name |
secunet SBC Container Version 5.2 |
Digital Tachograph EFAS-4.10 V05.00 |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
DE |
DE |
status |
active |
archived |
not_valid_after |
25.06.2029 |
25.09.2024 |
not_valid_before |
26.06.2024 |
25.09.2019 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3c_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1117c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1117a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1117b_pdf.pdf |
manufacturer |
Secunet Security Networks AG |
intellic GmbH |
manufacturer_web |
https://www.secunet.com/en/ |
https://www.intellic.eu |
security_level |
ASE_TSS.2, ALC_FLR.2, AVA_VAN.5, EAL4+ |
EAL4+, ATE_DPT.2, AVA_VAN.5 |
dgst |
1fbbc802399645af |
9bdc769a307beb62 |
heuristics/cert_id |
BSI-DSZ-CC-1089-V3-2024 |
BSI-DSZ-CC-1117-2019 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
5.2 |
4.10, 05.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1089-V2-2022 |
BSI-DSZ-CC-1055-2018 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1089-V2-2022, BSI-DSZ-CC-1089-2020 |
BSI-DSZ-CC-0727-2011, BSI-DSZ-CC-1055-2018, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0980-2017, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0726-2012, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
- category: Network and Network related Devices and Systems
- cert_id: BSI-DSZ-CC-1089-V3-2024
- certification_date: 26.06.2024
- enhanced:
- applicant: secunet Security Networks AG Weidenauer Straße 223-225 57076 Siegen
- assurance_level: EAL4+,AVA_VAN.5,ASE_TSS.2,ALC_FLR.2
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 26.06.2024
- description: The secunet SBC Container is a Session Border Controller Container, a Linux systemd-nspawn container which can be deployed on a Linux operating system. The main purpose of the secunet SBC Container is a secure bridging between an SIP caller and the SIP callee. Concretely, the SBC supports a safeguarded initiation of SIP sessions (also called signaling) and bridging of media communication streams such as RTP or SRTP. A Session Border Controller (SBC) is a device which is deployed in Voice-over-IP (VoIP) networks to manage the signaling and media streams of audio and video communication. The used hardware is under full control of the operating system. However, the connected networks have to be separated physically, especially the management network, to allow the secunet SBC to perform the intended operation in a secure manner.
- entries: [frozendict({'id': 'BSI-DSZ-CC-1089-V3-2024 (26.06.2024)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-1089-V2-2022 (19.05.2022)', 'description': ') networks to manage the signaling and media streams of audio and video communication. The used hardware is under full control of the operating system. However, the connected networks have to be separated physically, especially the management network, to allow the secunet SBC to perform the in-tended operation in a secure manner.'}), frozendict({'id': 'BSI-DSZ-CC-1089-2020 (08.07.2020)', 'description': 'Certificate'})]
- evaluation_facility: SRC Security Research & Consulting GmbH
- expiration_date: 25.06.2029
- product: secunet SBC Container Version 5.2
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3b_pdf.pdf?__blob=publicationFile&v=2
- product: secunet SBC Container Version 5.2
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1089.html
- vendor: secunet Security Networks AG
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
40651f75a5887085 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0094b_pdf.pdf |
pdf_data/cert_filename |
1089V3c_pdf.pdf |
1117c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1089-V3-2024: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4 augmented: 1
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2"
- /Subject: Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2
- /Title: Certificate BSI-DSZ-CC-1089-V3-2024
- pdf_file_size_bytes: 230700
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20191017115054+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, "
- /ModDate: D:20191017122955+02'00'
- /Producer: LibreOffice 6.2
- /Subject: Certificate Digital Tachograph EFAS-4.10 V05.00
- /Title: Certificate BSI-DSZ-CC-1117-2019
- pdf_file_size_bytes: 294127
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
1089V3a_pdf.pdf |
1117a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ASE_TSS.2, ALC_FLR.2 and AVA_VAN.5 valid until: 25 Month 2029 SOGIS Recognition Agreement for components up to EAL 4
- cc_version: Product specific Security Target Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1089-V3-2024
- cert_item: secunet SBC Container, Version 5.2
- cert_lab: BSI
- developer: secunet Security Networks AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ATE_DPT.2 und AVA_VAN.5
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1117-2019
- cert_item: Digital Tachograph EFAS-4.10 V05.00
- cert_lab: BSI
- developer: Intellic GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP-0094-2017
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1089-V2-2022: 2
- BSI-DSZ-CC-1089-V3-2024: 13
|
- DE:
- BSI-DSZ-CC-1055-2018: 3
- BSI-DSZ-CC-1117-2019: 14
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0094-2017: 1
- BSI-CC-PP-0094-2017: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 2
- EAL 5+: 1
- EAL 6: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
- SRC:
- SRC Security Research & Consulting: 3
|
- SRC:
- SRC Security Research & Consulting: 2
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 32: 1
- AIS 34: 2
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 1
- AIS 32: 1
- AIS 34: 2
- AIS 35: 1
- AIS 36: 3
- AIS 38: 1
- AIS 40: 1
- AIS 46: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Version 1.4, 25.04.2024, file name: SBC_TAT_CMS, Frafos GmbH (confidential document) [9] Secunet SBC container – User Guidance, Frafos GmbH, 28.05.2024, v3.6, file name: SBC – AGD v3: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- secunet SBC Container, Version 2.1, Date 31.05.2024, SRC Security Research & Consulting GmbH (confidential document) [8] Configuration list for the TOE as part of Tools and Techniques / Configuration, secunet SBC: 1
|
- ConfidentialDocument:
- 08.2019, intellic Germany GmbH [7] Evaluation Technical Report, Version 1.1, 20.09.2019, SRC GmbH, (confidential document) [8] Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP- 0094-2017 [9: 1
- COMP) - M7892 G12 and D11- BSI-DSZ-CC-0891-V3, TÜV Informationstechnik GmbH, Version 1, 2017-11-29 (confidential document) 21 / 25 Certification Report BSI-DSZ-CC-1117-2019 C. Excerpts from the Criteria For the meaning: 1
- Version 04, Approved, 02.09.2019 file name: 1250-111-SEC-DE04_APPR_Konfigurationsliste.docx (confidential document) [12] Bedienungsanleitung Smart Tachograph EFAS-4.10, INTELLIC, Version 01, 2019, file name: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2"
- /Subject: Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2
- /Title: Certification Report BSI-DSZ-CC-1089-V3-2024
- pdf_file_size_bytes: 348771
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
|
pdf_data/st_filename |
1089V3b_pdf.pdf |
1117b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0094-2017: 3
- BSI-CC-PP-0094: 1
- BSI-CC-PP-0094-: 1
- BSI-CC-PP-0094-2017: 8
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 11
- EAL4 augmented: 1
|
- EAL:
- EAL 6: 2
- EAL 6 augmented: 2
- EAL4: 16
- EAL4 augmented: 6
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 3
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 3
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.1: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 9
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 1
- FDP_IFC.1: 12
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 4
- FIA_SOS.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF: 13
- FMT_SMF.1: 7
- FMT_SMR: 1
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 2
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
|
- FAU:
- FAU_GEN.1: 23
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAS.1: 1
- FAU_STG.1: 15
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCO:
- FCO_NRO.1: 9
- FCO_NRO.1.1: 1
- FCO_NRO.1.2: 1
- FCO_NRO.1.3: 1
- FCS:
- FCS_CKM: 21
- FCS_CKM.1: 53
- FCS_CKM.1.1: 2
- FCS_CKM.2: 20
- FCS_CKM.2.1: 2
- FCS_CKM.4: 46
- FCS_CKM.4.1: 2
- FCS_COP: 29
- FCS_COP.1: 79
- FCS_COP.1.1: 6
- FCS_RNG: 4
- FCS_RNG.1: 29
- FCS_RNG.1.1: 4
- FCS_RNG.1.2: 4
- FDP:
- FDP_ACC: 12
- FDP_ACC.1: 82
- FDP_ACC.1.1: 5
- FDP_ACF: 11
- FDP_ACF.1: 67
- FDP_ACF.1.1: 10
- FDP_ACF.1.2: 5
- FDP_ACF.1.3: 5
- FDP_ACF.1.4: 5
- FDP_ETC.2: 12
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 15
- FDP_ITC: 12
- FDP_ITC.1: 35
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 49
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_ITT.1: 10
- FDP_ITT.1.1: 1
- FDP_MSA.3: 4
- FDP_RIP: 1
- FDP_RIP.1: 17
- FDP_RIP.1.1: 1
- FDP_SDI.1: 3
- FDP_SDI.2: 20
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FIA:
- FIA_AFL.1: 24
- FIA_AFL.1.1: 5
- FIA_AFL.1.2: 4
- FIA_API.1: 1
- FIA_ATD.1: 15
- FIA_ATD.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU.1: 22
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UAU.3: 8
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UID.1: 11
- FIA_UID.2: 18
- FIA_UID.2.1: 1
- FMT:
- FMT_LIM: 2
- FMT_LIM.1: 3
- FMT_LIM.2: 1
- FMT_MOF.1: 29
- FMT_MOF.1.1: 5
- FMT_MSA.1: 29
- FMT_MSA.1.1: 1
- FMT_MSA.3: 52
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 5
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 31
- FMT_SMF.1.1: 1
- FMT_SMR.1: 45
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 14
- FPT_FLS.1.1: 1
- FPT_PHP.1: 1
- FPT_PHP.2: 9
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 2
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_STM.1: 15
- FPT_STM.1.1: 1
- FPT_TDC: 8
- FPT_TDC.1: 24
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 2
- FPT_TST.1: 12
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC.1: 27
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 3
- FTP_ITC.1.3: 3
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.AES: 2
- O.RND: 2
- O.SHA: 2
- O.TDES: 2
- OE:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 57
- AES-: 1
- AES-128: 8
- AES-192: 4
- AES-256: 4
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 4
- SHA-256: 15
- SHA-384: 9
- SHA-512: 9
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- NIST P-256: 1
- NIST P-384: 1
- NIST P-521: 1
- P-256: 1
- P-384: 1
- P-521: 1
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- physical tampering: 8
- SCA:
- other:
- JIL: 4
- reverse engineering: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 180-1: 3
- FIPS 180-4: 6
- FIPS 186-4: 5
- FIPS 197: 6
- FIPS PUB 180-4: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 2
- ISO:
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-3: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 7816-6: 1
- ISO/IEC 7816-8: 1
- ISO/IEC 9797-1: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 22 RSA Generated by ERCA; inserted in VU by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non- volatile memory Card.PK (conditional, possibly multiple) Card: 1
- 25 ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non-volatile memory (conditional; only present if existing at time of: 1
- 25 ECC Generated by MSCA ; obtained by VU in MSCA_Card certificate during mutual authentication Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_VU- EGF.PK: 1
- 25. ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope of this ST Not applicable VU non-volatile memory EUR.PK (previous) The previous public key of ERCA: 1
- 25. ECC Generated by MSCA ; obtained by VU in MSCA_VU-EGF certificate during coupling to an EGF Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) Table 23 -: 1
- C as part of the EUR.Link.C; obtained by VU during mutual authentication towards such card or EGF Out of scope of this ST Not applicable VU general non- volatile memory (conditional; only if the VU has: 1
- Out of scope: 28
- SW update credentials AES Derived by the VU from the SeedVu at the end of the manufacturing phase Out of scope for this ST Made unavailable when the VU has reached end of life VU SC non- volatile memory: 2
- VU personalization AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_Depers Key for de- personalizat ion VU: 1
- by card or card manufacturer; obtained by VU in card certificate during mutual authentication Out of scope of this ST Not applicable VU non-volatile memory(conditional, possibly multiple) EGF_MA.PK EGF: 1
- by card or card- Manufacturer; obtained by VU in card certificate during mutual authentication Out of scope of this ST Not applicable VU non- volatile memory MS.PK (conditional, possibly multiple) Public key: 1
- data stored in the MC flash memory. AES Generated by the VU at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory Table 26: Manufacturer specific keys and: 1
- downloaded data files RSA Generated by VU manufacturer at the end of the manufacturing phase Out of scope of this ST. Made unavailable when the VU has reached end of life VU non- volatile memory EUR.PK: 1
- downloaded logging data. AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_ErrorLog_ MC ErrorLog: Key for MC data: 1
- downloaded logging data. ECC Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory K_ErrorLog_E nc ErrorLog: Key for download: 1
- during SW update AES Generated by the VU manufacturer before distribution of a SW update package Out of scope for this ST Made unavailable at the end of the SW update process VU SC non- volatile memory: 2
- foreign) MSCA; obtained by VU in MS certificate presented by a card during mutual authentication Out of scope of this ST Not applicable VU non- volatile memory Table 20 - First-generation asymmetric keys: 1
- key generations). However, a VU will retrieve only one of these keys during the pairing process. Out of scope of this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only: 1
- obtained by VU in EGF certificate during mutual authentication as part of the coupling process Out of scope of this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA_Card.PK: 1
- of the SW update compatibility header AES Generated by the VU manufacturer once for a product line Out of scope for this ST Made unavailable when the VU has reached end of life VU SC non- volatile memory: 1
- personalization request AES Derived by the VU from the SeedVu at the end of the manufacturing phase Out of scope for this ST Not applicable. VU SC non- volatile memory KCOMP SW Update: Key for MAC of compatibilit: 1
- phase. Note: as explained in [5] Annex 1C, Appendix 11, section 12.2, a VU contains only one KM-VU. Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory KM-WC: 1
- received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory K_VUDSRC: 1
- received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope of this ST Made unavailable when the VU has reached end of life VU non- volatile memory Table 24 -: 1
- stored in the MC memory. AES Generated by the VU manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable. VU MC non- volatile memory K_DataSe_M AC Data storage: Key VU specific: 1
- under KM) at the end of the manufacturing phase; obtained and decrypted by VU during pairing Out of scope of this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only: 1
- used by the VU to ensure AES Generated by the VU at the end of the manufacturing Out of scope for this ST Not applicable. VU SC non- Security Target EFAS-4.10 document number version author: 1
|
pdf_data/st_metadata |
- /Author: SRC
- pdf_file_size_bytes: 914085
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 43
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |