name |
APPGate Security Server |
Morpho_HC_Germany_G2_COS V1 |
category |
Boundary Protection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
DE |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
28.10.2021 |
not_valid_before |
05.05.2008 |
28.10.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0418a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0938a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0418b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0938b_pdf.pdf |
manufacturer |
APPGate Network Security AB |
Morpho Cards GmbH |
manufacturer_web |
https://www.appgate.com/ |
https://www.morpho.com/e-documents |
security_level |
EAL2+, ALC_FLR.1 |
EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5 |
dgst |
1629b8ab19367dd3 |
7950b51171b0f96d |
heuristics/cert_id |
BSI-DSZ-CC-0418-2008 |
BSI-DSZ-CC-0938-2016 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_FLR.1, ADV_FSP.1, ADV_RCR.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ASE_REQ.1, ADV_HLD.1, AVA_SOF.1 |
ASE_INT.1, ASE_APD.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0782-2012 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/protection_profiles |
{} |
ecc28509c30de1a5 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0082V2b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0418a.pdf |
0938a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0418-2008
- cert_item: AppGate Security Server version 8.0
- cert_lab: BSI
- developer: AppGate Network Security AB
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5, ATE_DPT.2 and ALC_DVS.2
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0938-2016
- cert_item: Morpho_HC_Germany_G2_COS V1
- cert_lab: BSI
- developer: Morpho Cards GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Card Operating System Generation 2 (PP COS G2), Version 1.9, 18 November 2014, BSI-CC-PP-0082-V2-2014
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 8
- BSI-DSZ-CC-0938-2016: 30
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0082-V2-2014: 4
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 4
- EAL 2 augmented: 4
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 5
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 13
- EAL 4 augmented: 3
- EAL 5: 10
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_CAP: 2
- ACM_SCP: 2
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_FLR.1: 4
- ALC_LCD: 1
- ALC_TAT: 2
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_SOF: 3
- AVA_VLA: 4
- AVA_VLA.3: 1
- AVA_VLA.4: 1
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM: 2
- FCS_COP: 20
- FCS_RNG: 3
- FPT:
|
pdf_data/report_keywords/cc_claims |
- A:
- OE:
- OE.ADMIN: 1
- OE.AUTH: 1
- OE.AUTHKEY: 1
- OE.GATEWAY: 1
- OE.NOEVIL: 1
- OE.PHYSICAL: 1
- OE.REMOTE: 1
- OE.RNG: 1
- OE.TIME: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 8
- Infineon Technologies AG: 7
- Morpho:
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- SCA:
- DPA: 1
- Template attack: 1
- side channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
- BSI:
- BSI 7148: 1
- BSI TR-03116-1: 1
- BSI TR-03143: 4
- BSI TR-03144: 14
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 2
- AIS 23: 1
- AIS 25: 2
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 1
- AIS 36: 4
- AIS 38: 1
- AIS31: 1
- FIPS:
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- AB [7] Evaluation Technical Report, Version 2, 10.04.2008, atsec information security GmbH (confidential document) [8] Guidance documentation for the TOE, AppGate Security Server, Version 8.0.4 8 AIS 14: 1
|
- ConfidentialDocument:
- 1.11, 01.09.2016, Morpho Cards GmbH (confidential document) [11] Guidance Documentation Morpho_HC_Germany_G2_COS V1 - OS Preparation Guidance, Version 1.13: 1
- Security Target Morpho_HC_Germany_G2_COS V1, Version 1.09, 30.08.2016, Morpho Cards GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-0938-2016, Security Target Lite Morpho_HC_Germany_G2_COS V1: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- for Morpho_HC_Germany_G2_COS V1, Version 2.0, 02.09.2016, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0938-2016, Configuration List Morpho_HC_Germany_G2_COS V1: 1
- procedure BSI-DSZ-CC-0782-V2-2015, Version 7, 21 October 2015, TÜV Informationstechnik GmbH (confidential document) [18] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20080507084207+02'00'
- /Creator: Writer
- /Keywords: "AppGate Security Server version 8.0, AppGate Network Security AB, BSI-DSZ-CC-0418-2008"
- /ModDate: D:20080507094753+02'00'
- /Producer: StarOffice 8
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0418-2008
- pdf_file_size_bytes: 384333
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20161124164918+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, eHC G2, PP-0082, Morpho"
- /ModDate: D:20161220121910+01'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0938-2016
- pdf_file_size_bytes: 1388001
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 50
|
pdf_data/st_filename |
0418b.pdf |
0938b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 2
- BSI-DSZ-CC-0938: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0035: 1
- BSI-CC-PP-0035-: 1
- BSI-CC-PP-0035-2007: 9
- BSI-CC-PP-0059: 1
- BSI-CC-PP-0071: 1
- BSI-CC-PP-0072: 1
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0082-V2: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0035: 3
- BSI-PP-0035-: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 2
- EAL2 augmented: 1
- EAL2+: 3
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 11
- EAL4 augmented: 5
- EAL4+: 1
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ASE:
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 16
- ADV_FSP: 1
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 20
- ADV_IMP: 1
- ADV_IMP.1: 11
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 24
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 15
- AGD_PRE: 1
- AGD_PRE.1: 11
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 16
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 7
- ALC_DEL: 1
- ALC_DEL.1: 6
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 20
- ALC_LCD: 1
- ALC_LCD.1: 9
- ALC_TAT: 1
- ALC_TAT.1: 10
- ASE:
- ASE_APD.1: 1
- ASE_CCL: 1
- ASE_CCL.1: 15
- ASE_ECD: 1
- ASE_ECD.1: 14
- ASE_INT: 1
- ASE_INT.1: 17
- ASE_OBJ: 1
- ASE_OBJ.2: 13
- ASE_REQ: 1
- ASE_REQ.1: 2
- ASE_REQ.2: 15
- ASE_SPD: 1
- ASE_SPD.1: 8
- ASE_TSS: 1
- ASE_TSS.1: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 2
- ATE_COV.2: 8
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 18
- ATE_FUN: 1
- ATE_FUN.1: 14
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 13
- FAU_STG.1: 2
- FAU_STG.3: 1
- FAU_STG.3.1: 2
- FAU_STG.4: 9
- FAU_STG.4.1: 1
- FCS:
- FCS_ACC.1.1: 1
- FCS_CKM.1: 23
- FCS_CKM.1.1: 1
- FCS_CKM.2: 15
- FCS_CKM.2.1: 1
- FCS_CKM.4: 10
- FCS_COP: 43
- FCS_COP.1: 2
- FCS_COP.1.1: 4
- FCS_RNG.1: 8
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 11
- FDP_ACF.1: 8
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 20
- FIA_ATD.1.1: 2
- FIA_SOS.1: 11
- FIA_SOS.1.1: 1
- FIA_UAU.2: 16
- FIA_UAU.2.1: 2
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 2
- FIA_UID.2: 19
- FIA_UID.2.1: 2
- FMT:
- FMT_MSA: 1
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.2: 12
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITC: 2
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
- FPT_SEP.1: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTA:
- FTA_TSE.1: 8
- FTA_TSE.1.1: 1
- FTP:
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_SAS: 11
- FAU_SAS.1: 4
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 63
- FCS_CKM.1: 18
- FCS_CKM.2: 4
- FCS_CKM.4: 39
- FCS_CKM.4.1: 1
- FCS_COP: 129
- FCS_COP.1: 16
- FCS_RNG: 10
- FCS_RNG.1: 16
- FCS_RNG.1.1: 4
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC: 71
- FDP_ACC.1: 20
- FDP_ACF: 59
- FDP_ACF.1: 32
- FDP_IFC: 12
- FDP_IFC.1: 7
- FDP_IFF.1: 2
- FDP_ITC.1: 14
- FDP_ITC.2: 14
- FDP_ITT: 10
- FDP_ITT.1: 2
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 16
- FIA_AFL.1: 4
- FIA_API: 2
- FIA_API.1: 9
- FIA_API.1.1: 2
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 1
- FIA_UAU.4: 8
- FIA_UAU.4.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 3
- FIA_UID.1.2: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 20
- FMT_LIM.1: 10
- FMT_LIM.1.1: 1
- FMT_LIM.2: 9
- FMT_LIM.2.1: 1
- FMT_MSA: 46
- FMT_MSA.1: 7
- FMT_MSA.3: 19
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 28
- FMT_MTD.1: 3
- FMT_SMF.1: 23
- FMT_SMF.1.1: 1
- FMT_SMR.1: 26
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 3
- FPT_EMS.1: 10
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS: 9
- FPT_FLS.1: 16
- FPT_FLS.1.1: 1
- FPT_ITE: 6
- FPT_ITE.1: 10
- FPT_ITE.1.1: 2
- FPT_ITE.1.2: 2
- FPT_ITE.2: 13
- FPT_ITE.2.1: 4
- FPT_ITE.2.2: 2
- FPT_ITT: 10
- FPT_ITT.1: 2
- FPT_PHP: 10
- FPT_PHP.3: 3
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 5
- A.AUTH: 3
- A.AUTHKEY: 4
- A.GATEWAY: 3
- A.NOEVIL: 4
- A.PHYSICAL: 3
- A.REMOTE: 3
- A.RNG: 3
- A.TIME: 3
- O:
- O.AUDIT: 13
- O.AUTH: 16
- O.AUTHORIZE: 13
- O.SECCOMM: 12
- OE:
- OE.ADMIN: 6
- OE.AUTH: 11
- OE.AUTHKEY: 6
- OE.GATEWAY: 4
- OE.NOEVIL: 4
- OE.PHYSICAL: 4
- OE.REMOTE: 4
- OE.RNG: 5
- OE.TIME: 6
- T:
- T.AUTHENTIC: 4
- T.AUTHORIZED: 5
- T.BYPASS: 3
- T.NETWORK: 5
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 5
- Infineon Technologies AG: 8
- Morpho:
- NXP:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 1
- TrustedLabs:
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 4
- SHA-256: 13
- SHA-384: 5
- SHA-512: 4
- SHA2: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 20
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 19
- Physical Probing: 2
- SPA: 2
- physical probing: 1
- side channel: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
- FIPS 180-2: 4
- FIPS 186-2: 3
- FIPS 197: 3
- ISO:
- RFC:
- RFC 2104: 2
- RFC 4251: 3
- RFC 4252: 5
- RFC 4253: 13
- RFC 4254: 2
- RFC 4256: 6
- RFC2104: 1
- X509:
|
- CC:
- CCMB-2012-09-001: 3
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 2
- ISO:
- ISO/IEC 7816: 4
- ISO/IEC 7816-3: 2
- ISO/IEC 9797-1: 1
- NIST:
- NIST SP 800-38B: 1
- NIST SP 800-67: 2
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- in FCS_COP.1b. FCS_COP.1c FPT_ITC.1/2 or FCS_CKM.1 The generation of public server key pairs is out of scope for this evaluation. As defined in 2008-04-10 © 2008 AppGate Network Security AB 51 of 61 AppGate: 1
- out of scope: 2
- security function is needed. FCS_COP.1c FCS_CKM.4 The destruction of public server key pairs is out of scope for this evaluation. FCS_COP.1c FMT_MSA.2 No security attributes are generated as part of the: 1
|
- OutOfScope:
- out of scope: 1
- statements of SPD, security objectives and security requirements of the optional packages are out of scope. 4.5.1 TOE type consistency The TOE type is smart card without the application named as a whole: 1
|
pdf_data/st_metadata |
- /Author: isabell
- /CreationDate: D:20080506133330Z
- /Creator: FreePDF XP 3.05 - http://shbox.de
- /Keywords: AppGate Security Server
- /ModDate: D:20080529065412+02'00'
- /Producer: AFPL Ghostscript 8.53
- /Subject: AppGate Security Server
- /Title: AppGate Security Server, Version 8.0.4 Security Target
- pdf_file_size_bytes: 611037
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
- /Author: Thomas HOFFMANN, Agnes DILLER, Sebastian BOND
- /CreationDate: D:20161206164752+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: Security Target Morpho MORPHO_HC_GERMANY_G2_COS COS
- /ModDate: D:20161206164752+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: SECURITY TARGET LITE MORPHO_HC_GERMANY_G2_COS V1
- /Title: SECURITY TARGET LITE MORPHO_HC_GERMANY_G2_COS V1
- pdf_file_size_bytes: 1471239
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 185
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |