| name |
CryptoServer CSPLight Version 1.0.0 |
MultiApp V5.1 (version 5.1) ( 2023/31) |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
DE |
FR |
| status |
active |
active |
| not_valid_after |
01.04.2026 |
28.09.2028 |
| not_valid_before |
01.04.2021 |
28.08.2023 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1145c_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_31fr.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1145a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_31fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1145b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_31en.pdf |
| manufacturer |
Utimaco |
THALES DIS FRANCE SA |
| manufacturer_web |
https://hsm.utimaco.com/ |
https://www.thalesgroup.com/en/europe/france |
| security_level |
ALC_CMS.3, EAL2+, ALC_LCD.1 |
EAL6+, ALC_FLR.2 |
| dgst |
02fe08c76c490ca3 |
bdeb2f50840bb113 |
| heuristics/cert_id |
BSI-DSZ-CC-1145-2021 |
ANSSI-CC-2023/31 |
| heuristics/cert_lab |
BSI |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_LCD.1, ASE_SPD.1, ALC_CMC.2, ALC_CMS.3, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ASE_REQ.2, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_TAT.3, ALC_LCD.1, ALC_DVS.2, ADV_TDS.5, ALC_FLR.2, ASE_SPD.1, ATE_COV.3, ADV_INT.3, ASE_TSS.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ADV_SPM.1, ADV_ARC.1 |
| heuristics/extracted_versions |
1.0.0 |
5.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2023/42, ANSSI-CC-2023/34, ANSSI-CC-2023/35, ANSSI-CC-2023/45, ANSSI-CC-2023/36, ANSSI-CC-2025/05 |
| heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2023/01 |
| heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2023/42, ANSSI-CC-2023/34, ANSSI-CC-2023/35, ANSSI-CC-2023/45, ANSSI-CC-2023/36, ANSSI-CC-2025/05 |
| heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2023/01 |
| heuristics/scheme_data |
- category: Server applications
- cert_id: BSI-DSZ-CC-1145-2021
- certification_date: 01.04.2021
- enhanced:
- applicant: Utimaco IS GmbH Germanusstraße 4 52080 Aachen
- assurance_level: EAL2,ALC_CMS.3,ALC_LCD.1
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1145c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 01.04.2021
- description: Utimaco CryptoServer CSPLight is a Cryptographic Service Provider Light (CSPLight) implemented in software and based on the Protection Profile BSI-CC-PP-0111-2019 with modules Time Stamp and Audit (BSI-CC-PP-0112-2020) and Clustering (BSI-CC-PP-0113-2020). It is intended to be used with products requiring a certified Cryptographic Service Provider Light.
- entries: [frozendict({'id': 'BSI-DSZ-CC-1145-2021-MA-01', 'description': 'Cryptographic Service Provider Light'}), frozendict({'id': 'Zertifizierungsreport / Certification Report', 'description': 'Certificate'})]
- evaluation_facility: SRC Security Research & Consulting GmbH
- expiration_date: 31.03.2026
- product: CryptoServer CSPLight Version 1.0.0
- protection_profile: Protection Profile Cryptographic Service Provider Light (CSPL) Version 1.0, 12 November 2019, BSI-CC-PP-0111-2019, Common Criteria Protection Profile Configuration Cryptographic Service Provider Light – Time Stamp Service and Audit (PPC-CSPLight-TS-Au) Version 1.0, 26 February 2020, BSI-CC-PP-0112-2020, Common Criteria Protection Profile Configuration Cryptographic Service Provider Light - Time Stamp Service and Audit – Clustering (PPC-CSPLight-TS-Au-Cl), Version 1.0, 26 February 2020, BSI-CC-PP-0113-2020
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1145a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1145b_pdf.pdf?__blob=publicationFile&v=3
- product: CryptoServer CSPLight Version 1.0.0
- subcategory: Other server applications
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Serveranwendungen_Sonstiges/1145.html
- vendor: Utimaco IS GmbH
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2023/01 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2023/01 |
| heuristics/protection_profiles |
{} |
94167fd161e87d71 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf |
| pdf_data/cert_filename |
1145c_pdf.pdf |
Certificat-CC-2023_31fr.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0112-2020: 1
- BSI-CC-PP-0111-2019: 1
- BSI-CC-PP-0113-2020: 1
|
- BSI:
- BSI-CC-PP-0099-V2-2020: 1
|
| pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
|
|
| pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_CMS.3: 1
- ALC_FLR: 1
- ALC_LCD.1: 1
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210414071519+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Cryptographic Service Provider Light"
- /ModDate: D:20210414072338+02'00'
- /Producer: LibreOffice 6.3
- /Subject: Certificate, Urkunde
- /Title: Certificate BSI-DSZ-CC-1145-2021
- pdf_file_size_bytes: 245229
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20230829152627+02'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20230829152916+02'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 156728
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/report_filename |
1145a_pdf.pdf |
ANSSI-CC-2023_31fr.pdf |
| pdf_data/report_frontpage |
- FR:
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 2 augmented by ALC_CMS.3 and ALC_LCD.1
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1145-2021
- cert_item: CryptoServer CSPLight Version 1.0.0
- cert_lab: BSI
- developer: Utimaco IS GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile Cryptographic Service Provider Light (CSPL) Version 1.0, 12 November 2019, BSI-CC-PP-0111-2019, Common Criteria Protection Profile Configuration Cryptographic Service Provider Light – Time Stamp Service and Audit (PPC- CSPLight-TS-Au) Version 1.0, 26 February 2020, BSI-CC-PP- 0112-2020, Common Criteria Protection Profile Configuration Cryptographic Service Provider Light - Time Stamp Service and Audit – Clustering (PPC-CSPLight-TS-Au-Cl), Version 1.0, 26 February 2020, BSI-CC-PP-0113-2020
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2023/01: 2
- ANSSI-CC-2023/31: 2
|
| pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0112-2020: 2
- BSI-CC-PP-0111-2019: 4
- BSI-CC-PP-0112-2020: 2
- BSI-CC-PP-0113-2020: 4
|
- BSI:
- BSI-CC-PP-0099-V2-2020: 2
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 6
- EAL 2 augmented: 3
- EAL 2+: 1
- EAL 4: 1
|
|
| pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_CMS.3: 4
- ALC_FLR: 3
- ALC_LCD.1: 4
|
|
| pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM: 17
- FCS_CKM.5: 1
- FCS_COP: 20
- FCS_RNG.1: 1
- FDP:
- FIA:
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
- SRC:
- SRC Security Research & Consulting: 3
|
|
| pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 10
- AES-: 1
- AES-128: 1
- constructions:
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
- SHA:
- SHA2:
- SHA-256: 2
- SHA-384: 1
- SHA-512: 1
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
- Brainpool:
- brainpoolP256r1: 8
- brainpoolP384r1: 3
- brainpoolP512r1: 3
- NIST:
- Curve P-256: 3
- P-256: 3
- P-384: 6
- P-521: 6
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- BSI:
- AIS 14: 1
- AIS 19: 1
- AIS 20: 4
- AIS 32: 1
- AIS 35: 2
- AIS 46: 1
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 197: 4
- ICAO:
- ISO:
- ISO/IEC 14888-2: 1
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- ISO/IEC 9797-2: 1
- PKCS:
- RFC:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- SRC Security Research & Consulting GmbH (confidential document) [8] Protection Profile Cryptographic Service Provider Light (CSPL) Version 1.0, 12 November 2019: 1
- Version 1.0.2, 2021-03-18, Security Target for CryptoServer CSPLight, Utimaco IS GmbH (confidential document) [7] Evaluation Technical Report, Version 1.5, 2021-03-26, Evaluation Technical Report (ETR) –: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- list for the TOE, Version 1.0.1, 2021-03-18, CryptoServer CSPLight Configuration Management (confidential document) [11] Preparative guidance documentation for the TOE, Version 1.0.1, 2021-03-18, CryptoServer: 1
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename |
1145b_pdf.pdf |
ANSSI-cible-2023_31en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0111-2019: 3
- BSI-CC-PP-0112-2020: 1
- BSI-CC-PP-0113-2020: 2
|
- BSI:
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0099-V2-2020: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0056-V2-MA-2012: 1
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 2
- EAL2 augmented: 2
|
- EAL:
- EAL 6+: 1
- EAL6: 34
- EAL6 augmented: 1
- EAL6+: 3
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.3: 6
- ALC_DEL.1: 1
- ALC_LCD.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 5
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 8
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 6
- ADV_IMP.1: 3
- ADV_IMP.2: 4
- ADV_INT.3: 2
- ADV_SPM.1: 9
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 1
- ADV_TDS.5: 6
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 7
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.5: 4
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.2: 4
- ALC_FLR.2: 7
- ALC_LCD.1: 4
- ALC_TAT.1: 2
- ALC_TAT.3: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 1
- ATE_COV.3: 2
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 3
- ATE_FUN.2: 4
- ATE_IND.2: 2
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 10
- FAU_GEN.1: 14
- FAU_GEN.1.1: 4
- FAU_GEN.1.2: 2
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 4
- FCS:
- FCS_CKM: 182
- FCS_CKM.1: 48
- FCS_CKM.2: 26
- FCS_CKM.4: 96
- FCS_CKM.4.1: 1
- FCS_CKM.5: 16
- FCS_CKM.5.1: 1
- FCS_COP: 220
- FCS_COP.1: 45
- FCS_RNG: 2
- FCS_RNG.1: 12
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 52
- FDP_ACC.1: 52
- FDP_ACF: 23
- FDP_ACF.1: 22
- FDP_DAU: 25
- FDP_DAU.1: 3
- FDP_DAU.2: 6
- FDP_ETC: 8
- FDP_ETC.1: 6
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 11
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 42
- FDP_ITC: 27
- FDP_ITC.1: 37
- FDP_ITC.2: 49
- FDP_RIP: 6
- FDP_RIP.1: 1
- FDP_UCT: 1
- FDP_UIT: 1
- FIA:
- FIA_AFL: 14
- FIA_AFL.1: 4
- FIA_AFL.1.2: 1
- FIA_API: 23
- FIA_API.1: 7
- FIA_API.1.1: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 11
- FIA_UAU.5.2: 1
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UID: 1
- FIA_UID.1: 24
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 12
- FMT_MOF.1: 15
- FMT_MOF.1.1: 5
- FMT_MSA: 27
- FMT_MSA.1: 17
- FMT_MSA.2: 8
- FMT_MSA.2.1: 1
- FMT_MSA.3: 11
- FMT_MSA.4: 11
- FMT_MTD: 65
- FMT_MTD.1: 33
- FMT_MTD.3: 33
- FMT_MTD.3.1: 1
- FMT_SAE: 2
- FMT_SAE.1: 8
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 9
- FMT_SMF.1: 30
- FMT_SMF.1.1: 1
- FMT_SMR: 14
- FMT_SMR.1: 46
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ESA: 18
- FPT_ESA.1: 14
- FPT_ESA.1.1: 1
- FPT_ESA.1.2: 1
- FPT_ESA.1.3: 1
- FPT_ESA.1.4: 1
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_ISA: 33
- FPT_ISA.1: 19
- FPT_ISA.1.1: 1
- FPT_ISA.1.2: 1
- FPT_ISA.1.3: 1
- FPT_ISA.1.4: 1
- FPT_ISA.1.5: 1
- FPT_STM: 1
- FPT_STM.1: 22
- FPT_STM.1.1: 4
- FPT_TCT: 23
- FPT_TCT.1: 6
- FPT_TCT.1.1: 1
- FPT_TDC: 41
- FPT_TDC.1: 25
- FPT_TIT: 37
- FPT_TIT.1: 12
- FPT_TIT.1.1: 2
- FPT_TIT.1.2: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 21
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 2
- FTP_TRP: 1
- FTP_TRP.1: 5
|
- FAU:
- FAU_ARP.1: 15
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FAU_SAS.1: 2
- FCO:
- FCS:
- FCS_CKM: 47
- FCS_CKM.1: 29
- FCS_CKM.1.1: 3
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.3: 5
- FCS_CKM.3.1: 1
- FCS_CKM.4: 29
- FCS_CKM.4.1: 2
- FCS_CMK.4: 1
- FCS_COP: 48
- FCS_COP.1: 24
- FCS_COP.1.1: 5
- FCS_RNG: 19
- FCS_RNG.1: 11
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC: 48
- FDP_ACC.1: 19
- FDP_ACC.2: 6
- FDP_ACF: 43
- FDP_ACF.1: 24
- FDP_IFC: 25
- FDP_IFC.1: 14
- FDP_IFC.2: 2
- FDP_IFF: 15
- FDP_IFF.1: 14
- FDP_ITC: 13
- FDP_ITC.1: 15
- FDP_ITC.2: 20
- FDP_ITT.1: 2
- FDP_RIP: 96
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_ROL: 13
- FDP_ROL.1: 5
- FDP_SDC.1: 2
- FDP_SDI: 8
- FDP_SDI.2: 4
- FDP_UCT.1: 2
- FDP_UIT: 6
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 23
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API.1: 2
- FIA_ATD: 12
- FIA_ATD.1: 3
- FIA_UAU: 64
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 38
- FIA_UID.1: 19
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 38
- FMT_LIM.1: 18
- FMT_LIM.1.1: 2
- FMT_LIM.2: 17
- FMT_LIM.2.1: 2
- FMT_MSA: 102
- FMT_MSA.1: 15
- FMT_MSA.2: 2
- FMT_MSA.3: 22
- FMT_MTD: 53
- FMT_MTD.1: 13
- FMT_MTD.3: 1
- FMT_SMF: 75
- FMT_SMF.1: 29
- FMT_SMF.1.1: 2
- FMT_SMR: 85
- FMT_SMR.1: 35
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 8
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 14
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 48
- FPT_FLS.1: 16
- FPT_FLS.1.1: 2
- FPT_ITT: 6
- FPT_ITT.1: 2
- FPT_PHP: 7
- FPT_PHP.3: 17
- FPT_PHP.3.1: 1
- FPT_RCV: 13
- FPT_RCV.3: 4
- FPT_RCV.4: 1
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 8
- FPT_TST.1: 14
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 17
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 5
- FTP_TRP.1: 7
|
| pdf_data/st_keywords/cc_claims |
|
- A:
- A.CAP_FILE: 4
- A.DELETION: 4
- A.OS-UPDATE-EVIDENCE: 3
- A.SECURE_ACODE_MANAGEMENT: 3
- A.VERIFICATION: 3
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 5
- D.APP_KEYS: 1
- D.CRYPTO: 5
- D.JCS_CODE: 6
- D.JCS_DATA: 8
- D.OS-: 1
- D.OS-UPDATE-CODE-ID: 3
- D.OS-UPDATE_ADDITIONALCODE: 5
- D.OS-UPDATE_DEC-KEY: 2
- D.OS-UPDATE_SGNVER-KEY: 2
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 15
- O.APPLET: 28
- O.ARRAY_VIEWS_CONFID: 7
- O.ARRAY_VIEWS_INTEG: 3
- O.CARD-MANAGEMENT: 20
- O.CIPHER: 11
- O.CODE_CAP_FILE: 23
- O.CONFID-OS-UPDATE: 4
- O.DELETION: 4
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CONFID: 9
- O.GLOBAL_ARRAYS_INTEG: 5
- O.INSTALL: 7
- O.JAVAOBJECT: 68
- O.KEY-MNGT: 6
- O.LOAD: 11
- O.NATIVE: 11
- O.OBJ-DELETION: 4
- O.OBJ_DELETION: 4
- O.OPERATE: 15
- O.PIN-MNGT: 6
- O.PIN_MNGT: 4
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 1
- O.RNG: 10
- O.SCP: 33
- O.SECURE_AC_ACTIVATION: 5
- O.SECURE_LOAD_ACODE: 9
- O.SID: 13
- O.TOE_IDENTIFICATION: 7
- O.TRANSACTION: 6
- OE:
- OE.CAP_FILE: 5
- OE.CODE-EVIDENCE: 11
- OE.OS-UPDATE-ENCRYPTION: 6
- OE.OS-UPDATE-EVIDENCE: 3
- OE.SECURE_ACODE_MANAGEMENT: 3
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 7
- OP.ARRAY_LENGTH: 3
- OP.ARRAY_T_ALOAD: 3
- OP.ARRAY_T_ASTORE: 3
- OP.CREATE: 11
- OP.DELETE_APPLET: 6
- OP.DELETE_CAP_FILE: 4
- OP.DELETE_CAP_FILE_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 8
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.ADDITIONAL_CODE_ENCRYPTION: 3
- OSP.ADDITIONAL_CODE_SIGNING: 3
- OSP.ATOMIC_ACTIVATION: 3
- OSP.RNG: 3
- OSP.TOE_IDENTIFICATION: 3
- OSP.VERIFICATION: 3
- OT:
- R:
- T:
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 3
- T.CONFID-OS-UPDATE_LOAD: 3
- T.DELETION: 3
- T.EXE-CODE: 6
- T.FAKE-SGNVER-KEY: 3
- T.INSTALL: 3
- T.INTEG-APPLI-CODE: 6
- T.INTEG-APPLI-DATA: 6
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 3
- T.INTEG-OS-UPDATE_LOAD: 3
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 3
- T.RESOURCES: 3
- T.SID: 6
- T.UNAUTHORIZED_TOE_CODE_UPDATE: 3
- T.WRONG-UPDATE-STATE: 3
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 32
- AES-128: 14
- AES-256: 10
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDEA: 1
- TDES: 12
- Triple-DES: 3
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 2
- SHA-512: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 2
- SHA-384: 1
- SHA-512: 2
- SHA2: 1
- SHA224: 1
- SHA3:
- SHA3: 2
- SHA3-384: 1
- SHA3-512: 1
|
| pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 2
- Key agreement: 11
- KEX:
- MAC:
|
- KA:
- Key Agreement: 6
- Key agreement: 2
- MAC:
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- Brainpool:
- brainpoolP256r1: 8
- brainpoolP384r1: 4
- brainpoolP512r1: 4
- NIST:
- Curve P-256: 3
- Curve P-384: 3
- Curve P-521: 3
- P-256: 3
- P-384: 3
- P-521: 3
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- SCA:
- physical probing: 1
- side channel: 2
|
- FI:
- Malfunction: 6
- Physical Tampering: 3
- fault induction: 2
- malfunction: 9
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 3
- SPA: 1
- physical probing: 7
- timing attacks: 1
|
| pdf_data/st_keywords/technical_report_id |
- BSI:
- BSI TR-03110: 1
- BSI TR-03151: 1
- BSI TR-03153: 1
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.DG1: 4
- EF.DG16: 4
- EF.DG3: 1
- EF.DG4: 1
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 140-2: 1
- FIPS 180-4: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-4: 3
- FIPS PUB 186-4: 8
- FIPS PUB 197: 8
- ICAO:
- ISO:
- ISO/IEC 10116: 6
- ISO/IEC 14888-2: 8
- ISO/IEC 18033-3: 5
- ISO/IEC 19790: 6
- ISO/IEC 9797-2: 3
- ISO/IEC18033-3: 1
- PKCS:
- PKCS #1: 5
- PKCS#1: 7
- PKCS#5: 2
- RFC:
- RFC2104: 4
- RFC5639: 13
- RFC5903: 7
- RFC6954: 5
|
- BSI:
- AIS20: 1
- AIS31: 6
- BSI-AIS31: 1
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 1
- FIPS180-4: 2
- FIPS197: 5
- FIPS202: 2
- ICAO:
- NIST:
- PKCS:
- SCP:
- SCP01: 4
- SCP02: 4
- SCP03: 5
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
- com:
- com.gemalto.belpic: 1
- com.gemalto.javacard.eid: 1
- com.gemalto.javacard.fido.ctap: 1
- com.gemalto.javacard.iasclassic: 1
- com.gemalto.javacard.mspnp: 1
- com.gemalto.javacardx.gdp: 1
- com.gemalto.moc.client: 1
- com.gemalto.moc.server: 1
- com.gemalto.mpcos: 1
- com.gemalto.puredi: 1
- com.gemalto.tacho: 1
- java:
- javacard:
- javacard.eid: 1
- javacard.fido.ctap: 1
- javacard.framework: 3
- javacard.iasclassic: 1
- javacard.mspnp: 1
- javacardx:
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- The DELETE and INSTALL APDU commands are out of scope of this SPM: 1
- 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes The SFR FMT_MTD.3/JCRE is out of scope of the SPM: 1
- Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start The initial setting of: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- and deletion; see #.DELETION and #.INSTALL). The DELETE and INSTALL APDU commands are out of scope of this SPM. The list of registred applets’ AIDs is proven to be not modified during the execution: 1
- as a null reference. Such a mechanism is implementation-dependent. The deletion of applets is out of scope of this SPM scope. In the case of an array type, fields are components of the array ([JVM], §2.14: 1
- because AID registry is created during loading phase, which is also out of scope of the SPM (Hypothesis 2 of the SPM document [MAV51_SPM]). MultiApp V5.1: JCS Security Target ST: 1
- is also out of scope (Hypothesis 4 of the SPM document [MAV51_SPM]).. 3) S.CAP_FILE performing OP.ARRAY_AASTORE of the: 1
- out of scope: 9
- the active context is not the same as the Selected Applet Context. Application note: This rule is out of scope of the SPM modelisation because CLEAR_ON_DESELECT objects can be created exclusively in the API: 1
|
| pdf_data/st_metadata |
- /Author: Ott;[email protected]
- /CreationDate: D:20210318165443+01'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20210318165443+01'00'
- /Producer: Microsoft® Word 2016
- /Title: CryptoServer CSPLight Security Target
- pdf_file_size_bytes: 2910003
- pdf_hyperlinks: http://hsm.utimaco.com/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 141
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |