Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
JISEC-CC-CRP-C0514
MTCOS Smart Tachograph V2 / SLE78CFX4000P
BSI-DSZ-CC-1088-2022
name Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z) MTCOS Smart Tachograph V2 / SLE78CFX4000P
category Access Control Devices and Systems Other Devices and Systems
scheme JP DE
status archived active
not_valid_after 06.06.2021 03.06.2027
not_valid_before 06.06.2016 03.06.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1088c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1088a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1088b_pdf.pdf
manufacturer Hitachi, Ltd. MaskTech International GmbH
manufacturer_web https://www.hitachi.com/ https://www.masktech.de/
security_level EAL2+, ALC_FLR.1 EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.2
dgst 4b794daffbae517d 89245415f575b632
heuristics/cert_id JISEC-CC-CRP-C0514 BSI-DSZ-CC-1088-2022
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ALC_FLR.1, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ALC_FLR.1, AVA_VAN.2, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ALC_DVS.2, ATE_DPT.2, ASE_SPD.1, ATE_COV.2, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1
heuristics/extracted_versions 00, 80, 01, 25 -
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0514
  • certification_date: 01.06.2016
  • claim: EAL2+ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0514_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
    • product_type: Control Program for storage system
    • report_link: https://www.ipa.go.jp/en/security/c0514_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0514_est.pdf
    • toe_version: 80-01-25-00/00(R8-01A-06_Z)
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.07.2021
  • supplier: Hitachi, Ltd.
  • toe_japan_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0514_it4504.html
  • toe_overseas_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program80-01-25-00/00(R8-01A-06_Z)
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0782-V5-2020
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0782-V5-2020
heuristics/protection_profiles {} d9ddf0d150631fef
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0091b_pdf.pdf
pdf_data/cert_filename 1088c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1088-2022: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0091-2017: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • ATE:
    • ATE_DPT.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20220613083859+02'00'
  • /Creator: Writer
  • /Keywords: Common Criteria, Certification, Zertifizierung, Tachograph Card
  • /ModDate: D:20220613084333+02'00'
  • /Producer: LibreOffice 6.3
  • /Subject: Common Criteria Certification
  • /Title: Certificate BSI-DSZ-CC-1088-2022
  • pdf_file_size_bytes: 254122
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0514_erpt.pdf 1088a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1088-2022
    • cert_item: MTCOS Smart Tachograph V2 / SLE78CFX4000P
    • cert_lab: BSI
    • developer: MaskTech International GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Digital Tachograph - Tachograph Card (TC PP) Version 1.0, 19 May 2017, BSI-CC-PP-0091-2017
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0514-01: 1
    • Certification No. C0514: 1
  • DE:
    • BSI-DSZ-CC-1088-2022: 20
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0091: 1
    • BSI-CC-PP-0091-2017: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL 5: 4
    • EAL 5+: 1
    • EAL 6: 2
    • EAL 6 augmented: 1
    • EAL5+: 1
    • EAL6: 3
    • EAL6 augmented: 2
    • EAL6+: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 4
  • ADV:
    • ADV_ARC: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_DPT.2: 4
  • AVA:
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.CONNECT_STORAGE: 1
    • A.EXTERNAL_SERVER: 1
    • A.MAINTENCE_PC: 1
    • A.MANAGEMENT_PC: 1
    • A.MANAGE_SECRET: 1
    • A.NOEVIL: 1
    • A.PHYSICAL_SEC: 1
  • T:
    • T.CHG_CONFIG: 1
    • T.HDD_REUSE: 1
    • T.HDD_THEFT: 1
    • T.LP_LEAK: 1
    • T.TSF_COMP: 1
  • OE:
    • OE.EOL: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 6
    • Infineon Technologies AG: 11
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 3
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 8
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • NIST P-256: 1
    • NIST P-384: 1
    • NIST P-521: 1
    • P-256: 1
    • P-384: 1
    • P-521: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
  • Infineon:
    • v1.02.013: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 6
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 3
    • AIS 25: 4
    • AIS 26: 4
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 4
    • AIS 35: 2
    • AIS 36: 4
    • AIS 37: 3
    • AIS 38: 1
    • AIS 46: 3
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 7816: 2
  • RFC:
    • RFC 5480: 1
    • RFC 5639: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Criteria CCv3.1 EAL6 augmented (EAL6+), Version 4.1, 21 October 2020, Infineon Technologies AG (confidential document) Security Target Lite BSI-DSZ-CC-0782-V5, Security Target Lite M7892 B11 Recertification Common: 1
    • Digital Tachograph – Tachograph Card, Version 1.0, 10 March 2022, MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1088-2022, Security Target lite – MTCOS Smart Tachograph V2 : 1
    • Tachograph V2 / SLE78CFX4000P, Version 1.5, 12 May 2022, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-1088-2022, Configuration List – MTCOS Smart Tachograph V2 : 1
    • Version 0.6, 10 May 2022, MaskTech International GmbH (confidential document) [11] User Guidance BSI-DSZ-CC-1088-2022, User Guidance – MTCOS Smart Tachograph V2 / SLE78CFX4000P: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • for Composite Evaluation (ETR COMP), BSI-DSZ-CC- 0782-V5, Version 5, TÜV Informationstechnik GmbH (confidential document) [15] COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 of 18 March 2016 implementing Regulation (EU: 1
pdf_data/report_metadata
  • /CreationDate: D:20160906162354+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160906162432+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 473024
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 41
pdf_data/st_filename c0514_est.pdf 1088b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-V5-2020: 1
    • BSI-DSZ-CC-1088: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035-2007: 2
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0091-2017: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 3
  • EAL:
    • EAL4: 15
    • EAL4 augmented: 5
    • EAL6: 2
    • EAL6 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 11
    • ALC_FLR.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 3
    • ASE_REQ.2: 3
    • ASE_SPD.1: 3
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 11
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 11
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 18
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 10
    • FAU_STG.3.1: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 2
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 19
    • FIA_ATD.1: 6
    • FIA_SOS: 20
    • FIA_SOS.1: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 18
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 18
    • FIA_UID.2.1: 1
    • FIA_USB: 19
    • FIA_USB.1: 6
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 10
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM: 1
    • FPT_STM.1: 13
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 9
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP.1: 9
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 3
    • FAU_SAA.1: 8
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO.1: 12
    • FCO_NRO.1.1: 1
    • FCO_NRO.1.2: 1
    • FCO_NRO.1.3: 1
  • FCS:
    • FCS_CKM: 105
    • FCS_CKM.1: 30
    • FCS_CKM.2: 10
    • FCS_CKM.4: 29
    • FCS_COP: 79
    • FCS_COP.1: 20
    • FCS_RNG: 5
    • FCS_RNG.1: 17
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 26
    • FDP_ACC.1: 11
    • FDP_ACC.2: 8
    • FDP_ACF: 23
    • FDP_ACF.1: 16
    • FDP_DAU.1: 12
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 6
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 8
    • FDP_ITC.1: 39
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 41
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_ITT.1: 1
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 2
    • FDP_SDI.2: 14
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL: 23
    • FIA_AFL.1: 8
    • FIA_ATD: 14
    • FIA_ATD.1: 8
    • FIA_SOS.2: 1
    • FIA_UAU: 20
    • FIA_UAU.1: 14
    • FIA_UAU.3: 12
    • FIA_UAU.3.1: 1
    • FIA_UAU.3.2: 1
    • FIA_UAU.4: 8
    • FIA_UAU.4.1: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
    • FIA_USB: 13
    • FIA_USB.1: 7
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 8
    • FMT_SMF.1: 1
  • FPR:
    • FPR_UNO.1: 12
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 18
    • FPT_EMS.1.1: 2
    • FPT_EMS.1.2: 2
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_ITC.1: 1
    • FPT_PHP.3: 14
    • FPT_PHP.3.1: 1
    • FPT_TDC: 18
    • FPT_TDC.1: 8
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 16
    • FTP_ITC.1: 9
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECT_STORAGE: 3
    • A.EXTERNAL_SERVER: 3
    • A.MAINTENANCE_PC: 3
    • A.MANAGEMENT_PC: 3
    • A.MANAGE_SECRET: 3
    • A.NOEVIL: 3
    • A.PHYSICAL_SEC: 3
  • O:
    • O.ADM_AUTH: 8
    • O.ADM_ROLE: 5
    • O.AUD_GEN: 7
    • O.HDD_: 2
    • O.HDD_ENC: 6
    • O.HDD_SHRED: 3
    • O.HOST_ACCESS: 8
    • O.SEC_COMM: 8
    • O.SWITCH_AUTH: 6
  • OE:
    • OE.CONNECT_STORAGE: 2
    • OE.EXTERNAL_SERVER: 3
    • OE.FC-: 1
    • OE.FC-SP_HBA: 2
    • OE.HDD_ENC: 2
    • OE.MAINTENANCE_PC: 3
    • OE.MANAGEMENT_PC: 2
    • OE.MANAGE_SECRET: 3
    • OE.NOEVIL: 2
    • OE.PHYSICAL_SEC: 3
  • T:
    • T.CHG_CONFIG: 3
    • T.HDD_REUSE: 3
    • T.HDD_THEFT: 3
    • T.LP_LEAK: 3
    • T.TSF_COMP: 3
  • O:
    • O.RND: 1
  • OE:
    • OE.EOL: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Infineon:
    • Infineon: 4
    • Infineon Technologies AG: 6
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 1
  • AES_competition:
    • AES:
      • AES: 40
  • DES:
    • 3DES:
      • 3DES: 5
      • TDEA: 1
      • TDES: 17
    • DES:
      • DES: 6
  • constructions:
    • MAC:
      • CMAC: 10
      • HMAC: 2
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 512: 1
  • ECC:
    • ECC:
      • ECC: 14
    • ECDH:
      • ECDH: 5
    • ECDSA:
      • ECDSA: 11
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
  • SHA:
    • SHA1:
      • SHA-1: 10
    • SHA2:
      • SHA-2: 7
      • SHA-224: 1
      • SHA-256: 7
      • SHA-384: 3
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 8
    • TLS:
      • TLS: 2
      • TLSv1.0: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 7
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 4
    • brainpoolP384r1: 1
    • brainpoolP512r1: 4
  • NIST:
    • NIST P-256: 1
    • NIST P-384: 1
    • NIST P-521: 1
    • P-256: 1
    • P-384: 1
    • P-521: 1
    • secp256r1: 4
    • secp384r1: 1
    • secp521r1: 4
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • malfunction: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 1
    • SPA: 1
    • physical probing: 5
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS PUB 180-2: 1
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 1
  • RFC:
    • RFC2865: 2
  • BSI:
    • AIS 31: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS 180-1: 2
    • FIPS 46-3: 1
    • FIPS PUB 180-4: 1
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 10116-2017: 1
    • ISO/IEC 10373: 2
    • ISO/IEC 19790:2012: 1
    • ISO/IEC 7810: 2
    • ISO/IEC 7816: 4
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-38B: 1
    • NIST SP 800-67: 1
    • NIST SP 800-90A: 1
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 5480: 1
    • RFC 5639: 1
    • RFC 5869: 1
    • RFC 8017: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • A.3. RSA Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU.PK (conditional, possibly multiple) VU: 1
    • A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory 94 Key Symbol Description Purpose Type: 1
    • A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory EUR.PK (previous) (conditional; only: 1
    • DSRC channel AES Generated by ERCA Note: Workshop and control cards may contain up to 3 KMDSRC keys Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory: 1
    • ECC Generated by MSCA; obtained by card in MSCA_VU-EGF cer- tificate during mutual authen- tication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.4: Second-generation asymmetric: 1
    • EUR.C as part of the EUR.Link.C; obtained by card during mutual authentication towards such a VU. Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU_MA.PK (conditional, possibly multiple: 1
    • Out of scope: 11
    • by VU or VU man- ufacturer; obtained by card in VU certificate during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MS.PK (conditional, possibly multiple: 1
    • by VU or VU man- ufacturer; obtained by card in VU_MA certificate during mu- tual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MSCA_VU- EGF.PK (conditional, possibly: 1
    • foreign) MSCA; obtained by card in MS certifi- cate presented by a VU during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.1: First-generation asymmetric: 1
    • inserted in card by card manufacturer. Note: See [REG_2016/799] An- nex 1C, Appendix 11, CSM_105. Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory: 1
    • section 12.2, a workshop card may contain up to three keys KM-WC (of consecutive key generations). Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory: 1
pdf_data/st_metadata
  • /Author: 八木
  • /CreationDate: D:20160901154400+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160901154400+09'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: CC EAL2 Security Target
  • /Title: USP_V ST
  • pdf_file_size_bytes: 1477873
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
  • /Author: MaskTech International GmbH
  • /CreationDate: D:20220406102943+02'00'
  • /Creator: LaTeX with hyperref
  • /Keywords: Common Criteria, CC, Digital Tachograph – Tachograph Card, MTCOS, EAL 4+
  • /ModDate: D:20220406102943+02'00'
  • /PTEX.Fullbanner: This is pdfTeX, Version 3.14159265-2.6-1.40.20 (TeX Live 2019/Cygwin) kpathsea version 6.3.1
  • /Producer: pdfTeX-1.40.20
  • /Subject: Common Criteria Certification
  • /Title: MTCOS Smart Tachograph V2 / SLE78CFX4000P- Security Target lite
  • /Trapped: /False
  • pdf_file_size_bytes: 487471
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 102
state/cert/convert_garbage None False
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/convert_garbage None False
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_garbage None False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different