name |
Bundesdruckerei Document Application with tamper-evident casing 2.5.1, Firmware Version 1.5.8, TOE Casing Version 0
|
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6)
|
category |
Other Devices and Systems
|
Other Devices and Systems
|
not_valid_before |
2023-07-20
|
2018-01-15
|
not_valid_after |
2028-07-19
|
2021-01-14
|
scheme |
DE
|
TR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1215b_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NCR%20e10%20Security%20Target%202.7.pdf
|
status |
active
|
archived
|
manufacturer |
Bundesdruckerei GmbH
|
Encore Bilişim Sistemleri Ltd. Şti.
|
manufacturer_web |
https://www.bundesdruckerei.de
|
https://www.ncr.com/
|
security_level |
EAL3 |
EAL2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1215a_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NCR%20v2.0%20CR.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1215c_pdf.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile for Document Management Terminal', 'pp_eal': 'EAL3', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0064V2b_pdf.pdf', 'pp_ids': frozenset({'DMT-PP'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'New Generation Cash Register Fiscal Application Software Protection Profile', 'pp_eal': 'EAL2', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/NGCRFAS_PP_v2%200.pdf', 'pp_ids': frozenset({'NGCRFAS PP'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
485830c69d8ba626265eebc51ec8e2c1f8ad3e34741bed72f7a6cebd8a1e6636
|
None
|
state/cert/txt_hash |
b260aa65883e81271a909dcc3ad855a950ca7e63776f3229bff1e24556cd5cc1
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
8f60270d6640f52c12d3d8008285970d19614cd28e13b75aa78fdb19cd564146
|
44336d31760811c7d0394f7569d153e671cabba2e4f5d09cd4cbb3ccf7a84538
|
state/report/txt_hash |
e3b1901c236cae3810629528cc7f80cb79a4d94c5cbc08f0d9473f487da88822
|
5286f02707797ad72414d7a2f167934f340b9fa9a6c744af5f0e861f7aacabb8
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
29ef2586498ab8dae5afcc7c8d7fa66e4eb9a78036339a08c03d6b2aa547c556
|
ef7f2346152e8a89e7204d78962b5a3c487a2827c0497c7a8c47fc105f1a2387
|
state/st/txt_hash |
2beb940db91b5d70df1de7c43660d3a9bbdd817b0e7a5ef56c6e05c85b7321d1
|
25066db009017c2e24485b69db5be2dc4c96851b30201b3455150322ab1dfd4d
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-1215-2023
|
21.0.03/TSE-CCCS-48
|
heuristics/cert_lab |
BSI |
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
2.5.1, 1.5.8 |
2.0, 1.0.2, 0.0.6 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1181-2021 |
None
|
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1161-2020, BSI-DSZ-CC-1181-2021, BSI-DSZ-CC-1093, BSI-DSZ-CC-1125-2019 |
None
|
heuristics/scheme_data |
- cert_id:
BSI-DSZ-CC-1215-2023
- product:
Bundesdruckerei Document Application with tamper-evident casing 2.5.1, Firmware Version 1.5.8, TOE Casing Version 0
- vendor:
Bundesdruckerei GmbH
- certification_date:
20.07.2023
- category:
Electronic ID documents
- url:
https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-Software/1215.html
- enhanced:
- product:
Bundesdruckerei Document Application with tamper-evident casing 2.5.1, Firmware Version 1.5.8, TOE Casing Version 0
- applicant:
Bundesdruckerei GmbH
Kommandantenstraße 18
10969 Berlin
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL3
- protection_profile:
Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI)
- certification_date:
20.07.2023
- expiration_date:
19.07.2028
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1215a_pdf.pdf?__blob=publicationFile&v=2
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1215b_pdf.pdf?__blob=publicationFile&v=2
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1215c_pdf.pdf?__blob=publicationFile&v=2
- description:
The Target of Evaluation (TOE) is the Bundesdruckerei Document Application with tamperevident casing 2.5.1.
The Document Application is running on a Document Management Terminal (DMT). It is used to read the German Passport (ePass), to read and update the electronic data of the German identification card (“Personalausweis (PA)”) and electronic resident permit (“elektronischer Aufenthaltstitel (eAT)”) as well as to verify the document’s authenticity and the integrity of its data.
The TOE is operated by governmental organisations, e.g. municipal office, police, government or other state approved agencies. The TOE is specifically applied in registration offices to allow card holders to verify that their ePass, PA or eAT is working correctly. In case of PA and eAT it is further possible to update the address information of the card holder, the card holder’s PIN for eID applications, and the community ID (“Gemeindeschlüssel”). In addition, the eID application functionality of the PA or eAT can be activated or deactivated. Additionally the TOE ensures secure communication to external control software and provides a tamper-evident enclosure.
Necessary protocols for the communication of the TOE with the electronic identity documents like the ePass, PA or eAT are described in [ICAO_9303], [TR-03110-1], [TR-03110-2], and [TR-03110-3].
- subcategory:
Software
|
None
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
1215c_pdf.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
234391
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Federal Office for Information Security
- /Keywords:
"Common Criteria, Certification, Zertifizierung, Bundesdruckerei GmbH, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
- /Subject:
Common Criteria, Certification, Zertifizierung, Bundesdruckerei GmbH, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018
- /Title:
Certificate BSI-DSZ-CC-1215-2023
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
1215a_pdf.pdf
|
NCR v2.0 CR.pdf
|
pdf_data/report_frontpage |
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-1215-2023
- cert_item:
Bundesdruckerei Document Application with tamper-evident casing 2.5.1 Firmware Version 1.5.8, TOE Casing Version 0
- developer:
Bundesdruckerei GmbH
- cert_lab:
BSI
- ref_protection_profiles:
Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064- V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI
- cc_version:
PP conformant Common Criteria Part 2 extended
- cc_security_level:
Common Criteria Part 3 conformant EAL 3 valid until: 19 July 2028
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA |
7
|
1
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1215-2023:
15
- BSI-DSZ-CC-1181-2021:
3
- BSI-DSZ-CC-1215:
1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0064-:
1
- BSI-CC-PP-0064-V2-2018:
3
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/report_keywords/cc_sar/ADV |
|
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
|
pdf_data/report_keywords/cc_sar/ALC |
|
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
|
pdf_data/report_keywords/cc_sar/ATE |
|
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 3: 4
- EAL 2:
3
- EAL 1: 1
- EAL 4: 1
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 |
3
|
2
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FIA:
- FIA_UAU.4:
1
- FIA_UAU.5:
1
- FIA_UAU.6:
1
- FIA_API.1:
1
- FIA_UAU.2:
1
- FIA_UID.2:
1
- FMT:
- FMT_SMR.1:
1
- FMT_SMF.1:
1
- FMT_MTD:
3
- FPT:
- FTP:
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- Evaluation Technical Report, Version 2, 2023-06-21, BSI-DSZ-CC-1215, TÜV Informationstechnik GmbH (confidential document) [8] Common Criteria Protection Profile for Document Management Terminal DMT-PP:
1
- BSI) [9] Configuration list for the TOE, Version 1.43, 2023-04-26, ALC_CMS_DMT- V1.xx.xlsx (confidential document) [10] Guidance documentation for the TOE, Version 1.201, 2023-04-18, VISOTEC® V-ÄNDERUNGSTERMINAL:
1
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_protocol/TLS |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
4
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA256:
8
- SHA384:
5
- SHA512:
1
- SHA224:
1
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- SCA:
- side channel:
1
- SPA:
2
- DPA:
2
- FI:
- physical tampering:
3
- Malfunction:
1
- malfunction:
2
- DFA:
1
|
pdf_data/report_keywords/side_channel_analysis/FI |
|
- physical tampering:
3
- Malfunction: 1
- malfunction: 2
- DFA: 1
|
pdf_data/report_keywords/side_channel_analysis/FI/physical tampering |
4
|
3
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS186-2:
6
- FIPS180-4:
8
- FIPS PUB 46-3:
2
- FIPS 197:
8
- FIPS186-4:
1
- FIPS197:
1
- BSI:
- AIS 48:
1
- AIS 20:
1
- AIS 32:
1
- AIS 38:
1
- RFC:
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
- ISO/IEC 9797-:
2
- ISO/IEC 15946-:
6
- ICAO:
|
- ISO:
- X509:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/report_keywords/standard_id/ISO |
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
- ISO/IEC 9797-:
2
- ISO/IEC 15946-:
6
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
5
|
5
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES |
2
|
1
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
443562
- pdf_is_encrypted:
False
- pdf_number_of_pages:
29
- /Author:
Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Bundesdruckerei GmbH, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
- /Subject: Common Criteria, Certification, Zertifizierung, Bundesdruckerei GmbH, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018
- /Title: Certification Report BSI-DSZ-CC-1215-2023
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
|
- pdf_file_size_bytes:
536471
- pdf_is_encrypted:
False
- pdf_number_of_pages:
21
- /Author:
Cengiz GÖREN
- /Creator: Microsoft® Word 2019
- /CreationDate: D:20191213114059+03'00'
- /ModDate: D:20191213114059+03'00'
- /Producer: Microsoft® Word 2019
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
Federal Office for Information Security
|
Cengiz GÖREN
|
pdf_data/report_metadata/pdf_file_size_bytes |
443562
|
536471
|
pdf_data/report_metadata/pdf_hyperlinks |
https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte |
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
29
|
21
|
pdf_data/st_filename |
1215b_pdf.pdf
|
NCR e10 Security Target 2.7.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0064-V2-2018:
3
- BSI-CC-PP-0064-:
1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_TDS.2:
1
- AGD:
- ALC:
- ALC_CMC.3:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_FUN.1:
1
- AVA:
- AVA_VAN.5:
2
- AVA_VAN.2:
1
- APE:
- ASE:
- ASE_CCL.1:
1
- ASE_INT.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
3
- AGD_PRE.1:
1
- ALC:
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_TDS.2: 1
|
- ADV_ARC.1:
1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
|
- AGD_OPE.1:
3
- AGD_PRE.1: 1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
1
|
3
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_CMC.3: 1
- ALC_DEL.1:
1
- ALC_LCD.1: 1
|
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_INT.1:
1
- ASE_REQ.2: 1
- ASE_TSS.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1: 1
- ASE_INT.1:
1
- ASE_OBJ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2: 1
- ATE_FUN.1:
1
|
- ATE_COV.1: 1
- ATE_FUN.1:
1
- ATE_IND.2: 1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_VAN.5: 2
- AVA_VAN.2:
1
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.2 |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL 3:
4
- EAL4+:
2
- EAL3:
1
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
5
- FAU_GEN.1.1:
3
- FAU_GEN.1.2:
2
- FAU_GEN:
1
- FCS:
- FCS_RNG.1:
6
- FCS_COP:
29
- FCS_CKM:
13
- FCS_CKM.1:
15
- FCS_CKM.4:
5
- FCS_CKM.4.1:
1
- FCS_COP.1:
25
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_RNG:
3
- FDP:
- FDP_RIP.1:
4
- FDP_RIP.1.1:
1
- FIA:
- FIA_API.1:
6
- FIA_UAU.4:
5
- FIA_API:
1
- FIA_API.1.1:
1
- FIA_UAU.2:
6
- FIA_UAU.2.1:
1
- FIA_UAU.1:
3
- FIA_UAU.4.1:
1
- FIA_UAU.5:
4
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.6:
4
- FIA_UAU.6.1:
1
- FIA_UID.2:
6
- FIA_UID.2.1:
1
- FIA_UID.1:
2
- FMT:
- FMT_MTD:
22
- FMT_MTD.1:
5
- FMT_SMF.1:
7
- FMT_SMF.1.1:
1
- FMT_SMR.1:
5
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FTP:
- FTP_TRP:
4
- FTP_TRP.1:
3
- FTP_TRP.1.2:
1
|
- FAU:
- FAU_GEN:
1
- FAU_GEN.1:
6
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_SAR:
1
- FAU_SAR.1:
4
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_STG:
1
- FAU_STG.1:
5
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.4:
4
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FCO:
- FCO_NRO:
1
- FCO_NRO.2:
4
- FCO_NRO.1:
1
- FCO_NRO.2.1:
1
- FCO_NRO.2.2:
1
- FCO_NRO.2.3:
1
- FCS:
- FCS_CKM:
27
- FCS_CKM.2:
15
- FCS_COP.1:
12
- FCS_CKM.4:
55
- FCS_CKM.1.1:
6
- FCS_CKM.1:
27
- FCS_CKM.2.1:
1
- FCS_CKM.4.1:
1
- FCS_COP:
43
- FCS_COP.1.1:
11
- FDP:
- FDP_ITC.1:
27
- FDP_ITC.2:
27
- FDP_ACC:
1
- FDP_ACC.1:
25
- FDP_ACF.1:
5
- FDP_ACC.1.1:
1
- FDP_ACF:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ETC:
9
- FDP_IFC.1:
22
- FDP_ETC.2.1:
2
- FDP_ETC.2.2:
2
- FDP_ETC.2.3:
2
- FDP_ETC.2.4:
2
- FDP_IFC:
18
- FDP_IFF.1:
4
- FDP_IFC.1.1:
2
- FDP_IFF:
9
- FDP_IFF.1.1:
2
- FDP_IFF.1.2:
2
- FDP_IFF.1.3:
2
- FDP_IFF.1.4:
2
- FDP_IFF.1.5:
2
- FDP_ITC:
11
- FDP_ITC.2.1:
2
- FDP_ITC.2.2:
2
- FDP_ITC.2.3:
2
- FDP_ITC.2.4:
2
- FDP_ITC.2.5:
1
- FDP_SDI:
6
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_SDI.2:
3
- FIA:
- FIA_UID.1:
9
- FIA_AFL:
9
- FIA_UAU.1:
8
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
2
- FIA_UAU:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.4:
4
- FIA_UAU.4.1:
1
- FIA_UID:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FMT:
- FMT_MSA.3:
6
- FMT_MOF:
1
- FMT_MOF.1:
6
- FMT_SMR.1:
30
- FMT_SMF.1:
23
- FMT_MSA:
34
- FMT_MSA.1.1:
5
- FMT_MSA.1:
4
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD:
9
- FMT_MTD.1.1:
1
- FMT_SMF:
1
- FMT_SMF.1.1:
1
- FMT_SMR:
1
- FMT_SMR.2:
11
- FMT_SMR.2.1:
1
- FMT_SMR.2.2:
1
- FMT_SMR.2.3:
1
- FPT:
- FPT_STM.1:
7
- FPT_TDC.1:
5
- FPT_FLS:
1
- FPT_FLS.1:
4
- FPT_PHP:
1
- FPT_PHP.2:
4
- FPT_PHP.1:
1
- FPT_PHP.2.1:
1
- FPT_PHP.2.2:
1
- FPT_PHP.2.3:
1
- FPT_RCV:
1
- FPT_RCV.1:
4
- FPT_RCV.1.1:
1
- FPT_RCV.4:
4
- FPT_RCV.4.1:
1
- FPT_STM:
1
- FPT_STM.1.1:
1
- FPT_TDC:
9
- FPT_TDC.1.2:
2
- FPT_TDC.1.1:
1
- FPT_TEE:
9
- FPT_TEE.1.1:
2
- FPT_TEE.1.2:
2
- FTP:
- FTP_ITC.1:
5
- FTP_TRP.1:
4
- FTP_ITC:
10
- FTP_ITC.1.1:
2
- FTP_ITC.1.2:
2
- FTP_ITC.1.3:
2
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
5
- FAU_GEN.1.1:
3
- FAU_GEN.1.2:
2
- FAU_GEN:
1
|
- FAU_GEN:
1
- FAU_GEN.1:
6
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_SAR: 1
- FAU_SAR.1: 4
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 4
- FAU_STG.3: 1
- FAU_STG.4.1: 1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
5
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RNG.1: 6
- FCS_COP:
29
- FCS_CKM:
13
- FCS_CKM.1:
15
- FCS_CKM.4:
5
- FCS_CKM.4.1:
1
- FCS_COP.1:
25
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FCS_RNG: 3
|
- FCS_CKM:
27
- FCS_CKM.2: 15
- FCS_COP.1:
12
- FCS_CKM.4:
55
- FCS_CKM.1.1: 6
- FCS_CKM.1:
27
- FCS_CKM.2.1: 1
- FCS_CKM.4.1:
1
- FCS_COP:
43
- FCS_COP.1.1: 11
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
13
|
27
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
15
|
27
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
5
|
55
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
29
|
43
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
25
|
12
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_RIP.1:
4
- FDP_RIP.1.1:
1
|
- FDP_ITC.1:
27
- FDP_ITC.2:
27
- FDP_ACC:
1
- FDP_ACC.1:
25
- FDP_ACF.1:
5
- FDP_ACC.1.1:
1
- FDP_ACF:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ETC:
9
- FDP_IFC.1:
22
- FDP_ETC.2.1:
2
- FDP_ETC.2.2:
2
- FDP_ETC.2.3:
2
- FDP_ETC.2.4:
2
- FDP_IFC:
18
- FDP_IFF.1:
4
- FDP_IFC.1.1:
2
- FDP_IFF:
9
- FDP_IFF.1.1:
2
- FDP_IFF.1.2:
2
- FDP_IFF.1.3:
2
- FDP_IFF.1.4:
2
- FDP_IFF.1.5:
2
- FDP_ITC:
11
- FDP_ITC.2.1:
2
- FDP_ITC.2.2:
2
- FDP_ITC.2.3:
2
- FDP_ITC.2.4:
2
- FDP_ITC.2.5:
1
- FDP_SDI:
6
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_SDI.2:
3
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API.1: 6
- FIA_UAU.4:
5
- FIA_API: 1
- FIA_API.1.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.1:
3
- FIA_UAU.4.1:
1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 4
- FIA_UAU.6.1: 1
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FIA_UID.1:
2
|
- FIA_UID.1:
9
- FIA_AFL: 9
- FIA_UAU.1:
8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_UAU: 1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4:
4
- FIA_UAU.4.1:
1
- FIA_UID: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
3
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4 |
5
|
4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
2
|
9
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MTD:
22
- FMT_MTD.1: 5
- FMT_SMF.1:
7
- FMT_SMF.1.1:
1
- FMT_SMR.1:
5
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
- FMT_MSA.3: 6
- FMT_MOF: 1
- FMT_MOF.1: 6
- FMT_SMR.1:
30
- FMT_SMF.1:
23
- FMT_MSA: 34
- FMT_MSA.1.1: 5
- FMT_MSA.1: 4
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD:
9
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1.1:
1
- FMT_SMR: 1
- FMT_SMR.2: 11
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
22
|
9
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
7
|
23
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
5
|
30
|
pdf_data/st_keywords/cc_sfr/FPT |
|
- FPT_STM.1: 7
- FPT_TDC.1: 5
- FPT_FLS: 1
- FPT_FLS.1: 4
- FPT_PHP:
1
- FPT_PHP.2: 4
- FPT_PHP.1:
1
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 1
- FPT_RCV: 1
- FPT_RCV.1: 4
- FPT_RCV.1.1: 1
- FPT_RCV.4: 4
- FPT_RCV.4.1: 1
- FPT_STM: 1
- FPT_STM.1.1: 1
- FPT_TDC: 9
- FPT_TDC.1.2: 2
- FPT_TDC.1.1: 1
- FPT_TEE: 9
- FPT_TEE.1.1: 2
- FPT_TEE.1.2: 2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_TRP: 4
- FTP_TRP.1:
3
- FTP_TRP.1.2: 1
|
- FTP_ITC.1: 5
- FTP_TRP.1:
4
- FTP_ITC: 10
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 2
- FTP_ITC.1.3: 2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
3
|
4
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC |
4
|
8
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_protocol/TLS |
|
|
pdf_data/st_keywords/crypto_protocol/TLS/TLS |
|
|
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS 1.2 |
2
|
2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256:
2
- P-384:
1
- NIST P-384:
1
- secp384r1:
3
- secp256r1:
2
- secp521r1:
1
- prime256v1:
2
- Brainpool:
- brainpoolP224r1:
1
- brainpoolP256r1:
1
- brainpoolP384r1:
1
- brainpoolP512r1:
1
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
- SHA1:
- SHA2:
- SHA-256:
5
- SHA-224:
2
- SHA-384:
2
- SHA-512:
2
- SHA256:
2
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
- SHA-256: 5
- SHA-224: 2
- SHA-384: 2
- SHA-512: 2
- SHA256:
2
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 |
2
|
1
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.DG1:
2
- EF.DG2:
1
- EF.DG3:
2
- EF.DG4:
2
- EF.DG5:
1
- EF.DG16:
2
- EF.DG13:
1
- EF.COM:
2
- EF.SOD:
2
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
25
|
2
|
pdf_data/st_keywords/side_channel_analysis |
|
- SCA:
- side channel:
3
- SPA:
3
- DPA:
3
- FI:
- physical tampering:
9
- Malfunction:
3
- malfunction:
2
- DFA:
1
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
- physical tampering:
9
- Malfunction: 3
- malfunction: 2
- DFA: 1
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
5
|
9
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4:
2
- FIPS186-4:
3
- FIPS180-4:
3
- FIPS186-2:
2
- FIPS197:
2
- FIPS 186-2:
1
- FIPS 186-4:
1
- FIPS PUB 197:
1
- BSI:
- RFC:
- ISO:
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
- ICAO:
|
- FIPS:
- FIPS 198-1:
2
- FIPS PUB 180-2:
3
- NIST:
- PKCS:
- RFC:
- X509:
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS 180-4:
2
- FIPS186-4:
3
- FIPS180-4:
3
- FIPS186-2:
2
- FIPS197:
2
- FIPS 186-2:
1
- FIPS 186-4:
1
- FIPS PUB 197:
1
|
- FIPS 198-1:
2
- FIPS PUB 180-2:
3
|
pdf_data/st_keywords/standard_id/RFC |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
8
|
19
|
pdf_data/st_keywords/symmetric_crypto/DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/DES |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1530980
- pdf_is_encrypted:
False
- pdf_number_of_pages:
91
- /Author:
Alexander Haferland
- /Keywords: CC, ST, Common Criteria, Security Target, Inspection System, PA, eAT, ePass
- /Subject: Security Target
- /Title: Bundesdruckerei Document Application Common Criteria Evaluation
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1042698
- pdf_is_encrypted:
False
- pdf_number_of_pages:
73
- /Author:
FK
- /Creator: Microsoft® Word 2019
- /CreationDate: D:20191213114041+03'00'
- /ModDate: D:20191213114041+03'00'
- /Producer: Microsoft® Word 2019
- pdf_hyperlinks:
http://en.wikipedia.org/wiki/Receipt
|
pdf_data/st_metadata//Author |
Alexander Haferland
|
FK
|
pdf_data/st_metadata/pdf_file_size_bytes |
1530980
|
1042698
|
pdf_data/st_metadata/pdf_hyperlinks |
|
http://en.wikipedia.org/wiki/Receipt |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
91
|
73
|
dgst |
2ca8cb6f67dcfa4a
|
4260aad8ebfc5357
|