Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BlackBerry® Enterprise Server Version 5.0.0
383-4-100
STARCOS 3.5 ID GCC C1R
BSI-DSZ-CC-0800-2012
name BlackBerry® Enterprise Server Version 5.0.0 STARCOS 3.5 ID GCC C1R
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA DE
not_valid_after 28.09.2015 01.09.2019
not_valid_before 12.03.2010 31.01.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/blackberry-smart-v50-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0800a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/blackberry-smart-v50-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0800b_pdf.pdf
manufacturer Research In Motion Limited G+D Mobile Security GmbH
manufacturer_web https://www.rim.com/ https://www.gi-de.com/de/de/mobile-security/
security_level EAL4+, ALC_FLR.1 EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5
dgst 1999de0c48802e38 9b5bad238daba320
heuristics/cert_id 383-4-100 BSI-DSZ-CC-0800-2012
heuristics/cert_lab CANADA BSI
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ASE_SPD.1, ATE_DPT.2, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 5.0.0 3.5
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0682-2010
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0682-2010
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0645-2010
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0645-2010
heuristics/protection_profiles {} 0e62a9ea5e7ca3a7
maintenance_updates

protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0061b_pdf.pdf
pdf_data/report_filename blackberry-smart-v50-cert-eng.pdf 0800a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • CA:
    • cert_id: 383-4-100-CR
    • cert_lab: CANADA
  • DE:
    • cert_id: BSI-DSZ-CC-0800-2012
    • cert_item: STARCOS 3.5 ID GCC C1R
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-100: 1
    • 383-4-100-CR: 1
  • DE:
    • BSI-DSZ-CC-0645-2010: 3
    • BSI-DSZ-CC-0682-2010: 3
    • BSI-DSZ-CC-0800-2012: 21
    • BSI-DSZ-CC-S-0004-2010: 1
    • BSI-DSZ-CC-S-0009-: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0061-2009: 1
    • BSI-CC-PP-0061-2009: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 1
    • EAL 4+: 3
  • EAL:
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 1
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 8
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 6
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 6
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_VAL_EXP.1: 1
  • FDP:
    • FDP_SDP_EXP.1: 1
    • FDP_SDP_EXP.2: 1
  • FTA:
    • FTA_SSL_EXP.4: 1
  • FCS:
    • FCS_CKM: 3
    • FCS_COP: 5
pdf_data/report_keywords/vendor
  • GD:
    • Giesecke & Devrient: 14
  • NXP:
    • NXP: 8
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 4
  • SRC:
    • SRC Security Research & Consulting: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • constructions:
    • MAC:
      • CMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 4
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
    • physical tampering: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 5
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 27
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 3
  • ISO:
    • ISO/IEC 17025:2005: 1
  • BSI:
    • AIS 20: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 3
    • AIS 36: 2
    • AIS 38: 1
  • FIPS:
    • FIPS 180-2: 2
    • FIPS 197: 1
    • FIPS PUB 180-2: 1
  • ICAO:
    • ICAO: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C1R, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product NXP P5Cx128V0A/P5Cx145V0A: 1
    • GCC C1R, Giesecke & Devrient GmbH (confidential document) [12] STARCOS 3.5 ID GCC C1 Guidance for Inlay Production, Version 1.0, 16.08.2010, Giesecke &: 1
    • Secure Smart Card Controller, Version 1.33, 29.09.2011, T-Systems GEI GmbH (confidential document) [11] Configuration list for the TOE, Version 0.2, 24.01.2012, Konfigurationsliste von STARCOS 3.5: 1
    • Version 1.2, 09.12.2011, STARCOS 3.5 ID GCC C1R Security Target, Giesecke & Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15: 1
pdf_data/report_metadata
  • /AM_ACPP_Date: [dd month yyyy]
  • /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
  • /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
  • /AM_ACPP_Version: [AM_AMCPP_Version]
  • /AM_IAR_Date: [dd month yyyy]
  • /AM_IAR_Doc#: [AM_IAR_Doc#]
  • /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
  • /AM_IAR_Version: [AM_IAR_Version]
  • /AM_ST Date: [dd month yyyy]
  • /AM_ST Title: [AM_ST Title]
  • /AM_ST Version: [AM_ST Version]
  • /AM_TOE: [AM_TOE]
  • /AM_TOE Short: [AM_TOE Short]
  • /AM_TOE Version: [AM_TOE Version]
  • /Author: sjackson
  • /CC Version: 3.1R3
  • /CC date: July 2009
  • /CEM Version: 3.1R3
  • /CEM date: July 2009
  • /CR_Date: 24 February 2010
  • /CR_Version: 0.3
  • /Client City: Waterloo
  • /Client Country: Canada
  • /Client Full Name: Research In Motion Limited
  • /Client Postal Code: N2L 3W8
  • /Client Short Name: RIM
  • /Client State: Ontario
  • /Client Street: 295 Phillip Street
  • /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
  • /Company:
  • /CreationDate: D:20101014092443-04'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /Developer Long Name: Research In Motion Limited
  • /Developer Short Name: RIM
  • /EAL Level: 4+
  • /EAL Level Base: 4
  • /EAL Long: EAL 4 Augmented
  • /EAL Short: EAL 4+
  • /ETPlan_Doc#: 1603-000-D003
  • /ETPlan_Title: Evaluation Test Plan
  • /ETPlan_Version: 0.3
  • /ETPlan_date: 24 February 2010
  • /ETProcRes_Date: 24 February 2010
  • /ETProcRes_Doc#: 1603-000-D005
  • /ETProcRes_Title: Evaluation Test Results
  • /ETProcRes_Version: 0.3
  • /ETProc_Date: 24 Februrary 2010
  • /ETProc_Doc#: 1603-000-D004
  • /ETProc_Title: Evaluation Test Procedures
  • /ETProc_Version: 0.3
  • /ETReport_Date: 24 February 2010
  • /ETReport_Doc#: 1603-000-D002
  • /ETReport_Title: Evaluation Technical Report
  • /ETReport_TitleShort: ETR
  • /ETReport_Version: 0.5
  • /EWP_Date: 15 July 2008
  • /EWP_Doc#: 1603-000-D001
  • /EWP_Title: Evaluation Work Plan
  • /EWP_Version: 1.1
  • /Eval number: 383-4-100
  • /Eval_End_Date: [dd month yyyy (date on certificate)]
  • /Eval_Start_Date: 18 July 2008
  • /Keywords:
  • /LeadEvaluator: S. Jackson
  • /LeadEvaluatorInitials: SJ
  • /Manager:
  • /ModDate: D:20101014092605-04'00'
  • /Producer: Acrobat Distiller 9.2.0 (Windows)
  • /ProjectManager: M. Gauvreau
  • /ProjectManagerInitials: MG
  • /ProjectNumber: 1603
  • /ST_Date: 11 February 2010
  • /ST_Title: Security Target BlackBerry® Smartphone Version 5.0
  • /ST_Version: 4.0
  • /SVC_Date: 1 December 2008
  • /SVC_Doc#: 1603-000-D007
  • /SVC_Title: Site Visit Checklist
  • /SVC_Version: 0.1
  • /SVR_Date: 30 March 2009
  • /SVR_Doc#: 1603-000-D006
  • /SVR_Title: Site Visit Report
  • /SVR_Version: 0.3
  • /SV_City: Waterloo
  • /Security Classification: EWA-Canada & RIM Proprietary
  • /SourceModified: D:20101014132425
  • /Sponsor: Research In Motion Limited
  • /Sponsor City: Waterloo
  • /Sponsor Country: Canada
  • /Sponsor Postal Code: N2L 3W8
  • /Sponsor State: Ontario
  • /Sponsor Street: 295 Phillip Street
  • /Subject:
  • /TOE: BlackBerry® Smartphone
  • /TOE Line1: [TOE Line1 - enter later for PCR or web page]
  • /TOE Line2: [TOE Line2 - enter later for PCR or web page]
  • /TOE Line3: [TOE Line3 - enter later for PCR or web page]
  • /TOE Line4: [TOE Line4 - enter later for PCR or web page]
  • /TOE Line5: [TOE Line5 - enter later for PCR or web page]
  • /TOE Short: BlackBerry® Smartphone
  • /TOE Short with version: BlackBerry® Smartphone
  • /TOE Short-NoTM: BlackBerry Smartphone
  • /TOE Version: 5.0
  • /TOE with version: BlackBerry® Smartphone Version 5.0
  • /TOE-NoTM: BlackBerry Smartphone
  • /Title: EAL X+ Evaluation of [Developer Long Name]
  • /_AdHocReviewCycleID: 500818796
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: Reade, Rick A.
  • /_EmailSubject: RIM CPL post update ... rick
  • /_ReviewingToolsShownOnce:
  • pdf_file_size_bytes: 94281
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20120215151946+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, G&D, Giesecke & Devrient, STARCOS 3.5, eID, nPA"
  • /ModDate: D:20120215152413+01'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0800-2012
  • pdf_file_size_bytes: 1014930
  • pdf_hyperlinks: https://www.bsi.bund.dea/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename blackberry-smart-v50-sec-eng.pdf 0800b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0645-2010: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0035: 1
    • BSI-CC-PP-0059: 1
    • BSI-CC-PP-0061: 2
    • BSI-PP-0055: 1
    • BSI-PP-0056: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 6
    • EAL 4 augmented: 2
  • EAL:
    • EAL 4: 2
    • EAL 5: 2
    • EAL4: 13
    • EAL4 augmented: 3
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 3
    • ADV_FSP.2: 3
    • ADV_FSP.4: 5
    • ADV_IMP.1: 5
    • ADV_TDS.1: 2
    • ADV_TDS.3: 6
  • AGD:
    • AGD_OPE.1: 6
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 4
    • ALC_CMS.1: 1
    • ALC_CMS.4: 3
    • ALC_DEL.1: 4
    • ALC_DVS.1: 5
    • ALC_FLR.1: 8
    • ALC_LCD.1: 5
    • ALC_TAT.1: 5
  • ASE:
    • ASE_CCL.1: 4
    • ASE_ECD.1: 6
    • ASE_INT.1: 5
    • ASE_OBJ.2: 6
    • ASE_REQ.1: 1
    • ASE_REQ.2: 3
    • ASE_SPD.1: 5
    • ASE_TSS.1: 4
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 4
    • ATE_DPT.1: 3
    • ATE_DPT.2: 1
    • ATE_FUN.1: 7
    • ATE_IND.2: 3
  • AVA:
    • AVA_VAN.3: 4
  • ADV:
    • ADV_ARC.1: 4
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_ECD: 2
    • ASE_TSS.2: 1
  • ATE:
    • ATE_DPT.1: 2
    • ATE_DPT.2: 9
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 4
    • FCS_CKM.4: 16
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 20
    • FCS_COP.1.1: 1
    • FCS_VAL_EXP.1: 12
    • FCS_VAL_EXP.1.1: 2
  • FDP:
    • FDP_ACC.1: 38
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 27
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 5
    • FDP_ETC.2: 7
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 3
    • FDP_IFC.1: 91
    • FDP_IFC.1.1: 9
    • FDP_IFF: 1
    • FDP_IFF.1: 79
    • FDP_IFF.1.1: 9
    • FDP_IFF.1.2: 8
    • FDP_IFF.1.3: 16
    • FDP_IFF.1.4: 16
    • FDP_IFF.1.5: 8
    • FDP_ITC.1: 6
    • FDP_ITC.2: 11
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 3
    • FDP_SDP_EXP.1: 14
    • FDP_SDP_EXP.1.1: 2
    • FDP_SDP_EXP.2: 13
    • FDP_SDP_EXP.2.1: 2
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 18
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF.1.1: 3
    • FMT_MSA.1: 48
    • FMT_MSA.1.1: 4
    • FMT_MSA.2: 14
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 61
    • FMT_MSA.3.1: 6
    • FMT_MSA.3.2: 6
    • FMT_SAE.1: 7
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 3
    • FPT_TDC.1.2: 3
  • FTA:
    • FTA_SSL.1: 11
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 6
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_SSL_EXP.4: 15
    • FTA_SSL_EXP.4.1: 2
    • FTA_SSL_EXP.4.2: 2
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 5
    • FAU_SAS.1: 17
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 48
    • FCS_CKM.1: 16
    • FCS_CKM.2: 4
    • FCS_CKM.4: 20
    • FCS_COP: 44
    • FCS_COP.1: 14
    • FCS_RND: 7
    • FCS_RND.1: 14
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 16
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF: 23
    • FDP_ACF.1: 22
    • FDP_IFC.1: 5
    • FDP_ITC.1: 7
    • FDP_ITC.2: 8
    • FDP_ITT.1: 1
    • FDP_RIP: 4
    • FDP_RIP.1: 13
    • FDP_SDI: 8
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
  • FIA:
    • FIA_AFL: 32
    • FIA_AFL.1: 8
    • FIA_API: 20
    • FIA_API.1: 4
    • FIA_API.1.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU: 44
    • FIA_UAU.1: 10
    • FIA_UAU.4: 6
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 14
    • FIA_UAU.6: 8
    • FIA_UIA: 1
    • FIA_UID: 24
    • FIA_UID.1: 11
  • FMT:
    • FMT_LIM: 13
    • FMT_LIM.1: 16
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 15
    • FMT_LIM.2.1: 2
    • FMT_MOF: 2
    • FMT_MOF.1: 1
    • FMT_MSA: 14
    • FMT_MSA.1: 6
    • FMT_MSA.2: 1
    • FMT_MSA.3: 8
    • FMT_MSA.4: 1
    • FMT_MTD: 86
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 2
    • FMT_MTD.3: 9
    • FMT_MTD.3.1: 1
    • FMT_SMF: 5
    • FMT_SMF.1: 38
    • FMT_SMR: 4
    • FMT_SMR.1: 31
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP: 6
    • FPT_PHP.1: 5
    • FPT_PHP.3: 14
    • FPT_SEP.1: 1
    • FPT_TST: 2
    • FPT_TST.1: 13
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT.2: 3
  • FTP:
    • FTP_ITC: 21
    • FTP_ITC.1: 6
pdf_data/st_keywords/cc_claims
  • A:
    • A.CGA: 2
    • A.SCA: 2
  • O:
    • O.HW_AES: 3
    • O.MEM_ACCESS: 1
    • O.MF_FW: 1
    • O.RND: 3
    • O.SFR_ACCESS: 1
  • OE:
    • OE.CGA_SSCD: 3
    • OE.CGA_TC_SVD: 2
    • OE.HID_TC_VAD: 1
    • OE.HID_VAD: 2
    • OE.SCA_TC_DTBS: 1
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • GD:
    • Giesecke & Devrient: 7
  • NXP:
    • NXP: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
      • AES-: 1
      • AES-256: 8
    • RC:
      • RC2: 3
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 11
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 19
  • DES:
    • 3DES:
      • T-DES: 1
      • Triple-DES: 7
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CMAC: 5
      • KMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 15
  • FF:
    • DH:
      • Diffie-Hellman: 2
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 5
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 8
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-2: 1
      • SHA-224: 2
      • SHA-256: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 91
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 6
  • RNG:
    • RNG: 1
  • RNG:
    • RND: 6
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CBC:
    • CBC: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 16
    • Physical Tampering: 4
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 7
  • SCA:
    • DPA: 2
    • Leak-Inherent: 6
    • SPA: 1
    • physical probing: 3
    • timing attacks: 2
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 140
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 13
    • FIPS 186-2: 8
    • FIPS 197: 1
    • FIPS 46-3: 1
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS 20: 1
    • AIS 31: 2
    • AIS20: 2
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 197: 1
    • FIPS PUB 180-2: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#3: 3
  • RFC:
    • RFC3369: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • to the plastic Identity Card is achieved by physical and organisational security measures being out of scope of the current ST. The TOE shall comprise at least a) the circuitry of the contactless chip incl: 1
pdf_data/st_metadata
  • /Author: stut
  • /Classification: Public
  • /Company:
  • /CreationDate: D:20111213150025+01'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /Date: 09.12.2011
  • /Keywords: Version 1.2 Status 09.12.2011
  • /ModDate: D:20111213150037+01'00'
  • /Producer: Acrobat Distiller 9.3.3 (Windows)
  • /State: Draft
  • /Styles: supported
  • /Subject: STARCOS 3.5 ID GCC C1R
  • /TemplAuthor: Joern Treger
  • /TemplVersion: 1.0
  • /Title: Security Target Lite
  • /Version: 1.2
  • pdf_file_size_bytes: 666410
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 129
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different