Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Carte VITALE 2 - Application VITALE : Composant AT90SC24036RCV masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1
ANSSI-CC-2013/14
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
BSI-DSZ-CC-0772-2014
name Carte VITALE 2 - Application VITALE : Composant AT90SC24036RCV masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1 - Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
category ICs, Smart Cards and Smart Card-Related Devices and Systems Data Protection
not_valid_before 2013-05-22 2014-11-07
not_valid_after 2019-09-01 2019-11-08
scheme FR DE
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-14en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
manufacturer MORPHO/Inside Secure Kanguru Solutions
manufacturer_web https://www.morpho.com https://www.kanguru.com
security_level ALC_DVS.2, AVA_VAN.5, EAL4+ ALC_FLR.1, EAL2+
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-14fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 3, Version 1.05', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0006b.pdf', 'pp_ids': frozenset({'SSCD_TYPE3_V1.05'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': frozenset({'PDCP_V1.3'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0005b.pdf', 'pp_ids': frozenset({'SSCD_TYPE2_V1.04'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'})
state/report/pdf_hash e3931a6267279e0cd0ee59764c8941a25f1bae0d0806605e1099e05a52eb7407 16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57
state/report/txt_hash d56c07510cc3d5b39d86f75a6c37cd3e0ce1c61ea7cc4cea3877034c95ef5c46 8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82
state/st/pdf_hash bf77496e9551181307cda4e333dcc05b128f391913df61a56cbb3f0b1108eaca 077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d
state/st/txt_hash 7caf842fedffecd6af8cbfd1a76bcfcbbcccce4ba697313c90bb6b18bf4bd9d1 74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147
heuristics/cert_id ANSSI-CC-2013/14 BSI-DSZ-CC-0772-2014
heuristics/cert_lab CEA BSI
heuristics/extracted_versions 1.0.1 2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6
heuristics/report_references/directly_referencing ANSSI-CC-2012/08 None
heuristics/report_references/indirectly_referencing ANSSI-CC-2012/08 None
heuristics/scheme_data
  • product: Carte VITALE 2 - Application ADELE : Composant AT90SC24036RCV masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1
  • url: https://cyber.gouv.fr/produits-certifies/carte-vitale-2-application-adele-composant-at90sc24036rcv-masque-par-le-logiciel
  • description: Le produit certifié est la « Carte VITALE 2 - Application ADELE : Composant AT90SC24036RCV masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1 » développée par Morpho et Inside Secure. Suivant une règle de nommage interne de Morpho, la version du correctif (1) correspond au dernier digit de la version du système d'exploitation (1.0.1). La cible d'évaluation (TOE - « T
  • sponsor: Morpho
  • developer: Morpho / Inside Secure
  • cert_id: 2013/15
  • level: EAL4+
  • enhanced:
    • cert_id: 2013/15
    • certification_date: 22/05/2013
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r3
    • developer: Morpho / Inside Secure
    • sponsor: Morpho
    • evaluation_facility: CEA - LETI
    • level: EAL4+
    • protection_profile: PP ESforSSD, BSI-PP-0005-2002, BSI-PP-0006-2002
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_DVS.2, AVA_VAN.5
    • target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-15en.pdf
    • report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-15fr.pdf
None
pdf_data/report_filename ANSSI-CC_2013-14fr.pdf 0772a_pdf.pdf
pdf_data/report_frontpage
  • FR:
    • match_rules: Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
    • cert_id: ANSSI-CC-2013/14
    • cert_item: Carte VITALE 2 - Application VITALE : Composant AT90SC24036RCV masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1
    • cert_item_version: Version système d’exploitation : 1.0.1 Version du correctif : 1
    • ref_protection_profiles: PP ESforSSD] certifié par l’ANSSI Protection Profile Embedded software for Smart Secure Devices Basic and Extended configurations – Basic configuration, version 1.0 [BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
    • cc_version: Critères Communs version 3.1 révision 3
    • cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
    • developer: Morpho 18 Chaussée Jules César, 95520 Osny, France Inside Secure Maxwell Building – Scottish Enterprise Technology Park East Kilbride – Glasgow G75 0QF - Ecosse Commanditaire Morpho 18 Chaussée Jules César, 95520 Osny, France
    • cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
  • DE:
    • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
    • cert_id: BSI-DSZ-CC-0772-2014
    • cert_item: Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
    • developer: Kanguru Solutions
    • cert_lab: BSI
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2013/14: 21
    • ANSSI-CC-2012/08: 2
    • ANSSI-CC-2012/08-M01: 1
  • DE:
    • BSI-DSZ-CC-0772-2014: 22
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0005-2002: 2
    • BSI-PP-0006-2002: 1
    • BSI-PP-0035-: 1
    • BSI-PP- 0005-2002: 1
    • BSI-PP- 0006-2002: 1
    • BSI-PP- 0035-2007: 1
    • BSI-PP-0035-2007: 1
  • ANSSI:
    • ANSSI-CC-PP-2009_02: 1
  • BSI:
    • BSI-PP-0025-2006: 4
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0005-2002: 2
  • BSI-PP-0006-2002: 1
  • BSI-PP-0035-: 1
  • BSI-PP- 0005-2002: 1
  • BSI-PP- 0006-2002: 1
  • BSI-PP- 0035-2007: 1
  • BSI-PP-0035-2007: 1
  • BSI-PP-0025-2006: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 3
    • AVA_VAN: 3
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.1: 5
    • ALC_FLR: 3
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
    • AVA_VAN: 2
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_ARC.1: 1
  • ADV_FSP.1: 1
  • ADV_FSP.2: 1
  • ADV_FSP.3: 1
  • ADV_FSP.4: 1
  • ADV_FSP.5: 1
  • ADV_FSP.6: 1
  • ADV_IMP.1: 1
  • ADV_IMP.2: 1
  • ADV_INT.1: 1
  • ADV_INT.2: 1
  • ADV_INT.3: 1
  • ADV_SPM.1: 1
  • ADV_TDS.1: 1
  • ADV_TDS.2: 1
  • ADV_TDS.3: 1
  • ADV_TDS.4: 1
  • ADV_TDS.5: 1
  • ADV_TDS.6: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
pdf_data/report_keywords/cc_sar/AGD
  • AGD_OPE: 1
  • AGD_PRE: 1
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_OPE: 1
  • AGD_PRE: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 3
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_FLR.1: 5
  • ALC_FLR: 3
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 1
  • ALC_CMC.5: 1
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_DVS.2: 1
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 1
  • ALC_LCD.2: 1
  • ALC_TAT.1: 1
  • ALC_TAT.2: 1
  • ALC_TAT.3: 1
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 3 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 2 3
pdf_data/report_keywords/cc_sar/ASE
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_TSS.2: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ATE
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_FUN: 1
  • ATE_IND: 1
  • ATE_COV.1: 2
  • ATE_COV.2: 1
  • ATE_COV.3: 1
  • ATE_DPT.1: 1
  • ATE_DPT.2: 1
  • ATE_DPT.3: 1
  • ATE_DPT.4: 1
  • ATE_FUN.1: 1
  • ATE_FUN.2: 1
  • ATE_IND.1: 1
  • ATE_IND.2: 1
  • ATE_IND.3: 1
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_FUN: 1
  • ATE_IND: 1
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN.5: 3
  • AVA_VAN: 3
  • AVA_VAN.1: 1
  • AVA_VAN.2: 1
  • AVA_VAN.3: 1
  • AVA_VAN.4: 1
  • AVA_VAN.5: 1
  • AVA_VAN: 2
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN 3 2
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 3 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 4: 2
  • EAL4: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 5: 1
  • EAL 7: 1
  • EAL 2: 8
  • EAL 1: 7
  • EAL 4: 7
  • EAL2: 2
  • EAL 3: 4
  • EAL 5: 6
  • EAL 6: 3
  • EAL 7: 4
  • EAL 2 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 1 7
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 1 4
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 2 7
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 1 6
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 1 4
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC E6 Elevé: 1
  • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_COP.1: 1
    • FCS_CKM.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
  • FIA:
    • FIA_UID.2: 4
    • FIA_UAU.2: 4
    • FIA_UAU.6: 1
    • FIA_SOS.1: 1
  • FMT:
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User: 1
    • KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 3
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 2
  • atsec:
    • atsec: 3
pdf_data/report_keywords/hash_function/SHA/SHA2
  • SHA-2: 1
  • SHA-256: 13
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
  • ISO:
    • ISO/IEC 17065: 2
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES-256: 1
      • AES: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
    • BSI 7138: 2
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/vendor
  • Morpho:
    • Morpho: 11
  • Microsoft:
    • Microsoft: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 275945
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /CreationDate: D:20130523091304+02'00'
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate: D:20130530104905+02'00'
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1643286
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20141121083051+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
  • /ModDate: D:20141121113713+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0772-2014
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
pdf_data/report_metadata//CreationDate D:20130523091304+02'00' D:20141121083051+01'00'
pdf_data/report_metadata//Creator PDFCreator Version 1.2.1 Writer
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
pdf_data/report_metadata//ModDate D:20130530104905+02'00' D:20141121113713+01'00'
pdf_data/report_metadata//Producer GPL Ghostscript 9.02 LibreOffice 4.2
pdf_data/report_metadata//Subject Common Criteria Certification
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0772-2014
pdf_data/report_metadata/pdf_file_size_bytes 275945 1643286
pdf_data/report_metadata/pdf_hyperlinks https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
pdf_data/report_metadata/pdf_number_of_pages 20 42
pdf_data/st_filename ANSSI-CC-cible_2013-14en.pdf 0772b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 3
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2012/08-M01: 1
  • DE:
    • BSI-DSZ-CC-0772: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 10
  • T:
    • T.RND: 12
  • A:
    • A.CGA: 8
    • A.SCA: 7
  • OE:
    • OE.HI_VAD: 10
    • OE.RND: 13
    • OE.SVD_AUTH_CGA: 2
  • OSP:
    • OSP.MANAGEMENT_OF_SECRETS: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 1
  • ANSSI:
    • ANSSI-CC-PP-ESforSSD_Basic: 1
    • ANSSI-CC-PP-ESforSSD_Extended: 1
  • BSI:
    • BSI-PP-0025: 6
    • BSI-PP- 0025: 13
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035: 1
  • BSI-PP-0025: 6
  • BSI-PP- 0025: 13
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_PRE: 1
    • AGD_OPE: 1
    • AGD_PRE.1: 1
    • AGD_OPE.1: 1
  • ALC:
    • ALC_DVS.2: 7
    • ALC_DVS.1: 1
  • AVA:
    • AVA_VAN.5: 8
    • AVA_VAN: 1
  • ADV:
    • ADV_SPM.1: 2
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.1: 5
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_IMP.1: 1
  • ADV_TDS.3: 1
  • ADV_SPM.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
pdf_data/st_keywords/cc_sar/AGD
  • AGD_PRE: 1
  • AGD_OPE: 1
  • AGD_PRE.1: 1
  • AGD_OPE.1: 1
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 7
  • ALC_DVS.1: 1
  • ALC_FLR.1: 5
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 8
  • AVA_VAN: 1
  • AVA_VAN.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 4: 1
  • EAL5: 1
  • EAL4+: 3
  • EAL4: 3
  • EAL 4 augmented: 1
  • EAL5 augmented: 1
  • EAL4 augmented: 1
  • EAL2: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP: 3
    • FAU_SAA: 3
    • FAU_GEN: 1
    • FAU_ARP.1: 2
    • FAU_SAA.1: 3
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM: 9
    • FCS_CKM.4: 5
    • FCS_COP.1: 10
    • FCS_COP: 6
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.3: 1
  • FDP:
    • FDP_ACC: 31
    • FDP_ACF: 31
    • FDP_ETC: 4
    • FDP_ITC: 6
    • FDP_RIP.1: 5
    • FDP_RIP: 3
    • FDP_ROL: 3
    • FDP_SDI: 9
    • FDP_UCT: 8
    • FDP_UIT: 15
    • FDP_ACC.1: 13
    • FDP_ACF.1: 49
    • FDP_ETC.1: 2
    • FDP_ITC.1: 7
    • FDP_RIP.1.1: 1
    • FDP_SDI.2: 6
    • FDP_UCT.1: 4
    • FDP_UIT.1: 10
    • FDP_ROL.1: 3
    • FDP_UNO.1: 1
  • FIA:
    • FIA_AFL.1: 3
    • FIA_ATD.1: 3
    • FIA_SOS: 3
    • FIA_UAU.1: 4
    • FIA_UID.1: 8
    • FIA_UID: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1.1: 1
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_SOS.2: 3
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF: 3
    • FMT_MSA: 23
    • FMT_MSA.2: 3
    • FMT_MSA.3: 15
    • FMT_MTD: 3
    • FMT_SMR: 3
    • FMT_SMR.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 8
    • FMT_MSA.2.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 3
    • FPR_UNO.1: 1
  • FPT:
    • FPT_AMT.1: 2
    • FPT_FLS.1: 5
    • FPT_FLS: 3
    • FPT_ITC: 3
    • FPT_ITI: 3
    • FPT_PHP.1: 3
    • FPT_PHP.3: 3
    • FPT_TST: 3
    • FPT_TST.1: 8
    • FPT_FLS.1.1: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_ITC.1: 2
    • FPT_ITI.1: 2
  • FTP:
    • FTP_ITC: 23
    • FTP_TRP: 10
    • FTP_ITC.1: 20
    • FTP_TRP.1: 6
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_RNG.1: 15
    • FCS_CKM.1: 9
    • FCS_CKM.4: 9
    • FCS_COP.1: 9
    • FCS_RNG: 2
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM.2: 1
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_IFC.1: 1
  • FIA:
    • FIA_UAU.1: 7
    • FIA_UAU.6: 8
    • FIA_SOS.1: 8
    • FIA_UAU.2: 9
    • FIA_UID.2: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MTD: 12
    • FMT_SMF: 20
    • FMT_SMR.1: 12
    • FMT_SMF.1: 6
    • FMT_MTD.1: 3
    • FMT_MSA.1.1: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.3: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_RCV.4: 8
    • FPT_PHP.1: 8
    • FPT_RCV.4.1: 2
    • FPT_FLS.1.1: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_ARP: 3
  • FAU_SAA: 3
  • FAU_GEN: 1
  • FAU_ARP.1: 2
  • FAU_SAA.1: 3
  • FAU_GEN: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1: 3
  • FCS_CKM: 9
  • FCS_CKM.4: 5
  • FCS_COP.1: 10
  • FCS_COP: 6
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 1
  • FCS_CKM.3: 1
  • FCS_RNG.1: 15
  • FCS_CKM.1: 9
  • FCS_CKM.4: 9
  • FCS_COP.1: 9
  • FCS_RNG: 2
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 3
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM.2: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 3 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 5 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 10 9
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 31
  • FDP_ACF: 31
  • FDP_ETC: 4
  • FDP_ITC: 6
  • FDP_RIP.1: 5
  • FDP_RIP: 3
  • FDP_ROL: 3
  • FDP_SDI: 9
  • FDP_UCT: 8
  • FDP_UIT: 15
  • FDP_ACC.1: 13
  • FDP_ACF.1: 49
  • FDP_ETC.1: 2
  • FDP_ITC.1: 7
  • FDP_RIP.1.1: 1
  • FDP_SDI.2: 6
  • FDP_UCT.1: 4
  • FDP_UIT.1: 10
  • FDP_ROL.1: 3
  • FDP_UNO.1: 1
  • FDP_ACC.1: 14
  • FDP_ACF.1: 13
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_IFC.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 13 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 49 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 7 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 3
  • FIA_ATD.1: 3
  • FIA_SOS: 3
  • FIA_UAU.1: 4
  • FIA_UID.1: 8
  • FIA_UID: 3
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_SOS.2: 3
  • FIA_UAU.1: 7
  • FIA_UAU.6: 8
  • FIA_SOS.1: 8
  • FIA_UAU.2: 9
  • FIA_UID.2: 10
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.6.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_UID.1: 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 4 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 8 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MOF.1: 6
  • FMT_MOF: 3
  • FMT_MSA: 23
  • FMT_MSA.2: 3
  • FMT_MSA.3: 15
  • FMT_MTD: 3
  • FMT_SMR: 3
  • FMT_SMR.1: 5
  • FMT_MOF.1.1: 1
  • FMT_MSA.1: 8
  • FMT_MSA.2.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1: 5
  • FMT_MTD.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.1: 8
  • FMT_MTD: 12
  • FMT_SMF: 20
  • FMT_SMR.1: 12
  • FMT_SMF.1: 6
  • FMT_MTD.1: 3
  • FMT_MSA.1.1: 1
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.3: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 15 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 3 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 5 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 5 12
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_AMT.1: 2
  • FPT_FLS.1: 5
  • FPT_FLS: 3
  • FPT_ITC: 3
  • FPT_ITI: 3
  • FPT_PHP.1: 3
  • FPT_PHP.3: 3
  • FPT_TST: 3
  • FPT_TST.1: 8
  • FPT_FLS.1.1: 1
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_ITC.1: 2
  • FPT_ITI.1: 2
  • FPT_FLS.1: 9
  • FPT_RCV.4: 8
  • FPT_PHP.1: 8
  • FPT_RCV.4.1: 2
  • FPT_FLS.1.1: 1
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 5 9
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1 3 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Out of scope: 2
    • 11 1.5.4.3 Out of scope : 1
    • 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5: 1
    • from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 7
  • CBC:
    • CBC: 1
pdf_data/st_keywords/cipher_mode/CBC/CBC 7 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 11
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 40
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 5
  • SHA2:
    • SHA-256: 3
    • SHA-2: 2
  • SHA2:
    • SHA-256: 1
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 3
  • SHA-2: 2
  • SHA-256: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 3 1
pdf_data/st_keywords/randomness/RNG
  • RND: 35
  • RNG: 4
  • RNG: 14
pdf_data/st_keywords/randomness/RNG/RNG 4 14
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • physical probing: 2
    • side channel: 1
    • SPA: 3
    • DPA: 3
    • timing attacks: 2
  • FI:
    • physical tampering: 3
    • malfunction: 1
    • fault injection: 1
  • other:
    • reverse engineering: 1
  • FI:
    • physical tampering: 3
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 3
  • malfunction: 1
  • fault injection: 1
  • physical tampering: 3
pdf_data/st_keywords/standard_id
  • PKCS:
    • PKCS#1: 10
    • PKCS 1: 2
  • BSI:
    • AIS31: 3
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
pdf_data/st_keywords/standard_id/BSI
  • AIS31: 3
  • AIS 20: 1
  • AIS 31: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 8
    • 3DES:
      • TDES: 8
      • 3DES: 4
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/st_keywords/vendor
  • Morpho:
    • Morpho: 8
  • Philips:
    • Philips: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 1094226
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 102
  • /CreationDate: D:20130523093454+02'00'
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate: D:20130530104833+02'00'
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 704587
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 41
  • /Keywords: Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
  • /Subject:
  • /Title: Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
  • /Creator: Unknown
  • /Author: Andreas Siegert (generated by CCTool version 2.8)
  • /Producer: XEP 4.23
  • /application: CCTool version x.y
  • /Trapped: /False
  • /CreationDate: D:20141006150157Z
  • /ModDate: D:20141006150157Z
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
pdf_data/st_metadata//CreationDate D:20130523093454+02'00' D:20141006150157Z
pdf_data/st_metadata//Creator PDFCreator Version 1.2.1 Unknown
pdf_data/st_metadata//Keywords Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
pdf_data/st_metadata//ModDate D:20130530104833+02'00' D:20141006150157Z
pdf_data/st_metadata//Producer GPL Ghostscript 9.02 XEP 4.23
pdf_data/st_metadata//Title Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
pdf_data/st_metadata/pdf_file_size_bytes 1094226 704587
pdf_data/st_metadata/pdf_hyperlinks http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
pdf_data/st_metadata/pdf_number_of_pages 102 41
dgst 08b573324872fe54 eda06ca3c208ebd0