Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IBM z/OS Version 2 Release 4
OCSI/CERT/ATS/03/2020/RC
AKIS GEZGIN_I v1.0.0.0 BAC Configuration with Active Authentication
21.0.03/TSE-CCCS-49
name IBM z/OS Version 2 Release 4 AKIS GEZGIN_I v1.0.0.0 BAC Configuration with Active Authentication
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme IT TR
status active archived
not_valid_after 13.01.2027 20.02.2021
not_valid_before 13.01.2022 21.02.2018
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_zos_v2r4_v1.0_en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKIS_GEZGIN_I_v1.0.0.0_BAC_with_Active_Authentication_CR_20180220.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_zos_v2r4_v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS%20GEZGiN_I%20BAC%20&%20AA%20Security%20Target%20Lite.pdf
manufacturer IBM Corporation TÜBİTAK BİLGEM UEKAE
manufacturer_web https://www.ibm.com https://www.uekae.tubitak.gov.tr
security_level ALC_FLR.3, EAL4+ EAL4+, ALC_DVS.2
dgst 48d125b90e370836 51bab7ff97ad0fb4
heuristics/cert_id OCSI/CERT/ATS/03/2020/RC 21.0.03/TSE-CCCS-49
heuristics/extracted_sars ADV_IMP.1, ADV_ARC.1, ADV_FSP.4, ATE_IND.2, AGD_PRE.1, AVA_VAN.3, ALC_CMC.4, AGD_OPE.1, ASE_REQ.2, ASE_ECD.1, ASE_OBJ.2, ASE_SPD.1, ALC_FLR.3, ATE_COV.2, ADV_TDS.3, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ATE_DPT.1, ALC_DVS.1, ALC_TAT.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1, ALC_CMS.4 ADV_IMP.1, ADV_ARC.1, ADV_FSP.4, ATE_IND.2, AGD_PRE.1, ALC_FLR.1, AVA_VAN.3, ALC_CMC.4, AGD_OPE.1, ASE_REQ.2, ASE_ECD.1, ALC_DVS.2, ATE_COV.2, ASE_OBJ.2, ASE_SPD.1, ADV_TDS.3, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ATE_DPT.1, ALC_TAT.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1, ALC_CMS.4
heuristics/extracted_versions 2, 4 1.0.0.0
heuristics/report_references/directly_referencing OCSI/CERT/ATS/01/2018/RC {}
heuristics/report_references/indirectly_referencing OCSI/CERT/ATS/01/2018/RC {}
heuristics/scheme_data
  • certification_date: 13.01.2022
  • level: EAL4+
  • report_link_en: https://www.ocsi.gov.it/documenti/certificazioni/ibm/zos/cr_zos_v2r4_v1.0_en.pdf
  • report_link_it: https://www.ocsi.gov.it/documenti/certificazioni/ibm/zos/rc_zos_v2r4_v1.0_it.pdf
  • supplier: IBM Corporation
  • target_link: https://www.ocsi.gov.it/documenti/certificazioni/ibm/zos/st_zos_v2r4_v1.3.pdf
  • title: IBM z/OS Version 2 Release 4
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0782-V4-2018
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0782-V4-2018
heuristics/protection_profiles {} 60455fc9564e2545
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf
pdf_data/report_filename cr_zos_v2r4_v1.0_en.pdf AKIS_GEZGIN_I_v1.0.0.0_BAC_with_Active_Authentication_CR_20180220.pdf
pdf_data/report_keywords/cc_cert_id
  • IT:
    • OCSI/CERT/ATS/01/2018/RC: 1
    • OCSI/CERT/ATS/03/2020/RC: 39
  • DE:
    • BSI-DSZ-CC-0782-V2-2015-RA-01: 1
  • TR:
    • 21.0.03/TSE-CCCS-49: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0067: 1
    • BSI-CC-PP-0067: 2
  • BSI:
    • BSI-CC-PP-0055: 1
    • BSI-PP-0035: 2
    • BSI-PP-0055: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL4: 6
    • EAL4 augmented: 1
    • EAL4+: 1
  • EAL:
    • EAL 4: 1
    • EAL 4+: 5
    • EAL 6+: 1
    • EAL2: 1
    • EAL4+: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 1
    • ALC_FLR.3: 7
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_TLSC_PLUS.1: 2
pdf_data/report_keywords/cc_claims
  • O:
    • O.J: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 1
    • Infineon Technologies: 2
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 6
  • TUBITAK-BILGEM:
    • TÜBİTAK BİLGEM: 7
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • TDES: 1
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 2
  • SSH:
    • SSH: 9
  • TLS:
    • TLS:
      • TLS: 9
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2018-0734: 1
    • CVE-2018-0735: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • side channel: 1
    • side channels: 1
  • FI:
    • DFA: 1
    • Malfunction: 2
    • Physical Tampering: 1
    • malfunction: 1
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 1
pdf_data/report_keywords/ic_data_group
  • EF:
    • EF.DG14: 1
    • EF.DG15: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 15408: 6
  • PKCS:
    • PKCS#11: 1
  • RFC:
    • RFC 4217: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ICAO:
    • ICAO: 5
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_metadata
  • /Author: OCSI
  • /CreationDate: D:20220113110444+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20220113110444+00'00'
  • /Title: Certification Report "IBM z/OS Version 2 Release 4"
  • pdf_file_size_bytes: 573171
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 39
  • /Author: Cengiz GÖREN
  • /CreationDate: D:20191213133215+03'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20191213133215+03'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 490817
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename st_zos_v2r4_v1.3.pdf AKiS GEZGiN_I BAC & AA Security Target Lite.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-V4-2018: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0067: 1
  • BSI:
    • BSI-CC-PP-0035-2007: 1
    • BSI-CC-PP-0055: 6
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-PP-0035: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 5
    • EAL4 augmented: 2
  • EAL:
    • EAL 6+: 1
    • EAL4: 8
    • EAL4 augmented: 2
    • EAL6: 3
    • EAL6+: 2
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 5
  • ALC:
    • ALC_DVS.2: 6
    • ALC_FLR.1: 1
  • APE:
    • APE_SRE: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 6
    • FAU_STG.3.1: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 16
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 9
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 3
    • FCS_CKM_EXT.4: 10
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP.1: 56
    • FCS_COP.1.1: 1
    • FCS_RBG_EXT.1: 8
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT: 8
    • FCS_SSHC_EXT.1: 6
    • FCS_SSHS_EXT: 7
    • FCS_SSHS_EXT.1: 6
    • FCS_SSH_EXT.1: 6
    • FCS_SSH_EXT.1.1: 1
    • FCS_STO_EXT.1: 7
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT: 3
    • FCS_TLSC_EXT.4: 7
    • FCS_TLSC_PLUS: 5
    • FCS_TLSC_PLUS.1: 12
    • FCS_TLSC_PLUS.1.1: 2
    • FCS_TLSC_PLUS.1.2: 2
    • FCS_TLSC_PLUS.1.3: 2
    • FCS_TLSC_PLUS.2: 12
    • FCS_TLSC_PLUS.2.1: 2
    • FCS_TLSC_PLUS.3: 12
    • FCS_TLSC_PLUS.3.1: 1
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 24
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ACF_EXT.1: 7
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC.1: 3
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP: 4
    • FDP_RIP.2: 9
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 11
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 11
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF_EXT: 1
    • FMT_MOF_EXT.1: 7
    • FMT_MSA.1: 27
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 24
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 1
    • FMT_SMF_EXT.1: 11
    • FMT_SMF_EXT.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ACF_EXT.1: 7
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT: 1
    • FPT_ASLR_EXT.1: 7
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.1: 8
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 8
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC_EXT.1: 8
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 4
    • FAU_SAS.1: 13
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM.1: 24
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 19
    • FCS_CKM.4.1: 1
    • FCS_COP: 54
    • FCS_COP.1: 6
    • FCS_RND: 5
    • FCS_RND.1: 16
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 2
    • FDP_ITC: 1
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_MSA.3: 1
    • FDP_UCT.1: 12
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 12
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 12
    • FIA_API.1: 7
    • FIA_SOS.2: 1
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 13
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 11
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 4
    • FMT_LIM.1: 19
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 18
    • FMT_LIM.2.1: 2
    • FMT_MSA.3: 1
    • FMT_MTD: 39
    • FMT_MTD.1: 4
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC.1: 3
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECT: 5
    • A.PEER: 7
    • A.PHYSICAL: 4
    • A.PLATFORM: 5
    • A.PROPER_ADMIN: 6
    • A.PROPER_USER: 5
  • O:
    • O.ACCOUNTABILITY: 12
    • O.AUDITING: 15
    • O.DISCRETIONARY: 13
    • O.IA: 21
    • O.IA_MULTIPLE: 1
    • O.INTEGRITY: 19
    • O.I_A: 1
    • O.MANAGEMENT: 25
    • O.PROTECTED_COMMS: 26
    • O.PROTECTED_STORAGE: 10
  • OE:
    • OE.PHYSICAL: 4
    • OE.PLATFORM: 4
    • OE.PROPER_ADMIN: 4
    • OE.PROPER_USER: 4
    • OE.RECOVER: 3
    • OE.REMOTE: 4
    • OE.TRUSTED: 6
  • T:
    • T.ACCESS: 20
    • T.IA: 13
    • T.LIMITED_PHYSICAL_ACCESS: 4
    • T.LOCAL_ATTACK: 3
    • T.NETWORK_ATTACK: 11
    • T.NETWORK_EAVESDROP: 5
  • OE:
    • OE.BAC-: 2
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 11
    • Infineon AG: 1
    • Infineon Technologies: 1
pdf_data/st_keywords/eval_facility
  • TUBITAK-BILGEM:
    • TÜBİTAK BİLGEM: 88
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 17
      • AES-256: 1
  • DES:
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 2
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • TDES: 2
    • DES:
      • DES: 9
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 17
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
  • ECC:
    • ECC:
      • ECC: 8
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DH:
      • Diffie-Hellman: 2
  • RSA:
    • RSA 2048: 2
    • RSA 4096: 2
    • RSA-2048: 1
    • RSA-4096: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-2: 6
      • SHA-256: 5
      • SHA-384: 2
      • SHA-512: 6
      • SHA256: 7
      • SHA384: 7
      • SHA512: 7
  • SHA:
    • SHA1:
      • SHA-1: 6
      • SHA1: 1
    • SHA2:
      • SHA-2: 10
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 9
  • MAC:
    • MAC: 5
  • MAC:
    • MAC: 7
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 14
    • IKEv1: 3
    • IKEv2: 10
  • IPsec:
    • IPsec: 6
  • SSH:
    • SSH: 63
    • SSHv2: 2
  • TLS:
    • SSL:
      • SSL: 22
    • TLS:
      • TLS: 54
      • TLS 1.2: 7
      • TLS 1.3: 7
      • TLS v1.2: 1
  • PACE:
    • PACE: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RBG: 1
  • TRNG:
    • TRNG: 1
  • RNG:
    • RNG: 6
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 7
  • XTS:
    • XTS: 1
  • CBC:
    • CBC: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 4
    • P-521: 4
    • secp256r1: 5
    • secp384r1: 6
    • secp521r1: 6
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 2
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • side channel: 1
    • side channels: 1
  • FI:
    • DFA: 5
    • Malfunction: 4
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 5
    • physical tampering: 2
  • SCA:
    • DPA: 6
    • SPA: 5
    • physical probing: 3
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 2006: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 13
    • EF.DG1: 23
    • EF.DG13: 2
    • EF.DG14: 2
    • EF.DG15: 4
    • EF.DG16: 23
    • EF.DG2: 4
    • EF.DG3: 3
    • EF.DG4: 2
    • EF.DG5: 3
    • EF.SOD: 12
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 3
    • FIPS 186-4: 1
    • FIPS PUB 140-2: 1
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 1
    • FIPS186-4: 19
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 2
  • PKCS:
    • PKCS #1: 1
    • PKCS #11: 2
    • PKCS#1: 2
    • PKCS#11: 6
  • RFC:
    • RFC 3602: 1
    • RFC 4252: 1
    • RFC2404: 4
    • RFC2407: 2
    • RFC2408: 2
    • RFC2409: 2
    • RFC2560: 3
    • RFC3602: 3
    • RFC4106: 5
    • RFC4109: 2
    • RFC4251: 3
    • RFC4252: 4
    • RFC4253: 6
    • RFC4301: 5
    • RFC4302: 2
    • RFC4303: 5
    • RFC4305: 2
    • RFC4307: 3
    • RFC4308: 3
    • RFC4718: 2
    • RFC4753: 2
    • RFC4754: 2
    • RFC4809: 2
    • RFC4835: 2
    • RFC4868: 4
    • RFC4869: 2
    • RFC4945: 2
    • RFC5246: 13
    • RFC5280: 6
    • RFC5288: 5
    • RFC5289: 17
    • RFC5647: 2
    • RFC5656: 2
    • RFC5759: 2
    • RFC5996: 3
    • RFC6125: 2
    • RFC8017: 10
    • RFC8446: 12
  • X509:
    • X.509: 10
    • x.509: 1
  • BSI:
    • AIS31: 3
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 197: 2
    • FIPS 46-3: 2
    • FIPS PUB 180-4: 1
  • ICAO:
    • ICAO: 9
  • ISO:
    • ISO/IEC 15946-1: 1
    • ISO/IEC 15946-2: 1
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-90: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 3447: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
  • OutOfScope:
    • out of scope: 2
    • target does not distinguish between the BIS, GIS and EIS because the Extended Access Control is out of scope. UNCLASSIFIED TÜBİTAK BİLGEM UEKAE eID Technologies AKIS GEZGIN_I BAC & AA Security Target Lite: 1
    • to the paper or the plastic card is achieved by physical and organizational security measures being out of scope of this ST. The physical scope of the TOE is composed of the IC dedicated software, the IC embedded: 1
pdf_data/st_metadata
  • /CreationDate: D:20200624163701+03'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20200624163701+03'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1644757
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 88
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different