Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 12 – Fall
CCEVS-VR-VID-11307-2022
AKD eID 2.0 SSCD
NSCIB-CC-2300144-01-CR
name Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 12 – Fall AKD eID 2.0 SSCD
category Mobility ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US NL
status archived active
not_valid_after 28.10.2024 30.09.2029
not_valid_before 28.10.2022 30.09.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11307-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300144-01-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11307-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300144-01-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11307-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300144-01-ST_Lite_v2.4.pdf
manufacturer Samsung Electronics Co., Ltd. AKD d.o.o.
manufacturer_web https://www.samsung.com https://www.akd.hr
security_level {} EAL4+, ALC_DVS.2, AVA_VAN.5
dgst 06818eae65667bc3 5a7ffad9f27b5ca5
heuristics/cert_id CCEVS-VR-VID-11307-2022 NSCIB-CC-2300144-01-CR
heuristics/cert_lab US
heuristics/cpe_matches cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:* {}
heuristics/related_cves CVE-2023-30700, CVE-2023-42537, CVE-2023-30712, CVE-2023-42536, CVE-2023-30689, CVE-2023-30694, CVE-2024-20891, CVE-2024-34612, CVE-2024-34594, CVE-2023-30685, CVE-2023-42563, CVE-2024-34589, CVE-2023-21485, CVE-2023-21451, CVE-2024-34647, CVE-2023-30715, CVE-2024-49415, CVE-2023-30680, CVE-2025-20889, CVE-2024-34595, CVE-2024-20846, CVE-2023-21461, CVE-2023-42562, CVE-2025-20887, CVE-2023-21430, CVE-2023-30679, CVE-2024-20836, CVE-2024-34604, CVE-2025-20891, CVE-2023-21438, CVE-2024-20866, CVE-2023-42564, CVE-2024-34646, CVE-2023-21441, CVE-2024-20865, CVE-2023-21490, CVE-2024-20892, CVE-2024-34666, CVE-2023-30688, CVE-2024-34638, CVE-2023-30717, CVE-2025-20884, CVE-2024-34678, CVE-2023-42569, CVE-2023-30708, CVE-2023-30696, CVE-2024-20857, CVE-2024-20831, CVE-2023-30654, CVE-2023-42556, CVE-2023-42538, CVE-2024-34655, CVE-2024-20900, CVE-2025-20904, CVE-2023-21457, CVE-2023-21487, CVE-2023-30690, CVE-2024-20895, CVE-2024-20804, CVE-2024-34652, CVE-2024-34669, CVE-2024-20843, CVE-2024-34583, CVE-2023-30693, CVE-2024-20893, CVE-2024-20817, CVE-2024-20849, CVE-2023-30711, CVE-2024-34588, CVE-2023-42561, CVE-2024-20814, CVE-2024-20859, CVE-2023-30681, CVE-2025-20881, CVE-2025-20885, CVE-2024-34607, CVE-2023-21428, CVE-2024-20844, CVE-2024-34614, CVE-2024-20848, CVE-2023-30706, CVE-2024-20832, CVE-2024-20875, CVE-2023-21454, CVE-2023-21492, CVE-2024-20888, CVE-2024-34676, CVE-2023-42533, CVE-2024-34665, CVE-2023-21437, CVE-2023-30716, CVE-2023-30697, CVE-2024-20897, CVE-2023-21421, CVE-2024-34609, CVE-2024-34619, CVE-2025-20905, CVE-2023-21439, CVE-2024-34587, CVE-2023-21486, CVE-2023-42530, CVE-2024-20847, CVE-2024-34668, CVE-2023-42535, CVE-2023-30721, CVE-2023-42532, CVE-2024-34642, CVE-2023-21488, CVE-2023-42527, CVE-2023-30718, CVE-2024-20812, CVE-2023-21456, CVE-2024-49410, CVE-2024-20818, CVE-2024-34618, CVE-2023-30691, CVE-2023-21423, CVE-2023-30699, CVE-2024-20876, CVE-2023-21445, CVE-2024-34616, CVE-2023-42560, CVE-2024-34593, CVE-2024-34651, CVE-2023-21460, CVE-2023-21504, CVE-2024-20845, CVE-2024-20819, CVE-2024-34611, CVE-2024-49411, CVE-2024-34590, CVE-2024-20833, CVE-2023-21496, CVE-2024-34602, CVE-2024-20881, CVE-2023-42529, CVE-2024-20842, CVE-2024-20811, CVE-2023-21458, CVE-2024-20898, CVE-2024-20899, CVE-2024-34605, CVE-2023-21493, CVE-2023-30692, CVE-2025-20907, CVE-2024-34680, CVE-2023-21495, CVE-2023-30720, CVE-2024-20815, CVE-2024-34585, CVE-2023-42559, CVE-2024-34641, CVE-2024-20890, CVE-2023-21442, CVE-2023-42557, CVE-2024-34615, CVE-2025-20883, CVE-2024-20879, CVE-2024-34637, CVE-2024-20806, CVE-2024-20894, CVE-2023-21435, CVE-2023-21489, CVE-2023-30710, CVE-2024-20896, CVE-2023-21429, CVE-2023-21424, CVE-2023-21452, CVE-2024-34610, CVE-2024-34586, CVE-2024-34677, CVE-2024-34608, CVE-2023-30727, CVE-2024-20803, CVE-2024-20830, CVE-2023-30686, CVE-2023-30739, CVE-2024-20813, CVE-2025-20886, CVE-2023-21427, CVE-2023-30707, CVE-2024-34674, CVE-2024-20882, CVE-2023-42528, CVE-2024-20863, CVE-2023-42531, CVE-2023-42570, CVE-2024-20810, CVE-2024-20889, CVE-2025-20890, CVE-2024-34591, CVE-2023-30733, CVE-2023-21502, CVE-2024-49414, CVE-2024-34645, CVE-2023-21425, CVE-2024-34606, CVE-2024-20877, CVE-2024-20834, CVE-2025-20888, CVE-2023-21491, CVE-2024-34592, CVE-2023-42568, CVE-2024-20880, CVE-2024-20816, CVE-2023-30709, CVE-2023-21422, CVE-2024-20901, CVE-2024-20862, CVE-2023-42534, CVE-2024-20861, CVE-2024-34648, CVE-2023-30714, CVE-2023-21436, CVE-2023-30731, CVE-2024-34673, CVE-2023-21446, CVE-2023-30713, CVE-2025-20882, CVE-2024-20858, CVE-2024-20835, CVE-2023-30687, CVE-2024-34639, CVE-2023-30701, CVE-2023-42566, CVE-2024-20820, CVE-2024-34640, CVE-2024-20878, CVE-2023-21484, CVE-2023-30719, CVE-2024-20805, CVE-2024-34667, CVE-2024-34653 {}
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 12 2.0
heuristics/report_references/directly_referencing {} NSCIB-CC-2300127-01-CR
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1149-V3-2023, NSCIB-CC-2300127-01-CR, BSI-DSZ-CC-1149-2022, BSI-DSZ-CC-1149-V2-2023
heuristics/scheme_data
  • category: Mobility
  • certification_date: 28.10.2022
  • evaluation_facility: Gossamer Security Solutions
  • expiration_date: 28.10.2024
  • id: CCEVS-VR-VID11307
  • product: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 12 – Fall
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11307
  • vendor: Samsung Electronics Co., Ltd.
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1149-V3-2023, NSCIB-CC-2300127-01-CR
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1149-V3-2023, NSCIB-CC-2300127-01-CR
heuristics/protection_profiles c40ae795865a0dba, 731bdcc989507942, 83014eb399a802f3, c88af12926be2779 d9553e7194783182, d918b28fd7bb5d79, 4a814d0e3c9f9082, 1f7ea2e05de5b88b, 27abdb9c6ab375a7
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.2.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf
pdf_data/cert_filename st_vid11307-ci.pdf NSCIB-CC-2300144-01-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11307-2022: 1
  • NL:
    • NSCIB-2300144-01: 1
    • NSCIB-CC-2300144-01: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.3: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 3
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
  • Riscure:
    • Riscure: 1
pdf_data/cert_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 18045:2008: 1
pdf_data/cert_metadata
  • /CreationDate: D:20221031104646-04'00'
  • /ModDate: D:20221031104646-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181441
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Haak
  • /CreationDate: D:20241013115200+01'00'
  • /Creator: Microsoft® Word 2021
  • /ModDate: D:20241013115200+01'00'
  • /Producer: Microsoft® Word 2021
  • /Title: NSCIB Certificate
  • pdf_file_size_bytes: 96238
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11307-vr.pdf NSCIB-CC-2300144-01-CR.pdf
pdf_data/report_frontpage
  • NL:
  • US:
    • cert_id: CCEVS-VR-VID11307-2022
    • cert_item: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 12 - Fall
    • cert_lab: US NIAP
  • NL:
    • cert_id: NSCIB-CC-2300144-01-CR
    • cert_item: AKD eID 2.0 SSCD
    • cert_lab: Riscure B.V.
    • developer: AKD d.o.o
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11307-2022: 1
  • NL:
    • NSCIB-2300144-01: 1
    • NSCIB-CC-2300127-01: 1
    • NSCIB-CC-2300144-01-CR: 12
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0076-: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL6+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 12
  • Samsung:
    • Samsung: 43
  • NXP:
    • NXP: 1
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
  • Riscure:
    • Riscure: 3
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 9
  • VPN:
    • VPN: 11
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Fault Injection: 1
  • SCA:
    • side-channel: 1
  • other:
    • JHAS: 1
    • JIL: 3
    • JIL-AAPS: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 4: 5
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 1
pdf_data/report_metadata
  • /Author: comptont
  • /CreationDate: D:20221031104159-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20221031104159-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 427393
  • pdf_hyperlinks: http://www.kb.cert.org/vuls/, https://web.nvd.nist.gov/view/vuln/search
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename st_vid11307-st.pdf NSCIB-CC-2300144-01-ST_Lite_v2.4.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1149-V3-2023: 2
  • NL:
    • NSCIB-CC-2300127-01-CR: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 3
    • BSI-CC-PP-0071-2012-MA-01: 2
    • BSI-CC-PP-0072-2012-MA-01: 2
    • BSI-CC-PP-0075-2012-MA-01: 3
    • BSI-CC-PP-0076-: 1
    • BSI-CC-PP-0076-2013-MA-01: 2
    • BSI-PP-0035-2007: 1
  • other:
    • PP-SSCD-6: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 1 augmented: 1
  • EAL:
    • EAL 4+: 2
    • EAL4: 13
    • EAL4 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 3
    • ALC_CMS: 1
    • ALC_CMS.1: 4
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 7
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 5
  • ADV:
    • ADV_ARC.1: 4
    • ADV_FSP.4: 3
    • ADV_IMP.1: 3
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 3
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 8
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG: 4
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 19
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM_EXT: 21
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 1
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.3: 5
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 1
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 1
    • FCS_CKM_EXT.6.1: 1
    • FCS_CKM_EXT.8: 2
    • FCS_CKM_EXT.8.1: 1
    • FCS_COP: 37
    • FCS_COP.1: 16
    • FCS_RBG_EXT: 6
    • FCS_RBG_EXT.1: 14
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_RBG_EXT.2: 1
    • FCS_RBG_EXT.2.1: 1
    • FCS_SRV_EXT: 6
    • FCS_SRV_EXT.1: 1
    • FCS_SRV_EXT.1.1: 1
    • FCS_SRV_EXT.2.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 2
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 2
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 20
    • FCS_TLSC_EXT.1: 6
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.4: 1
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLSC_EXT.5: 1
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLS_EXT: 3
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF_EXT: 9
    • FDP_ACF_EXT.1: 1
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 2
    • FDP_ACF_EXT.2.1: 1
    • FDP_ACF_EXT.3: 1
    • FDP_ACF_EXT.3.1: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 1
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 2
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 6
    • FDP_IFC_EXT.1: 2
    • FDP_IFC_EXT.1.1: 2
    • FDP_PBA_EXT: 3
    • FDP_PBA_EXT.1: 1
    • FDP_PBA_EXT.1.1: 1
    • FDP_RIP: 2
    • FDP_RIP.2: 1
    • FDP_RIP.2.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 2
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 7
    • FDP_UPC_EXT.1: 4
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 3
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 18
    • FIA_BLT_EXT.1: 2
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 2
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 2
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.4.2: 1
    • FIA_BLT_EXT.6: 1
    • FIA_BLT_EXT.6.1: 1
    • FIA_BLT_EXT.7: 1
    • FIA_BLT_EXT.7.1: 1
    • FIA_BMG_EXT: 1
    • FIA_BMG_EXT.1: 11
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 1
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 3
    • FIA_PSK_EXT.1: 1
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 1
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 6
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 3
    • FIA_UAU.6.1: 1
    • FIA_UAU.6.2: 1
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 9
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.4: 1
    • FIA_UAU_EXT.4.1: 1
    • FIA_UAU_EXT.4.2: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 1
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 1
    • FMT_SMF_EXT: 14
    • FMT_SMF_EXT.1: 7
    • FMT_SMF_EXT.1.1: 1
    • FMT_SMF_EXT.2: 1
    • FMT_SMF_EXT.2.1: 1
    • FMT_SMF_EXT.3: 2
    • FMT_SMF_EXT.3.1: 1
  • FPT:
    • FPT_AEX_EXT: 18
    • FPT_AEX_EXT.1: 1
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 1
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 1
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_AEX_EXT.5: 1
    • FPT_AEX_EXT.5.1: 1
    • FPT_AEX_EXT.5.2: 1
    • FPT_AEX_EXT.6.1: 1
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 1
    • FPT_BBD_EXT.1.1: 1
    • FPT_JTA_EXT: 3
    • FPT_JTA_EXT.1: 1
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 1
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 1
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 1
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 1
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 17
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 3
    • FPT_TUD_EXT: 10
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.3: 1
    • FPT_TUD_EXT.3.1: 1
    • FPT_TUD_EXT.6: 1
    • FPT_TUD_EXT.6.1: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 2
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 2
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_BLT_EXT: 10
    • FTP_BLT_EXT.1: 1
    • FTP_BLT_EXT.1.1: 1
    • FTP_BLT_EXT.1.2: 1
    • FTP_BLT_EXT.2: 1
    • FTP_BLT_EXT.2.1: 1
    • FTP_BLT_EXT.3: 2
    • FTP_ITC: 1
    • FTP_ITC_EXT: 5
    • FTP_ITC_EXT.1: 4
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 4
    • FCS_CKM.2: 2
    • FCS_CKM.4: 17
    • FCS_CKM.4.1: 1
    • FCS_COP: 58
    • FCS_COP.1: 9
  • FDP:
    • FDP_ACC: 40
    • FDP_ACC.1: 27
    • FDP_ACF: 27
    • FDP_ACF.1: 25
    • FDP_DAU: 8
    • FDP_DAU.1: 1
    • FDP_DAU.2: 2
    • FDP_IFC.1: 14
    • FDP_ITC: 8
    • FDP_ITC.1: 12
    • FDP_ITC.2: 9
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_SDI: 17
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
    • FDP_UCT: 9
    • FDP_UCT.1: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 6
    • FIA_API.1: 11
    • FIA_API.1.1: 2
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 3
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 13
    • FMT_MSA.1: 7
    • FMT_MSA.2: 7
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 8
    • FMT_MSA.4.1: 1
    • FMT_MTD: 14
    • FMT_MTD.1: 2
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 8
    • FPT_EMS.1: 11
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ICT: 2
    • FTP_ITC: 28
    • FTP_ITC.1: 17
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.CONFIG: 1
    • OE.DATA_PROPER_USER: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • A:
    • A.CGA: 3
    • A.CSP: 4
    • A.SCA: 3
  • OE:
    • OE.HID_VAD: 10
pdf_data/st_keywords/vendor
  • Broadcom:
    • Broadcom: 1
  • Qualcomm:
    • Qualcomm: 24
  • Samsung:
    • Samsung: 133
  • NXP:
    • NXP: 9
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 21
      • AES-: 5
      • AES-128: 1
      • AES-256: 11
  • constructions:
    • MAC:
      • HMAC: 11
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 3
  • AES_competition:
    • AES:
      • AES: 21
  • constructions:
    • MAC:
      • CMAC: 8
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 6
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 16
  • FF:
    • DH:
      • DH: 6
      • DHE: 1
      • Diffie-Hellman: 6
  • RSA:
    • RSA 2048: 3
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 11
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • Diffie-Hellman: 8
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 4
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 23
      • SHA-384: 3
      • SHA-512: 2
  • scrypt:
    • scrypt: 3
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA256: 1
      • SHA384: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 12
    • IKEv1: 13
    • IKEv2: 11
  • IPsec:
    • IPsec: 42
  • TLS:
    • TLS:
      • TLS: 60
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 2
  • VPN:
    • VPN: 98
  • PACE:
    • PACE: 15
  • PGP:
    • PGP: 1
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 7
  • RNG:
    • RBG: 14
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 1
  • CBC:
    • CBC: 7
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 10
    • P-521: 8
    • secp256r1: 2
    • secp384r1: 2
  • NIST:
    • NIST P-256: 1
    • NIST P-384: 1
    • P-256: 1
    • P-384: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 22
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • fault injection: 1
    • physical tampering: 5
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 1
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 6
  • IBM:
    • SE: 4
  • other:
    • TEE: 27
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 4: 9
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 6
    • FIPS 186-4: 6
    • FIPS 197: 9
    • FIPS 198-1: 5
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-132: 4
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 800-108: 4
    • SP 800-38A: 2
    • SP 800-38C: 2
    • SP 800-38E: 2
    • SP 800-38F: 1
    • SP 800-56A: 1
    • SP 800-90A: 4
  • PKCS:
    • PKCS 2: 1
    • PKCS#12: 2
  • RFC:
    • RFC 2246: 1
    • RFC 2560: 1
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 3526: 2
    • RFC 3602: 2
    • RFC 4106: 2
    • RFC 4109: 1
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4346: 1
    • RFC 4945: 2
    • RFC 5216: 1
    • RFC 5246: 4
    • RFC 5280: 4
    • RFC 5282: 2
    • RFC 5288: 3
    • RFC 5289: 8
    • RFC 5746: 1
    • RFC 5759: 1
    • RFC 6125: 1
    • RFC 6379: 2
    • RFC 6960: 1
    • RFC 8247: 1
    • RFC 8784: 1
  • X509:
    • X.509: 11
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS 186-4: 3
    • FIPS 197: 5
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 11770-3: 3
    • ISO/IEC 14443: 2
    • ISO/IEC 14888-3: 3
    • ISO/IEC 7816-3: 1
  • NIST:
    • NIST SP 800-38B: 2
  • PKCS:
    • PKCS#15: 2
  • RFC:
    • RFC 5639: 2
pdf_data/st_keywords/javacard_packages
  • com:
    • com.samsung.android.knox.net.vpn: 1
  • java:
    • java.security.cert: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • antenna, card body or carrier are irrelevant for the secure operation of the TOE and are therefore out of scope of the TOE. To be powered and able to communicate, the TOE requires a reader and the terminal: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Vesna Brigić Mikuc
  • /CreationDate: D:20240920222037+02'00'
  • /Creator: Microsoft® Word 2019
  • /Keywords: Common Criteria Security Target Secure Signature Creation Device SSCD Qualified Electronic Signature/Seal Creation Device QSCD
  • /ModDate: D:20240920222037+02'00'
  • /Producer: Microsoft® Word 2019
  • /Title: Security Target Lite AKD eID 2.0 SSCD v2.3
  • pdf_file_size_bytes: 1278868
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different