name |
Windows 8 and Windows Server 2012 - BitLocker |
STARCOS 3.5 ID GCC C2 |
category |
Data Protection |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
DE |
status |
archived |
archived |
not_valid_after |
11.07.2017 |
01.09.2019 |
not_valid_before |
07.04.2014 |
17.05.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10540-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0751a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10540-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0751b_pdf.pdf |
manufacturer |
Microsoft Corporation |
G+D Mobile Security GmbH |
manufacturer_web |
https://www.microsoft.com |
https://www.gi-de.com/de/de/mobile-security/ |
security_level |
{} |
EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5 |
dgst |
220e0461680ea9bd |
666b8267adc5735d |
heuristics/cert_id |
CCEVS-VR-VID-10540-2014 |
BSI-DSZ-CC-0751-2013 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ASE_SPD.1, ATE_DPT.2, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
2012, 8 |
3.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0952-2014 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0813-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0952-V2-2016 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/scheme_data |
- category: Encrypted Storage
- certification_date: 07.04.2014
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 11.07.2017
- id: CCEVS-VR-VID10540
- product: Windows 8 and Windows Server 2012 - BitLocker
- scheme: US
- url: https://www.niap-ccevs.org/product/10540
- vendor: Microsoft Corporation
|
|
heuristics/st_references/directly_referenced_by |
CCEVS-VR-VID-10520-2015 |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0813-2012 |
heuristics/st_references/indirectly_referenced_by |
CCEVS-VR-VID-10520-2015 |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/protection_profiles |
96e7de1d0ab0577d |
0e62a9ea5e7ca3a7 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_swfde_v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0061b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10540-vr.pdf |
0751a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID10540-2014
- cert_item: Microsoft Windows 8, Microsoft Windows Server 2012 Full Disk Encryption
- cert_lab: US NIAP
|
- DE:
- cert_id: BSI-DSZ-CC-0751-2013
- cert_item: STARCOS 3.5 ID GCC C2
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10540-2014: 1
|
- DE:
- BSI-DSZ-CC-0751-2013: 21
- BSI-DSZ-CC-0813-2012: 4
- BSI-DSZ-CC-S-0007-2011: 1
- BSI-DSZ-CC-S-0008-2011: 1
- BSI-DSZ-CC-S-0009-2012: 1
- BSI-DSZ-CC-S-0010-2012: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 2
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 8
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Microsoft:
- Microsoft: 39
- Microsoft Corporation: 2
|
- GD:
- G&D: 2
- Giesecke & Devrient: 15
- Infineon:
- Infineon: 3
- Infineon Technologies: 1
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- physical tampering: 1
- SCA:
- other:
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 3
- AIS 36: 2
- FIPS:
- FIPS 180-2: 2
- FIPS 197: 1
- FIPS PUB 180-2: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C2, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7820 A11, Version 1, 01.06: 1
- TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [11] STARCOS 3.5 ID GCC C2 Configuration 1, Application Specification, Version 1.0, 14.03.2013: 1
- Version 0.5, 29.04.2013, Konfigurationsliste von STARCOS 3.5 ID GCC C2, Giesecke & Devrient GmbH (confidential document) 22 / 36 BSI-DSZ-CC-0751-2013 Certification Report C Excerpts from the Criteria CC Part 1: 1
- Version 2.3, 19.03.2013, STARCOS 3.5 ID GCC C2 Security Target, Giesecke & Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 16: 1
|
pdf_data/report_metadata |
- /Author: SAIC;NIAP
- /Company: SAIC
- /ContentTypeId: 0x010100E95ABE977C77374FA01078E1E1DC99C0
- /CreationDate: D:20140408091819-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /ModDate: D:20140408091856-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140408131725
- /Subject: Windows IPsec VPN Client
- /Title: Validation Report
- /_NewReviewCycle:
- pdf_file_size_bytes: 170053
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20130617144322+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, nPA, G&D, Giesecke & Devrient GmbH, Personalausweis, eID, Identity Card"
- /ModDate: D:20130618081618+02'00'
- /Producer: LibreOffice 3.6
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0751-2013
- pdf_file_size_bytes: 954609
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
st_vid10540-st.pdf |
0751b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035: 1
- BSI-CC-PP-0059: 1
- BSI-CC-PP-0061: 2
- BSI-PP-0055: 1
- BSI-PP-0056: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 5: 2
- EAL4: 13
- EAL4 augmented: 3
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_OPR: 1
- AGD_PRE: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- APE:
- ASE:
- ATE:
- ATE_DPT.1: 2
- ATE_DPT.2: 9
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 61
- FCS_CKM.1.1: 1
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 7
- FCS_CKM_EXT.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 56
- FCS_COP.1.1: 1
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 11
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FDP:
- FDP_DSK_EXT: 1
- FDP_DSK_EXT.1: 6
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 1
- FDP_DSK_EXT.1.3: 1
- FDP_DSK_EXT.1.4: 1
- FDP_HIB_EXT.1.1: 2
- FIA:
- FIA_AUT_EXT: 1
- FIA_AUT_EXT.1: 6
- FIA_AUT_EXT.1.1: 3
- FIA_AUT_EXT.1.2: 1
- FIA_AUT_EXT.1.3: 1
- FIA_AUT_EXT.1.4: 1
- FMT:
- FMT_COP.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FPT:
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 17
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 50
- FCS_CKM.1: 16
- FCS_CKM.2: 4
- FCS_CKM.4: 20
- FCS_COP: 52
- FCS_COP.1: 10
- FCS_RND: 7
- FCS_RND.1: 11
- FCS_RND.1.1: 2
- FCS_RNG.1: 3
- FDP:
- FDP_ACC: 16
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF: 23
- FDP_ACF.1: 21
- FDP_IFC.1: 5
- FDP_ITC.1: 7
- FDP_ITC.2: 8
- FDP_ITT.1: 1
- FDP_RIP: 4
- FDP_RIP.1: 13
- FDP_SDI: 14
- FDP_SDI.1: 3
- FDP_SDI.2: 7
- FIA:
- FIA_AFL: 32
- FIA_AFL.1: 8
- FIA_API: 20
- FIA_API.1: 4
- FIA_API.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU: 44
- FIA_UAU.1: 10
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 14
- FIA_UAU.6: 8
- FIA_UIA: 1
- FIA_UID: 24
- FIA_UID.1: 11
- FMT:
- FMT_LIM: 13
- FMT_LIM.1: 16
- FMT_LIM.1.1: 2
- FMT_LIM.2: 15
- FMT_LIM.2.1: 2
- FMT_MOF: 2
- FMT_MOF.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 5
- FMT_MSA.2: 1
- FMT_MSA.3: 8
- FMT_MSA.4: 1
- FMT_MTD: 86
- FMT_MTD.1: 12
- FMT_MTD.1.1: 2
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF: 5
- FMT_SMF.1: 38
- FMT_SMR: 4
- FMT_SMR.1: 31
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP: 6
- FPT_PHP.1: 5
- FPT_PHP.3: 14
- FPT_TST: 2
- FPT_TST.1: 15
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHORIZED_USER: 2
- A.ET_AUTH_USE_ONLY: 2
- A.PASSPHRASE_BASED_AUTH_FACTOR: 2
- A.PROTECT_INTEGRITY: 2
- A.SHUTDOWN: 2
- A.TPM_PIN_ANTI-HAMMER: 2
- A.TRAINED_ADMINISTRATORS: 2
- O:
- O.AUTHORIZATION: 1
- O.CORRECT_TSF_OPERATION: 1
- O.DEK_SECURITY: 1
- O.ENCRYPT_ALL: 1
- O.KEY_MATERIAL_COMPROMISE: 1
- O.MANAGE: 1
- O.OWNERSHIP: 1
- O.POWER_SAVE: 1
- O.SHUTDOWN: 1
- O.TRUSTED_UPDATE: 1
- OE:
- OE.PASSPHRASE_STRENGTH: 1
- OE.RESTRICTED_FUNCTIONS: 1
- OE.SINGLE_USE_ET: 1
- OE.STRONG_ENVIRONMENT_: 1
- OE.TRAINED_USERS: 1
- T:
- T.KEYING_MATERIAL_: 1
- T.KEYSPACE_EXHAUST: 1
- T.PERSISTENT_INFORMATION: 1
- T.TSF_: 1
- T.UNAUTHORIZED_DISK_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNSAFE_AUTHFACTOR_VERIFICATION: 1
|
- A:
- O:
- OE:
- OE.CGA_SSCD: 3
- OE.CGA_TC_SVD: 2
- OE.HID_TC_VAD: 1
- OE.HID_VAD: 2
- OE.SCA_TC_DTBS: 1
- T:
|
pdf_data/st_keywords/vendor |
- Cisco:
- Microsoft:
- Microsoft: 97
- Microsoft Corporation: 4
|
- GD:
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 41
- AES-: 1
- AES-128: 6
- AES-256: 4
- RC:
- DES:
- constructions:
- MAC:
- CBC-MAC: 3
- CMAC: 1
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-512: 1
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 6
- SHA-384: 1
- SHA-512: 1
- SHA256: 4
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 2
- SHA-256: 3
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 14
- Physical Tampering: 4
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- physical tampering: 7
- SCA:
- DPA: 2
- Leak-Inherent: 6
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 4
- FIPS 140-2: 3
- FIPS 180-3: 1
- FIPS 186-3: 2
- FIPS 197: 1
- FIPS PUB 186-3: 1
- FIPS PUB 197: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38F: 1
- NIST SP 800-90: 4
- SP 800-56A: 1
- SP 800-90: 2
- PKCS:
- X509:
|
- BSI:
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS 180-2: 1
- FIPS 197: 1
- FIPS PUB 180-2: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- to the plastic Identity Card is achieved by physical and organisational security measures being out of scope of the current ST. The TOE shall comprise at least a) the circuitry of the contactless chip incl: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20140407112941-07'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20140408092154-04'00'
- /Producer: Microsoft® Word 2013
- pdf_file_size_bytes: 1458933
- pdf_hyperlinks: http://msdn.microsoft.com/en-us/library/windows/hardware/dn481216(v=vs.85).aspx, http://csrc.nist.gov/groups/STM/cavp/documents/aes/AESAVS.pdf, http://www.microsoft.com/security/default.aspx, http://csrc.nist.gov/groups/STM/cavp/documents/shs/SHAVS.pdf, http://msdn.microsoft.com/en-us/library/windows/desktop/aa375458(v=vs.85).aspx, http://msdn.microsoft.com/en-us/library/aa375458(v=VS.85).aspx, http://technet.microsoft.com/en-us/library/cc733982(v=WS.10).aspx, http://creativecommons.org/licenses/by-nd-nc/1.0/, http://csrc.nist.gov/groups/STM/cavp/documents/dss/SigVer15EMTest.zip%20(for%20PKCS%20%231%20Version%201.5%20implementations, http://csrc.nist.gov/groups/STM/cavp/documents/dss/SigVer931IRTest.zip, http://csrc.nist.gov/groups/STM/cavp/documents/aes/KAT_AES.zip, http://technet.microsoft.com/en-us/library/cc766159(v=WS.10).aspx
- pdf_is_encrypted: False
- pdf_number_of_pages: 71
|
- /Author: stut
- /Classification: Public
- /Company:
- /CreationDate: D:20130429154943+02'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Date: 29.04.2013
- /Keywords: Version 2.4 Status 29.04.2013
- /ModDate: D:20130429154954+02'00'
- /Producer: Acrobat Distiller 9.5.0 (Windows)
- /State: Final
- /Styles: supported
- /Subject: STARCOS 3.5 ID GCC C2
- /TemplAuthor: Joern Treger
- /TemplVersion: 1.0
- /Title: Security Target Lite
- /Version: 2.4
- pdf_file_size_bytes: 666940
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 127
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |