This page was not yet optimized for use on mobile
devices.
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.3.2; (Firmware Vers. 1.2.28, HW Vers. 0)
CSV information
| Status | archived |
|---|---|
| Valid from | 11.12.2020 |
| Valid until | 10.12.2025 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Bundesdruckerei GmbH |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL3 |
| Protection profiles | |
| Maintenance updates | tBSI-DSZ-CC-1161-2020-MA-01Bundesdruckerei Document Application withtamper-evident casing, Document ApplicationVersion 2.3.2; (Firmware Vers. 1.2.28, HW Vers. 0) (22.03.2021) Certification report |
Heuristics summary
Certificate ID: BSI-DSZ-CC-1161-2020
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 3, EAL 2Security Assurance Requirements (SAR)
ALC_FLRProtection profiles
BSI-CC-PP-0064-Certificates
BSI-DSZ-CC-1161-2020Standards
ISO/IEC 15408, ISO/IEC 18045Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, CMACAsymmetric Algorithms
ECDH, ECDSAHash functions
SHA1, SHA-1, SHA256, SHA384, SHA512, SHA224Schemes
MACProtocols
SSH, TLS, PACERandomness
RNGBlock cipher modes
CBCSecurity level
EAL 3, EAL 2, EAL 1, EAL 4, EAL 2+Security Assurance Requirements (SAR)
ADV_ARC, ALC_FLR, ATE_FUN, ATE_IND, AVA_VANSecurity Functional Requirements (SFR)
FAU_GEN.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_API.1, FIA_UAU.2, FIA_UID.2, FMT_SMR.1, FMT_SMF.1, FMT_MTD, FPT_PHP, FTP_TRPProtection profiles
BSI-CC-PP-0064-, BSI-CC-PP-0064-V2-2018Certificates
BSI-DSZ-CC-1161-2020, BSI-DSZ-CC-1125-, BSI-DSZ-CC-1125-2019, BSI-DSZ-CC-1161Evaluation facilities
TÜV InformationstechnikSide-channel analysis
physical tamperingCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Evaluation Technical Report, Version 2, 2020-11-17, BSI-DSZ-CC-1161, TÜV Informationstechnik GmbH (confidential document) [8] Common Criteria Protection Profile for Document Management Terminal DMT-PP, Security (BSI) [9] Configuration list for the TOE, 1.30, 2020-10-28, Bundesdruckerei GmbH (confidential document) [10] Guidance documentation for the TOE, Version 1.172, 2020-07-07, VISOTEC® V- ÄNDERUNGSTERMINALStandards
FIPS186-2, FIPS180-4, FIPS PUB 46-3, FIPS 197, FIPS186-4, FIPS197, AIS48, AIS 20, AIS 32, RFC5246, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-1161-2020 |
|---|---|
| Subject | Zertifizierungsreport BSI-DSZ-CC-1161-2020 |
| Keywords | "Common Criteria, Certification, Zertifizierung, Document Management Terminal, DMT, BSI-CC-PP-0064-V2-2018, Bundesdruckerei GmbH" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20210119144356+01'00' |
| Modification date | D:20210120150946+01'00' |
| Pages | 29 |
| Creator | Writer |
| Producer | LibreOffice 6.3 |
Frontpage
| Certificate ID | BSI-DSZ-CC-1161-2020 |
|---|---|
| Certified item | Bundesdruckerei Document Application with tamper-evident casing Document Application Version 2.3.2; (Firmware Vers. 1.2.28, HW Vers. 0 |
| Certification lab | BSI |
| Developer | Bundesdruckerei GmbH |
References
Outgoing- BSI-DSZ-CC-1125-2019 - archived - Bundesdruckerei Document Application with tamper-evident casing, Document Applicatio Vesion 2.2.1; (Firmware Vers. 1.1.12, HW Vers. 0)
- BSI-DSZ-CC-1181-2021 - active - Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)
Security target
Extracted keywords
Symmetric Algorithms
AES, E2, DES, Triple-DES, 3DES, KMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DHHash functions
SHA-1, SHA1, SHA-256, SHA-224, SHA-384, SHA-512, SHA256Schemes
MACProtocols
TLS1.2, TLS 1.2, PACERandomness
RNGElliptic Curves
P-256, P-384, NIST P-384, secp384r1, secp256r1, secp521r1, prime256v1, brainpoolP224r1, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1Block cipher modes
CBCIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG13, EF.COM, EF.SODSecurity level
EAL 3, EAL4+, EAL3Claims
A.PKI, R.CRL, OE.PKI, OSP.RNGSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.2, AGD_OPE.1, ALC_CMC.3, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, AVA_VAN.2, APE_ECD, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN, FCS_RNG.1, FCS_COP, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_RNG, FDP_RIP.1, FDP_RIP.1.1, FIA_API.1, FIA_UAU.4, FIA_API, FIA_API.1.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.1, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FMT_MTD, FMT_MTD.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_PHP, FPT_PHP.1, FTP_TRP, FTP_TRP.1, FTP_TRP.1.2Protection profiles
BSI-CC-PP-0064-V2-2018, BSI-CC-PP-0064-Certificates
BSI-DSZ-CC-1161Side-channel analysis
physical tamperingStandards
FIPS 180-4, FIPS186-4, FIPS180-4, FIPS186-2, FIPS197, FIPS 186-2, FIPS 186-4, FIPS PUB 197, AIS31, RFC5280, RFC3369, ISO/IEC 14443, ISO/IEC 7816-4, ICAOFile metadata
| Title | Bundesdruckerei Document Application Common Criteria Evaluation |
|---|---|
| Subject | Security Target |
| Keywords | CC, ST, Common Criteria, Security Target, Inspection System, PA, eAT, ePass |
| Author | Alexander Haferland |
| Creation date | D:20200911130017+02'00' |
| Modification date | D:20200911130017+02'00' |
| Pages | 91 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-1161-2020Extracted SARs
ADV_ARC.1, ADV_TDS.2, AGD_OPE.1, ALC_CMC.3, ALC_DEL.1, ALC_LCD.1, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1, ATE_COV.2, ATE_FUN.1, AVA_VAN.5Similar certificates
Showing 5 out of 16.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1161c_pdf.pdf",
"dgst": "1355c394ee74fa69",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1161-2020",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL3",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.2.28",
"2.3.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"2f40ca96ef4a080e"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1181-2021"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1125-2019"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1181-2021",
"BSI-DSZ-CC-1215-2023",
"BSI-DSZ-CC-1247-2025"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1125-2019",
"BSI-DSZ-CC-1093"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2021-03-22",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1161ma1a_pdf.pdf",
"maintenance_st_link": null,
"maintenance_title": "tBSI-DSZ-CC-1161-2020-MA-01Bundesdruckerei Document Application withtamper-evident casing, Document ApplicationVersion 2.3.2; (Firmware Vers. 1.2.28, HW Vers. 0)"
}
]
},
"manufacturer": "Bundesdruckerei GmbH",
"manufacturer_web": "https://www.bundesdruckerei.de",
"name": "Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.3.2; (Firmware Vers. 1.2.28, HW Vers. 0)",
"not_valid_after": "2025-12-10",
"not_valid_before": "2020-12-11",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "1161c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1161-2020": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0064-": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 3": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "1161a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 3 SOGIS Recognition Agreement",
"cc_version": "PP conformant Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-1161-2020",
"cert_item": "Bundesdruckerei Document Application with tamper-evident casing Document Application Version 2.3.2; (Firmware Vers. 1.2.28, HW Vers. 0",
"cert_lab": "BSI",
"developer": "Bundesdruckerei GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064- V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 7
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1125-": 1,
"BSI-DSZ-CC-1125-2019": 2,
"BSI-DSZ-CC-1161": 1,
"BSI-DSZ-CC-1161-2020": 15
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0064-": 1,
"BSI-CC-PP-0064-V2-2018": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1
},
"ALC": {
"ALC_FLR": 3
},
"ATE": {
"ATE_FUN": 1,
"ATE_IND": 5
},
"AVA": {
"AVA_VAN": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 3": 4,
"EAL 4": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1
},
"FIA": {
"FIA_API.1": 1,
"FIA_UAU.2": 1,
"FIA_UAU.4": 1,
"FIA_UAU.5": 1,
"FIA_UAU.6": 1,
"FIA_UID.2": 1
},
"FMT": {
"FMT_MTD": 3,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_PHP": 1
},
"FTP": {
"FTP_TRP": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"Evaluation Technical Report, Version 2, 2020-11-17, BSI-DSZ-CC-1161, T\u00dcV Informationstechnik GmbH (confidential document) [8] Common Criteria Protection Profile for Document Management Terminal DMT-PP": 1,
"Security (BSI) [9] Configuration list for the TOE, 1.30, 2020-10-28, Bundesdruckerei GmbH (confidential document) [10] Guidance documentation for the TOE, Version 1.172, 2020-07-07, VISOTEC\u00ae V- \u00c4NDERUNGSTERMINAL": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 6
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 8
},
"SSH": {
"SSH": 3
},
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 3
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1,
"SHA1": 1
},
"SHA2": {
"SHA224": 1,
"SHA256": 10,
"SHA384": 6,
"SHA512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 7
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 4
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 32": 1,
"AIS48": 1
},
"FIPS": {
"FIPS 197": 8,
"FIPS PUB 46-3": 2,
"FIPS180-4": 7,
"FIPS186-2": 6,
"FIPS186-4": 1,
"FIPS197": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"RFC": {
"RFC5246": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"3DES": {
"3DES": 4
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CMAC": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20210119144356+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Document Management Terminal, DMT, BSI-CC-PP-0064-V2-2018, Bundesdruckerei GmbH\"",
"/ModDate": "D:20210120150946+01\u002700\u0027",
"/Producer": "LibreOffice 6.3",
"/Subject": "Zertifizierungsreport BSI-DSZ-CC-1161-2020",
"/Title": "Certification Report BSI-DSZ-CC-1161-2020",
"pdf_file_size_bytes": 423147,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/AIS",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
},
"st_filename": "1161b_pdf(1).pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1161": 1
}
},
"cc_claims": {
"A": {
"A.PKI": 4
},
"OE": {
"OE.PKI": 4
},
"OSP": {
"OSP.RNG": 4
},
"R": {
"R.CRL": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0064-": 1,
"BSI-CC-PP-0064-V2-2018": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_DEL.1": 1,
"ALC_LCD.1": 1
},
"APE": {
"APE_ECD": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.2": 1,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 4,
"EAL3": 1,
"EAL4+": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 5,
"FAU_GEN.1.1": 3,
"FAU_GEN.1.2": 2
},
"FCS": {
"FCS_CKM": 13,
"FCS_CKM.1": 15,
"FCS_CKM.4": 5,
"FCS_CKM.4.1": 1,
"FCS_COP": 29,
"FCS_COP.1": 25,
"FCS_RNG": 3,
"FCS_RNG.1": 6,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_RIP.1": 4,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_API": 1,
"FIA_API.1": 6,
"FIA_API.1.1": 1,
"FIA_UAU.1": 3,
"FIA_UAU.2": 6,
"FIA_UAU.2.1": 1,
"FIA_UAU.4": 5,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 4,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 4,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 2,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MTD": 22,
"FMT_MTD.1": 5,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 5,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_PHP": 4,
"FPT_PHP.1": 2
},
"FTP": {
"FTP_TRP": 4,
"FTP_TRP.1": 3,
"FTP_TRP.1.2": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 27
},
"TLS": {
"TLS": {
"TLS 1.2": 2,
"TLS1.2": 6
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 12
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP224r1": 1,
"brainpoolP256r1": 2,
"brainpoolP384r1": 2,
"brainpoolP512r1": 2
},
"NIST": {
"NIST P-384": 1,
"P-256": 2,
"P-384": 1,
"prime256v1": 2,
"secp256r1": 1,
"secp384r1": 3,
"secp521r1": 1
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 7,
"SHA1": 2
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 5,
"SHA-384": 2,
"SHA-512": 2,
"SHA256": 2
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 2,
"EF.DG1": 2,
"EF.DG13": 1,
"EF.DG16": 2,
"EF.DG2": 1,
"EF.DG3": 2,
"EF.DG4": 2,
"EF.DG5": 1,
"EF.SOD": 2
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 25
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 5
}
},
"standard_id": {
"BSI": {
"AIS31": 2
},
"FIPS": {
"FIPS 180-4": 2,
"FIPS 186-2": 1,
"FIPS 186-4": 1,
"FIPS PUB 197": 1,
"FIPS180-4": 3,
"FIPS186-2": 2,
"FIPS186-4": 3,
"FIPS197": 2
},
"ICAO": {
"ICAO": 13
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816-4": 1
},
"RFC": {
"RFC3369": 1,
"RFC5280": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
},
"E2": {
"E2": 1
}
},
"DES": {
"3DES": {
"3DES": 4,
"Triple-DES": 4
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 2,
"KMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Alexander Haferland",
"/CreationDate": "D:20200911130017+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/Keywords": "CC, ST, Common Criteria, Security Target, Inspection System, PA, eAT, ePass",
"/ModDate": "D:20200911130017+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Subject": "Security Target",
"/Title": "Bundesdruckerei Document Application Common Criteria Evaluation",
"pdf_file_size_bytes": 1654579,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 91
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0064V2b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1161a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1161b_pdf(1).pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "a2285889205be3b7175de2e8ed9c13cb80c954b2dfe4ad416ebcf44b2bbf3a25",
"txt_hash": "2fe3e006035576e2ebcb068b66d130422f83ac1ee5444a9106ac40d97ba63a87"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "2de240d58368644b6f88d646c749fe3d304df95ab165ce17af0732aa081c9474",
"txt_hash": "69647a13214bb1901bbd3c990217ce77bb671939718b6bfab99765008c97ab6f"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "d9726ac3f917a1e4625bc8f79a609473ac1f4cf5498d05eb666d3df39fefdeaa",
"txt_hash": "c5e4798f33b7f0a2c34d5df4dd4d6a063063c739cab09bedee86092ec32db023"
}
},
"status": "archived"
}