name |
EulerOS v2.0 build 3.10.0-327.59.59.46.h34.x86_64 |
MTCOS Pro 2.6 SSCD / P71D352 (N7121) |
category |
Operating Systems |
Products for Digital Signatures |
scheme |
ES |
DE |
status |
archived |
active |
not_valid_after |
06.04.2023 |
27.10.2028 |
not_valid_before |
06.04.2018 |
27.10.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-22-CCRA.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1211c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-22-INF-2257.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1211a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-22-ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1211b_pdf.pdf |
manufacturer |
Huawei Technologies Co. Ltd. |
MaskTech International GmbH |
manufacturer_web |
https://www.huawei.com |
https://www.masktech.de/ |
security_level |
{} |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
483be89f17178148 |
d50de8f311b752e5 |
heuristics/cert_id |
2017-22-INF-2257 |
BSI-DSZ-CC-1211-2023 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_IND.1, AVA_VAN.1, ASE_ECD.1, ASE_OBJ.1, ATE_FUN.1, AGD_PRE.1, ASE_INT.1, AGD_OPE.1, ALC_CMS.1, ALC_TSU_EXT.1, ATE_COV.1, ADV_FSP.1, ASE_SPD.1, ALC_CMC.1, ASE_REQ.1, ASE_CCL.1, ASE_TSS.1 |
ASE_INT.1, ASE_SPD.1, ASE_TSS.2, ASE_CCL.1, ALC_CMC.4, ALC_LCD.1, ATE_COV.2, ADV_FSP.5, ASE_REQ.2, ASE_OBJ.2, AGD_PRE.1, AVA_VAN.5, ALC_CMS.5, ATE_DPT.3, ALC_DEL.1, ADV_IMP.1, ADV_TDS.4, AGD_OPE.1, ASE_ECD.1, ATE_FUN.1, ALC_COMP.1, ALC_DVS.2, ALC_FLR.1, ALC_TAT.2, ADV_ARC.1, ADV_INT.2, ATE_IND.2 |
heuristics/extracted_versions |
3.10.0, 2.0, 327.59.59.46 |
2.6 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1147-V3-2023 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1136-V3-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1148-V3-2023, BSI-DSZ-CC-1147-V3-2023 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0995-2018, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-1034-2019, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1001-2018, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-1136-V2-2022, BSI-DSZ-CC-1136-2021, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0996-2018, BSI-DSZ-CC-1136-V3-2022 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
heuristics/protection_profiles |
1edd61e3f1f2ce0d |
4a814d0e3c9f9082, 27abdb9c6ab375a7, d918b28fd7bb5d79, 1f7ea2e05de5b88b, d9553e7194783182 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_os_v4.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf |
pdf_data/cert_filename |
2017-22-CCRA.pdf |
1211c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 2
- EAL 5 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei Technologies Co: 1
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180416164112+02'00'
- pdf_file_size_bytes: 756901
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH"
- /Subject: Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH
- /Title: Certificate BSI-DSZ-CC-1211-2023
- pdf_file_size_bytes: 231878
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
2017-22-INF-2257.pdf |
1211a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 valid until: 26 October 2028
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1211-2023
- cert_item: MTCOS Pro 2.6 SSCD / P71D352 (N7121
- cert_lab: BSI
- developer: MaskTech International GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: EN 419211-2:2013 (BSI-CC-PP-0059-2009-MA-02), EN 419211-3:2013 (BSI-CC-PP-0075-2012-MA-01), EN 419211-4:2013 (BSI-CC-PP-0071-2012-MA-01) EN 419211-5:2013 (BSI-CC-PP-0072-2012-MA-01), EN 419211-6:2014 (BSI-CC-PP-0076-2013-MA-01
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1036-2019: 3
- BSI-DSZ-CC-1064-2020-MA-01: 1
- BSI-DSZ-CC-1136-V3-2022: 10
- BSI-DSZ-CC-1136-V3-2022-MA-01: 2
- BSI-DSZ-CC-1211-2023: 18
- BSI-DSZ-CC-S-0181-2022: 1
- BSI-DSZ-CC-S-0207-: 1
- BSI-DSZ-CC-S-0232-2023: 1
- BSI-DSZ-CC-S-0233-2023: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0072-2012-MA-01: 1
- BSI-CC-PP- 0075-2012-MA-01: 1
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0056-v2-2012: 1
- BSI-CC-PP-0059-2009-MA-02: 3
- BSI-CC-PP-0068-V2-2011-MA01: 1
- BSI-CC-PP-0071-: 1
- BSI-CC-PP-0071-2012-MA-01: 3
- BSI-CC-PP-0072-2012-MA-01: 3
- BSI-CC-PP-0075-2012-MA-01: 3
- BSI-CC-PP-0076-2013-MA-01: 3
- BSI-CC-PP-0084-2014: 3
- BSI-CC-PP-0086-2015: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 1
- EAL 5: 8
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
- EAL6: 4
- EAL6 augmented: 3
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_FLR: 2
- ALC_TSU_EXT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.1: 1
- AVA:
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_FLR.1: 3
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM_EXT.3: 1
- FCS_COP.1: 4
- FCS_DTLS_EXT.1: 1
- FCS_RBG_EXT.1: 1
- FCS_STO_EXT.1: 1
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.2: 1
- FCS_TLSC_EXT.3: 1
- FCS_TLSC_EXT.4: 1
- FDP:
- FDP_ACF_EXT.1: 1
- FDP_IFC_EXT.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_UAU.5: 1
- FMT:
- FPT:
- FPT_ACF_EXT.1: 1
- FPT_ASLR_EXT.1: 1
- FPT_SBOP_EXT.1: 1
- FPT_SRP_EXT.1: 1
- FPT_TST_EXT.1: 1
- FPT_TUD_EXT.1: 1
- FPT_TUD_EXT.2: 1
- FTA:
- FTP:
- FTP_ITC_EXT.1: 2
- FTP_TRP.1: 1
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- OE:
- OE.PLATFORM: 1
- OE.PROPER_ADMIN: 1
- OE.PROPER_USER: 1
- T:
- T.LIMITED_PHYSICAL_ACC: 1
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
|
|
pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 3
- Infineon:
|
- NXP:
- NXP: 5
- NXP Semiconductors: 11
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102-1: 1
- BSI TR-03110: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 2
- AIS 25: 3
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 3
- AIS 37: 2
- AIS 38: 1
- AIS 46: 3
- AIS 47: 1
- AIS36: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- out of scope: 1
|
- ConfidentialDocument:
- 1.6, 20 October 2023, Evaluation Technical Report (ETR), SRC Security Research & Consulting GmbH (confidential document) [9] EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device: 1
- 2023, Configuration List of MTCOS Pro 2.6 SSCD / P71D352 (N7121), MaskTech International GmbH (confidential document) [19] User Guidance – MTCOS Pro 2.6 SSCD / P71D352 (N7121), Version 1.3, 30 August 2023, MaskTech: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- creation device with key generation, Version 0.1, 09 September 2022, MaskTech International GmbH (confidential document) 26 / 30 BSI-DSZ-CC-1211-2023 Certification Report C. Excerpts from the Criteria For the meaning: 1
- key generation and key import, MTCOS Pro 2.6 SSCD / P71D352 (N7121), MaskTech International GmbH (confidential document) 7 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20180416162833+02'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20180416162833+02'00'
- /Producer: Microsoft® Word 2013
- pdf_file_size_bytes: 641524
- pdf_hyperlinks: https://oc.ccn.cni.es/
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH"
- /Subject: Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH
- /Title: Certification Report BSI-DSZ-CC-1211-2023
- pdf_file_size_bytes: 433901
- pdf_hyperlinks: https://www.sogis.eu/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/AIS, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
pdf_data/st_filename |
2017-22-ST.pdf |
1211b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1136-V3-2022: 1
- BSI-DSZ-CC-1211: 2
- BSI-DSZ-CC-1211-2023: 1
- BSI-DSZ-CC-S-0207-2021: 1
- BSI-DSZ-CC-S-0214-2022: 1
- BSI-DSZ-CC-S-0232-2023: 1
- BSI-DSZ-CC-S-0233-2023: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0071: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0059: 1
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072: 1
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0075-MA-01: 1
- BSI-CC-PP-0076: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0084-2014: 2
- BSI-CC-PP-0086-2015: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5: 10
- EAL5 augmented: 6
- EAL6: 1
- EAL6 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_IMP.1: 3
- ADV_INT.2: 2
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 2
- ALC_DEL.1: 2
- ALC_DVS.2: 9
- ALC_FLR.1: 1
- ALC_LCD.1: 2
- ALC_TAT.2: 2
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.2: 3
- ASE_SPD.1: 3
- ASE_TSS.1: 3
- ASE_TSS.2: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 3
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 5
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM.2.1: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 30
- FCS_COP.1.1: 5
- FCS_DTLS_EXT.1: 1
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 3
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 5
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHC_EXT.1.2: 1
- FCS_SSHC_EXT.1.3: 1
- FCS_SSHC_EXT.1.4: 1
- FCS_SSHC_EXT.1.5: 1
- FCS_SSHC_EXT.1.6: 1
- FCS_SSHC_EXT.1.7: 1
- FCS_SSHC_EXT.1.8: 1
- FCS_SSHS_EXT: 1
- FCS_SSHS_EXT.1: 4
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 2
- FCS_SSH_EXT.1: 5
- FCS_SSH_EXT.1.1: 1
- FCS_STO_EXT: 1
- FCS_STO_EXT.1: 3
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT: 2
- FCS_TLSC_EXT.1: 5
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.2: 5
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSS_EXT.1.1: 1
- FDP:
- FDP_ACF_EXT: 1
- FDP_ACF_EXT.1: 3
- FDP_ACF_EXT.1.1: 1
- FDP_IFC_EXT: 1
- FDP_IFC_EXT.1: 3
- FDP_IFC_EXT.1.1: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 2
- FMT:
- FMT_MOF: 1
- FMT_MOF_EXT: 3
- FMT_MOF_EXT.1: 3
- FMT_MOF_EXT.1.1: 1
- FMT_SMF: 1
- FMT_SMF_EXT: 2
- FMT_SMF_EXT.1: 3
- FMT_SMF_EXT.1.1: 2
- FPT:
- FPT_ACF_EXT: 1
- FPT_ACF_EXT.1: 3
- FPT_ACF_EXT.1.1: 1
- FPT_ACF_EXT.1.2: 1
- FPT_ASLR_EXT: 1
- FPT_ASLR_EXT.1: 3
- FPT_ASLR_EXT.1.1: 1
- FPT_SBOP_EXT: 1
- FPT_SBOP_EXT.1: 3
- FPT_SBOP_EXT.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.2: 3
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FTP:
- FTP_ITC_EXT: 1
- FTP_ITC_EXT.1: 4
- FTP_ITC_EXT.1.1: 1
- FTP_TRP: 1
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM: 112
- FCS_CKM.1: 30
- FCS_CKM.2: 11
- FCS_CKM.4: 44
- FCS_CKM.4.1: 1
- FCS_COP: 141
- FCS_COP.1: 24
- FCS_COP.1.1: 1
- FCS_RND: 1
- FCS_RND.1: 13
- FCS_RND.1.1: 1
- FCS_RND.1.2: 1
- FCS_RNG: 3
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 77
- FDP_ACC.1: 36
- FDP_ACF: 36
- FDP_ACF.1: 36
- FDP_AFC: 18
- FDP_DAU: 10
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_IFC.1: 19
- FDP_ITC: 8
- FDP_ITC.1: 25
- FDP_ITC.2: 22
- FDP_ITT.1: 1
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FDP_SDC.1: 1
- FDP_SDI: 21
- FDP_SDI.1: 2
- FDP_SDI.2: 5
- FDP_UCT: 10
- FDP_UCT.1: 1
- FDP_UIT: 12
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 23
- FIA_AFL.1: 7
- FIA_API: 1
- FIA_API.1: 8
- FIA_API.1.1: 1
- FIA_UAU: 25
- FIA_UAU.1: 20
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 2
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 12
- FIA_UAU.6.1: 1
- FIA_UID.1: 21
- FIA_UID.1.1: 2
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 2
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA: 69
- FMT_MSA.1: 9
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 20
- FMT_MSA.4: 4
- FMT_MTD: 44
- FMT_MTD.1: 5
- FMT_SMF.1: 29
- FMT_SMF.1.1: 2
- FMT_SMR.1: 35
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 20
- FPT_EMS.1: 7
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_ITC: 1
- FPT_ITT.1: 1
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 40
- FTP_ITC.1: 16
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- O:
- O.ACCOUNTABILITY: 1
- O.INTEGRITY: 1
- O.MANAGEMENT: 1
- O.PROTECTED_COMMS: 1
- O.PROTECTED_STORAGE: 1
- OE:
- OE.PLATFORM: 1
- OE.PROPER_ADMIN: 1
- OE.PROPER_USER: 1
- T:
- T.LIMITED_PHYSICAL_ACCESS: 1
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
|
- A:
- A.CGA: 3
- A.CSP: 5
- A.SCA: 3
- O:
- O.AES: 1
- O.ECC: 1
- O.PUF: 1
- O.RND: 1
- O.RSA: 1
- O.SHA: 1
- O.TDES: 1
- OE:
- OE.CGA_TC_: 1
- OE.HID_VAD: 7
- OT:
- OT.EMSEC_: 1
- OT.TOE_TC_: 1
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 18
- Huawei Technologies Co: 5
- Infineon:
|
- NXP:
- NXP: 1
- NXP Semiconductors: 7
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 12
- TDEA: 1
- TDES: 5
- Triple-DES: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 2
- SHA-512: 2
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 8
- SHA-384: 3
- SHA-512: 4
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- PGP:
- SSH:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 47
- TLS 1.0: 1
- TLS 1.1: 3
- TLS 1.2: 3
- TLS1.0: 3
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 4
- P-384: 4
- P-521: 4
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 1
- fault injection: 2
- malfunction: 1
- physical tampering: 4
- SCA:
- Leak-Inherent: 1
- physical probing: 2
- side channel: 2
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-02102-1: 1
- BSI TR-03110: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 2
- FIPS 197: 1
- FIPS 198-2: 1
- FIPS PUB 186-4: 4
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-38F: 1
- NIST SP 800-56A: 1
- NIST SP 800-56B: 1
- NIST SP 800-57: 1
- NIST SP 800-90: 1
- SP 800-90A: 2
- RFC:
- RFC 2818: 1
- RFC 4251: 1
- RFC 4253: 3
- RFC 4366: 1
- RFC 4492: 8
- RFC 5246: 9
- RFC 5280: 3
- RFC 5289: 16
- RFC 5759: 1
- RFC 6125: 1
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 180-4: 1
- FIPS PUB 140-3: 1
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- ICAO:
- ISO:
- ISO/IEC 10116-2017: 1
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 7816: 2
- NIST:
- NIST SP 800-38B: 1
- NIST SP 800-56A: 1
- NIST SP 800-67: 1
- NIST SP 800-90A: 1
- PKCS:
- PKCS #1: 2
- PKCS #15: 1
- PKCS#1: 2
- PKCS#3: 1
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- out of scope: 2
|
|
pdf_data/st_metadata |
- /Author: Pro 4
- /Comments:
- /Company:
- /CreationDate: D:20171228151831+14'18'
- /Creator: WPS Office Community
- /Keywords:
- /ModDate: D:20171228151831+14'18'
- /Producer:
- /SourceModified: D:20171228151831+14'18'
- /Subject:
- /Title:
- /Trapped: False
- pdf_file_size_bytes: 784910
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 111
|
- /Author: MaskTech International GmbH
- /Keywords: Common Criteria, CC, Secure Signature Creation Device, SSCD, MTCOS, EAL 5+
- /Subject: Common Criteria Certification
- /Title: MTCOS Pro 2.6 SSCD / P71D352 (N7121)- Security Target lite
- pdf_file_size_bytes: 1200444
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 130
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |