Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
secunet SBC Container Version 5.2
BSI-DSZ-CC-1089-V3-2024
TCOS ID Version 3.0 Release 1/P71
BSI-DSZ-CC-1188-2023
name secunet SBC Container Version 5.2 TCOS ID Version 3.0 Release 1/P71
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_after 25.06.2029 18.04.2028
not_valid_before 26.06.2024 18.04.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1188c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1188a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V3b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1188b_pdf.pdf
manufacturer Secunet Security Networks AG Deutsche Telekom Security GmbH
manufacturer_web https://www.secunet.com/en/ https://www.telekom.de/security
security_level ASE_TSS.2, ALC_FLR.2, AVA_VAN.5, EAL4+ ALC_DVS.2, EAL4+, ATE_DPT.2, AVA_VAN.5
dgst 1fbbc802399645af cfe95a153cff5649
heuristics/cert_id BSI-DSZ-CC-1089-V3-2024 BSI-DSZ-CC-1188-2023
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ALC_DVS.2, ALC_CMC.4, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, ADV_FUN.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ADV_TDS.3, ASE_TSS.2, ADV_FSP.4
heuristics/extracted_versions 5.2 3.0
heuristics/report_references/directly_referencing BSI-DSZ-CC-1089-V2-2022 BSI-DSZ-CC-1149-2022
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-1089-V2-2022, BSI-DSZ-CC-1089-2020 BSI-DSZ-CC-1149-2022
heuristics/scheme_data
  • category: Network and Network related Devices and Systems
  • cert_id: BSI-DSZ-CC-1089-V3-2024
  • certification_date: 26.06.2024
  • enhanced:
    • applicant: secunet Security Networks AG Weidenauer Straße 223-225 57076 Siegen
    • assurance_level: EAL4+,AVA_VAN.5,ASE_TSS.2,ALC_FLR.2
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 26.06.2024
    • description: The secunet SBC Container is a Session Border Controller Container, a Linux systemd-nspawn container which can be deployed on a Linux operating system. The main purpose of the secunet SBC Container is a secure bridging between an SIP caller and the SIP callee. Concretely, the SBC supports a safeguarded initiation of SIP sessions (also called signaling) and bridging of media communication streams such as RTP or SRTP. A Session Border Controller (SBC) is a device which is deployed in Voice-over-IP (VoIP) networks to manage the signaling and media streams of audio and video communication. The used hardware is under full control of the operating system. However, the connected networks have to be separated physically, especially the management network, to allow the secunet SBC to perform the intended operation in a secure manner.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-1089-V3-2024 (26.06.2024)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-1089-V2-2022 (19.05.2022)', 'description': ') networks to manage the signaling and media streams of audio and video communication. The used hardware is under full control of the operating system. However, the connected networks have to be separated physically, especially the management network, to allow the secunet SBC to perform the in-tended operation in a secure manner.'}), frozendict({'id': 'BSI-DSZ-CC-1089-2020 (08.07.2020)', 'description': 'Certificate'})]
    • evaluation_facility: SRC Security Research & Consulting GmbH
    • expiration_date: 25.06.2029
    • product: secunet SBC Container Version 5.2
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1089V3b_pdf.pdf?__blob=publicationFile&v=2
  • product: secunet SBC Container Version 5.2
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1089.html
  • vendor: secunet Security Networks AG
  • category: Electronic ID documents
  • cert_id: BSI-DSZ-CC-1188-2023
  • certification_date: 18.04.2023
  • enhanced:
    • applicant: Deutsche Telekom Security GmbH Untere Industriestraße 20 57250 Netphen
    • assurance_level: EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1188c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 18.04.2023
    • description: The Target of Evaluation (TOE) is the product TCOS ID Version 3.0 Release 1/P71 provided by Deutsche Telekom Security GmbH, based on the hardware platform P71 (N7122) by NXP Semiconductors GmbH. It is an electronic Identity Card representing a smart card with contactless interface programmed according to the Technical Guideline BSI TR-03110 and the ICAO specifications. The evaluation of the product is based on the Protection Profiles BSI-CC-PP-0087-V2-2016-MA-01 and BSI-CC-PP-0090-2016 (including further referenced Protections Profiles). Additionally, the TOE meets the requirements of the Technical Guideline BSI TR-03116-2 as part of the qualification for the use within electronic ID card projects of the Federal Republic of Germany. The smart card provides the following authentication mechanisms: Passive Authentication, Password Authenticated Connection Establishment (PACE), Chip Authentication version 1, 2 and 3, Terminal Authentication version 1 and 2. The smart card contains at least one of the following applications that are all subject of the TOE’s evaluation: • ePassport Application • eID Application • eSign Application Two different major configurations of the TOE exist that only differ in the installed file system or applications respectively: • Passport • ID Document Furthermore, the TOE provides the so-called Update-in-Field mechanism. This secure update mechanism allows to install code-signed updates of the TOE Embedded Software (operating system part) by authorized staff during operational use. The TOE’s evaluation only covers the Update-in-Field mechanism itself, but does not cover any update packages.
    • entries: [frozendict({'id': 'Machine-Readable'}), frozendict({'id': 'Common'})]
    • evaluation_facility: SRC Security Research & Consulting GmbH
    • expiration_date: 17.04.2028
    • product: TCOS ID Version 3.0 Release 1/P71
    • protection_profile: Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use (MR.ED-PP), Version 2.0.3, 18 July 2016, BSI-CC-PP-0087-V2-2016-MA-01Common Criteria PP Configuration Machine Readable Electronic Documents - Optionales Nachladen (Optional Post-Emission Updates) [MR.ED-ON-PP], Version 0.9.2, 18 August 2016, BSI-CC-PP-0090-2016
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1188a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1188b_pdf.pdf?__blob=publicationFile&v=2
  • product: TCOS ID Version 3.0 Release 1/P71
  • subcategory: IC with applications
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-IC_mit_Anwendung/1188.html
  • vendor: Deutsche Telekom Security GmbH
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1149-2022
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1149-2022
heuristics/protection_profiles {} d90a82ee45f94fe0, 3eb6aa5ff339f509
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0087V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0090b_pdf.pdf
pdf_data/cert_filename 1089V3c_pdf.pdf 1188c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1089-V3-2024: 1
  • DE:
    • BSI-DSZ-CC-1188-2023: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0087-V2-2016-MA-01: 1
    • BSI-CC-PP-0090-2016: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4 augmented: 1
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_DVS.2: 1
  • ATE:
    • ATE_DPT.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • DeutscheTelekom:
    • Deutsche Telekom Security: 1
pdf_data/cert_metadata
  • /Author: Federal Office for Information Security
  • /Keywords: "Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2"
  • /Subject: Common Criteria, Certification, Zertifizierung, secunet SBC Container, Version 5.2
  • /Title: Certificate BSI-DSZ-CC-1089-V3-2024
  • pdf_file_size_bytes: 230700
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, MRTD, ePass, eID, eSign"
  • /Subject: Common Criteria, Certification, Zertifizierung, MRTD, ePass, eID, eSign
  • /Title: Certificate BSI-DSZ-CC-1188-2023
  • pdf_file_size_bytes: 232861
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 1089V3a_pdf.pdf 1188a_pdf.pdf
pdf_data/report_frontpage
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ASE_TSS.2, ALC_FLR.2 and AVA_VAN.5 valid until: 25 Month 2029 SOGIS Recognition Agreement for components up to EAL 4
    • cc_version: Product specific Security Target Common Criteria Part 2 conformant
    • cert_id: BSI-DSZ-CC-1089-V3-2024
    • cert_item: secunet SBC Container, Version 5.2
    • cert_lab: BSI
    • developer: secunet Security Networks AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2, AVA_VAN.5
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1188-2023
    • cert_item: TCOS ID Version 3.0 Release 1/P71
    • cert_lab: BSI
    • developer: Deutsche Telekom Security GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Common Criteria Protection Profile Machine- Readable Electronic Documents based on BSI TR- 03110 for Official Use [MR.ED-PP], Version 2.0.3, 18 July 2016, BSI-CC-PP-0087-V2-2016-MA-01 Common Criteria PP Configuration Machine Readable Electronic Documents – Optionales Nachladen (Optional Post-Emission Updates) [MR.ED-ON-PP], Version 0.9.2, 18 August 2016, BSI-CC-PP-0090-2016
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1089-V2-2022: 2
    • BSI-DSZ-CC-1089-V3-2024: 13
  • DE:
    • BSI-DSZ-CC-1149-2022: 6
    • BSI-DSZ-CC-1149-2022-MA-01: 5
    • BSI-DSZ-CC-1188: 3
    • BSI-DSZ-CC-1188-2023: 21
    • BSI-DSZ-CC-S-0208-2022: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012-MA-02: 2
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0068-V2-: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 2
    • BSI-CC-PP-0086-2015: 3
    • BSI-CC-PP-0087-V2-: 1
    • BSI-CC-PP-0087-V2-2016-MA-01: 1
    • BSI-CC-PP-0090-2016: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 2
    • EAL 5+: 1
    • EAL 6: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL 5: 4
    • EAL 5+: 1
    • EAL 6: 1
    • EAL5+: 1
    • EAL6: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 3
    • ALC_FLR.2: 5
  • ASE:
    • ASE_TSS.2: 5
  • AVA:
    • AVA_VAN.5: 5
  • ADV:
    • ADV_ARC: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 2
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_DPT.2: 4
  • AVA:
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 22
    • FCS_COP: 23
    • FCS_RND: 1
  • FIA:
    • FIA_API: 1
    • FIA_UAU: 6
  • FTP:
    • FTP_ITC: 6
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 11
    • NXP Semiconductors: 10
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 3
  • DeutscheTelekom:
    • Deutsche Telekom Security: 19
  • SRC:
    • SRC Security Research & Consulting: 3
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
      • AES-256: 1
  • constructions:
    • MAC:
      • CMAC: 4
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 4
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • PGP:
    • PGP: 2
  • SSH:
    • SSH: 1
  • PACE:
    • PACE: 18
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 6
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • OFB:
    • OFB: 2
pdf_data/report_keywords/ecc_curve
  • Brainpool:
    • brainpoolP512t1: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • fault injection: 1
    • malfunction: 1
  • SCA:
    • side channel: 2
  • other:
    • JIL: 5
    • deep learning: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102-1: 1
    • BSI TR-03110: 8
    • BSI TR-03116: 3
    • BSI TR-03116-2: 2
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 2
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 3
    • AIS 23: 1
    • AIS 25: 4
    • AIS 26: 4
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 4
    • AIS 36: 4
    • AIS 37: 2
    • AIS 38: 1
    • AIS 46: 2
    • AIS20: 2
    • AIS31: 2
  • FIPS:
    • FIPS PUB 180-4: 1
    • FIPS180: 3
    • FIPS186: 12
    • FIPS197: 4
  • ICAO:
    • ICAO: 15
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • RFC:
    • RFC 5639: 15
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Version 1.4, 25.04.2024, file name: SBC_TAT_CMS, Frafos GmbH (confidential document) [9] Secunet SBC container – User Guidance, Frafos GmbH, 28.05.2024, v3.6, file name: SBC – AGD v3: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • secunet SBC Container, Version 2.1, Date 31.05.2024, SRC Security Research & Consulting GmbH (confidential document) [8] Configuration list for the TOE as part of Tools and Techniques / Configuration, secunet SBC: 1
  • ConfidentialDocument:
    • Evaluation (ETR COMP), BSI-DSZ-CC- 1149, Version 3, 10 May 2022, TÜV Informationstechnik GmbH (confidential document) [23] Certification Report BSI-DSZ-CC-S-0208-2022 for Bundesdruckerei GmbH manufacturing site for: 1
    • ID Version 3.0 Release 1/P71, Version 1.1, 05 April 2023, SRC Security Research & Consulting GmbH (confidential document) [14] Configuration List BSI-DSZ-CC-1188, Konfigurationsliste von TCOS ID Version 3.0 Release 1: 1
    • P71D600, Version 1.0, 28 March 2023, Deutsche Telekom Security GmbH (confidential document) [15] TCOS ID card Version 3.0 Release 1, Guidance Document – Common Part, Guidance Documentation: 1
    • Security GmbH (confidential document) Note: End of report 38 / 38: 1
    • Zufallszahlengenerierung in TCOS, Version 1.4, 13 January 2023, Deutsche Telekom Security GmbH (confidential document) [UiF] Spezifikation ‘Update im Feld’ aus Applikationssicht, Version 0.12, 04 August 2022, Deutsche: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
pdf_data/st_filename 1089V3b_pdf.pdf 1188b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • CC-1089: 1
  • DE:
    • BSI-DSZ-CC-1149-2022: 1
    • BSI-DSZ-CC-1149-2022-MA-01: 1
    • BSI-DSZ-CC-1188: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0086-2015: 1
    • BSI-CC-PP-0056-V2-: 1
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0068-V2-2011-MA01: 1
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0086-2015: 1
    • BSI-CC-PP-0087-V2-2016-MA-01: 2
    • BSI-CC-PP-0090-: 1
    • BSI-CC-PP-0090-2016: 1
    • BSI-CC-PP0084: 1
    • BSI-CC-PP0087: 1
    • BSI-PP-0055-2009: 1
    • BSI-PP-0056-V2-2012-MA02: 1
    • BSI-PP-0087: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 11
    • EAL4 augmented: 1
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL 6+: 1
    • EAL4: 10
    • EAL4 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 6
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 2
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 7
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 4
    • ADV_FSP: 1
    • ADV_FSP.4: 2
    • ADV_FUN.1: 1
    • ADV_IMP.1: 2
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.2: 7
    • ALC_FLR.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 5
    • ATE_DPT.3: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 1
    • FDP_IFC.1: 12
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 4
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF: 13
    • FMT_SMF.1: 7
    • FMT_SMR: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 2
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FAU:
    • FAU_SAS: 21
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 73
    • FCS_CKM.1: 29
    • FCS_CKM.2: 9
    • FCS_CKM.4: 31
    • FCS_COP: 97
    • FCS_COP.1: 29
    • FCS_RND: 13
    • FCS_RND.1: 10
    • FCS_RND.1.1: 1
    • FCS_RNG: 3
  • FDP:
    • FDP_ACC: 44
    • FDP_ACC.1: 21
    • FDP_ACF: 59
    • FDP_ACF.1: 51
    • FDP_IFC: 5
    • FDP_IFC.1: 8
    • FDP_IFF: 8
    • FDP_IFF.1: 5
    • FDP_ITC.1: 18
    • FDP_ITC.2: 19
    • FDP_ITT.1: 1
    • FDP_RIP: 19
    • FDP_RIP.1: 12
    • FDP_SDC.1: 1
    • FDP_SDI: 12
    • FDP_SDI.1: 3
    • FDP_SDI.2: 5
    • FDP_UCT: 7
    • FDP_UCT.1: 3
    • FDP_UIT: 7
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 37
    • FIA_AFL.1: 11
    • FIA_API: 34
    • FIA_API.1: 10
    • FIA_API.1.1: 1
    • FIA_UAU: 83
    • FIA_UAU.1: 16
    • FIA_UAU.4: 3
    • FIA_UAU.5: 7
    • FIA_UAU.6: 5
    • FIA_UIA: 1
    • FIA_UID: 37
    • FIA_UID.1: 17
  • FMT:
    • FMT_LIM: 31
    • FMT_LIM.1: 21
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 17
    • FMT_LIM.2.1: 1
    • FMT_MOF: 6
    • FMT_MOF.1: 1
    • FMT_MSA: 34
    • FMT_MSA.1: 6
    • FMT_MSA.3: 8
    • FMT_MSA.4: 1
    • FMT_MTD: 123
    • FMT_MTD.1: 18
    • FMT_MTD.3: 5
    • FMT_SMF: 28
    • FMT_SMF.1: 36
    • FMT_SMF.1.1: 1
    • FMT_SMR: 12
    • FMT_SMR.1: 39
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 23
    • FPT_EMS.1: 17
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 4
    • FPT_FLS: 16
    • FPT_FLS.1: 7
    • FPT_ITT.1: 1
    • FPT_PHP: 17
    • FPT_PHP.1: 2
    • FPT_PHP.3: 5
    • FPT_TST: 17
    • FPT_TST.1: 12
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 34
    • FTP_ITC.1: 20
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.LDAP: 4
  • A:
    • A.CGA: 2
    • A.SCA: 2
  • O:
    • O.AES: 1
    • O.ECC: 1
    • O.PUF: 1
    • O.RND: 3
    • O.RSA: 1
    • O.TDES: 1
  • OE:
    • OE.HID_VAD: 4
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 4
    • NXP Semiconductors: 2
pdf_data/st_keywords/eval_facility
  • DeutscheTelekom:
    • Deutsche Telekom Security: 158
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 19
      • AES-256: 1
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 4
      • Triple-DES: 3
  • constructions:
    • MAC:
      • CMAC: 6
      • KMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 6
    • ECDH:
      • ECDH: 15
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 4
      • Diffie-Hellman: 9
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 9
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 14
  • TLS:
    • TLS:
      • TLS: 6
  • PACE:
    • PACE: 167
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 4
    • RNG: 7
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 1
  • OFB:
    • OFB: 1
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP192r1: 1
    • brainpoolP192t1: 1
    • brainpoolP224r1: 1
    • brainpoolP224t1: 1
    • brainpoolP256r1: 2
    • brainpoolP256t1: 1
    • brainpoolP320r1: 1
    • brainpoolP320t1: 1
    • brainpoolP384r1: 2
    • brainpoolP384t1: 1
    • brainpoolP512r1: 2
    • brainpoolP512t1: 1
  • NIST:
    • NIST P-256: 1
    • P-192: 2
    • P-256: 3
    • P-384: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 6
    • Physical Tampering: 2
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 5
    • physical tampering: 5
  • SCA:
    • DPA: 1
    • Leak-Inherent: 6
    • physical probing: 3
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 4
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.ChipSecurity: 1
    • EF.DG1: 3
    • EF.DG14: 3
    • EF.DG16: 2
    • EF.DG2: 1
    • EF.DG3: 5
    • EF.DG4: 5
    • EF.SOD: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • BSI:
    • AIS 31: 1
    • AIS 36: 1
    • AIS31: 2
    • AIS36: 2
  • CC:
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 1
    • FIPS180: 2
    • FIPS186: 7
    • FIPS197: 3
  • ICAO:
    • ICAO: 6
  • PKCS:
    • PKCS#3: 8
  • RFC:
    • RFC 2631: 1
    • RFC 5639: 1
    • RFC5639: 27
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf: 1
    • For the eSign Application the interface is not specified in the SSCD PP ([SSCDPP]) and it is out of scope of the Technical Guideline TR-03110 (cf. [EACTR Part 3, B.7]). 13 For the ePass Application, the: 1
    • by these terminals was given already in chapter 1.3.3. 71 Others than above listed terminals are out of scope of this ST. In particular, terminals using Basic Access Control (BAC) are not supported by the TOE: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: SRC
  • pdf_file_size_bytes: 914085
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 43
  • /Author: Markus Blick, Ernst-G. Giessman
  • /Keywords: Electronic Identity Card, Residence Permit Card, eID, eIDAS, Passport
  • /Subject: TCOS ID Version 3.0 Release 1
  • /Title: TCOS ID Version 3.0 Release 1 (NXP)
  • pdf_file_size_bytes: 2069185
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 152
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different