This page was not yet optimized for use on mobile
devices.
STARCOS 3.5 ID GCC C1R
CSV information
| Status | archived |
|---|---|
| Valid from | 31.01.2012 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | G+D Mobile Security GmbH |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL4+, ATE_DPT.2, AVA_VAN.5, ALC_DVS.2 |
| Protection profiles | |
| Maintenance updates | STARCOS 3.5 ID GCC C1R (23.03.2012) Certification report Security target |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0800-2012
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
AES, CMACAsymmetric Algorithms
ECDH, ECDSA, ECCHash functions
SHA-1, SHA-256Protocols
PACERandomness
RNGOperating System name
STARCOS 3Vendor
NXP, Giesecke & DevrientSecurity level
EAL 4, EAL 5, EAL1, EAL4, EAL5+, EAL6, EAL3, EAL5, EAL7, EAL2, EAL 4 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_DPT.2, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FCS_COP, FCS_CKMProtection profiles
BSI-CC-PP-0061-2009, BSI-CC-PP- 0061-2009Certificates
BSI-DSZ-CC-0800-2012, BSI-DSZ-CC-0682-2010, BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-S-0009-, BSI-DSZ-CC-S-0004-2010Evaluation facilities
SRC Security Research & ConsultingSide-channel analysis
side channel, physical tampering, fault injection, JILCertification process
Version 1.2, 09.12.2011, STARCOS 3.5 ID GCC C1R Security Target, Giesecke & Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15, Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C1R, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product NXP P5Cx128V0A/P5Cx145V0A, Secure Smart Card Controller, Version 1.33, 29.09.2011, T-Systems GEI GmbH (confidential document) [11] Configuration list for the TOE, Version 0.2, 24.01.2012, Konfigurationsliste von STARCOS 3.5, GCC C1R, Giesecke & Devrient GmbH (confidential document) [12] STARCOS 3.5 ID GCC C1 Guidance for Inlay Production, Version 1.0, 16.08.2010, Giesecke &Standards
FIPS 180-2, FIPS 197, FIPS PUB 180-2, AIS 34, AIS 25, AIS 26, AIS 35, AIS 20, AIS 32, AIS 36, AIS 38, ICAOTechnical reports
BSI 7125, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-0800-2012 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, G&D, Giesecke & Devrient, STARCOS 3.5, eID, nPA" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20120215151946+01'00' |
| Modification date | D:20120215152413+01'00' |
| Pages | 36 |
| Creator | Writer |
| Producer | OpenOffice.org 3.2 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0800-2012 |
|---|---|
| Certified item | STARCOS 3.5 ID GCC C1R |
| Certification lab | BSI |
| Developer | Giesecke & Devrient GmbH |
References
Outgoing- BSI-DSZ-CC-0645-2010 - archived - NXP Secure PKI Smart Card Controllers P5CD145V0A, MSO; P5CC145V0A, MSO; P5CD128V0A, MSO and P5CC128V0A, MSO; each including IC Dedicated Software
- BSI-DSZ-CC-0682-2010 - archived - STARCOS 3.5 ID GCC C1
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, T-DES, KMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-2Schemes
MAC, Key AgreementProtocols
PACERandomness
TRNG, RNDBlock cipher modes
CBCOperating System name
STARCOS 3Vendor
NXP, Giesecke & DevrientSecurity level
EAL5+, EAL4, EAL 4, EAL 5, EAL4 augmentedClaims
O.RND, O.HW_AES, O.MF_FW, O.MEM_ACCESS, O.SFR_ACCESS, T.RND, A.CGA, A.SCA, OE.CGA_SSCD, OE.CGA_TC_SVD, OE.HID_TC_VAD, OE.SCA_TC_DTBS, OE.HID_VADSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DVS.1, ATE_DPT.2, ATE_DPT.1, ATE_FUN.1, AVA_VAN.5, APE_ECD, ASE_ECD, ASE_TSS.2Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_RND.1, FCS_CKM.1, FCS_RND.1.1, FCS_COP, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FDP_ACF, FDP_RIP, FDP_SDI, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1, FDP_ACC, FDP_ACF.1, FDP_ACC.1.1, FDP_ACC.1, FDP_SDI.1, FDP_SDI.2, FDP_IFC.1, FDP_ITT.1, FIA_API, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UAU, FIA_UID, FIA_AFL, FIA_UIA, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_UAU.1, FIA_AFL.1, FIA_UID.1, FIA_UAU.4.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR, FMT_MTD, FMT_MTD.3, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_SMR.1, FMT_SMF, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3.1, FMT_MOF, FMT_MSA, FMT_MOF.1, FMT_MSA.2, FMT_MSA.4, FPT_TST.1, FPT_FLS.1, FPT_PHP.3, FPT_FLS, FPT_FLS.1.1, FPT_TST.1.3, FPT_PHP, FPT_TST, FPT_PHP.1, FPT_SEP.1, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1Protection profiles
BSI-CC-PP-0061, BSI-PP-0056, BSI-CC-PP-0059, BSI-PP-0055, BSI-CC-PP- 0035Certificates
BSI-DSZ-CC-0645-2010Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attacks, Physical Tampering, Physical tampering, physical tampering, Malfunction, malfunction, fault injection, reverse engineeringCertification process
out of scope, to the plastic Identity Card is achieved by physical and organisational security measures being out of scope of the current ST. The TOE shall comprise at least a) the circuitry of the contactless chip inclStandards
FIPS 180-2, FIPS 197, FIPS PUB 180-2, PKCS#3, AIS20, AIS 31, AIS 20, RFC3369, ISO/IEC 7816-2, ISO/IEC 14443, ISO/IEC 7816-4, ICAO, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004Technical reports
BSI TR-03110File metadata
| Title | Security Target Lite |
|---|---|
| Subject | STARCOS 3.5 ID GCC C1R |
| Keywords | Version 1.2 Status 09.12.2011 |
| Author | stut |
| Creation date | D:20111213150025+01'00' |
| Modification date | D:20111213150037+01'00' |
| Pages | 129 |
| Creator | Acrobat PDFMaker 9.1 for Word |
| Producer | Acrobat Distiller 9.3.3 (Windows) |
References
Outgoing- BSI-DSZ-CC-0645-2010 - archived - NXP Secure PKI Smart Card Controllers P5CD145V0A, MSO; P5CC145V0A, MSO; P5CD128V0A, MSO and P5CC128V0A, MSO; each including IC Dedicated Software
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0800-2012Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.3, ALC_LCD.2, ALC_TAT.3, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.3, ATE_DPT.2, ATE_FUN.1, ATE_IND.3, AVA_VAN.5References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "9b5bad238daba320",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0800-2012",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.5"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"0e62a9ea5e7ca3a7"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0682-2010",
"BSI-DSZ-CC-0645-2010"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0682-2010",
"BSI-DSZ-CC-0645-2010"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0645-2010"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0645-2010"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2012-03-23",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0800_ma1a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0800_ma1b_pdf.pdf",
"maintenance_title": "STARCOS 3.5 ID GCC C1R"
}
]
},
"manufacturer": "G+D Mobile Security GmbH",
"manufacturer_web": "https://www.gi-de.com/de/de/mobile-security/",
"name": "STARCOS 3.5 ID GCC C1R",
"not_valid_after": "2019-09-01",
"not_valid_before": "2012-01-31",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0800a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0800-2012",
"cert_item": "STARCOS 3.5 ID GCC C1R",
"cert_lab": "BSI",
"developer": "Giesecke \u0026 Devrient GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 3
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0645-2010": 3,
"BSI-DSZ-CC-0682-2010": 3,
"BSI-DSZ-CC-0800-2012": 21,
"BSI-DSZ-CC-S-0004-2010": 1,
"BSI-DSZ-CC-S-0009-": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0061-2009": 1,
"BSI-CC-PP-0061-2009": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 2,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 6,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 6,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 8,
"EAL 4 augmented": 3,
"EAL 5": 1,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 8,
"EAL5": 6,
"EAL5+": 1,
"EAL6": 4,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 3,
"FCS_COP": 5
}
},
"certification_process": {
"ConfidentialDocument": {
"Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C1R, SRC Security Research \u0026 Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product NXP P5Cx128V0A/P5Cx145V0A": 1,
"GCC C1R, Giesecke \u0026 Devrient GmbH (confidential document) [12] STARCOS 3.5 ID GCC C1 Guidance for Inlay Production, Version 1.0, 16.08.2010, Giesecke \u0026": 1,
"Secure Smart Card Controller, Version 1.33, 29.09.2011, T-Systems GEI GmbH (confidential document) [11] Configuration list for the TOE, Version 0.2, 24.01.2012, Konfigurationsliste von STARCOS 3.5": 1,
"Version 1.2, 09.12.2011, STARCOS 3.5 ID GCC C1R Security Target, Giesecke \u0026 Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 4
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 3
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 27
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 1,
"physical tampering": 1
},
"SCA": {
"side channel": 1
},
"other": {
"JIL": 5
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 25": 2,
"AIS 26": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 3,
"AIS 36": 2,
"AIS 38": 1
},
"FIPS": {
"FIPS 180-2": 2,
"FIPS 197": 1,
"FIPS PUB 180-2": 1
},
"ICAO": {
"ICAO": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
}
},
"constructions": {
"MAC": {
"CMAC": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"Giesecke \u0026 Devrient": 14
},
"NXP": {
"NXP": 8
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20120215151946+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, G\u0026D, Giesecke \u0026 Devrient, STARCOS 3.5, eID, nPA\"",
"/ModDate": "D:20120215152413+01\u002700\u0027",
"/Producer": "OpenOffice.org 3.2",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0800-2012",
"pdf_file_size_bytes": 1014930,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.dea/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
},
"st_filename": "0800b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 5
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 8
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0645-2010": 1
}
},
"cc_claims": {
"A": {
"A.CGA": 2,
"A.SCA": 2
},
"O": {
"O.HW_AES": 3,
"O.MEM_ACCESS": 1,
"O.MF_FW": 1,
"O.RND": 3,
"O.SFR_ACCESS": 1
},
"OE": {
"OE.CGA_SSCD": 3,
"OE.CGA_TC_SVD": 2,
"OE.HID_TC_VAD": 1,
"OE.HID_VAD": 2,
"OE.SCA_TC_DTBS": 1
},
"T": {
"T.RND": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0035": 1,
"BSI-CC-PP-0059": 1,
"BSI-CC-PP-0061": 2,
"BSI-PP-0055": 1,
"BSI-PP-0056": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 4,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_DVS.1": 1,
"ALC_DVS.2": 9
},
"APE": {
"APE_ECD": 1
},
"ASE": {
"ASE_ECD": 2,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_DPT.1": 2,
"ATE_DPT.2": 9,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL 5": 2,
"EAL4": 13,
"EAL4 augmented": 3,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 5,
"FAU_SAS.1": 17,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 48,
"FCS_CKM.1": 16,
"FCS_CKM.2": 4,
"FCS_CKM.4": 20,
"FCS_COP": 44,
"FCS_COP.1": 14,
"FCS_RND": 7,
"FCS_RND.1": 14,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC": 16,
"FDP_ACC.1": 13,
"FDP_ACC.1.1": 1,
"FDP_ACF": 23,
"FDP_ACF.1": 22,
"FDP_IFC.1": 5,
"FDP_ITC.1": 7,
"FDP_ITC.2": 8,
"FDP_ITT.1": 1,
"FDP_RIP": 4,
"FDP_RIP.1": 13,
"FDP_SDI": 8,
"FDP_SDI.1": 2,
"FDP_SDI.2": 4
},
"FIA": {
"FIA_AFL": 32,
"FIA_AFL.1": 8,
"FIA_API": 20,
"FIA_API.1": 4,
"FIA_API.1.1": 2,
"FIA_SOS.2": 1,
"FIA_UAU": 44,
"FIA_UAU.1": 10,
"FIA_UAU.4": 6,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 14,
"FIA_UAU.6": 8,
"FIA_UIA": 1,
"FIA_UID": 24,
"FIA_UID.1": 11
},
"FMT": {
"FMT_LIM": 13,
"FMT_LIM.1": 16,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 15,
"FMT_LIM.2.1": 2,
"FMT_MOF": 2,
"FMT_MOF.1": 1,
"FMT_MSA": 14,
"FMT_MSA.1": 6,
"FMT_MSA.2": 1,
"FMT_MSA.3": 8,
"FMT_MSA.4": 1,
"FMT_MTD": 86,
"FMT_MTD.1": 12,
"FMT_MTD.1.1": 2,
"FMT_MTD.3": 9,
"FMT_MTD.3.1": 1,
"FMT_SMF": 5,
"FMT_SMF.1": 38,
"FMT_SMR": 4,
"FMT_SMR.1": 31
},
"FPT": {
"FPT_FLS": 3,
"FPT_FLS.1": 12,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP": 6,
"FPT_PHP.1": 5,
"FPT_PHP.3": 14,
"FPT_SEP.1": 1,
"FPT_TST": 2,
"FPT_TST.1": 13,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_FLT.2": 3
},
"FTP": {
"FTP_ITC": 21,
"FTP_ITC.1": 6
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"to the plastic Identity Card is achieved by physical and organisational security measures being out of scope of the current ST. The TOE shall comprise at least a) the circuitry of the contactless chip incl": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 91
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 5
},
"SHA2": {
"SHA-2": 1,
"SHA-224": 2,
"SHA-256": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 140
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 6
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 16,
"Physical Tampering": 4,
"Physical tampering": 2,
"fault injection": 1,
"malfunction": 6,
"physical tampering": 7
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 6,
"SPA": 1,
"physical probing": 3,
"timing attacks": 2
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 31": 2,
"AIS20": 2
},
"CC": {
"CCMB-2009-07-001": 2,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2,
"CCMB-2009-07-004": 2
},
"FIPS": {
"FIPS 180-2": 1,
"FIPS 197": 1,
"FIPS PUB 180-2": 1
},
"ICAO": {
"ICAO": 4
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816-2": 1,
"ISO/IEC 7816-4": 1
},
"PKCS": {
"PKCS#3": 3
},
"RFC": {
"RFC3369": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 19
}
},
"DES": {
"3DES": {
"T-DES": 1,
"Triple-DES": 7
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"CMAC": 5,
"KMAC": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"Giesecke \u0026 Devrient": 7
},
"NXP": {
"NXP": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "stut",
"/Classification": "Public",
"/Company": "",
"/CreationDate": "D:20111213150025+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 9.1 for Word",
"/Date": "09.12.2011",
"/Keywords": "Version 1.2 Status 09.12.2011",
"/ModDate": "D:20111213150037+01\u002700\u0027",
"/Producer": "Acrobat Distiller 9.3.3 (Windows)",
"/State": "Draft",
"/Styles": "supported",
"/Subject": "STARCOS 3.5 ID GCC C1R",
"/TemplAuthor": "Joern Treger",
"/TemplVersion": "1.0",
"/Title": "Security Target Lite",
"/Version": "1.2",
"pdf_file_size_bytes": 666410,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 129
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0061b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0800a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"ATE_DPT.2",
"EAL4+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0800b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "040ff0f6937f368c99ccb3f2accd317e62e0b34d27c5ff241099d9d7a61088a2",
"txt_hash": "0fbe3376fecae71b3e50e2322223637ec376eab8f8946db031d27bb370abf93d"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "9c7cef9d357125c4b461a85172bb7398b6a7b31fb7003b7bc23ec96479e91636",
"txt_hash": "b4ca55c2dc2ca46f25d66a6eefbe44d7a795a5436e64b679dd5e16afb5693606"
}
},
"status": "archived"
}