TCOS eEnergy Security Module Version 2.0 Release 1/P71
CSV information ?
Status | active |
---|---|
Valid from | 29.02.2024 |
Valid until | 01.03.2034 |
Scheme | 🇩🇪 DE |
Manufacturer | Deutsche Telekom Security GmbH |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL4+, ATE_DPT.2 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ATE_DPT.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0077-V2-2015Certificates
BSI-DSZ-CC-1217-2024Evaluation facilities
Deutsche Telekom SecurityStandards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Certificate BSI-DSZ-CC-1217-2024 |
---|---|
Subject | Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2 |
Keywords | "Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Pages | 1 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, CMACAsymmetric Algorithms
ECDSA, ECC, DH, Diffie-HellmanSchemes
MAC, Key Agreement, KAProtocols
TLS, PACERandomness
RNGBlock cipher modes
CBCVendor
NXP, NXP SemiconductorsSecurity level
EAL 4, EAL 5, EAL 2, EAL 1, EAL5+, EAL6, EAL 5+, EAL 6, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ADV_ARC, ALC_DVS.2, ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, AVA_VAN.5Security Functional Requirements (SFR)
FCS_COP, FCS_CKM, FCS_RNG.1, FIA_UID.1, FIA_UAU.4, FIA_UAU.5, FTP_ITC.1Protection profiles
BSI-CC-PP-0077-V2-2015Certificates
BSI-DSZ-CC-1217-2024, BSI-DSZ-CC-1149-V3-2023, BSI-DSZ-CC-1217Evaluation facilities
TÃœV Informationstechnik, Deutsche Telekom Security, SRC Security Research & ConsultingSide-channel analysis
side channel, malfunction, fault injection, JILCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Version 2.0 Release 1/P71, Version 1.1, 16 February 2024, SRC Security Research & Consulting GmbH (confidential document) [9] Configuration List BSI-DSZ-CC-1217, Konfigurationsliste von TCOS eESM Version 2.0 Release, P71D600, Version 1.0, 13 February 2024, Deutsche Telekom Security GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-1217, Operational Guidance for users and administrators, R1/R2R3), BSI- DSZ-CC-1149-V3-2023, Version 2, 1 December 2023, TÃœV Informationstechnik GmbH (confidential document) [14] Technische Richtlinie BSI TR-03109-1: Smart Meter Gateway - Anforderungen an dieStandards
FIPS 180-4, FIPS 186, FIPS 197, AIS 34, AIS 36, AIS 37, AIS 26, AIS 25, AIS 20, AIS 31, AIS 46, AIS 1, AIS 14, AIS 19, AIS 32, AIS 35, AIS 38, RFC 5639, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-03109-2, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-1217-2024 |
---|---|
Subject | Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2 |
Keywords | "Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Pages | 29 |
Frontpage
Certificate ID | BSI-DSZ-CC-1217-2024 |
---|---|
Certified item | TCOS eEnergy Security Module Version 2.0 Release 1/P71 |
Certification lab | BSI |
Developer | Deutsche Telekom Security GmbH |
References
Outgoing- BSI-DSZ-CC-1149-V3-2023 - active - NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3)
Security target ?
Extracted keywords
Symmetric Algorithms
AES, TDES, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-HellmanSchemes
MAC, Key AgreementProtocols
TLS, PACERandomness
RND, RNGElliptic Curves
P-256, P-384, NIST P-256, NIST P-384, secp256r1, secp384r1, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1Block cipher modes
CBCVendor
NXP, NXP SemiconductorsSecurity level
EAL4, EAL 6+, EAL 4, EAL 6, EAL4 augmented, EAL 6 augmentedClaims
O.PACE, O.RND, O.AES, O.TDES, O.RSA, O.ECC, O.PUF, OE.PACE, OSP.SMSecurity Assurance Requirements (SAR)
ADV_TDS, ADV_ARC.1, ADV_TDS.3, ADV_FUN.1, ADV_ARC, ADV_FSP, ADV_FSP.4, ADV_IMP.1, AGD_PRE.1, AGD_OPE.1, ALC_FLR.1, ALC_DVS.2, ALC_DEL.1, ALC_CMC.4, ALC_CMS.4, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_TSS.2Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FDP_ACF, FDP_ACC.2, FDP_ACF.1, FDP_SDI.2, FDP_RIP.1, FDP_ETC.1, FDP_ITC.1, FDP_UCT.1, FDP_UIT.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_RIP.1.1, FDP_IFC, FDP_ETC.1.1, FDP_ETC.1.2, FDP_IFC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UIT.1.2, FDP_ITC, FDP_SDI, FDP_RIP, FDP_UIT, FDP_SDC.1, FDP_ITT.1, FDP_ACC, FDP_UCT, FIA_ATD.1, FIA_SOS.1, FIA_UAU, FIA_UAU.4, FIA_UAU.5, FIA_UID.1, FIA_USB.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS, FIA_UID, FIA_USB, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMR, FMT_MSA, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_PHP, FPT_TST, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_ICT.1, FTP_ITCProtection profiles
BSI-CC-PP-0077-V2-2015, BSI-CC-PP-0073-2014Certificates
BSI-DSZ-CC-1217, BSI-DSZ-CC-1149-V3-2023Evaluation facilities
Deutsche Telekom SecuritySide-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channels, side channel, side-channels, SPA, DPA, timing attacks, Physical tampering, physical tampering, Malfunction, malfunction, DFA, fault injectionCertification process
out of scope, entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and theStandards
FIPS186, FIPS197, FIPS PUB 186-4, AIS36, AIS 36, RFC5639, RFC 5639, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004Technical reports
BSI TR-03109File metadata
Title | Security Target TCOS Smart Meter Security Module (NXP) |
---|---|
Subject | TCOS Smart Meter Security Module Version 1.0 Release 1 |
Keywords | "TCOS Security Module, Sicherheitsmodul, Smart Meter" |
Author | Deutsche Telekom Security GmbH |
Pages | 75 |
References
Outgoing- BSI-DSZ-CC-1149-V3-2023 - active - NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3)
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_FUN.1, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, AVA_VAN.5Similar certificates
Scheme data ?
Cert Id | BSI-DSZ-CC-1217-2024 | |
---|---|---|
Product | TCOS eEnergy Security Module Version 2.0 Release 1/P71 | |
Vendor | Deutsche Telekom Security GmbH | |
Certification Date | 29.02.2024 | |
Category | Intelligent measuring systems | |
Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Smartmeter_Sicherheitsmodule/1217.html | |
Enhanced | ||
Product | TCOS eEnergy Security Module Version 2.0 Release 1/P71 | |
Applicant | Deutsche Telekom Security GmbH Untere Industriestraße 20 57250 Netphen | |
Evaluation Facility | SRC Security Research & Consulting GmbH | |
Assurance Level | EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5 | |
Protection Profile | Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP), Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015 | |
Certification Date | 29.02.2024 | |
Expiration Date | 28.02.2034 | |
Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1217a_pdf.pdf?__blob=publicationFile&v=2 | |
Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1217b_pdf.pdf?__blob=publicationFile&v=2 | |
Cert Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1217c_pdf.pdf?__blob=publicationFile&v=2 | |
Description | The Target of Evaluation (TOE) is the product TCOS eEnergy Security Module Version 2.0 Release 1/P71 developed by Deutsche Telekom Security GmbH. The TOE is a Smart Meter Security Module according to the Technical Guideline BSI TR-03109-2, Version 1.1 intended to be used by a Smart Meter Gateway in a Smart Metering System. The TOE serves as cryptographic service provider for the Smart Meter Gateway and supports the Smart Meter Gateway for its specific cryptographic needs. These cryptographic services cover the following issues: Digital Signature Generation, Digital Signature Verification, Key Agreement for TLS, Key Agreement for Content Data Encryption, Key Pair Generation, Random Number Generation, Component Authentication via the PACE Protocol with Negotiation of Session Keys, Secure Messaging, and Secure Storage of Key Material and further data relevant for the Gateway. | |
Subcategory | Security module for an Smart Metering Gateway |
References ?
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2024-02-29', 'enhanced': {'__update__': {'applicant': 'Deutsche Telekom Security GmbH Untere Industriestraße 20 57250 Netphen', 'certification_date': '2024-02-29', 'expiration_date': '2034-02-28'}}}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for the Security Module of a Smart Metering System', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0077b_pdf.pdf', 'pp_ids': None}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3d8976b02e8509887aab898939d770d74abd3dc38e4a2df47b1fa7ff6263704b', 'txt_hash': '8596b1c4e04223e6f206e3aa7294881be123c7bce9e9cee470c09fbefef12699'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b614936b2d1f7d1555bee0f16f96141cdb06b86ef7c0fed1e6d10a8a1dfd526e', 'txt_hash': 'b70df464e41897e798d8a03b2ce1befe8a7e3d3f522bd148caf7f7b9caa7f3b2'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 930419, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 75, '/Author': 'Deutsche Telekom Security GmbH', '/Keywords': '"TCOS Security Module, Sicherheitsmodul, Smart Meter"', '/Subject': 'TCOS Smart Meter Security Module Version 1.0 Release 1', '/Title': 'Security Target TCOS Smart Meter Security Module (NXP)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 233498, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2"', '/Subject': 'Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2', '/Title': 'Certificate BSI-DSZ-CC-1217-2024', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1217': 1, 'BSI-DSZ-CC-1149-V3-2023': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0077-V2-2015': 2, 'BSI-CC-PP-0073-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4': 6, 'EAL 6+': 1, 'EAL 4': 5, 'EAL 6': 1, 'EAL4 augmented': 3, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_TDS': 2, 'ADV_ARC.1': 2, 'ADV_TDS.3': 2, 'ADV_FUN.1': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_PRE.1': 2, 'AGD_OPE.1': 1}, 'ALC': {'ALC_FLR.1': 2, 'ALC_DVS.2': 8, 'ALC_DEL.1': 2, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 8, 'ATE_COV.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 10}, 'ASE': {'ASE_TSS.2': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_RNG': 9, 'FCS_RNG.1': 17, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 61, 'FCS_CKM.4': 45, 'FCS_COP': 67, 'FCS_CKM.1': 16, 'FCS_CKM.2': 8, 'FCS_COP.1': 12, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACF': 4, 'FDP_ACC.2': 17, 'FDP_ACF.1': 8, 'FDP_SDI.2': 8, 'FDP_RIP.1': 7, 'FDP_ETC.1': 7, 'FDP_ITC.1': 20, 'FDP_UCT.1': 8, 'FDP_UIT.1': 7, 'FDP_ITC.2': 14, 'FDP_ACC.1': 12, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_SDI.1': 2, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_RIP.1.1': 1, 'FDP_IFC': 1, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_IFC.1': 8, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UIT.1.2': 1, 'FDP_ITC': 8, 'FDP_SDI': 1, 'FDP_RIP': 1, 'FDP_UIT': 2, 'FDP_SDC.1': 1, 'FDP_ITT.1': 1, 'FDP_ACC': 2, 'FDP_UCT': 1}, 'FIA': {'FIA_ATD.1': 10, 'FIA_SOS.1': 3, 'FIA_UAU': 18, 'FIA_UAU.4': 6, 'FIA_UAU.5': 6, 'FIA_UID.1': 14, 'FIA_USB.1': 6, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1': 5, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS': 1, 'FIA_UID': 1, 'FIA_USB': 1}, 'FMT': {'FMT_LIM': 7, 'FMT_LIM.1': 23, 'FMT_LIM.2': 21, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMF.1': 10, 'FMT_SMR.1': 6, 'FMT_MSA.3': 4, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMR': 1, 'FMT_MSA': 2}, 'FPT': {'FPT_EMS': 6, 'FPT_EMS.1': 14, 'FPT_EMS.1.1': 2, 'FPT_EMS.1.2': 2, 'FPT_FLS.1': 8, 'FPT_PHP.3': 9, 'FPT_TST.1': 9, 'FPT_FLS.1.1': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 1, 'FPT_PHP': 1, 'FPT_TST': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 10, 'FTP_TRP.1': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_ICT.1': 4, 'FTP_ITC': 2}}, 'cc_claims': {'O': {'O.PACE': 5, 'O.RND': 2, 'O.AES': 1, 'O.TDES': 1, 'O.RSA': 1, 'O.ECC': 1, 'O.PUF': 1}, 'OE': {'OE.PACE': 1}, 'OSP': {'OSP.SM': 1}}, 'vendor': {'NXP': {'NXP': 2, 'NXP Semiconductors': 1}}, 'eval_facility': {'DeutscheTelekom': {'Deutsche Telekom Security': 81}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 12}}, 'DES': {'3DES': {'TDES': 4}}, 'constructions': {'MAC': {'CMAC': 5}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 19}, 'ECC': {'ECC': 12}}, 'FF': {'DH': {'DH': 13, 'Diffie-Hellman': 5}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 3}, 'KA': {'Key Agreement': 17}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 28}}, 'PACE': {'PACE': 67}}, 'randomness': {'RNG': {'RND': 2, 'RNG': 7}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {'NIST': {'P-256': 11, 'P-384': 15, 'NIST P-256': 1, 'NIST P-384': 1, 'secp256r1': 1, 'secp384r1': 1}, 'Brainpool': {'brainpoolP256r1': 2, 'brainpoolP384r1': 2, 'brainpoolP512r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'Physical Probing': 1, 'physical probing': 2, 'side channels': 1, 'side channel': 1, 'side-channels': 1, 'SPA': 2, 'DPA': 2, 'timing attacks': 1}, 'FI': {'Physical tampering': 1, 'physical tampering': 5, 'Malfunction': 9, 'malfunction': 3, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03109': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS186': 10, 'FIPS197': 3, 'FIPS PUB 186-4': 1}, 'BSI': {'AIS36': 3, 'AIS 36': 1}, 'RFC': {'RFC5639': 11, 'RFC 5639': 1}, 'X509': {'X.509': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1217-2024': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0077-V2-2015': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 5': 1, 'EAL 2': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'ATE': {'ATE_DPT.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'DeutscheTelekom': {'Deutsche Telekom Security': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
1217b_pdf.pdf
. - The cert_filename property was set to
1217c_pdf.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1149-V3-2023']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1149-V3-2023']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}]}
values added.
- The st property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1217a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1217b_pdf.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1149-2022']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1149-2022']}}}
data.
- The report_references property was updated, with the
-
05.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0bedd2a193c3ba00bedfcc429bd9dcf1a852eea6bf7c207e1a7cd1f5701d9013', 'txt_hash': '6b201fec135c46f5fa06400244b7f4a18aac436ce3b7d94eab3451bca1982a37'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 416984, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 29, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2"', '/Subject': 'Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2', '/Title': 'Certification Report BSI-DSZ-CC-1217-2024', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'https://www.commoncriteriaportal.org/', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS']}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1217-2024', 'cert_item': 'TCOS eEnergy Security Module Version 2.0 Release 1/P71', 'developer': 'Deutsche Telekom Security GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP), Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 valid until: 28 February 2034'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1217-2024': 16, 'BSI-DSZ-CC-1149-V3-2023': 5, 'BSI-DSZ-CC-1217': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0077-V2-2015': 4}}, 'cc_security_level': {'EAL': {'EAL 4': 5, 'EAL 5': 4, 'EAL 2': 3, 'EAL 1': 1, 'EAL5+': 1, 'EAL6': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC': 1}, 'ALC': {'ALC_DVS.2': 5, 'ALC_FLR': 2, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 4}, 'AVA': {'AVA_VAN.5': 4}}, 'cc_sfr': {'FCS': {'FCS_COP': 6, 'FCS_CKM': 4, 'FCS_RNG.1': 1}, 'FIA': {'FIA_UID.1': 1, 'FIA_UAU.4': 1, 'FIA_UAU.5': 1}, 'FTP': {'FTP_ITC.1': 1}}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 5, 'NXP Semiconductors': 9}}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 1}, 'DeutscheTelekom': {'Deutsche Telekom Security': 15}, 'SRC': {'SRC Security Research & Consulting': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'constructions': {'MAC': {'CMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 3}}, 'FF': {'DH': {'DH': 1, 'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KA': {'Key Agreement': 8, 'KA': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 6}}, 'PACE': {'PACE': 9}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 2}, 'FI': {'malfunction': 1, 'fault injection': 2}, 'other': {'JIL': 6}}, 'technical_report_id': {'BSI': {'BSI TR-03109-2': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 2, 'FIPS 186': 5, 'FIPS 197': 2}, 'BSI': {'AIS 34': 4, 'AIS 36': 7, 'AIS 37': 3, 'AIS 26': 4, 'AIS 25': 4, 'AIS 20': 3, 'AIS 31': 3, 'AIS 46': 3, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 32': 1, 'AIS 35': 1, 'AIS 38': 1}, 'RFC': {'RFC 5639': 5}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Version 2.0 Release 1/P71, Version 1.1, 16 February 2024, SRC Security Research & Consulting GmbH (confidential document) [9] Configuration List BSI-DSZ-CC-1217, Konfigurationsliste von TCOS eESM Version 2.0 Release': 1, 'P71D600, Version 1.0, 13 February 2024, Deutsche Telekom Security GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-1217, Operational Guidance for users and administrators': 1, 'R1/R2R3), BSI- DSZ-CC-1149-V3-2023, Version 2, 1 December 2023, TÃœV Informationstechnik GmbH (confidential document) [14] Technische Richtlinie BSI TR-03109-1: Smart Meter Gateway - Anforderungen an die': 1}}}
. - The report_filename property was set to
1217a_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1149-V3-2023']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1149-2022', 'BSI-DSZ-CC-1149-V3-2023', 'BSI-DSZ-CC-1149-V2-2023']}}
data.
- The report property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name TCOS eEnergy Security Module Version 2.0 Release 1/P71 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1217c_pdf.pdf",
"dgst": "8239b6c33b01617f",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1217-2024",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1149-V3-2023"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1149-V3-2023",
"BSI-DSZ-CC-1149-V2-2023",
"BSI-DSZ-CC-1149-2022"
]
}
},
"scheme_data": {
"category": "Intelligent measuring systems",
"cert_id": "BSI-DSZ-CC-1217-2024",
"certification_date": "2024-02-29",
"enhanced": {
"applicant": "Deutsche Telekom Security GmbH Untere Industriestra\u00dfe 20 57250 Netphen",
"assurance_level": "EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1217c_pdf.pdf?__blob=publicationFile\u0026v=2",
"certification_date": "2024-02-29",
"description": "The Target of Evaluation (TOE) is the product TCOS eEnergy Security Module Version 2.0 Release 1/P71 developed by Deutsche Telekom Security GmbH. The TOE is a Smart Meter Security Module according to the Technical Guideline BSI TR-03109-2, Version 1.1 intended to be used by a Smart Meter Gateway in a Smart Metering System. The TOE serves as cryptographic service provider for the Smart Meter Gateway and supports the Smart Meter Gateway for its specific cryptographic needs. These cryptographic services cover the following issues: Digital Signature Generation, Digital Signature Verification, Key Agreement for TLS, Key Agreement for Content Data Encryption, Key Pair Generation, Random Number Generation, Component Authentication via the PACE Protocol with Negotiation of Session Keys, Secure Messaging, and Secure Storage of Key Material and further data relevant for the Gateway.",
"evaluation_facility": "SRC Security Research \u0026 Consulting GmbH",
"expiration_date": "2034-02-28",
"product": "TCOS eEnergy Security Module Version 2.0 Release 1/P71",
"protection_profile": "Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP), Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1217a_pdf.pdf?__blob=publicationFile\u0026v=2",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1217b_pdf.pdf?__blob=publicationFile\u0026v=2"
},
"product": "TCOS eEnergy Security Module Version 2.0 Release 1/P71",
"subcategory": "Security module for an Smart Metering Gateway",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Smartmeter_Sicherheitsmodule/1217.html",
"vendor": "Deutsche Telekom Security GmbH"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1149-V3-2023"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1149-V3-2023"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Deutsche Telekom Security GmbH",
"manufacturer_web": "https://www.telekom.de/security",
"name": "TCOS eEnergy Security Module Version 2.0 Release 1/P71",
"not_valid_after": "2034-03-01",
"not_valid_before": "2024-02-29",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "1217c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1217-2024": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0077-V2-2015": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"ATE": {
"ATE_DPT.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"DeutscheTelekom": {
"Deutsche Telekom Security": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2",
"/Title": "Certificate BSI-DSZ-CC-1217-2024",
"pdf_file_size_bytes": 233498,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "1217a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 valid until: 28 February 2034",
"cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-1217-2024",
"cert_item": "TCOS eEnergy Security Module Version 2.0 Release 1/P71",
"cert_lab": "BSI",
"developer": "Deutsche Telekom Security GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP), Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
},
"ECDSA": {
"ECDSA": 6
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1149-V3-2023": 5,
"BSI-DSZ-CC-1217": 3,
"BSI-DSZ-CC-1217-2024": 16
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0077-V2-2015": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 5,
"ALC_FLR": 2,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_DPT.2": 4
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 3,
"EAL 4": 5,
"EAL 4 augmented": 3,
"EAL 5": 4,
"EAL 5+": 1,
"EAL 6": 1,
"EAL5+": 1,
"EAL6": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 4,
"FCS_COP": 6,
"FCS_RNG.1": 1
},
"FIA": {
"FIA_UAU.4": 1,
"FIA_UAU.5": 1,
"FIA_UID.1": 1
},
"FTP": {
"FTP_ITC.1": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"P71D600, Version 1.0, 13 February 2024, Deutsche Telekom Security GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-1217, Operational Guidance for users and administrators": 1,
"R1/R2R3), BSI- DSZ-CC-1149-V3-2023, Version 2, 1 December 2023, T\u00dcV Informationstechnik GmbH (confidential document) [14] Technische Richtlinie BSI TR-03109-1: Smart Meter Gateway - Anforderungen an die": 1,
"Version 2.0 Release 1/P71, Version 1.1, 16 February 2024, SRC Security Research \u0026 Consulting GmbH (confidential document) [9] Configuration List BSI-DSZ-CC-1217, Konfigurationsliste von TCOS eESM Version 2.0 Release": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 9
},
"TLS": {
"TLS": {
"TLS": 6
}
}
},
"crypto_scheme": {
"KA": {
"KA": 1,
"Key Agreement": 8
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"DeutscheTelekom": {
"Deutsche Telekom Security": 15
},
"SRC": {
"SRC Security Research \u0026 Consulting": 3
},
"TUV": {
"T\u00dcV Informationstechnik": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 2,
"malfunction": 1
},
"SCA": {
"side channel": 2
},
"other": {
"JIL": 6
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 14": 1,
"AIS 19": 1,
"AIS 20": 3,
"AIS 25": 4,
"AIS 26": 4,
"AIS 31": 3,
"AIS 32": 1,
"AIS 34": 4,
"AIS 35": 1,
"AIS 36": 7,
"AIS 37": 3,
"AIS 38": 1,
"AIS 46": 3
},
"FIPS": {
"FIPS 180-4": 2,
"FIPS 186": 5,
"FIPS 197": 2
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"RFC": {
"RFC 5639": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"constructions": {
"MAC": {
"CMAC": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-03109-2": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 5,
"NXP Semiconductors": 9
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2",
"/Title": "Certification Report BSI-DSZ-CC-1217-2024",
"pdf_file_size_bytes": 416984,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.sogis.eu/",
"https://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/AIS",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
},
"st_filename": "1217b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 12
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 19
}
},
"FF": {
"DH": {
"DH": 13,
"Diffie-Hellman": 5
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1149-V3-2023": 1,
"BSI-DSZ-CC-1217": 1
}
},
"cc_claims": {
"O": {
"O.AES": 1,
"O.ECC": 1,
"O.PACE": 5,
"O.PUF": 1,
"O.RND": 2,
"O.RSA": 1,
"O.TDES": 1
},
"OE": {
"OE.PACE": 1
},
"OSP": {
"OSP.SM": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0073-2014": 1,
"BSI-CC-PP-0077-V2-2015": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 2,
"ADV_FSP": 1,
"ADV_FSP.4": 1,
"ADV_FUN.1": 1,
"ADV_IMP.1": 1,
"ADV_TDS": 2,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 2,
"ALC_DVS.2": 8,
"ALC_FLR.1": 2,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_TSS.2": 2
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.2": 8,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 10
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 5,
"EAL 6": 1,
"EAL 6 augmented": 1,
"EAL 6+": 1,
"EAL4": 6,
"EAL4 augmented": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 1
},
"FCS": {
"FCS_CKM": 61,
"FCS_CKM.1": 16,
"FCS_CKM.2": 8,
"FCS_CKM.4": 45,
"FCS_CKM.4.1": 1,
"FCS_COP": 67,
"FCS_COP.1": 12,
"FCS_RNG": 9,
"FCS_RNG.1": 17,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.1": 12,
"FDP_ACC.2": 17,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 4,
"FDP_ACF.1": 8,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_ETC.1": 7,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 8,
"FDP_ITC": 8,
"FDP_ITC.1": 20,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 14,
"FDP_ITT.1": 1,
"FDP_RIP": 1,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1,
"FDP_SDC.1": 1,
"FDP_SDI": 1,
"FDP_SDI.1": 2,
"FDP_SDI.2": 8,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UCT": 1,
"FDP_UCT.1": 8,
"FDP_UIT": 2,
"FDP_UIT.1": 7,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_ATD.1": 10,
"FIA_ATD.1.1": 1,
"FIA_SOS": 1,
"FIA_SOS.1": 3,
"FIA_SOS.1.1": 1,
"FIA_UAU": 18,
"FIA_UAU.1": 5,
"FIA_UAU.4": 6,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 6,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID": 1,
"FIA_UID.1": 14,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB": 1,
"FIA_USB.1": 6,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_LIM": 7,
"FMT_LIM.1": 23,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 21,
"FMT_LIM.2.1": 2,
"FMT_MSA": 2,
"FMT_MSA.3": 4,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 6,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 6,
"FPT_EMS.1": 14,
"FPT_EMS.1.1": 2,
"FPT_EMS.1.2": 2,
"FPT_FLS": 1,
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP": 1,
"FPT_PHP.3": 9,
"FPT_PHP.3.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ICT.1": 4,
"FTP_ITC": 2,
"FTP_ITC.1": 10,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 67
},
"TLS": {
"TLS": {
"TLS": 28
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 17
},
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP256r1": 2,
"brainpoolP384r1": 2,
"brainpoolP512r1": 2
},
"NIST": {
"NIST P-256": 1,
"NIST P-384": 1,
"P-256": 11,
"P-384": 15,
"secp256r1": 1,
"secp384r1": 1
}
},
"eval_facility": {
"DeutscheTelekom": {
"Deutsche Telekom Security": 81
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 2,
"RNG": 7
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Malfunction": 9,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 3,
"physical tampering": 5
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 2,
"Physical Probing": 1,
"SPA": 2,
"physical probing": 2,
"side channel": 1,
"side channels": 1,
"side-channels": 1,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS 36": 1,
"AIS36": 3
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 2
},
"FIPS": {
"FIPS PUB 186-4": 1,
"FIPS186": 10,
"FIPS197": 3
},
"RFC": {
"RFC 5639": 1,
"RFC5639": 11
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 12
}
},
"DES": {
"3DES": {
"TDES": 4
}
},
"constructions": {
"MAC": {
"CMAC": 5
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03109": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 2,
"NXP Semiconductors": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Deutsche Telekom Security GmbH",
"/Keywords": "\"TCOS Security Module, Sicherheitsmodul, Smart Meter\"",
"/Subject": "TCOS Smart Meter Security Module Version 1.0 Release 1",
"/Title": "Security Target TCOS Smart Meter Security Module (NXP)",
"pdf_file_size_bytes": 930419,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 75
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0077b_pdf.pdf",
"pp_name": "Protection Profile for the Security Module of a Smart Metering System"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1217a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"ATE_DPT.2",
"EAL4+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1217b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b614936b2d1f7d1555bee0f16f96141cdb06b86ef7c0fed1e6d10a8a1dfd526e",
"txt_hash": "b70df464e41897e798d8a03b2ce1befe8a7e3d3f522bd148caf7f7b9caa7f3b2"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0bedd2a193c3ba00bedfcc429bd9dcf1a852eea6bf7c207e1a7cd1f5701d9013",
"txt_hash": "6b201fec135c46f5fa06400244b7f4a18aac436ce3b7d94eab3451bca1982a37"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3d8976b02e8509887aab898939d770d74abd3dc38e4a2df47b1fa7ff6263704b",
"txt_hash": "8596b1c4e04223e6f206e3aa7294881be123c7bce9e9cee470c09fbefef12699"
}
},
"status": "active"
}