name |
Tarantella Enterprise 3 Version 3.40.911 with Tarantella Security Pack, Version 3.41.211 |
STARCOS 3.5 ID GCC C2R |
category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
UK |
DE |
status |
archived |
archived |
not_valid_after |
05.03.2013 |
18.11.2019 |
not_valid_before |
13.05.2005 |
17.11.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP214.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Tarantella_V2.4.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952b_pdf.pdf |
manufacturer |
Tarantella LTD |
G+D Mobile Security GmbH |
manufacturer_web |
https://www.tarantella.com |
https://www.gi-de.com/de/de/mobile-security/ |
security_level |
EAL2 |
EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5 |
dgst |
3db22e4de890393a |
27e724cd297034a1 |
heuristics/cert_id |
CRP214 |
BSI-DSZ-CC-0952-2014 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ASE_SPD.1, ATE_DPT.2, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
3.40.911, 3.41.211 |
3.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0952-V2-2016 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0813-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0952-V2-2016 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0813-2012 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0813-2012 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/protection_profiles |
{} |
0e62a9ea5e7ca3a7 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0061b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP214.pdf |
0952a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 SOGIS Recognition Agreement
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0952-2014
- cert_item: STARCOS 3.5 ID GCC C2R
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 16 December 2009, BSI-CC-PP-0061-2009 and in accordance with BSI Technische Richtlinie BSI-TR-03116-2, 2013
|
pdf_data/report_keywords/cc_cert_id |
- UK:
- CERTIFICATION REPORT No. P214: 1
|
- DE:
- BSI-DSZ-CC-0751-2013: 4
- BSI-DSZ-CC-0813-2012: 4
- BSI-DSZ-CC-0952-2014: 20
- BSI-DSZ-CC-S-0017-2014: 2
- BSI-DSZ-CC-S-0023-2013: 2
- BSI-DSZ-CC-S-0029-2014: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 14
- EAL 4 augmented: 3
- EAL 5: 8
- EAL 6: 3
- EAL 7: 4
- EAL5+: 1
- EAL6: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_ACC.2: 1
- FDP_ACF.1: 1
- FMT:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Cisco:
- Microsoft:
- Microsoft: 1
- Microsoft Corporation: 1
|
- GD:
- G&D: 2
- Giesecke & Devrient: 19
- Infineon:
- Infineon: 3
- Infineon Technologies: 1
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- physical tampering: 1
- SCA:
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7138: 1
- BSI 7148: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- FIPS:
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 1
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 4
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- Solaris 8. Users should note that these Application Servers and the communications with them are out of scope of the evaluation. 6. Users login to the Tarantella Server via a web browser and are then presented: 1
- The evaluated configuration is as illustrated in the diagram above although the firewall shown is out of scope. The product can be used in more complex network environments. These network configurations, which: 1
- out of scope: 2
|
- ConfidentialDocument:
- Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C2R, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7820 A11, Version 3, 02.04: 1
- TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [11] STARCOS 3.5 ID GCC C2 Configuration 1, Application Specification, Version 1.0, 14.03.2013: 1
- Version 1.1, 05.11.2014, Konfigurationsliste von STARCOS 3.5 ID GCC C2R, Giesecke & Devrient GmbH (confidential document) 21 / 34 Certification Report BSI-DSZ-CC-0952-2014 This page is intentionally left blank. 22 / 34: 1
- Version 2.7, 05.08.2013, STARCOS 3.5 ID GCC C2R Security Target, Giesecke & Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15: 1
|
pdf_data/report_metadata |
- /Author: racook
- /CreationDate: D:20050526142837Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20131204151607Z
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Title: Microsoft Word - LFL_T206_Tarantella_CertRep_10.doc
- pdf_file_size_bytes: 667201
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20141203132656+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Giesecke & Devrient, G&D, STARCOS, nPA, Personalausweis, Identity Card, ID Card"
- /ModDate: D:20141203133150+01'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0952-2014
- pdf_file_size_bytes: 1238020
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
Tarantella_V2.4.pdf |
0952b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035: 1
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0061: 3
- BSI-PP-0055: 1
- BSI-PP-0056: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 5: 2
- EAL4: 13
- EAL4 augmented: 3
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.1: 1
- ADV_HLD.1: 1
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_SOF.1: 1
- AVA_VLA.1: 2
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- APE:
- ASE:
- ATE:
- ATE_DPT.1: 2
- ATE_DPT.2: 9
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 2
- FAU_GEN.2: 4
- FAU_GEN.2.1: 2
- FAU_SAR.1: 2
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.2: 4
- FAU_SAR.2.1: 2
- FAU_SAR.3: 3
- FAU_SAR.3.1: 2
- FAU_STG.1: 4
- FAU_STG.1.1: 2
- FAU_STG.1.2: 2
- FCS:
- FCS_COP.1: 3
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 2
- FDP_ACC.2: 6
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 2
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_ITC.1: 3
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_RIP.2: 2
- FDP_RIP.2.1: 4
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_UAU.2: 5
- FIA_UAU.2.1: 2
- FIA_UAU.5: 7
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 2
- FIA_UAU.7: 3
- FIA_UAU.7.1: 2
- FIA_UID.1: 2
- FIA_UID.2: 7
- FIA_UID.2.1: 2
- FMT:
- FMT_MSA.1: 3
- FMT_MSA.1.1: 2
- FMT_MSA.3: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 2
- FMT_SMF.1: 1
- FMT_SMF.1.1: 2
- FMT_SMR.1: 6
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITC: 3
- FPT_ITC.2: 1
- FPT_ITT.1: 3
- FPT_ITT.1.1: 2
- FPT_ITT.3: 2
- FPT_ITT.3.1: 2
- FPT_ITT.3.2: 2
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FTP:
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 17
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 52
- FCS_CKM.1: 16
- FCS_CKM.2: 4
- FCS_CKM.4: 20
- FCS_COP: 56
- FCS_COP.1: 11
- FCS_RND: 7
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG.1: 3
- FDP:
- FDP_ACC: 16
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF: 23
- FDP_ACF.1: 21
- FDP_IFC.1: 5
- FDP_ITC.1: 7
- FDP_ITC.2: 8
- FDP_ITT.1: 1
- FDP_RIP: 4
- FDP_RIP.1: 13
- FDP_SDI: 14
- FDP_SDI.1: 3
- FDP_SDI.2: 7
- FIA:
- FIA_AFL: 32
- FIA_AFL.1: 8
- FIA_API: 20
- FIA_API.1: 4
- FIA_API.1.1: 3
- FIA_SOS.2: 1
- FIA_UAU: 45
- FIA_UAU.1: 10
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 15
- FIA_UAU.6: 8
- FIA_UIA: 1
- FIA_UID: 25
- FIA_UID.1: 11
- FMT:
- FMT_LIM: 13
- FMT_LIM.1: 16
- FMT_LIM.1.1: 2
- FMT_LIM.2: 15
- FMT_LIM.2.1: 2
- FMT_MOF: 2
- FMT_MOF.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 5
- FMT_MSA.2: 1
- FMT_MSA.3: 8
- FMT_MSA.4: 1
- FMT_MTD: 86
- FMT_MTD.1: 12
- FMT_MTD.1.1: 2
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF: 5
- FMT_SMF.1: 38
- FMT_SMR: 4
- FMT_SMR.1: 31
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP: 6
- FPT_PHP.1: 5
- FPT_PHP.3: 14
- FPT_TST: 2
- FPT_TST.1: 15
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 2
- A.AUTH: 2
- A.CERTIFICATE: 3
- A.CONFIG: 2
- A.CONNECT: 2
- A.PHYSICAL: 2
- A.USER: 2
- O:
- O.ADMIN: 4
- O.AUDIT: 5
- O.AUTH_SERVER: 4
- O.DAC: 8
- O.SECURE_ENCRYPTION: 4
- O.TPATH: 8
- OE:
- OE.ACCOUNT: 5
- OE.AUDMAN: 3
- OE.AUDREC: 4
- OE.AUTHDATA: 4
- OE.INSTALL: 9
- OE.KEYMGMT: 9
- OE.OSAUTH: 4
- OE.OSCONFIG: 3
- OE.OSKEYS: 10
- OSP:
- T:
- T.CHANNEL: 3
- T.EXCEED: 3
- T.MISDIRECT: 3
- T.UNAUTH: 3
|
- A:
- O:
- OE:
- OE.CGA_SSCD: 3
- OE.CGA_TC_SVD: 2
- OE.HID_TC_VAD: 1
- OE.HID_VAD: 2
- OE.SCA_TC_DTBS: 1
- T:
|
pdf_data/st_keywords/vendor |
|
- GD:
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 2
- SHA-256: 3
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 14
- Physical Tampering: 4
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- physical tampering: 7
- SCA:
- DPA: 2
- Leak-Inherent: 6
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- FIPS:
- FIPS 140-2: 2
- FIPS140-2: 2
- RFC:
- X509:
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 180-4: 2
- FIPS 197: 4
- FIPS PUB 180-2: 2
- FIPS PUB 180-4: 1
- FIPS180-2: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Note that these application servers and the communications with them (RDP/SSH/X11) are out of scope: 1
- out of scope: 1
- server. (Note that these application servers and the communications with them (RDP/SSH/X11) are out of scope). Evaluation of Tarantella Enterprise 3 Tarantella Enterprise 3 Security Target/Issue 2.4 11 April: 1
|
- OutOfScope:
- out of scope: 1
- to the plastic Identity Card is achieved by physical and organisational security measures being out of scope of the current ST. The TOE shall comprise at least a) the circuitry of the contactless chip incl: 1
|
pdf_data/st_metadata |
- /Author: griffinh@griffinh
- /CreationDate: D:20050411140335+00'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20050411141010
- /Producer: Jaws PDF Creator v2.11.1164
- /Title: Microsoft Word - T206-ST.doc
- pdf_file_size_bytes: 384411
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
- /Author: stut
- /CreationDate: D:20141103145118+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: Version 2.9 Status 03.11.2014
- /ModDate: D:20141103145118+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: STARCOS 3.5 ID GCC C2R
- /Title: Security Target Lite
- pdf_file_size_bytes: 2021253
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 132
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |