name |
genuscreen 4.0 |
STARCOS 3.5 ID ECC C1 |
category |
Boundary Protection Devices and Systems |
Products for Digital Signatures |
scheme |
DE |
DE |
status |
archived |
archived |
not_valid_after |
30.10.2019 |
01.09.2019 |
not_valid_before |
29.10.2014 |
31.08.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0823a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0769a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0823b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0769b_pdf.pdf |
manufacturer |
GeNUA mbH |
G+D Mobile Security GmbH |
manufacturer_web |
https://www.genua.de/ |
https://www.gi-de.com/de/de/mobile-security/ |
security_level |
ASE_TSS.2, AVA_VAN.4, ALC_FLR.2, EAL4+ |
EAL4+, AVA_VAN.5 |
dgst |
4577a1ed977931d9 |
3248c326fec7a323 |
heuristics/cert_id |
BSI-DSZ-CC-0823-2014 |
BSI-DSZ-CC-0769-2012 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, AVA_VAN.4, ADV_TAT.1, ASE_CCL.1, ADV_SPM.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
4.0 |
3.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-0966-2015 |
BSI-DSZ-CC-0880-2013 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0565-2009 |
BSI-DSZ-CC-0813-2012 |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-0966-2015 |
BSI-DSZ-CC-0880-2013 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0382-2007, BSI-DSZ-CC-0565-2009 |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0813-2012 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/protection_profiles |
{} |
d918b28fd7bb5d79 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0823a_pdf.pdf |
0769a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2, ASE_TSS.2, AVA_VAN.4 SOGIS Recognition Agreement for components up to EAL 4
- cc_version: Product specific Security Target Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0823-2014
- cert_item: genuscreen 4.0
- cert_lab: BSI
- developer: genua mbh
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
- DE:
- cert_id: BSI-DSZ-CC-0769-2012
- cert_item: STARCOS 3.5 ID ECC C1
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0565-2009: 3
- BSI-DSZ-CC-0823: 1
- BSI-DSZ-CC-0823-2014: 18
|
- DE:
- BSI-DSZ-CC-0769: 3
- BSI-DSZ-CC-0769-2012: 21
- BSI-DSZ-CC-0813: 1
- BSI-DSZ-CC-0813-2012: 3
- BSI-DSZ-CC-S-0004-2010: 1
- BSI-DSZ-CC-S-0007-2011: 1
- BSI-DSZ-CC-S-0008-2011: 1
- BSI-DSZ-CC-S-0009-2012: 1
- BSI-DSZ-CC-S-0010-2012: 1
- BSI-DSZ-CC-S-0012-2012: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059: 1
- BSI-CC-PP-0059-2009: 3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 17
- EAL 4 augmented: 3
- EAL 5: 9
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 4: 10
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
- EAL1: 6
- EAL2: 3
- EAL3: 4
- EAL4: 4
- EAL5: 6
- EAL6: 3
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 6
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 7
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 7
- AVA_VAN.5: 1
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.HANET: 3
- A.INIT: 3
- A.NOEVIL: 3
- A.PHYSEC: 4
- A.RANDOM: 4
- A.SINGEN: 3
- A.TIMESTMP: 2
- OE:
- OE.ADMIN: 1
- OE.HANET: 1
- OE.INIT: 1
- OE.NOEVIL: 1
- OE.PHYSEC: 1
- OE.RANDOM: 1
- OE.SINGEN: 1
- OE.TIMESTMP: 1
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 3
- Giesecke & Devrient: 24
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 4
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- fault injection: 1
- physical tampering: 1
- SCA:
- other:
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7138: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 32: 1
- AIS 34: 1
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- BSI:
- AIS 1: 2
- AIS 14: 2
- AIS 19: 2
- AIS 20: 3
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 3
- AIS 37: 2
- AIS 38: 2
- AIS36: 1
- FIPS:
- FIPS PUB 180-2: 2
- FIPS PUB 197: 1
- PKCS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Evaluation Technical Report BSI-DSZ-CC-0823 for genuscreen 4.0 from genua mbH of secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genucenter Installations- und Konfigurationshandbuch: 1
- OutOfScope:
- The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE. The Security Target [6] is the basis for this certification. It is not based on a: 1
- or Mobile Clients, L2TP VPN, LDAP Authentication, Dynamic Routing, and virtual genucenter are out of scope of the evaluated configuration. In general, all information contained in the Security Target [6: 1
- out of scope: 2
|
- ConfidentialDocument:
- STARCOS 3.5 ID ECC C1 Security Target, Version 1.6, 12.06.2012, Giesecke & Devrient GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0769, STARCOS 3.5 ID ECC C1 Security Target Lite, Version 1.7, 05: 1
- Version 1.3, Date: 23.07.2012, Evaluation Facility: SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile for Secure Signature Creation Device – Part 2: Device with Key Generation: 1
|
pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20120912074352+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Giesecke & Devrient GmbH, STARCOS 3.5 ID ECC C1"
- /ModDate: D:20120912074832+02'00'
- /Producer: LibreOffice 3.5
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0769-2012
- pdf_file_size_bytes: 1012887
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
pdf_data/st_filename |
0823b_pdf.pdf |
0769b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0035: 2
- BSI-CC-PP-0059: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 3
- EAL4 augmented: 1
|
- EAL:
- EAL 4: 4
- EAL 5: 2
- EAL4: 7
- EAL4 augmented: 4
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 4
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_IMP: 1
- ADV_IMP.1: 3
- ADV_INT: 2
- ADV_SPM: 2
- ADV_TAT.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 3
- AGD_PRE: 1
- AGD_PRE.1: 3
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_FLR: 1
- ALC_FLR.2: 3
- ALC_LCD: 1
- ALC_LCD.1: 2
- ALC_TAT: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 3
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.1: 2
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.2: 4
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 2
- ATE_FUN: 1
- ATE_FUN.1: 4
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 20
- FAU_GEN.1: 5
- FAU_GEN.2: 1
- FAU_SAR: 12
- FAU_SAR.1: 3
- FAU_SAR.3: 1
- FCS:
- FCS_CKM: 143
- FCS_CKM.1: 29
- FCS_CKM.4: 31
- FCS_COP: 100
- FCS_COP.1: 29
- FDP:
- FDP_IFC: 53
- FDP_IFC.1: 33
- FDP_IFF: 43
- FDP_IFF.1: 37
- FDP_ITT: 32
- FDP_ITT.1: 4
- FIA:
- FIA_ATD: 6
- FIA_ATD.1: 1
- FIA_SOS: 6
- FIA_SOS.1: 1
- FIA_UAU: 12
- FIA_UAU.2: 1
- FIA_UAU.6: 1
- FIA_UID: 6
- FIA_UID.1: 3
- FIA_UID.2: 2
- FMT:
- FMT_IFC.2: 2
- FMT_MOF: 6
- FMT_MOF.1: 1
- FMT_MSA: 166
- FMT_MSA.1: 26
- FMT_MSA.2: 4
- FMT_MSA.3: 18
- FMT_SMF: 49
- FMT_SMF.1: 22
- FMT_SMR: 8
- FMT_SMR.1: 26
- FPT:
- FPT_ITT: 8
- FPT_ITT.1: 3
- FPT_STM.1: 3
- FPT_TEE: 8
- FPT_TEE.1: 2
- FPT_TRC: 6
- FPT_TRC.1: 1
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FTP:
|
- FAU:
- FCS:
- FCS_CKM: 13
- FCS_CKM.1: 19
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 16
- FCS_COP: 10
- FCS_COP.1: 6
- FCS_COP.1.1: 2
- FCS_RND.1: 2
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 27
- FDP_ACC.1: 17
- FDP_ACF: 18
- FDP_ACF.1: 18
- FDP_DAU: 7
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_IFC.1: 11
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_ITT.1: 3
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FDP_SDI: 13
- FDP_SDI.1: 2
- FDP_SDI.2: 4
- FDP_UIT: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 4
- FIA_API.1: 17
- FIA_API.1.1: 3
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 4
- FMT_MSA.2: 6
- FMT_MSA.2.1: 1
- FMT_MSA.3: 16
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 7
- FMT_MSA.4.1: 1
- FMT_MTD: 12
- FMT_MTD.1: 2
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR.1: 23
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ITT.1: 3
- FPT_PHP.1: 9
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 2
- FPT_TST: 2
- FPT_TST.1: 14
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FPT_TST.3: 1
- FRU:
- FTP:
- FTP_ITC: 35
- FTP_ITC.1: 9
- FTP_ITC.1.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 4
- A.HANET: 5
- A.INIT: 4
- A.NOEVIL: 4
- A.PHYSEC: 4
- A.RANDOM: 4
- A.SINGEN: 5
- A.TIMESTMP: 4
- O:
- O.AUDREC: 5
- O.AUTH: 12
- O.AVAIL: 5
- O.CONFID: 13
- O.INTEG: 9
- O.MEDIAT: 4
- O.NOREPLAY: 13
- O.RS: 11
- OE:
- OE.ADMIN: 2
- OE.HANET: 5
- OE.INIT: 7
- OE.NOEVIL: 3
- OE.PHYSEC: 4
- OE.RANDOM: 3
- OE.SINGEN: 4
- OE.TIMESTMP: 5
- T:
- T.MEDIAT: 4
- T.MMODIFY: 4
- T.MODIFY: 4
- T.MSNIFF: 4
- T.NOAUTH: 4
- T.SELPRO: 4
- T.SNIFF: 4
|
|
pdf_data/st_keywords/vendor |
|
- GD:
- G&D: 6
- Giesecke & Devrient: 8
- Infineon:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP224r1: 3
- brainpoolP256r1: 8
- brainpoolP320r1: 8
- brainpoolP384r1: 8
- brainpoolP512r1: 8
- NIST:
- secp256r1: 8
- secp384r1: 8
- secp521r1: 8
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Malfunction: 7
- fault injection: 1
- physical tampering: 14
- SCA:
- DPA: 3
- Leak-Inherent: 6
- SPA: 2
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
- STARCOS:
- STARCOS: 1
- STARCOS 3: 108
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- PKCS:
- RFC:
- RFC2104: 7
- RFC2409: 9
- RFC2460: 2
- RFC2617: 1
- RFC2965: 1
- RFC3502: 1
- RFC3526: 5
- RFC3602: 1
- RFC4253: 6
- RFC4301: 1
- RFC4344: 1
- RFC4418: 7
- RFC4432: 1
- RFC5656: 7
|
- BSI:
- AIS 20: 1
- AIS 31: 2
- AIS20: 1
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS PUB 180-2: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 4
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- 1.4.8.7 Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE. 1.4.8.8 No virtual genucenter The genucenter must be operated on real hardware: 1
- out of scope: 4
- the genucenter in a virtual machine is out of scope for this TOE. 1.4.9 Physical Scope The physical scope of TOE consists only of software and: 1
- to perform cryptographic operations for IPsec operations. However, usage of the cryptocard is out of scope for this TOE. 1.4.8.2 No USB update The management system genucenter can write configuration: 1
- when the USB stick is plug into the firewall component. However, usage of the USB update is out of scope for this TOE. 1.4.8.3 No FTP and SIP Relays The product allows the configuration of FTP and SIP: 1
|
|
pdf_data/st_metadata |
- /Author: Roland Meister
- /CreationDate: D:20141023133113+02'00'
- /Creator: Writer
- /Keywords: CC 3.1
- /Producer: LibreOffice 4.1
- /Subject: Common Criteria
- /Title: genucreen 4.0 Security Target
- pdf_file_size_bytes: 657632
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 72
|
- /Author: Giesecke & Devrient GmbH
- /Category: M7820
- /Comments: Public
- /Company: Giesecke & Devrient
- /CreationDate: D:20120705144942+02'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Keywords: Version 1.7/05.07.12
- /Manager: Infineon
- /ModDate: D:20120705144944+02'00'
- /Producer: Acrobat Distiller 9.3.3 (Windows)
- /Subject: Security Target Lite STARCOS 3.5 ID ECC C1
- /Title: STARCOS 3.5 ID ECC C1
- pdf_file_size_bytes: 282111
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 86
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |