Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Ubuntu LTS 16.04.4 with KVM and QEMU 2.5
CSEC2016011
STARCOS 3.7 COS HBA-SMC
BSI-DSZ-CC-0976-V4-2021
name Ubuntu LTS 16.04.4 with KVM and QEMU 2.5 STARCOS 3.7 COS HBA-SMC
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme SE DE
status archived active
not_valid_after 04.07.2023 18.06.2026
not_valid_before 04.07.2018 18.06.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20Certificate%20Ubuntu.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V4c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Ubuntu%20LTS%2016.04.4.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V4a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST-Ubuntu_16.04_LTS-1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V4b_pdf.pdf
manufacturer Canonical Group Limited G+D Mobile Security GmbH
manufacturer_web https://www.canonical.com/ https://www.gi-de.com/de/de/mobile-security/
security_level EAL2, ALC_FLR.3 ALC_DVS.2, EAL4+, ATE_DPT.2, AVA_VAN.5
dgst 13c72eba73efe67d e86ac89b4f665c58
heuristics/cert_id CSEC2016011 BSI-DSZ-CC-0976-V4-2021
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ALC_FLR.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 2.5, 16.04.4 3.7
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0976-V3-2019
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0976-2015, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-0879-2014, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0976-V2-2018, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0976-V3-2019, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0916-2015
heuristics/scheme_data
  • category: eHealth
  • cert_id: BSI-DSZ-CC-0976-V4-2021
  • certification_date: 18.06.2021
  • enhanced:
    • applicant: Giesecke & Devrient GmbH seit 1. Juli 2017 Giesecke+Devrient Mobile Security GmbH Prinzregentenstr. 159 81677 München
    • assurance_level: EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0976V4c_pdf.pdf?__blob=publicationFile&v=3
    • certification_date: 18.06.2021
    • description: The Target of Evaluation (TOE) is the product STARCOS 3.6 COSGKV C1 developed by Giesecke & Devrient GmbH. The TOE is a smart card product according to the G2 Card Operating System (G2-COS) specification from gematik. The TOE is intended to be used as a card operating system platform for specific card types and applications of the card generation G2 in the framework of the German health care system, and therefore implements the mandatory part of the G2-COS specification with the base functionality of the operating system platform only. The TOE implements from the PP-0082-V2 the base part without any of the optional packages.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-0976-V4-2021-MA-01 (Ausstellungsdatum / Certification Date 09.05.2022)', 'description': 'The partial ALC re-evaluation for procedure 0976-V4 covers the update of the product life-cycle concerning the involved development and production sites. The certified product itself did not change.'}), frozendict({'id': 'BSI-DSZ-CC-0976-V4-2021 (Ausstellungsdatum / Certification Date 18.06.2021, gültig bis / valid until 17.06.2026) Zertifizierungsreport / Certification Report', 'description': 'Software'}), frozendict({'id': 'BSI', 'description': 'The partial ALC re-evaluation for procedure 0976-V3 covers the update of the product life-cycle concerning the involved development and production sites. The certified product itself did not change.'}), frozendict({'id': 'BSI-DSZ-CC-0976-V3-2019-MA-01 (Ausstellungsdatum / Certification Date 15.06.2021)', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI-DSZ-CC-0976-V3-2019 (Ausstellungsdatum / Certification Date 21.11.2019, gültig bis / valid until 20.11.2024)', 'description': '), to adaptations in the life-cycle model as well as to the integration of the functional package Contactless and further specific changes in the Embedded Software including a corresponding update of the related user guidance documentation. In particular, the TOE’s (crypto) implementation was re-evaluated and reassessed.'}), frozendict({'id': 'BSI-DSZ-CC-0976-V2-2018 (Ausstellungsdatum / Certification Date 20.09.2018, gültig bis / valid until 19.09.2023)', 'description': 'Software'}), frozendict({'id': 'BSI-DSZ-CC-0976-2015-MA-01 (Ausstellungsdatum / Certification Date 02.08.2018)', 'description': 'The changes are related to an update and reevaluation of the product life-cycle caused by changes in the development and porduction sites. The certified product itself did not change.'}), frozendict({'id': 'BSI-DSZ-CC-0976-2015-RA-01 (Ausstellungsdatum / Certification Date 19.09.2017)', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-0976-2015 (Ausstellungsdatum / Certification Date 29.12.2015, gültig bis / valid until 28.12.2020)', 'description': 'Security Target'})]
    • evaluation_facility: SRC Security Research & Consulting GmbH
    • expiration_date: 17.06.2026
    • product: STARCOS 3.7 COS HBA-SMC
    • protection_profile: Card Operating System Generation 2 (PP COS G2), Version 2.1, 10 July 2019, BSI-CC-PP-0082-V4-2019
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0976V4a_pdf.pdf?__blob=publicationFile&v=3
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0976V4b_pdf.pdf?__blob=publicationFile&v=3
  • product: STARCOS 3.7 COS HBA-SMC
  • subcategory: Smartcards
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_SmartCards/0976_0976V2_0976V3_0976V4.html
  • vendor: Giesecke & Devrient GmbH seit 1. Juli 2017 Giesecke+Devrient Mobile Security GmbH
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-1067-V4-2023, BSI-DSZ-CC-1068-V3-2022, BSI-DSZ-CC-1067-V3-2022, BSI-DSZ-CC-1067-V5-2024, BSI-DSZ-CC-1068-V4-2023, BSI-DSZ-CC-1068-V5-2024
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1110-V3-2020
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-1067-V4-2023, BSI-DSZ-CC-1068-V3-2022, BSI-DSZ-CC-1067-V3-2022, BSI-DSZ-CC-1067-V5-2024, BSI-DSZ-CC-1068-V4-2023, BSI-DSZ-CC-1068-V5-2024
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1110-V3-2020
heuristics/protection_profiles {} 55ed365edb2c317f
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0082b_pdf.pdf
pdf_data/cert_filename CCRA Certificate Ubuntu.pdf 0976V4c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • SE:
    • CSEC2016011: 1
  • DE:
    • BSI-DSZ-CC-0976-V4-2021: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0082-V4-: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 1
  • ALC:
    • ALC_DVS.2: 1
  • ATE:
    • ATE_DPT.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • GD:
    • Giesecke+Devrient: 1
pdf_data/cert_keywords/eval_facility
  • atsec:
    • atsec: 1
pdf_data/cert_keywords/os_name
  • STARCOS:
    • STARCOS 3: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20180705084810+02'00'
  • /ModDate: D:20180730084901+02'00'
  • pdf_file_size_bytes: 1416660
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20210629121438+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, G2 COS, eHealth, STARCOS 3.7 COS HBA-SMC, Giesecke+Devrient Mobile Security GmbH"
  • /ModDate: D:20210629121708+02'00'
  • /Producer: LibreOffice 6.3
  • /Subject: STARCOS 3.7 COS HBA-SMC from G+D Mobile Security GmbH, Giesecke+Devrient Mobile Security GmbH
  • /Title: Certificate BSI-DSZ-CC-0976-V4-2021
  • pdf_file_size_bytes: 241574
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename Certification Report Ubuntu LTS 16.04.4.pdf 0976V4a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0976-V4-2021
    • cert_item: STARCOS 3.7 COS HBA-SMC
    • cert_lab: BSI
    • developer: Giesecke+Devrient Mobile Security GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Card Operating System Generation 2 (PP COS G2), Version 2.1, 10 July 2019, BSI-CC-PP-0082-V4- 2019
pdf_data/report_keywords/cc_cert_id
  • SE:
    • CSEC2016011: 1
  • DE:
    • BSI-DSZ-CC-0976-V3-2019: 3
    • BSI-DSZ-CC-0976-V4-2021: 26
    • BSI-DSZ-CC-1110-: 2
    • BSI-DSZ-CC-1110-V3-2020: 7
    • BSI-DSZ-CC-S-0128-: 1
    • BSI-DSZ-CC-S-0128-2019: 1
    • BSI-DSZ-CC-S-0132-2019: 1
    • BSI-DSZ-CC-S-0144-2020: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0082-V4-: 1
    • BSI-CC-PP-0082-V4-2019: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL 5: 4
    • EAL 5+: 1
    • EAL 6: 1
    • EAL5+: 1
    • EAL6: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 1
    • ALC_FLR.3: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 2
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_DPT.2: 4
  • AVA:
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 4
    • FCS_COP: 29
    • FCS_RNG: 3
    • FCS_RNG.1: 1
  • FIA:
    • FIA_UAU: 2
    • FIA_USB: 1
  • FPT:
    • FPT_ITE.1: 1
  • FTP:
    • FTP_ITC: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.AUTHUSER: 1
    • A.CONNECT: 1
    • A.DETECT: 1
    • A.IT: 1
    • A.KEYS: 1
    • A.MANAGE: 1
    • A.PEER: 2
    • A.PHYSICAL: 1
    • A.TRAINEDUSER: 1
  • T:
    • T.ACCESS: 6
    • T.COMM: 1
    • T.IA: 2
    • T.INFOFLOW: 1
    • T.RESTRICT: 1
  • A:
    • A.U: 1
pdf_data/report_keywords/vendor
  • GD:
    • G+D: 2
    • Giesecke & Devrient: 3
    • Giesecke+Devrient: 29
  • Infineon:
    • Infineon: 11
    • Infineon Technologies AG: 7
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 4
  • SRC:
    • SRC Security Research & Consulting: 3
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 30
    • HPC:
      • HPC: 4
  • constructions:
    • MAC:
      • CMAC: 15
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 10
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 14
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 1
  • RSA:
    • RSA-OAEP: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
  • SHA:
    • SHA2:
      • SHA-256: 3
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 8
    • SSHv2: 1
  • PACE:
    • PACE: 15
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 5
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 10
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2017-0861: 1
    • CVE-2017-15129: 1
    • CVE-2017-16808: 1
    • CVE-2017-17805: 1
    • CVE-2017-17806: 1
    • CVE-2018-3639: 1
    • CVE-2018-9056: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • fault injection: 1
    • malfunction: 1
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • SPA: 1
    • side channel: 1
  • other:
    • JIL: 6
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-03116-1: 1
    • BSI TR-03143: 5
    • BSI TR-03144: 10
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 38
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • RFC:
    • RFC 2460: 1
    • RFC 3484: 1
    • RFC 3542: 1
    • RFC 4213: 1
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 6
    • AIS 23: 1
    • AIS 25: 4
    • AIS 26: 4
    • AIS 31: 5
    • AIS 32: 1
    • AIS 34: 4
    • AIS 35: 2
    • AIS 36: 5
    • AIS 37: 2
    • AIS 38: 1
    • AIS 46: 2
  • FIPS:
    • FIPS 180-4: 9
    • FIPS 197: 12
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18031:2005: 1
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS#1: 5
  • RFC:
    • RFC 5639: 12
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1.1, 19 May 2021, Giesecke+Devrient Mobile Security GmbH (confidential document) [11] Guidance Documentation STARCOS 3.7 COS HBA-SMC – Main Document, Version 1.6, 23 March 2021: 1
    • Target STARCOS 3.7 COS HBA-SMC, Version 2.0, 22 April 2021, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically • AIS 1, Version 14, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • design step H13, Version 3.3, 22 April 2020, Infineon Technologies AG, BSI-DSZ-CC-1110-V3-2020 (confidential document) Security Target Lite of the underlying hardware platform, Security Target IFX_CCI_000003h: 1
    • for STARCOS 3.7 COS HBA-SMC, Version 2.9, 2 June 2021, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0976-V4-2021, Configuration List STARCOS 3.7 COS HBA-SMC: 1
    • procedure BSI-DSZ-CC-1110-V3-2020, Version 1, 23 April 2020, TÜV Informationstechnik GmbH (confidential document) [21] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische: 1
pdf_data/report_metadata
  • /Ansvarigt Område/enhet: CSEC
  • /Author: Jerry Johansson
  • /C-datum: 2008
  • /CSEC ID:
  • /CSECID:
  • /Company: FMV/CSEC
  • /ContentTypeId: 0x010100209C0526C7C5A44683868ABD684765F80200B916D1351C38174AA524317F62806230
  • /Copy: 0
  • /CreationDate: D:20190131103138+01'00'
  • /Creator: Acrobat PDFMaker 11 för Word
  • /Current Version: 0.9
  • /DDocBinder: Scheme (CB)
  • /DDocCabinet: QMS
  • /DDocID: 2005-03-05-64D6-T9YR
  • /DDocLastModDate: 2006-03-16 10:56:39
  • /DDocLibrary: https://haddock.fmv.se/domdoc/CSECLib.nsf
  • /DDocRevision: 3,7
  • /DDocTitle: 035 CB General Document - Template
  • /Datum, skapat: -
  • /Deluppdragsbenämning:
  • /Dokument Status: Aktiv
  • /Dokumentansvarig: Jerry Johansson
  • /Dokumentansvarigs enhet: KC Ledsyst
  • /Dokumentbeteckning:
  • /Dokumentdatum: 2018-Jul-04
  • /Dokumenttitel: Certification Report Canonical Ubuntu LTS 16.04.4
  • /Dokumenttyp: CB
  • /FMV_beteckning: 16FMV12482-52:1
  • /Fast_Roll:
  • /Fast_av:
  • /Fast_den: 2014-01-27T19:05:45Z
  • /Fastställarens roll: Lead Certifier
  • /Fastställd den: 2016-06-10T19:05:00Z
  • /Fastställt av: Jerry Johansson
  • /Fastställt av1: Jerry Johansson
  • /Giltigt från: -
  • /Infoklass: Öppen
  • /Informationsklass:
  • /Keywords:
  • /Klassificeringsnr: 25 550
  • /MallVersion: 7.0
  • /ModDate: D:20190201073718+01'00'
  • /Paragraf:
  • /Platina: 1
  • /Producer: Adobe PDF Library 11.0
  • /Referens ID: FMVID-297-738
  • /Sekr. gäller tom.: -
  • /SourceModified:
  • /Status: Aktivt
  • /Stämpel: 0
  • /Subject: 16FMV12482-52:1
  • /Title: Certification Report Canonical Ubuntu LTS 16.04.4
  • /Uncontrolled: 0.000000
  • /Uppdragsbenämning:
  • /Utgåva: 1.0
  • /_dlc_DocId: CSEC-37-1650
  • /_dlc_DocIdItemGuid: cfa7e571-175c-4889-bd10-378edb70609a
  • /_dlc_DocIdUrl: http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-37-1650, CSEC-37-1650
  • /Ärendetyp: 6
  • pdf_file_size_bytes: 166835
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename ST-Ubuntu_16.04_LTS-1.0.pdf 0976V4b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • SE:
    • CSEC 2016011: 1
  • DE:
    • BSI-DSZ-CC-1110-V3-2020: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0082-V4: 2
    • BSI-CC-PP- 0084-2014: 6
    • BSI-CC-PP-0035-2007: 1
    • BSI-CC-PP-0082-V3: 1
    • BSI-CC-PP-0082-V4: 27
    • BSI-CC-PP-0084-: 4
    • BSI-CC-PP-0084-2007: 1
    • BSI-CC-PP-0084-2014: 57
    • BSI-PP-0084-: 2
    • BSI-PP-0084-2014: 8
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 1
    • EAL4: 1
  • EAL:
    • EAL 4: 2
    • EAL 6: 2
    • EAL4: 14
    • EAL4 augmented: 4
    • EAL6: 1
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.3: 5
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 9
    • ADV_FSP: 2
    • ADV_FSP.4: 6
    • ADV_IMP: 2
    • ADV_IMP.1: 6
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 6
    • AGD_PRE: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC: 2
    • ALC_CMC.4: 1
    • ALC_CMS: 2
    • ALC_CMS.4: 1
    • ALC_DEL: 2
    • ALC_DEL.1: 1
    • ALC_DVS: 2
    • ALC_DVS.2: 12
    • ALC_FLR.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 11
    • ATE_FUN.1: 6
    • ATE_IND.2: 5
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 10
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 7
    • FAU_STG.3.1: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 34
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 13
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 26
    • FCS_COP.1.1: 6
    • FCS_RNG: 2
    • FCS_RNG.1: 33
    • FCS_RNG.1.1: 4
    • FCS_RNG.1.2: 5
  • FDP:
    • FDP_ACC.1: 38
    • FDP_ACC.1.1: 3
    • FDP_ACC.2: 19
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 42
    • FDP_ACF.1.1: 5
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 5
    • FDP_CDP: 5
    • FDP_CDP.1: 14
    • FDP_CDP.1.1: 2
    • FDP_ETC.2: 8
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 14
    • FDP_IFC.2: 20
    • FDP_IFC.2.1: 2
    • FDP_IFC.2.2: 2
    • FDP_IFF.1: 26
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_ITC.1: 4
    • FDP_ITC.2: 22
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 2
    • FDP_ITC.2.3: 2
    • FDP_ITC.2.4: 2
    • FDP_ITC.2.5: 2
    • FDP_RIP.2: 13
    • FDP_RIP.2.1: 1
    • FDP_UCT: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 19
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 12
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 50
    • FMT_MSA.1.1: 5
    • FMT_MSA.3: 51
    • FMT_MSA.3.1: 7
    • FMT_MSA.3.2: 7
    • FMT_MSA.4: 6
    • FMT_MSA.4.1: 1
    • FMT_MTD.1: 91
    • FMT_MTD.1.1: 13
    • FMT_REV.1: 15
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 25
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 35
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 22
    • FPT_TDC.1.1: 2
    • FPT_TDC.1.2: 2
  • FTA:
    • FTA_SSL.1: 7
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 7
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
  • FTP:
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
  • FAU:
    • FAU_SAS: 8
    • FAU_SAS.1: 3
  • FCS:
    • FCS_CKM: 83
    • FCS_CKM.1: 39
    • FCS_CKM.2: 9
    • FCS_CKM.4: 64
    • FCS_CKM.4.1: 1
    • FCS_COP: 189
    • FCS_COP.1: 27
    • FCS_COP.1.1: 1
    • FCS_RNG: 34
    • FCS_RNG.1: 20
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 123
    • FDP_ACC.1: 44
    • FDP_ACF: 110
    • FDP_ACF.1: 41
    • FDP_IFC: 7
    • FDP_IFC.1: 16
    • FDP_ITC.1: 35
    • FDP_ITC.2: 35
    • FDP_ITT: 7
    • FDP_ITT.1: 3
    • FDP_RIP: 9
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
    • FDP_SDC: 8
    • FDP_SDC.1: 3
    • FDP_SDI: 7
    • FDP_SDI.1: 1
    • FDP_SDI.2: 11
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT: 7
    • FDP_UCT.1: 1
    • FDP_UIT: 8
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ACC: 1
    • FIA_ACF: 1
    • FIA_AFL: 22
    • FIA_AFL.1: 4
    • FIA_API: 10
    • FIA_API.1: 16
    • FIA_API.1.1: 1
    • FIA_ATD: 10
    • FIA_ATD.1: 20
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU: 50
    • FIA_UAU.1: 20
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 12
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 17
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 12
    • FIA_UAU.6.1: 1
    • FIA_UID: 14
    • FIA_UID.1: 19
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 32
    • FIA_USB.1: 30
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 2
  • FMT:
    • FMT_LIM: 15
    • FMT_LIM.1: 3
    • FMT_LIM.2: 2
    • FMT_MSA: 68
    • FMT_MSA.1: 8
    • FMT_MSA.3: 39
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 38
    • FMT_MTD.1: 4
    • FMT_SMF.1: 51
    • FMT_SMF.1.1: 1
    • FMT_SMR: 9
    • FMT_SMR.1: 41
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SRM: 1
  • FPT:
    • FPT_EMS: 10
    • FPT_EMS.1: 15
    • FPT_EMS.1.1: 1
    • FPT_EMS.1.2: 1
    • FPT_FLS: 7
    • FPT_FLS.1: 16
    • FPT_FLS.1.1: 1
    • FPT_ITE: 11
    • FPT_ITE.1: 11
    • FPT_ITE.1.1: 1
    • FPT_ITE.1.2: 1
    • FPT_ITE.2: 13
    • FPT_ITE.2.1: 5
    • FPT_ITE.2.2: 1
    • FPT_ITT: 7
    • FPT_ITT.1: 3
    • FPT_PHP: 7
    • FPT_PHP.3: 4
    • FPT_TDC.1: 10
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 2
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT: 7
    • FRU_FLT.2: 3
  • FTP:
    • FTP_ITC: 22
    • FTP_ITC.1: 12
    • FTP_ITE: 1
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.AUTHUSER: 3
    • A.CONNECT: 5
    • A.DETECT: 3
    • A.IT: 2
    • A.KEYS: 3
    • A.MANAGE: 5
    • A.PEER: 6
    • A.PHYSICAL: 4
    • A.TRAINEDUSER: 3
  • O:
    • O.AUDITING: 14
    • O.COMP: 32
    • O.CP: 17
    • O.CRYPTO: 15
    • O.DISCRETIONARY: 10
    • O.MANAGE: 26
    • O.NETWORK: 12
    • O.SUBJECT: 10
    • O.TRUSTED_CHANNEL: 4
  • OE:
    • OE.ADMIN: 6
    • OE.INFO_PROTECT: 8
    • OE.INSTALL: 4
    • OE.IT: 4
    • OE.MAINTENANCE: 3
    • OE.PHYSICAL: 3
    • OE.RECOVER: 4
    • OE.REMOTE: 4
    • OE.TRUSTED: 5
  • T:
    • T.ACCESS: 24
    • T.COMM: 4
    • T.IA: 6
    • T.INFOFLOW: 4
    • T.RESTRICT: 3
  • O:
    • O.AES: 7
    • O.PACE_CHIP: 2
    • O.RND: 8
  • T:
    • T.RND: 5
pdf_data/st_keywords/vendor
  • GD:
    • Giesecke+Devrient: 14
  • Infineon:
    • Infineon: 2
    • Infineon Technologies AG: 2
  • NXP:
    • NXP Semiconductors: 1
  • STMicroelectronics:
    • STMicroelectronics: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 116
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
      • AES-256: 2
  • DES:
    • 3DES:
      • TDES: 1
      • Triple-DES: 2
  • constructions:
    • MAC:
      • HMAC: 3
  • AES_competition:
    • AES:
      • AES: 82
    • HPC:
      • HPC: 1
  • constructions:
    • MAC:
      • CMAC: 43
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 16
  • FF:
    • DH:
      • Diffie-Hellman: 11
  • ECC:
    • ECC:
      • ECC: 16
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 38
  • FF:
    • DH:
      • DH: 12
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 5
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-2: 2
      • SHA-224: 1
      • SHA-256: 4
      • SHA-384: 4
      • SHA-512: 4
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 2
      • SHA-256: 11
      • SHA-384: 6
      • SHA-512: 4
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 2
  • KA:
    • Key Agreement: 1
    • Key agreement: 1
  • MAC:
    • MAC: 33
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • SSH:
    • SSH: 59
    • SSHv2: 8
  • TLS:
    • SSL:
      • SSL: 11
    • TLS:
      • TLS: 3
  • VPN:
    • VPN: 1
  • PACE:
    • PACE: 123
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 1
  • RNG:
    • RNG: 17
  • RNG:
    • RND: 15
    • RNG: 38
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • CTR:
    • CTR: 3
  • ECB:
    • ECB: 3
  • XTS:
    • XTS: 3
  • CBC:
    • CBC: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 1
    • P-384: 1
    • P-521: 1
    • curve P-256: 1
    • curve P-384: 1
    • curve P-521: 1
  • Brainpool:
    • brainpoolP256r1: 4
    • brainpoolP384r1: 4
    • brainpoolP512r1: 4
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 5
  • libgcrypt:
    • libgcrypt: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 17
    • malfunction: 1
    • physical tampering: 3
  • SCA:
    • DPA: 1
    • Leak-Inherent: 15
    • Physical Probing: 2
    • SPA: 1
    • side channel: 1
  • other:
    • Bleichenbacher attack: 1
    • JIL: 3
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03111: 3
    • BSI TR-03143: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 179
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
  • FIPS:
    • FIPS 140-2: 7
    • FIPS 180-4: 6
    • FIPS 186-4: 1
    • FIPS 197: 5
    • FIPS 198-1: 2
    • FIPS 46-3: 1
    • FIPS PUB 186-4: 4
    • FIPS180-4: 2
    • FIPS197: 2
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 2460: 1
    • RFC 3484: 1
    • RFC 3542: 1
    • RFC 4213: 1
    • RFC 4252: 4
    • RFC 4253: 3
    • RFC 768: 1
    • RFC 791: 2
    • RFC 792: 1
    • RFC 793: 1
    • RFC3526: 2
    • RFC4252: 6
    • RFC4253: 13
    • RFC4419: 3
    • RFC5656: 4
    • RFC6668: 2
  • BSI:
    • AIS20: 2
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
    • CCMB-2017-05-001: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 197: 4
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 7816: 2
  • NIST:
    • NIST SP 800-38B: 1
  • PKCS:
    • PKCS #1: 2
  • RFC:
    • RFC 5639: 1
    • RFC5639: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
    • PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation: 1
    • as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also: 1
    • out of scope: 3
  • OutOfScope:
    • and cryptographic key sizes 2048 bits and 3072 bits modulus length for RSA private key operation is out of scope for the TOE. 371 The TOE shall meet the requirement “Cryptographic operation – CB ECC (FCS_COP.1/CB: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Giesecke+Devrient Mobile Security GmbH
  • /CreationDate: D:20210617104602+02'00'
  • /Creator: Microsoft® Word für Microsoft 365
  • /Keywords: Version 1.0/18.05.2021
  • /ModDate: D:20210617104602+02'00'
  • /Producer: Microsoft® Word für Microsoft 365
  • /Subject: Security Target STARCOS 3.7 COS HBA-SMC
  • /Title: G+D MS Security Target to BSI-PP-0082-V4
  • pdf_file_size_bytes: 2539468
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 166
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different