name |
Ubuntu LTS 16.04.4 with KVM and QEMU 2.5 |
TCOS CSP Module Version 1.0 Release 1/P6022y |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
SE |
DE |
status |
archived |
archived |
not_valid_after |
04.07.2023 |
07.04.2025 |
not_valid_before |
04.07.2018 |
07.04.2020 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20Certificate%20Ubuntu.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1118c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Ubuntu%20LTS%2016.04.4.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1118a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST-Ubuntu_16.04_LTS-1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1118b_pdf.pdf |
manufacturer |
Canonical Group Limited |
T-Systems International GMBH |
manufacturer_web |
https://www.canonical.com/ |
https://www.t-systems.de/ |
security_level |
EAL2, ALC_FLR.3 |
ALC_DVS.2, EAL4+, AVA_VAN.5 |
dgst |
13c72eba73efe67d |
55b8d7537c8fdcc1 |
heuristics/cert_id |
CSEC2016011 |
BSI-DSZ-CC-1118-2020 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ALC_CMS.4, ATE_DPT.2, ATE_FUN.1, AVA_VAN.5, ADV_FSP.4, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, ALC_DVS.2, ADV_TDS.3, ADV_IMP.1, AGD_OPE.1, ALC_CMC.4, ASE_TSS.2, AGD_PRE.1 |
heuristics/extracted_versions |
2.5, 16.04.4 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1121-V2-2021 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1059-V2-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1121-V2-2021 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1059-V2-2019, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1059-2018 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1059-2018 |
heuristics/protection_profiles |
{} |
1153ad24c84b397a, ae9dcab62c3296a2 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0104b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0107b_pdf.pdf |
pdf_data/cert_filename |
CCRA Certificate Ubuntu.pdf |
1118c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180705084810+02'00'
- /ModDate: D:20180730084901+02'00'
- pdf_file_size_bytes: 1416660
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200409141124+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP"
- /ModDate: D:20200409141414+02'00'
- /Producer: LibreOffice 6.2
- /Subject: TCOS CSP Module Version 1.0 Release 1/P6022y
- /Title: Certificate BSI-DSZ-CC-1118-2020
- pdf_file_size_bytes: 889220
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
Certification Report Ubuntu LTS 16.04.4.pdf |
1118a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant / extended EAL 4 augmented by ALC_DVS.2 and AVA_VAN.5 SOGIS Recognition Agreement
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1118-2020
- cert_item: TCOS CSP Module Version 1.0 Release 1/P6022y
- cert_lab: BSI
- developer: T-Systems International GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Cryptographic Service Provider (CSP) Version 0.9.8, 19 February 2019, BSI-CC-PP-0104-2019, Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit (PPC-CSP-TS-Au) Version 0.9.5, 8 April 2019, BSI- CC-PP-0107-2019
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1059-: 1
- BSI-DSZ-CC-1059-V2-2019: 1
- BSI-DSZ-CC-1078: 2
- BSI-DSZ-CC-1118-2020: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0104-2019: 3
- BSI-CC-PP-0107-: 1
- BSI-CC-PP-0107-2019: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 1
- EAL5+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.3: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.AUTHUSER: 1
- A.CONNECT: 1
- A.DETECT: 1
- A.IT: 1
- A.KEYS: 1
- A.MANAGE: 1
- A.PEER: 2
- A.PHYSICAL: 1
- A.TRAINEDUSER: 1
- T:
- T.ACCESS: 6
- T.COMM: 1
- T.IA: 2
- T.INFOFLOW: 1
- T.RESTRICT: 1
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 4
- NXP Semiconductors: 1
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TSystems:
- T-Systems International: 13
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 12
- AES-: 4
- AES-128: 6
- AES-256: 4
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
- CVE:
- CVE-2017-0861: 1
- CVE-2017-15129: 1
- CVE-2017-16808: 1
- CVE-2017-17805: 1
- CVE-2017-17806: 1
- CVE-2018-3639: 1
- CVE-2018-9056: 1
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- malfunction: 1
- SCA:
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
- RFC:
- RFC 2460: 1
- RFC 3484: 1
- RFC 3542: 1
- RFC 4213: 1
|
- BSI:
- AIS 1: 1
- AIS 28: 1
- AIS 34: 1
- AIS 36: 1
- AIS14: 1
- AIS19: 1
- AIS20: 1
- AIS25: 1
- AIS26: 1
- AIS31: 1
- AIS32: 1
- AIS34: 1
- AIS35: 1
- AIS36: 1
- AIS37: 1
- AIS38: 1
- AIS46: 1
- AIS47: 1
- FIPS:
- FIPS 180-4: 3
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 46-3: 1
- FIPS180: 2
- FIPS180-4: 1
- FIPS186: 9
- FIPS186-4: 2
- FIPS197: 9
- FIPS46: 1
- ICAO:
- ISO:
- ISO/IEC 10116:2017: 1
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- RFC:
- RFC 2104: 1
- RFC 5639: 9
- RFC 8017: 1
- RFC2104: 2
- RFC5639: 4
- RFC8017: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 0 Release 1/P6022y User guidance manual”, Version 1.0.4, 24.03.2020, T-Systems International GmbH (confidential document) [12] “TCOS CSP Module Personalization Guidance”, Version 1.4, 04.03.2020, T- Systems International: 1
- 2019 (confidential document) 7 See secton 9.1 for list of used AIS 28 / 31 BSI-DSZ-CC-1118-2020 Certification Report C: 1
- CSP Module Version 1.0 Release 1/NXP P60D145 VB”, 24.03.2020, v1.0.1, T-Systems International GmbH (confidential document) [11] “TCOS Cryptographic Service Provider Version 2.0 Release 1/P6022yTCOS Cryptographic Service: 1
- Report (ETR) - TCOS CSP Module Version 1.0 Release 1/P6022y”, SRC Security Research & Consulting, (confidential document) [8] Protection Profile (PP-0104) and Protection Profile-Module (PP-0107): Cryptographic Service: 1
- Update im Feld unter TCOS CSP Module 1.0 R1, T-Systems International GmbH, Version 0.2, 11.10.2019 (confidential document) [RNG] Zufallszahlengenerierung in TCOS,Version 1.01, 21.02.2019 (confidential document) [HWST] NXP: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- confidential document) [13] “Update im Feld unter TCOS CSP Module 1.0 R1”, T-Systems International GmbH, Version 0.2, 11: 1
|
pdf_data/report_metadata |
- /Ansvarigt Område/enhet: CSEC
- /Author: Jerry Johansson
- /C-datum: 2008
- /CSEC ID:
- /CSECID:
- /Company: FMV/CSEC
- /ContentTypeId: 0x010100209C0526C7C5A44683868ABD684765F80200B916D1351C38174AA524317F62806230
- /Copy: 0
- /CreationDate: D:20190131103138+01'00'
- /Creator: Acrobat PDFMaker 11 för Word
- /Current Version: 0.9
- /DDocBinder: Scheme (CB)
- /DDocCabinet: QMS
- /DDocID: 2005-03-05-64D6-T9YR
- /DDocLastModDate: 2006-03-16 10:56:39
- /DDocLibrary: https://haddock.fmv.se/domdoc/CSECLib.nsf
- /DDocRevision: 3,7
- /DDocTitle: 035 CB General Document - Template
- /Datum, skapat: -
- /Deluppdragsbenämning:
- /Dokument Status: Aktiv
- /Dokumentansvarig: Jerry Johansson
- /Dokumentansvarigs enhet: KC Ledsyst
- /Dokumentbeteckning:
- /Dokumentdatum: 2018-Jul-04
- /Dokumenttitel: Certification Report Canonical Ubuntu LTS 16.04.4
- /Dokumenttyp: CB
- /FMV_beteckning: 16FMV12482-52:1
- /Fast_Roll:
- /Fast_av:
- /Fast_den: 2014-01-27T19:05:45Z
- /Fastställarens roll: Lead Certifier
- /Fastställd den: 2016-06-10T19:05:00Z
- /Fastställt av: Jerry Johansson
- /Fastställt av1: Jerry Johansson
- /Giltigt från: -
- /Infoklass: Öppen
- /Informationsklass:
- /Keywords:
- /Klassificeringsnr: 25 550
- /MallVersion: 7.0
- /ModDate: D:20190201073718+01'00'
- /Paragraf:
- /Platina: 1
- /Producer: Adobe PDF Library 11.0
- /Referens ID: FMVID-297-738
- /Sekr. gäller tom.: -
- /SourceModified:
- /Status: Aktivt
- /Stämpel: 0
- /Subject: 16FMV12482-52:1
- /Title: Certification Report Canonical Ubuntu LTS 16.04.4
- /Uncontrolled: 0.000000
- /Uppdragsbenämning:
- /Utgåva: 1.0
- /_dlc_DocId: CSEC-37-1650
- /_dlc_DocIdItemGuid: cfa7e571-175c-4889-bd10-378edb70609a
- /_dlc_DocIdUrl: http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-37-1650, CSEC-37-1650
- /Ärendetyp: 6
- pdf_file_size_bytes: 166835
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200409135722+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP"
- /ModDate: D:20200409141001+02'00'
- /Producer: LibreOffice 6.2
- /Subject: TCOS CSP Module Version 1.0 Release 1/P6022y
- /Title: Certification Report BSI-DSZ-CC-1118-2020
- pdf_file_size_bytes: 1420347
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
pdf_data/st_filename |
ST-Ubuntu_16.04_LTS-1.0.pdf |
1118b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1059-2018: 1
- BSI-DSZ-CC-1118: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0104-: 1
- BSI-CC-PP-0104-2019: 1
- BSI-CC-PP-0107-2019: 2
- BSI-CC-PP0035: 1
- BSI-CC-PP0104: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 1
- EAL4: 1
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 6: 1
- EAL 6 augmented: 1
- EAL 6+: 1
- EAL4: 8
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.3: 5
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SEL.1: 8
- FAU_SEL.1.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 34
- FCS_CKM.1.1: 3
- FCS_CKM.2: 13
- FCS_CKM.2.1: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 26
- FCS_COP.1.1: 6
- FCS_RNG: 2
- FCS_RNG.1: 33
- FCS_RNG.1.1: 4
- FCS_RNG.1.2: 5
- FDP:
- FDP_ACC.1: 38
- FDP_ACC.1.1: 3
- FDP_ACC.2: 19
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 42
- FDP_ACF.1.1: 5
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 5
- FDP_ACF.1.4: 5
- FDP_CDP: 5
- FDP_CDP.1: 14
- FDP_CDP.1.1: 2
- FDP_ETC.2: 8
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 14
- FDP_IFC.2: 20
- FDP_IFC.2.1: 2
- FDP_IFC.2.2: 2
- FDP_IFF.1: 26
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_ITC.1: 4
- FDP_ITC.2: 22
- FDP_ITC.2.1: 2
- FDP_ITC.2.2: 2
- FDP_ITC.2.3: 2
- FDP_ITC.2.4: 2
- FDP_ITC.2.5: 2
- FDP_RIP.2: 13
- FDP_RIP.2.1: 1
- FDP_UCT: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 19
- FIA_ATD.1.1: 2
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 50
- FMT_MSA.1.1: 5
- FMT_MSA.3: 51
- FMT_MSA.3.1: 7
- FMT_MSA.3.2: 7
- FMT_MSA.4: 6
- FMT_MSA.4.1: 1
- FMT_MTD.1: 91
- FMT_MTD.1.1: 13
- FMT_REV.1: 15
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 25
- FMT_SMF.1.1: 1
- FMT_SMR.1: 35
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TDC.1: 22
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 2
- FTA:
- FTA_SSL.1: 7
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 7
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTP:
- FTP_ITC.1: 11
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 7
- FAU_GEN.1.1: 4
- FAU_GEN.1.2: 1
- FAU_SAS.1: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 5
- FAU_STG.3.1: 4
- FCS:
- FCS_CKM: 85
- FCS_CKM.1: 30
- FCS_CKM.2: 14
- FCS_CKM.4: 28
- FCS_CKM.4.1: 1
- FCS_CKM.5: 16
- FCS_CKM.5.1: 1
- FCS_COP: 135
- FCS_COP.1: 38
- FCS_RNG: 6
- FCS_RNG.1: 13
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 13
- FDP_ACC.1: 29
- FDP_ACF: 11
- FDP_ACF.1: 19
- FDP_DAU: 18
- FDP_DAU.1: 3
- FDP_DAU.2: 6
- FDP_ETC: 4
- FDP_ETC.1: 4
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 8
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 19
- FDP_ITC: 19
- FDP_ITC.1: 21
- FDP_ITC.2: 31
- FDP_ITT.1: 1
- FDP_RIP: 4
- FDP_RIP.1: 1
- FDP_SDC: 3
- FDP_SDC.1: 11
- FDP_SDC.1.1: 3
- FDP_SDI: 1
- FDP_SDI.2: 2
- FDP_UCT: 1
- FDP_UIT: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 14
- FIA_API.1: 7
- FIA_API.1.1: 1
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 11
- FIA_UAU.5.2: 1
- FIA_UAU.6: 4
- FIA_UAU.6.1: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MOF: 5
- FMT_MOF.1: 7
- FMT_MOF.1.1: 7
- FMT_MSA: 10
- FMT_MSA.1: 9
- FMT_MSA.2: 5
- FMT_MSA.2.1: 1
- FMT_MSA.3: 6
- FMT_MSA.4: 5
- FMT_MTD: 21
- FMT_MTD.1: 17
- FMT_MTD.3: 13
- FMT_MTD.3.1: 1
- FMT_SAE.1: 6
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 4
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS.1: 1
- FPT_ESA: 8
- FPT_ESA.1: 9
- FPT_ESA.1.1: 1
- FPT_ESA.1.2: 1
- FPT_ESA.1.3: 1
- FPT_ESA.1.4: 1
- FPT_FLS: 1
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ISA: 12
- FPT_ISA.1: 14
- FPT_ISA.1.1: 1
- FPT_ISA.1.2: 1
- FPT_ISA.1.3: 1
- FPT_ISA.1.4: 1
- FPT_ISA.1.5: 1
- FPT_ITT.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_SDC: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 4
- FPT_TCT: 10
- FPT_TCT.1: 5
- FPT_TCT.1.1: 1
- FPT_TDC: 9
- FPT_TDC.1: 16
- FPT_TIT: 15
- FPT_TIT.1: 10
- FPT_TIT.1.1: 2
- FPT_TIT.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 6
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 16
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHUSER: 3
- A.CONNECT: 5
- A.DETECT: 3
- A.IT: 2
- A.KEYS: 3
- A.MANAGE: 5
- A.PEER: 6
- A.PHYSICAL: 4
- A.TRAINEDUSER: 3
- O:
- O.AUDITING: 14
- O.COMP: 32
- O.CP: 17
- O.CRYPTO: 15
- O.DISCRETIONARY: 10
- O.MANAGE: 26
- O.NETWORK: 12
- O.SUBJECT: 10
- O.TRUSTED_CHANNEL: 4
- OE:
- OE.ADMIN: 6
- OE.INFO_PROTECT: 8
- OE.INSTALL: 4
- OE.IT: 4
- OE.MAINTENANCE: 3
- OE.PHYSICAL: 3
- OE.RECOVER: 4
- OE.REMOTE: 4
- OE.TRUSTED: 5
- T:
- T.ACCESS: 24
- T.COMM: 4
- T.IA: 6
- T.INFOFLOW: 4
- T.RESTRICT: 3
|
- O:
- O.AES: 1
- O.CUST_RECONF_PLAIN: 1
- O.EEPROM_INTEGRITY: 1
- O.FM_FW: 1
- O.MEM_ACCESS: 1
- O.PUF: 1
- O.RBGS: 6
- O.RND: 1
- O.SFR_ACCESS: 1
- O.TDES: 1
- O.TST: 6
- OE:
- OSP:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 3
- NXP Semiconductors: 1
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 107
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- AES:
- AES: 24
- AES-: 2
- AES-128: 9
- AES-256: 11
- DES:
- 3DES:
- TDEA: 1
- TDES: 4
- Triple-DES: 1
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 1
- SHA-256: 4
- SHA-384: 4
- SHA-512: 4
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 2
- SHA-512: 1
- SHA384: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 5
- KEX:
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 1
- P-384: 1
- P-521: 1
- curve P-256: 1
- curve P-384: 1
- curve P-521: 1
|
- Brainpool:
- brainpoolP192r1: 1
- brainpoolP192t1: 1
- brainpoolP224r1: 1
- brainpoolP224t1: 1
- brainpoolP256r1: 4
- brainpoolP256t1: 1
- brainpoolP320r1: 1
- brainpoolP320t1: 1
- brainpoolP384r1: 2
- brainpoolP384t1: 1
- brainpoolP512r1: 2
- brainpoolP512t1: 1
- NIST:
- Curve P-192: 1
- Curve P-256: 1
- Curve P-384: 1
- Curve P-521: 1
- P-192: 1
- P-256: 1
- P-384: 1
- P-521: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 1
- physical probing: 5
- side channels: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 140-2: 7
- FIPS 180-4: 6
- FIPS 186-4: 1
- FIPS 197: 5
- FIPS 198-1: 2
- FIPS 46-3: 1
- FIPS PUB 186-4: 4
- FIPS180-4: 2
- FIPS197: 2
- PKCS:
- RFC:
- RFC 2460: 1
- RFC 3484: 1
- RFC 3542: 1
- RFC 4213: 1
- RFC 4252: 4
- RFC 4253: 3
- RFC 768: 1
- RFC 791: 2
- RFC 792: 1
- RFC 793: 1
- RFC3526: 2
- RFC4252: 6
- RFC4253: 13
- RFC4419: 3
- RFC5656: 4
- RFC6668: 2
|
- BSI:
- AIS 31: 1
- AIS 36: 1
- AIS31: 4
- AIS36: 2
- CC:
- CCMB-2012-09-004: 1
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 1
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 4
- FIPS180: 2
- FIPS186: 4
- FIPS197: 11
- ICAO:
- ISO:
- ISO/IEC 10116:2017: 1
- ISO/IEC 19790: 6
- NIST:
- PKCS:
- RFC:
- RFC 2104: 1
- RFC 5639: 1
- RFC 5903: 1
- RFC 6954: 1
- RFC 8017: 1
- RFC2104: 2
- RFC5639: 13
- RFC5903: 3
- RFC6954: 4
- RFC8017: 5
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
- PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation: 1
- as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also: 1
- out of scope: 3
|
|
pdf_data/st_metadata |
- /Author: Stephan Mueller (generated by CCTool version 2.8.4.6)
- /CreationDate: D:20180627092838Z
- /Creator: Unknown
- /Keywords: Security Target, Common Criteria, Linux Distribution
- /ModDate: D:20180730084951+02'00'
- /Producer: XEP 4.18 build 20100322
- /Subject: Ubuntu
- /Title: Security Target for Ubuntu 16.04 LTS (version 1.0 as of 2018-06-27)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 1143627
- pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf, http://tools.ietf.org/html/rfc4252, http://tools.ietf.org/html/rfc5656, http://tools.ietf.org/html/rfc4253, http://tools.ietf.org/html/rfc3526, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf, http://tools.ietf.org/html/rfc6668, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf, http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf, http://tools.ietf.org/html/rfc4419
- pdf_is_encrypted: False
- pdf_number_of_pages: 114
|
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |