 'FDP': {'FDP_ACF': 7, 'FDP_ACC': 2, 'FDP_RIP.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_SOS.1': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MSA.1': 1, 'FMT_MSA.2': 1, 'FMT_MSA.3': 1, 'FMT_SMF.1.1': 1, 'FMT_SMF.1': 1, 'FMT_SMR.1': 1, 'FMT_MTD': 2}, 'FPT': {'FPT_ITC.1': 1, 'FPT_ITI.1': 1, 'FPT_TST.1': 1, 'FPT_FLS.1': 1, 'FPT_RCV.1': 1, 'FPT_PHP.2': 1, 'FPT_PHP.3': 1, 'FPT_STM.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1, 'DPA': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 140-2': 2, 'FIPS 140-2': 1}, 'PKCS': {'PKCS11': 1, 'PKCS#11': 1}, 'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 10}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 3, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 5}, 'ASE': {'ASE_INT': 3, 'ASE_REQ': 8, 'ASE_CCL': 3, 'ASE_SPD': 3, 'ASE_OBJ': 3, 'ASE_ECD': 3, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 12, 'FAU_GEN.2': 9, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1}, 'FCS': {'FCS_CKM.1': 24, 'FCS_CKM.2': 20, 'FCS_CKM.4': 24, 'FCS_COP': 37, 'FCS_RND.1': 15, 'FCS_RND': 2, 'FCS_COP.1': 4, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_RND.1.1': 2, 'FCS_RND.1.2': 2, 'FCS_RNG.1': 1}, 'FDP': {'FDP_ACC': 16, 'FDP_ACF': 22, 'FDP_ETC.1': 7, 'FDP_IFC': 17, 'FDP_IFF': 21, 'FDP_RIP.1': 8, 'FDP_SDI.2': 7, 'FDP_ITC.1': 8, 'FDP_ITC.2': 8, 'FDP_ACF.1': 4, 'FDP_ACC.1': 6, 'FDP_IFC.1': 6, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_IFF.1': 3, 'FDP_IFF.3': 2, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_IFF.4': 2}, 'FIA': {'FIA_SOS.1': 8, 'FIA_UAU.1': 9, 'FIA_UID.1': 15, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MTD': 20, 'FMT_SMF.1': 15, 'FMT_SMR.1': 14, 'FMT_MSA.3': 3, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1': 2, 'FMT_MTD.1': 1}, 'FPT': {'FPT_FLS.1': 12, 'FPT_ITC.1': 7, 'FPT_ITI.1': 9, 'FPT_PHP.2': 13, 'FPT_PHP.3': 9, 'FPT_RCV.1': 8, 'FPT_STM.1': 8, 'FPT_TST.1': 21, 'FPT_FLS.1.1': 1, 'FPT_ITC.1.1': 1, 'FPT_ITI.1.1': 1, 'FPT_ITI.1.2': 1, 'FPT_PHP.1': 1, 'FPT_PHP.2.1': 1, 'FPT_PHP.2.2': 1, 'FPT_PHP.2.3': 1, 'FPT_PHP.3.1': 1, 'FPT_RCV.1.1': 1, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_ITC': 1}}, 'cc_claims': {'O': {'O.AUDIT_CM': 1, 'O.CSP-': 1}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}, 'E2': {'E2': 2}}, 'DES': {'DES': {'DES': 8}, '3DES': {'TDES': 4, '3DES': 4}}}, 'asymmetric_crypto': {'FF': {'DSA': {'DSA': 8}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-2': 1}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 3}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'ECB': {'ECB': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Side-channel': 5, 'Side-channels': 2, 'side-channel': 3, 'side-channels': 4, 'side channel': 1}, 'FI': {'physical tampering': 7, 'Malfunction': 3, 'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 140-2': 2, 'FIPS PUB 186-2': 5, 'FIPS 140-2': 2}, 'NIST': {'NIST SP 800-90': 1}, 'PKCS': {'PKCS11': 1, 'PKCS#11': 1}, 'RFC': {'RFC 3447': 1}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to cr-ISCB-5-RPT-C037-v1a.pdf.
    • The st_filename property was set to st-AEP_Keyper_EAL4_ASE_1_3.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ISCB-5-RPT-C037-CR-v1a.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr-ISCB-5-RPT-C037-v1a.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-AEP_Keyper_EAL4_ASE_1_3.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Keyper Hardware Security Module (HSM) v2.0:a) Enterprise (Hardware: 9720, Software: 011126)b) Professional (Hardware: 9720, Software: 010405) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Key Management Systems",
  "cert_link": null,
  "dgst": "5f49aadb6b4baf28",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ISCB-5-RPT-C037-CR-v1a",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_no": "2013-001-C037",
      "certification_date": "2013-01-04",
      "developer": "AEP Networks Ltd.",
      "enhanced": {
        "assurance_level": "EAL4+ AVA_VAN.5",
        "category": "Key Management System",
        "cert_id": "C037",
        "certification_date": "2013-01-04",
        "developer": "AEP Networks Ltd. Knaves Beech Business Centre,Loudwater, Buckinghamshire,HP10 9UT,UNITED KINGDOM. URL: http://www.aepnetworks.com/Email: [email protected]: +44 1628 642 600Fax: +44 1628 642 605",
        "expiration_date": "2018-01-04",
        "mutual_recognition": "CCRA",
        "product": "Keyper Hardware Security Module (HSM) v2.0: a) Enterprise (Hardware: 9720, Software: 011126) b) Professional (Hardware: 9720, Software: 010405)",
        "report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C037/ISCB-5-RPT-C037-CR-v1a.pdf",
        "scope": "Keyper Hardware Security Module (HSM) v2.0 or the Target of Evaluation (TOE) is a dedicated hardware product which provides secure digital signature services, cryptographic services and key management services to applications that reside on physically separate host computer systems. The TOE is a secure module that is contained within an outer casing. The outer casing includes a Keypad, LCD screen, smart card reader and a number of external ports; they are out of the evaluation scope. The TOE is tamper reactive; and has been validated against the requirements for the FIPS PUB 140-2 at level 4. Keyper Hardware Security Module (HSM) v2.0 is intended for use in a dedicated network with devices and applications that make use of its cryptographic functions. Keyper Hardware Security Module (HSM) v2.0 should be provided appropriate physical and logical protections. The TOE encompasses two models: AEP Keyper Enterprise (Hardware: 9720, Software: 011126) and AEP Keyper Professional (Hardware: 9720, Software: 010405). Both models share the same features and architecture (the only difference is performance), therefore both models shall be considered together. Two additional \u201cHigh Availability\u201d models also exist, however they are out of the scope of this evaluation. The functions of the TOE that are within the scope of evaluation covering: Secure generation, distribution and destruction of cryptographic keys. Secure storage and management of keys throughout their lifecycle. User authentication to facilitate controlled access to cryptographic key management and TOE management functions by trusted personnel only. Security management to enable role-based management of the core functions of the TOE. Access control for key management functions to ensure that only specified roles are permitted to perform defined tasks. Auditing of security relevant events to provide suitable accountability. Self-test of the core cryptographic functions and algorithms of the TOE. Tamper protection to ensure that the TOE is adequately protected from unauthorised physical access.",
        "status": "Archive",
        "target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C037/AEP_Keyper_EAL4_ASE_1.3.pdf",
        "type": "Web based frontend to the Microsoft Certification Authority (CA) services"
      },
      "expiration_date": "2018-01-04",
      "level": "EAL4+ AVA_VAN.5",
      "product": "Keyper Hardware Security Module (HSM) v2.0: a) Enterprise (Hardware: 9720, Software: 011126) b) Professional (Hardware: 9720, Software: 010405)",
      "recognition": "CCRA",
      "url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/98"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "AEP Networks Ltd.",
  "manufacturer_web": "https://www.aepnetworks.com/",
  "name": "Keyper Hardware Security Module (HSM) v2.0:a) Enterprise (Hardware: 9720, Software: 011126)b) Professional (Hardware: 9720, Software: 010405)",
  "not_valid_after": "2018-01-04",
  "not_valid_before": "2013-01-04",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "cr-ISCB-5-RPT-C037-v1a.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "MY": {
          "ISCB-5-RPT-C037-CR-v1a": 30
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 5,
          "EAL4+": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_GEN.2": 1
        },
        "FCS": {
          "FCS_CKM.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 1,
          "FCS_COP": 3,
          "FCS_RND.1": 1
        },
        "FDP": {
          "FDP_ACC": 2,
          "FDP_ACF": 7,
          "FDP_RIP.1": 1,
          "FDP_SDI.2": 1
        },
        "FIA": {
          "FIA_SOS.1": 1,
          "FIA_UAU.1": 1,
          "FIA_UID.1": 1
        },
        "FMT": {
          "FMT_MSA.1": 1,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 1,
          "FMT_MTD": 2,
          "FMT_SMF.1": 1,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_ITC.1": 1,
          "FPT_ITI.1": 1,
          "FPT_PHP.2": 1,
          "FPT_PHP.3": 1,
          "FPT_RCV.1": 1,
          "FPT_STM.1": 1,
          "FPT_TST.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "DPA": 1,
          "SPA": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS PUB 140-2": 2
        },
        "ISO": {
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2
        },
        "PKCS": {
          "PKCS#11": 1,
          "PKCS11": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "ISCB Department",
      "/Category": "PUBLIC",
      "/Caveat": "FINAL",
      "/Classification": "PUBLIC",
      "/Company": "CyberSecurity Malaysia",
      "/CreationDate": "D:20130109091227+08\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 10.1 for Word",
      "/Developer": "AEP Networks",
      "/Document Type": "REPORT",
      "/Identifier": "ISCB-5-RPT-C037-CR-v1a",
      "/Index": "MyCB_TMP_011",
      "/Keywords": "Keyper",
      "/ModDate": "D:20130109091238+08\u002700\u0027",
      "/Phase": "Release",
      "/Producer": "Adobe PDF Library 10.0",
      "/Project Code": "C037",
      "/Released": "4 January 2013",
      "/ST Title": "Security Target for the Keyper Hardware Security Module (HSM) v2.0",
      "/ST Version": "v1.3",
      "/SourceModified": "D:20130109011207",
      "/Sponsor": "AEP Networks",
      "/Subject": "Keyper Hardware Security Module (HSM) v2.0",
      "/TOE Name": "Keyper Hardware Security Module (HSM) v2.0",
      "/TOE Version": "version 2.0",
      "/Title": "C037 Certification Report",
      "/Version": "v1a",
      "pdf_file_size_bytes": 442113,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "http://www.cybersecurity.my/mycc"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 30
    },
    "st_filename": "st-AEP_Keyper_EAL4_ASE_1_3.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DSA": {
            "DSA": 8
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.AUDIT_CM": 1,
          "O.CSP-": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 3,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL": 3,
          "ASE_CCL.1": 1,
          "ASE_ECD": 3,
          "ASE_ECD.1": 1,
          "ASE_INT": 3,
          "ASE_INT.1": 1,
          "ASE_OBJ": 3,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 8,
          "ASE_REQ.2": 1,
          "ASE_SPD": 3,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 10
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 12,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 9,
          "FAU_GEN.2.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 24,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 20,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 24,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 37,
          "FCS_COP.1": 4,
          "FCS_RND": 2,
          "FCS_RND.1": 15,
          "FCS_RND.1.1": 2,
          "FCS_RND.1.2": 2,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 16,
          "FDP_ACC.1": 6,
          "FDP_ACF": 22,
          "FDP_ACF.1": 4,
          "FDP_ETC.1": 7,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 1,
          "FDP_IFC": 17,
          "FDP_IFC.1": 6,
          "FDP_IFF": 21,
          "FDP_IFF.1": 3,
          "FDP_IFF.3": 2,
          "FDP_IFF.4": 2,
          "FDP_ITC.1": 8,
          "FDP_ITC.2": 8,
          "FDP_RIP.1": 8,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 7,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FIA": {
          "FIA_SOS.1": 8,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 9,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 15,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 2,
          "FMT_MSA.3": 3,
          "FMT_MTD": 20,
          "FMT_MTD.1": 1,
          "FMT_SMF.1": 15,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 14,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 12,
          "FPT_FLS.1.1": 1,
          "FPT_ITC": 1,
          "FPT_ITC.1": 7,
          "FPT_ITC.1.1": 1,
          "FPT_ITI.1": 9,
          "FPT_ITI.1.1": 1,
          "FPT_ITI.1.2": 1,
          "FPT_PHP.1": 1,
          "FPT_PHP.2": 13,
          "FPT_PHP.2.1": 1,
          "FPT_PHP.2.2": 1,
          "FPT_PHP.2.3": 1,
          "FPT_PHP.3": 9,
          "FPT_PHP.3.1": 1,
          "FPT_RCV.1": 8,
          "FPT_RCV.1.1": 1,
          "FPT_STM.1": 8,
          "FPT_STM.1.1": 1,
          "FPT_TST.1": 21,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-2": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 3,
          "malfunction": 3,
          "physical tampering": 7
        },
        "SCA": {
          "Side-channel": 5,
          "Side-channels": 2,
          "side channel": 1,
          "side-channel": 3,
          "side-channels": 4
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1
        },
        "FIPS": {
          "FIPS 140-2": 2,
          "FIPS PUB 140-2": 2,
          "FIPS PUB 186-2": 5
        },
        "NIST": {
          "NIST SP 800-90": 1
        },
        "PKCS": {
          "PKCS#11": 1,
          "PKCS11": 1
        },
        "RFC": {
          "RFC 3447": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 8
          },
          "E2": {
            "E2": 2
          }
        },
        "DES": {
          "3DES": {
            "3DES": 4,
            "TDES": 4
          },
          "DES": {
            "DES": 8
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Doug Stuart",
      "/Category": "ASE",
      "/Company": "stratsec",
      "/CreationDate": "D:20121218144137+08\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 10.1 for Word",
      "/DEV_Fullname": "AEP Networks",
      "/DEV_Shortname": "AEP",
      "/DEV_Sponsor": "David Miller",
      "/DOC_Classification": "COMMERCIAL-IN-CONFIDENCE",
      "/DOC_Id": "KPR_EAL4_ASE",
      "/DOC_Phase": "DRAFT",
      "/DOC_Released": "13-DEC-2012",
      "/DOC_Title": "Keyper HSM EAL4 Security Target",
      "/DOC_Version": "1.3",
      "/EVAL_CC": "3.1 (Rev 3)",
      "/EVAL_EAL": "EAL4",
      "/ModDate": "D:20121218144151+08\u002700\u0027",
      "/Producer": "Adobe PDF Library 10.0",
      "/SourceModified": "D:20121213065300",
      "/Subject": "Security Target",
      "/TOE_Fullname": "Keyper Hardware Security Module Version 2.0",
      "/TOE_Shortname": "Keyper HSM",
      "/TOE_Version": "2.0",
      "/Title": "Keyper Hardware Security Module (HSM) v2.0",
      "pdf_file_size_bytes": 737530,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 77
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr-ISCB-5-RPT-C037-v1a.pdf",
  "scheme": "MY",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-AEP_Keyper_EAL4_ASE_1_3.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "62d3c7b451258e05e404178d4542c6529772349953f0bd763562425532cfd580",
      "txt_hash": "e497d90d3f4bd87d2ee2ad74e8011964cd46face7eddc4845116dbd70a755d13"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "edb15ba5a7b02a5cfc8aca5dca1be188d6d4b7b36d0d7ebb076848c6569afca5",
      "txt_hash": "540efd6f2e0f9d8de96809ee978f580b8c26592814e18dceabb7c52ef1531d93"
    }
  },
  "status": "archived"
}