Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IBM RACF for z/OS Version 1, Release 12
BSI-DSZ-CC-0753-2012
STARCOS 3.5 ID GCC C1R
BSI-DSZ-CC-0800-2012
name IBM RACF for z/OS Version 1, Release 12 STARCOS 3.5 ID GCC C1R
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_before 23.02.2012 31.01.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0753a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0800a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0753b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0800b_pdf.pdf
manufacturer IBM Corporation G+D Mobile Security GmbH
manufacturer_web https://www.ibm.com https://www.gi-de.com/de/de/mobile-security/
security_level EAL5+, ALC_FLR.3 AVA_VAN.5, ATE_DPT.2, EAL4+, ALC_DVS.2
dgst 244baf9debd51b66 9b5bad238daba320
heuristics/cert_id BSI-DSZ-CC-0753-2012 BSI-DSZ-CC-0800-2012
heuristics/extracted_sars ADV_IMP.1, ADV_ARC.1, ADV_INT.2, AVA_VAN.4, ATE_IND.2, AGD_PRE.1, ADV_TDS.4, ALC_CMC.4, ALC_TAT.2, AGD_OPE.1, APE_REQ.2, ASE_REQ.2, ASE_ECD.1, ATE_COV.2, ALC_FLR.3, ASE_OBJ.2, ASE_SPD.1, ALC_CMS.5, ADV_SPM.1, APE_CCL.1, ATE_DPT.3, ADV_FSP.5, ASE_INT.1, APE_ECD.1, ALC_DEL.1, APE_SPD.1, ASE_TSS.2, APE_INT.1, APE_OBJ.2, ALC_DVS.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1 ADV_IMP.1, ALC_TAT.3, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4, AGD_PRE.1, ALC_LCD.2, AGD_OPE.1, APE_REQ.2, ASE_REQ.2, ATE_IND.3, ASE_ECD.1, ALC_DVS.2, ASE_OBJ.2, ALC_FLR.3, ASE_SPD.1, ALC_CMS.5, ADV_TDS.3, ADV_SPM.1, APE_CCL.1, ASE_INT.1, ATE_COV.3, APE_ECD.1, ALC_DEL.1, APE_SPD.1, ASE_TSS.2, APE_INT.1, ALC_CMC.5, APE_OBJ.2, ADV_INT.3, ASE_CCL.1, ATE_DPT.2, ATE_FUN.1
heuristics/extracted_versions 1, 12 3.5
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0816-2013 {}
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0682-2010, BSI-DSZ-CC-0645-2010
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-1029-2017, BSI-DSZ-CC-0875-2015, OCSI/CERT/ATS/01/2017/RC, BSI-DSZ-CC-0816-2013 {}
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0682-2010, BSI-DSZ-CC-0645-2010
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0645-2010
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0645-2010
heuristics/protection_profiles {} 0e62a9ea5e7ca3a7
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0061b_pdf.pdf
pdf_data/report_filename 0753a_pdf.pdf 0800a_pdf.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0753-2012
    • cert_item: IBM RACF for z/OS, Version 1, Release 12
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
    • cert_id: BSI-DSZ-CC-0800-2012
    • cert_item: STARCOS 3.5 ID GCC C1R
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0753-2012: 21
  • DE:
    • BSI-DSZ-CC-0645-2010: 3
    • BSI-DSZ-CC-0682-2010: 3
    • BSI-DSZ-CC-0800-2012: 21
    • BSI-DSZ-CC-S-0004-2010: 1
    • BSI-DSZ-CC-S-0009-: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0061-2009: 1
    • BSI-CC-PP-0061-2009: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 1
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 8
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 2
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 5
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 2
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 2
    • AVA_VAN.5: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 6
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 6
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 3
    • FCS_COP: 5
pdf_data/report_keywords/vendor
  • GD:
    • Giesecke & Devrient: 14
  • NXP:
    • NXP: 8
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
  • SRC:
    • SRC Security Research & Consulting: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • constructions:
    • MAC:
      • CMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 4
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 1
  • PACE:
    • PACE: 4
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
    • physical tampering: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 5
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 27
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 23: 1
    • AIS 32: 1
  • FIPS:
    • FIPS 180-2: 1
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS 20: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 3
    • AIS 36: 2
    • AIS 38: 1
  • FIPS:
    • FIPS 180-2: 2
    • FIPS 197: 1
    • FIPS PUB 180-2: 1
  • ICAO:
    • ICAO: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, 4, 8th February 2012, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, Version, 8th February 2012, z/OS R12 Element Configuration: 1
    • confidential document) [9] Guidance documentation for the TOE, GA22-7509-12, November 2011, z/OS Planning for Multilevel: 1
  • ConfidentialDocument:
    • Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C1R, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product NXP P5Cx128V0A/P5Cx145V0A: 1
    • GCC C1R, Giesecke & Devrient GmbH (confidential document) [12] STARCOS 3.5 ID GCC C1 Guidance for Inlay Production, Version 1.0, 16.08.2010, Giesecke &: 1
    • Secure Smart Card Controller, Version 1.33, 29.09.2011, T-Systems GEI GmbH (confidential document) [11] Configuration list for the TOE, Version 0.2, 24.01.2012, Konfigurationsliste von STARCOS 3.5: 1
    • Version 1.2, 09.12.2011, STARCOS 3.5 ID GCC C1R Security Target, Giesecke & Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20120215151946+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, G&D, Giesecke & Devrient, STARCOS 3.5, eID, nPA"
  • /ModDate: D:20120215152413+01'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0800-2012
  • pdf_file_size_bytes: 1014930
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.dea/, https://www.bsi.bund.de/zertifizierung
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename 0753b_pdf.pdf 0800b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0753: 1
  • DE:
    • BSI-DSZ-CC-0645-2010: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0067: 1
  • BSI:
    • BSI-CC-PP- 0035: 1
    • BSI-CC-PP-0059: 1
    • BSI-CC-PP-0061: 2
    • BSI-PP-0055: 1
    • BSI-PP-0056: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 1
  • EAL:
    • EAL 4: 2
    • EAL 5: 2
    • EAL4: 13
    • EAL4 augmented: 3
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 3
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 1
  • ADV:
    • ADV_ARC.1: 4
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_ECD: 2
    • ASE_TSS.2: 1
  • ATE:
    • ATE_DPT.1: 2
    • ATE_DPT.2: 9
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_GEN_SUB.1: 17
    • FAU_GEN_SUB.1.1: 1
    • FAU_GEN_SUB.1.2: 1
    • FAU_MTD.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 2
    • FCS_COP.1: 8
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 37
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 32
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 4
    • FDP_IFC.1: 7
    • FDP_IFC.2: 7
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF.1: 1
    • FDP_IFF.2: 7
    • FDP_IFF.2.1: 1
    • FDP_IFF.2.3: 1
    • FDP_IFF.2.4: 1
    • FDP_IFF.2.5: 1
    • FDP_IFF.2.6: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 16
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 12
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_USB.2: 13
    • FIA_USB.2.1: 2
    • FIA_USB.2.2: 2
    • FIA_USB.2.3: 2
    • FIA_USB.2.4: 2
  • FMT:
    • FMT_MSA.1: 40
    • FMT_MSA.1.1: 5
    • FMT_MSA.3: 42
    • FMT_MSA.3.1: 5
    • FMT_MSA.3.2: 5
    • FMT_MTD.1: 60
    • FMT_MTD.1.1: 8
    • FMT_REV.1: 15
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 21
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 30
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
    • FPT_TDC.1: 15
    • FPT_TDC.1.1: 3
    • FPT_TDC.1.2: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 5
    • FAU_SAS.1: 17
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 48
    • FCS_CKM.1: 16
    • FCS_CKM.2: 4
    • FCS_CKM.4: 20
    • FCS_COP: 44
    • FCS_COP.1: 14
    • FCS_RND: 7
    • FCS_RND.1: 14
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 16
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF: 23
    • FDP_ACF.1: 22
    • FDP_IFC.1: 5
    • FDP_ITC.1: 7
    • FDP_ITC.2: 8
    • FDP_ITT.1: 1
    • FDP_RIP: 4
    • FDP_RIP.1: 13
    • FDP_SDI: 8
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
  • FIA:
    • FIA_AFL: 32
    • FIA_AFL.1: 8
    • FIA_API: 20
    • FIA_API.1: 4
    • FIA_API.1.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU: 44
    • FIA_UAU.1: 10
    • FIA_UAU.4: 6
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 14
    • FIA_UAU.6: 8
    • FIA_UIA: 1
    • FIA_UID: 24
    • FIA_UID.1: 11
  • FMT:
    • FMT_LIM: 13
    • FMT_LIM.1: 16
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 15
    • FMT_LIM.2.1: 2
    • FMT_MOF: 2
    • FMT_MOF.1: 1
    • FMT_MSA: 14
    • FMT_MSA.1: 6
    • FMT_MSA.2: 1
    • FMT_MSA.3: 8
    • FMT_MSA.4: 1
    • FMT_MTD: 86
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 2
    • FMT_MTD.3: 9
    • FMT_MTD.3.1: 1
    • FMT_SMF: 5
    • FMT_SMF.1: 38
    • FMT_SMR: 4
    • FMT_SMR.1: 31
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP: 6
    • FPT_PHP.1: 5
    • FPT_PHP.3: 14
    • FPT_SEP.1: 1
    • FPT_TST: 2
    • FPT_TST.1: 13
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT.2: 3
  • FTP:
    • FTP_ITC: 21
    • FTP_ITC.1: 6
pdf_data/st_keywords/cc_claims
  • A:
    • A.AUTHUSER: 3
    • A.DETECT: 3
    • A.MANAGE: 5
    • A.OPERATING_SY: 1
    • A.OPERATING_SYSTEM: 3
    • A.PHYSICAL: 4
    • A.TRAINEDUSER: 3
    • A.TRUSTED_PRO-: 1
    • A.TRUSTED_PROGRAMS: 2
  • O:
    • O.AUDITING: 8
    • O.DISCRETIONARY: 14
    • O.LS: 17
    • O.MANAGE: 28
    • O.PROGRAM_INTEG-: 1
    • O.PROGRAM_INTEGRITY_S: 1
    • O.PROGRAM_INTEGRITY_SUPPORT: 5
  • OE:
    • OE.ADMIN: 5
    • OE.HW_CRYPTO: 4
    • OE.INFO_PROTECT: 7
    • OE.INSTALL: 4
    • OE.MAINTENANCE: 3
    • OE.OS_SEP: 6
    • OE.PHYSICAL: 3
    • OE.RECOVER: 4
    • OE.TRUSTED_PROGRAMS: 6
  • R:
    • R.LU: 2
    • R.PWRESET: 1
  • T:
    • T.ACCESS: 11
    • T.IA: 8
    • T.SENSITIVITY: 3
  • A:
    • A.CGA: 2
    • A.SCA: 2
  • O:
    • O.HW_AES: 3
    • O.MEM_ACCESS: 1
    • O.MF_FW: 1
    • O.RND: 3
    • O.SFR_ACCESS: 1
  • OE:
    • OE.CGA_SSCD: 3
    • OE.CGA_TC_SVD: 2
    • OE.HID_TC_VAD: 1
    • OE.HID_VAD: 2
    • OE.SCA_TC_DTBS: 1
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • GD:
    • Giesecke & Devrient: 7
  • NXP:
    • NXP: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES128: 2
      • AES256: 2
  • DES:
    • DES:
      • DES: 5
  • AES_competition:
    • AES:
      • AES: 19
  • DES:
    • 3DES:
      • T-DES: 1
      • Triple-DES: 7
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CMAC: 5
      • KMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
  • FF:
    • DSA:
      • DSA: 1
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 5
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 8
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 5
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-2: 1
      • SHA-224: 2
      • SHA-256: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 7
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 5
    • TLS:
      • TLS: 2
  • PACE:
    • PACE: 91
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 6
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 16
    • Physical Tampering: 4
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 7
  • SCA:
    • DPA: 2
    • Leak-Inherent: 6
    • SPA: 1
    • physical probing: 3
    • timing attacks: 2
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 140
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS180-2: 1
  • PKCS:
    • PKCS #11: 2
    • PKCS#1: 4
    • PKCS#11: 11
    • PKCS#12: 1
    • PKCS#7: 1
  • RFC:
    • RFC4055: 2
  • X509:
    • X.509: 2
  • BSI:
    • AIS 20: 1
    • AIS 31: 2
    • AIS20: 2
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 197: 1
    • FIPS PUB 180-2: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#3: 3
  • RFC:
    • RFC3369: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • to the plastic Identity Card is achieved by physical and organisational security measures being out of scope of the current ST. The TOE shall comprise at least a) the circuitry of the contactless chip incl: 1
pdf_data/st_metadata
  • /Author: stut
  • /Classification: Public
  • /Company:
  • /CreationDate: D:20111213150025+01'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /Date: 09.12.2011
  • /Keywords: Version 1.2 Status 09.12.2011
  • /ModDate: D:20111213150037+01'00'
  • /Producer: Acrobat Distiller 9.3.3 (Windows)
  • /State: Draft
  • /Styles: supported
  • /Subject: STARCOS 3.5 ID GCC C1R
  • /TemplAuthor: Joern Treger
  • /TemplVersion: 1.0
  • /Title: Security Target Lite
  • /Version: 1.2
  • pdf_file_size_bytes: 666410
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 129
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different