Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Carte VITALE 2 - Application ADELE : Composant SB23ZL48 masqu� par le logiciel SESAM VITALE v1.0.1 avec correctif version 1
ANSSI-CC-2011/68
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
BSI-DSZ-CC-0772-2014
name Carte VITALE 2 - Application ADELE : Composant SB23ZL48 masqu� par le logiciel SESAM VITALE v1.0.1 avec correctif version 1 - Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
category ICs, Smart Cards and Smart Card-Related Devices and Systems Data Protection
scheme FR DE
not_valid_after 01.09.2019 08.11.2019
not_valid_before 07.06.2012 07.11.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-68fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-68en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
manufacturer MORPHO / ST Microelectronics Kanguru Solutions
manufacturer_web https://www.morpho.com https://www.kanguru.com
security_level EAL4+, AVA_VAN.5, ALC_DVS.2 ALC_FLR.1, EAL2+
dgst 316b14b844c0b4cc eda06ca3c208ebd0
heuristics/cert_id ANSSI-CC-2011/68 BSI-DSZ-CC-0772-2014
heuristics/cert_lab CEA BSI
heuristics/extracted_sars AGD_OPE.1, AGD_PRE.1, ADV_FSP.2, ALC_DVS.2, ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_TDS.3 ASE_CCL.1, ALC_DEL.1, ALC_DVS.2, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.1, ADV_IMP.2, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, ALC_LCD.2, APE_INT.1, AGD_OPE.1, APE_CCL.1, ALC_TAT.3, APE_REQ.2, APE_ECD.1, ATE_DPT.4, ASE_ECD.1, ADV_INT.3, ALC_CMS.2, ADV_SPM.1, AVA_VAN.2, ALC_CMC.2, ASE_INT.1, APE_OBJ.2, AGD_PRE.1, APE_SPD.1, ADV_FSP.2, ALC_FLR.1, ASE_OBJ.2
heuristics/extracted_versions 1.0.1 3.2.0.3, 1.2.1.8, 02.03.10, 5.0.2.6, 2.0.0.0
heuristics/report_references/directly_referenced_by ANSSI-CC-2015/35 {}
heuristics/report_references/directly_referencing ANSSI-CC-2010/08 {}
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2015/35 {}
heuristics/report_references/indirectly_referencing ANSSI-CC-2010/08 {}
heuristics/scheme_data
  • cert_id: ANSSI-CC-2011/68
  • description: Le produit certifié est la « carte VITALE 2 - Application ADELE : Composant SB23ZL48 masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1 » développée par Morpho et STMicroelectronics. Suivant une règle de nommage interne de Morpho, la version du correctif (1) correspond au dernier digit de la version du système d'exploitation (1.0.1). La cible d'évaluation (TOE – Targ
  • developer: Morpho et STMicroelectronics
  • enhanced:
    • augmented: ALC_DVS.2, AVA_VAN.5
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r3
    • cert_id: ANSSI-CC-2011/68
    • certification_date: 2012-06-07
    • developer: Morpho et STMicroelectronics
    • evaluation_facility: CEA - LETI
    • level: EAL4+
    • mutual_recognition: SOG-IS CCRA
    • protection_profile: [PP ESforSSD] certifié par l'ANSSI, BSI-PP-0005-2002 et BSI-PP-0006-2002
    • report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-68fr.pdf
    • sponsor: Morpho
    • target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-68en.pdf
  • level: EAL4+
  • product: Carte VITALE 2 - Application ADELE
  • sponsor: Morpho
  • url: https://cyber.gouv.fr/produits-certifies/carte-vitale-2-application-adele
heuristics/st_references/directly_referencing ANSSI-CC-2010/08 {}
heuristics/st_references/indirectly_referencing ANSSI-CC-2010/08 {}
maintenance_updates
protection_profiles

pdf_data/report_filename ANSSI-CC_2011-68fr.pdf 0772a_pdf.pdf
pdf_data/report_frontpage
  • FR:
    • cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 3
    • cert_id: ANSSI-CC-2011/68
    • cert_item: Carte VITALE 2 - Application ADELE : Composant SB23ZL48 masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1
    • cert_item_version: - Version système d’exploitation : 1.0.1 - Version du correctif : 1
    • cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
    • developer: Morpho 18 Chaussée Jules César, 95520 Osny, France STMicroelectronics 29 Boulevard Romain Rolland - 75669 Paris CEDEX 14 Commanditaire Morpho 18 Chaussée Jules César, 95520 Osny, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité aux profils de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: - [PP ESforSSD] certifié par l’ANSSI Protection Profile Embedded software for Smart Secure Devices Basic and Extended configurations – Basic configuration, version 1.0 - [BSI-PP-0005-2002] : SSCD Type 2, version 1.04 - [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
  • DE:
  • FR:
  • DE:
    • cert_id: BSI-DSZ-CC-0772-2014
    • cert_item: Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
    • cert_lab: BSI
    • developer: Kanguru Solutions
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2010_08: 3
    • ANSSI-CC-2011/68: 21
    • ANSSI-CC-PP-2009_02: 1
  • DE:
    • BSI-DSZ-CC-0772-2014: 22
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2009_02: 1
  • BSI:
    • BSI-PP- 0005-2002: 1
    • BSI-PP- 0006-2002: 1
    • BSI-PP- 0035-2007: 1
    • BSI-PP-0005-2002: 2
    • BSI-PP-0006-2002: 1
    • BSI-PP-0035-2007: 2
  • BSI:
    • BSI-PP-0025-2006: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL 1: 7
    • EAL 2: 8
    • EAL 2 augmented: 3
    • EAL 3: 4
    • EAL 4: 7
    • EAL 5: 6
    • EAL 6: 3
    • EAL 7: 4
    • EAL2: 2
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 5
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 2
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
  • FIA:
    • FIA_SOS.1: 1
    • FIA_UAU.2: 4
    • FIA_UAU.6: 1
    • FIA_UID.2: 4
  • FMT:
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 1
pdf_data/report_keywords/vendor
  • Morpho:
    • Morpho: 11
  • STMicroelectronics:
    • STMicroelectronics: 3
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 2
  • CESTI:
    • CESTI: 3
  • atsec:
    • atsec: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 4
      • AES-256: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
  • SHA:
    • SHA2:
      • SHA-256: 13
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/crypto_library
  • Neslib:
    • NesLib v2.0: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7138: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison: 1
    • Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User: 1
pdf_data/report_metadata
  • /CreationDate: D:20120607110747+02'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20120618193327+02'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 417135
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20141121083051+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
  • /ModDate: D:20141121113713+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0772-2014
  • pdf_file_size_bytes: 1643286
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
pdf_data/st_filename ANSSI-CC-cible_2011-68en.pdf 0772b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2010/08: 1
  • DE:
    • BSI-DSZ-CC-0772: 1
pdf_data/st_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-ESforSSD_Basic: 1
    • ANSSI-CC-PP-ESforSSD_Extended: 1
  • BSI:
    • BSI-PP-0035: 1
  • BSI:
    • BSI-PP- 0025: 13
    • BSI-PP-0025: 6
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5+: 1
    • EAL4: 3
    • EAL4 augmented: 1
    • EAL4+: 3
    • EAL5: 1
    • EAL5 augmented: 1
  • EAL:
    • EAL2: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_DVS.2: 8
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 9
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_SPM.1: 2
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP: 4
    • FAU_ARP.1: 2
    • FAU_GEN: 1
    • FAU_SAA: 4
    • FAU_SAA.1: 3
  • FCS:
    • FCS_CKM: 9
    • FCS_CKM.1: 3
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.3: 1
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_COP: 10
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 31
    • FDP_ACC.1: 14
    • FDP_ACF: 31
    • FDP_ACF.1: 41
    • FDP_ETC: 4
    • FDP_ETC.1: 2
    • FDP_ITC: 6
    • FDP_ITC.1: 8
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP: 3
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
    • FDP_ROL: 3
    • FDP_ROL.1: 3
    • FDP_SDI: 9
    • FDP_SDI.2: 7
    • FDP_UCT: 9
    • FDP_UCT.1: 4
    • FDP_UIT: 15
    • FDP_UIT.1: 11
    • FDP_UNO.1: 1
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 3
    • FIA_ATD.1.1: 1
    • FIA_SOS: 3
    • FIA_SOS.2: 3
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UID: 2
    • FIA_UID.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF: 3
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA: 23
    • FMT_MSA.1: 9
    • FMT_MSA.2: 3
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 3
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 5
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 3
    • FPR_UNO.1: 1
  • FPT:
    • FPT_AMT.1: 2
    • FPT_EMS: 2
    • FPT_EMS.1: 5
    • FPT_EMS.1.1: 2
    • FPT_EMS.1.2: 2
    • FPT_FLS: 3
    • FPT_FLS.1: 5
    • FPT_FLS.1.1: 1
    • FPT_ITC: 3
    • FPT_ITC.1: 2
    • FPT_ITI: 3
    • FPT_ITI.1: 3
    • FPT_PHP.1: 3
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 3
    • FPT_PHP.3.1: 1
    • FPT_TST: 3
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 22
    • FTP_ITC.1: 20
    • FTP_TRP: 10
    • FTP_TRP.1: 6
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
    • FCS_RNG: 2
    • FCS_RNG.1: 15
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD: 12
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 2
    • FMT_SMF: 20
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_RCV.4: 8
    • FPT_RCV.4.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.CGA: 8
    • A.SCA: 7
  • O:
    • O.RND: 10
  • OE:
    • OE.HI_VAD: 10
    • OE.RND: 11
    • OE.SVD_AUTH_CGA: 2
  • OSP:
    • OSP.MANAGEMENT_OF_SECRETS: 1
  • T:
    • T.RND: 10
pdf_data/st_keywords/vendor
  • Morpho:
    • Morpho: 8
  • Philips:
    • Philips: 1
  • STMicroelectronics:
    • STMicroelectronics: 7
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 40
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 5
    • DES:
      • DES: 4
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-2: 2
      • SHA-256: 2
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 10
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 31
    • RNG: 3
  • RNG:
    • RNG: 14
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 3
  • CBC:
    • CBC: 1
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib v2.0: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
    • malfunction: 2
    • physical tampering: 4
  • SCA:
    • DPA: 3
    • SPA: 3
    • physical probing: 2
    • side channel: 1
    • timing attacks: 1
  • other:
    • reverse engineering: 1
  • FI:
    • physical tampering: 3
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 2
  • FIPS:
    • FIPS 180-1: 1
    • FIPS PUB 46-3: 1
    • FIPS180-2: 1
  • PKCS:
    • PKCS 1: 1
    • PKCS#1: 7
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 11 1.5.4.3 Out of scope : 1
    • 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5: 1
    • Out of scope: 2
    • from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●: 1
pdf_data/st_metadata
  • /CreationDate: D:20120125094819
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20120125094819
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1461696
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 104
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different