| name |
vinCERTcore, versión 4.0.5.5733 |
Giesecke+Devrient Sm@rtCafé® Expert 8.0 C2 |
| category |
Products for Digital Signatures |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
ES |
NL |
| status |
archived |
active |
| not_valid_after |
24.04.2023 |
24.05.2028 |
| not_valid_before |
24.04.2018 |
24.05.2023 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2016-01-CCRA.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01.1-Cert.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2016-01-INF-2264%20v2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01-CR.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2016-01-ST-v1.12.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01-ST.pdf |
| manufacturer |
Víntegris, SL. |
G+D Mobile Security GmbH |
| manufacturer_web |
https://www.vintegris.com/ |
https://www.gi-de.com/de/de/mobile-security/ |
| security_level |
EAL4+, ALC_FLR.2 |
EAL6+, ALC_FLR.1 |
| dgst |
1c5f79388b3fab19 |
e9c4587f626324cd |
| heuristics/cert_id |
2016-01-INF-2264 |
NSCIB-CC-2300006-01-CR |
| heuristics/cert_lab |
[] |
|
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_TDS.3, AVA_VAN.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ALC_FLR.2, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1 |
ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_REQ.2, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ASE_INT.2, ASE_ECD.1, ALC_FLR.1, ALC_TAT.3, ALC_LCD.1, ALC_DVS.2, ADV_TDS.5, ASE_SPD.1, ATE_COV.3, ADV_INT.3, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_SPM.1, ADV_ARC.1 |
| heuristics/extracted_versions |
4.0.5.5733 |
8.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022 |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022 |
| heuristics/protection_profiles |
{} |
7f886b64878b68c1 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf |
| pdf_data/cert_filename |
2016-01-CCRA.pdf |
NSCIB-CC-2300006-01.1-Cert.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
- NL:
- CC-22-0289065: 1
- NSCIB-2300006-01: 1
- NSCIB-CC-23-2300006-01: 1
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-V2-2020: 1
|
| pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL4: 1
- EAL4 augmented: 1
|
- EAL:
- EAL2: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL7: 1
|
| pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.3: 1
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20180404121729+02'00'
- pdf_file_size_bytes: 746055
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: Denise Cater
- /CreationDate: D:20230813222000+01'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20230813222000+01'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 94099
- pdf_hyperlinks: https://www.tuv-nederland.nl/
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
2016-01-INF-2264 v2.pdf |
NSCIB-CC-2300006-01-CR.pdf |
| pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-2300006-01-CR
- cert_item: Sm@rtCafé® Expert 8.0 C2
- cert_lab: SGS Brightsight B.V.
- developer: Giesecke+Devrient Mobile Security GmbH
|
| pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1107-V3-2022: 2
- NL:
- NSCIB-2300006-01: 1
- NSCIB-CC-2300006-01-CR: 13
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL 4+: 2
- EAL4: 2
- ITSEC:
|
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4: 1
- EAL5+: 1
- EAL6: 2
- EAL6 augmented: 2
- EAL6+: 4
|
| pdf_data/report_keywords/cc_sar |
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
|
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 1
- FAU_GEN.2: 1
- FAU_SAR.1: 1
- FAU_SAR.3: 1
- FCS:
- FDP:
- FDP_ACC: 2
- FDP_ACF: 2
- FDP_ETC.1: 1
- FDP_ETC.2: 1
- FDP_ITC.2: 1
- FDP_ROL.1: 1
- FDP_UIT: 2
- FIA:
- FIA_AFL.1: 1
- FIA_UAU.1: 1
- FIA_UAU.6: 1
- FIA_USB.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA: 1
- FMT_MSA.3: 1
- FMT_SMR.2: 1
- FPT:
- FTA:
- FTA_SSL.3: 1
- FTA_TSE.1: 1
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 4
- Giesecke+Devrient: 4
|
| pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 3
- SGS Brightsight: 3
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- SCA:
- other:
- JIL: 2
- JIL-AAPS: 2
- JIL-AM: 2
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- are stored in vinCERTcore. Digital signatures are always performed remotely in the vinCERTcore HSM (out of scope of evaluation). Password protected key usage is also supported. The vinCERTagent and the vinCERTweb: 1
- factor and second factor authentication mechanisms. Both vinCERTweb and vinCERTagent connects (out of scope of ST) to this subsystem to allow end-user authentication to the TOE. HSM subsystem is responsible: 1
- out of scope: 4
- to manage the certificate creation flow in the system using the external vinCERTweb product (out of scope of evaluation) and storing them in the HSM. The operative can be performed in two different ways: •: 1
- using the related functionalities on vinCERTweb. It’s required a vinCERTagent software (out of scope of evaluation) installed for digital signature purposes. This agent is compatible with CSP and: 1
|
|
| pdf_data/report_metadata |
- /Author: .
- /CreationDate: D:20180322165059+01'00'
- /Creator: PDFCreator Version 1.3.2
- /Keywords:
- /ModDate: D:20180322165059+01'00'
- /Producer: GPL Ghostscript 9.05
- /Subject:
- /Title: 2016-01-INF-2264 v2
- pdf_file_size_bytes: 1304805
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
|
| pdf_data/st_filename |
2016-01-ST-v1.12.pdf |
NSCIB-CC-2300006-01-ST.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1107-V3-2022: 2
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0099-V2-2020: 2
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4+: 3
- EAL4: 7
- EAL4 augmented: 4
- EAL4+: 4
|
- EAL:
- EAL 4+: 1
- EAL 6: 3
- EAL 6 augmented: 2
- EAL 6+: 1
- EAL6: 4
- EAL6 augmented: 2
- EAL6+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 5
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 3
- ADV_FSP.5: 9
- ADV_IMP.1: 6
- ADV_IMP.2: 2
- ADV_INT.3: 1
- ADV_SPM.1: 3
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 1
- ADV_TDS.5: 6
- AGD:
- AGD_OPE.1: 7
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.5: 3
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 4
- ALC_FLR.1: 6
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 3
- ASE_INT.2: 2
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- ATE_FUN.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 1
- FAU_ARP.1: 10
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAA: 1
- FAU_SAA.1: 6
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_SAR.3: 4
- FAU_SAR.3.1: 1
- FAU_STG: 1
- FAU_STG.2: 4
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 6
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 51
- FDP_ACC.1: 10
- FDP_ACF: 52
- FDP_ACF.1: 13
- FDP_ETC: 1
- FDP_ETC.1: 22
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 21
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_ITC: 1
- FDP_ITC.1: 17
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 29
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP: 1
- FDP_RIP.1: 11
- FDP_ROL: 1
- FDP_ROL.1: 4
- FDP_ROL.1.2: 1
- FDP_SDI: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 7
- FDP_UIT.1: 5
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UID: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA: 22
- FMT_MSA.1: 3
- FMT_MSA.3: 17
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 3
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 4
- FMT_SMR.2: 11
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_STM.1: 2
- FPT_TDC: 1
- FPT_TDC.1: 28
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL: 3
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 3
- FTA_SSL.4.1: 1
- FTA_TSE: 1
- FTA_TSE.1: 16
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 20
- FTP_ITC.1.1: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 1
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 21
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 36
- FCS_CKM.2: 4
- FCS_CKM.4: 29
- FCS_CKM.4.1: 1
- FCS_COP: 8
- FCS_COP.1: 118
- FCS_RNG: 5
- FCS_RNG.1: 13
- FCS_RNG.1.1: 5
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 30
- FDP_ACC.1: 11
- FDP_ACC.2: 5
- FDP_ACF: 29
- FDP_ACF.1: 13
- FDP_IFC: 31
- FDP_IFC.1: 13
- FDP_IFC.2: 2
- FDP_IFF: 23
- FDP_IFF.1: 17
- FDP_ITC: 12
- FDP_ITC.1: 8
- FDP_ITC.2: 20
- FDP_ITT.1: 1
- FDP_RIP: 139
- FDP_RIP.1: 11
- FDP_ROL: 16
- FDP_ROL.1: 5
- FDP_SDC.1: 2
- FDP_SDI: 15
- FDP_SDI.2: 4
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_API.1: 1
- FIA_ATD: 10
- FIA_ATD.1: 2
- FIA_UID: 16
- FIA_UID.1: 9
- FIA_UID.2: 1
- FIA_USB: 9
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA: 101
- FMT_MSA.1: 10
- FMT_MSA.2: 2
- FMT_MSA.3: 17
- FMT_MTD: 22
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 22
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR: 35
- FMT_SMR.1: 32
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 39
- FPT_FLS.1: 21
- FPT_FLS.1.1: 2
- FPT_ITT.1: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 3
- FPT_RCV: 13
- FPT_RCV.3: 10
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 2
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
| pdf_data/st_keywords/cc_claims |
|
- A:
- A.CAP_FILE: 6
- A.DELETION: 7
- A.VERIFICATION: 6
- D:
- D.APP_CODE: 1
- D.APP_I_DATA: 2
- D.CRYPTO: 2
- D.PIN: 1
- D.SEC_DATA: 1
- O:
- O.AES: 1
- O.ALARM: 22
- O.APPLET: 16
- O.ARRAY_VIEWS_CONFID: 11
- O.ARRAY_VIEWS_INTEG: 9
- O.CARD-: 6
- O.CARD-MANAGEMENT: 27
- O.CIPHER: 15
- O.CODE_CAP: 1
- O.CODE_CAP_: 1
- O.CODE_CAP_FILE: 12
- O.DELETION: 17
- O.FIREWALL: 43
- O.GLOBAL_ARRAYS: 1
- O.GLOBAL_ARRAYS_CONFID: 19
- O.GLOBAL_ARRAYS_INTEG: 9
- O.INSTALL: 16
- O.JAVAOBJEC: 1
- O.JAVAOBJECT: 46
- O.KEY-: 8
- O.KEY-MNGT: 15
- O.LOAD: 19
- O.NATIVE: 14
- O.OBJ-DELETION: 9
- O.OPERATE: 36
- O.PIN-: 5
- O.PIN-MNGT: 18
- O.PINMNGT: 1
- O.REALLOCATION: 18
- O.RESOURCES: 23
- O.RND: 4
- O.RNG: 11
- O.SCP: 64
- O.SID: 33
- O.TDES: 2
- O.TRANSACTION: 19
- OE:
- OE.CAP_FILE: 9
- OE.CARD-MANAGEMENT: 6
- OE.CODE-: 5
- OE.CODE-EVIDENCE: 15
- OE.SCP: 13
- OE.VERIFICATION: 38
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 4
- OP.ARRAY_LENGTH: 4
- OP.ARRAY_T_ALOAD: 2
- OP.ARRAY_T_ASTORE: 3
- OP.ARRAY_T_LOAD: 1
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_CAP_FILE: 3
- OP.DELETE_CAP_FILE_APPLET: 3
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 6
- OP.PUT: 5
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- R:
- T:
- T.CONFID-: 8
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 17
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 4
- T.DELETION: 4
- T.EXE-CODE: 6
- T.EXECODE: 1
- T.INSTALL: 5
- T.INTEG-: 10
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 5
- T.INTEG-APPLI-DATA: 13
- T.INTEG-JCS-: 2
- T.INTEG-JCS-CODE: 4
- T.INTEG-JCS-DATA: 3
- T.INTEG-JCSCODE: 1
- T.INTEGAPPLI-CODE: 2
- T.INTEGAPPLI-DATA: 1
- T.INTEGJCS-DATA: 6
- T.NATIVE: 5
- T.OBJ-DELETION: 2
- T.OBJDELETION: 1
- T.PHYSICAL: 3
- T.RESOURCES: 7
- T.SECURE_DELETION: 8
- T.SID: 16
|
| pdf_data/st_keywords/vendor |
|
- GD:
- G&D: 10
- G+D: 6
- Giesecke+Devrient: 8
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 1
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3-DES: 7
- 3DES: 3
- TDEA: 1
- TDES: 3
- Triple-DES: 4
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 4
- SHA-384: 4
- SHA-512: 4
- SHA3:
- SHA-3: 1
- SHA-3-224: 3
- SHA-3-256: 3
- SHA-3-384: 2
- SHA-3-512: 3
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- physical tampering: 5
- SCA:
- Leak-Inherent: 2
- physical probing: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 140-2: 4
- ISO:
- PKCS:
- PKCS #12: 1
- PKCS#11: 1
- PKCS#12: 6
- PKCS#5: 1
- RFC:
- RFC2986: 1
- RFC5246: 1
- RFC7292: 1
|
- BSI:
- AIS 20: 1
- AIS 31: 2
- AIS20: 7
- AIS31: 5
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- FIPS:
- FIPS 140-2: 1
- FIPS 186-4: 7
- FIPS 197: 10
- FIPS PUB 202: 4
- FIPS180-4: 3
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- ISO/IEC 9796-2: 1
- PKCS:
- PKCS1: 12
- PKCS3: 1
- PKCS5: 3
- RFC:
- RFC 4056: 1
- RFC 5639: 1
- RFC5639: 5
- SCP:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 5
- javacard.framework.applet: 1
- javacard.security: 7
- javacardx:
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- are stored in vinCERTcore. Digital signatures are always performed remotely in the vinCERTcore HSM (out of scope of evaluation). Password protected key usage is also supported. The vinCERTagent and the: 1
- factor and second factor authentication mechanisms. Both vinCERTweb and vinCERTagent connects (out of scope of ST) to this subsystem to allow end-user authentication to the TOE. HSM subsystem is responsible: 1
- out of scope: 4
- to manage the certificate creation flowin the system using the external vinCERTweb product (out of scope of evaluation) and storing them in the HSM. The operative can be performed in two different ways: 1
- using the related functionalities on vinCERTweb. It's required a vinCERTagent software (out of scope of evaluation) installed for digital signature purposes. This agent is compatible with CSP and: 1
|
- OutOfScope:
- 3 [AIS20],[AIS31]12 that implements13 : 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10: 1
- 384, 521}r1[SEC2], brainpoolP{224, 256, 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Giesecke+Devrient MS Security Target Sm@rtCafé® Expert 8.0 C2/Version 4.0/Status 10.05: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 5
- with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Giesecke+Devrient MS Security Target Sm@rtCafé® Expert 8.0 C2/Version 4.0/Status 10.05: 1
|
| pdf_data/st_metadata |
- /CreationDate: D:20180305120726+01'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20180305120726+01'00'
- /Producer: Microsoft® Word 2013
- pdf_file_size_bytes: 15342857
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 97
|
- /Author: G+D MS / stut
- /CreationDate: D:20230510174501+02'00'
- /Creator: Microsoft® Word für Microsoft 365
- /Keywords: Version 4.0/Status 10.05.2023
- /ModDate: D:20230510174501+02'00'
- /Producer: Microsoft® Word für Microsoft 365
- /Subject: Sm@rtCafé® Expert 8.0 C2
- /Title: Giesecke+Devrient MS Security Target
- pdf_file_size_bytes: 1811883
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 134
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |