name |
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)
|
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3)
|
category |
Other Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2021-10-27
|
2021-09-28
|
not_valid_after |
2026-10-27
|
2025-06-26
|
scheme |
DE
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181b_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible-anssi-cc-2020-65v2.pdf
|
status |
active
|
active
|
manufacturer |
Bundesdruckerei GmbH
|
THALES DIS FRANCE SA
|
manufacturer_web |
https://www.bundesdruckerei.de
|
https://www.thalesgroup.com/en/europe/france
|
security_level |
EAL3 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181a_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_65v2.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1181c_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2020-65v2.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile for Inspection Systems, Version 1.01', 'pp_eal': 'EAL3', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0064b_pdf.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
1d1da873337d138b0ce159c51f7fc3f45aea16dacbef34f16374d7f8dd3befeb
|
4cd0982b954a019eb3c343c539948aa268bca50a5e1b79de557393146da50220
|
state/cert/txt_hash |
161cdda16fc7ceeeece0cac20018bc62852a0dc306cef4c926c298d188e93699
|
0a56c1990efb616ab129cad19db0ced8506235cb7e0511dfe8713d97d01153c0
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
d3ea8b3a54f1a6190f13ab86f446e8b7e15be4eded087aa62a93c32ef1ae605e
|
8dd4c4edd973a7e452c641db48c8eb33354f85e05844f701c90561e1c43a694d
|
state/report/txt_hash |
16b19318b760c2523599b16c51cb8e6d75035a47f9e45dc109e05a5b4c3a2a94
|
7483bc89235d6fc41cffa0952905a7fa4ea415e2556190e4f0b0c48e132685ed
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
b5d8d8bd31c47186afa41397f8292f0505452c5fe1535badb9f14d7cf3633326
|
9ec9bc244cd2cdfa133da188f67f6302f7086acec87b2c453d19e5b906713150
|
state/st/txt_hash |
c1790a04de2ab290cfb648c47203c9abebed53098d5bfcc4ad767546369e112b
|
fe1f6fa6f2e466702df203929aa00510b8e554f774195f4ef29eddf064801fdb
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-1181-2021
|
ANSSI-CC-2020/65v2
|
heuristics/cert_lab |
BSI |
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
2.4.6, 1.3.28 |
3.0.5, 4.2.0, 2.3, 4.2 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1215-2023 |
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1161-2020 |
ANSSI-CC-2020/65 |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1215-2023 |
None
|
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1161-2020, BSI-DSZ-CC-1093, BSI-DSZ-CC-1125-2019 |
ANSSI-CC-2020/65 |
heuristics/scheme_data |
- cert_id:
BSI-DSZ-CC-1181-2021
- product:
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, …
- vendor:
Bundesdruckerei GmbH
- certification_date:
27.10.2021
- category:
Electronic ID documents
- url:
https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-Software_mit_Hardware/1181.html
- enhanced:
- product:
Bundesdruckerei Document Application with tamper-evident casing, Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0)
- applicant:
Bundesdruckerei GmbH
Kommandantenstraße 18
10969 Berlin
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL3
- protection_profile:
Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI)
- certification_date:
27.10.2021
- expiration_date:
26.10.2026
- entries:
frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-02 (Ausstellungsdatum / Certification Date 23.05.2022)', 'description': '"Rest of the terminal firmware (including the Operating System)"'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021-MA-01 (Ausstellungsdatum / Certification Date 09.03.2022)', 'description': 'Vers. 0) was changed due to an update of the Rest of the terminal firmware (including the Operating System). Configuration Management procedures required a change in the product identifier. Therefore the version number of the Firmware changed from 1.3.28 to 1.4.8. The changes also cover an minor update of the user guidance related to this version number.'}), frozendict({'id': 'BSI-DSZ-CC-1181-2021', 'description': 'Certificate'})
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181a_pdf.pdf?__blob=publicationFile&v=2
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181b_pdf.pdf?__blob=publicationFile&v=2
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1181c_pdf.pdf?__blob=publicationFile&v=2
- description:
The Target of Evaluation (TOE) is the Bundesdruckerei Document Application with tamper-evident casing 2.4.6.
The Document Application is running on a Document Management Terminal (DMT). It is used to read the German Passport (ePass), to read and update the electronic data of the German identification card (“Personalausweis (PA)”) and electronic resident permit (“elektronischer Aufenthaltstitel (eAT)”) as well as to verify the document’s authenticity and the integrity of its data.
The TOE is operated by governmental organisations, e.g. municipal office, police, government or other state approved agencies. The TOE is specifically applied in registration offices to allow card holders to verify that their ePass, PA or eAT is working correctly. In case of PA and eAT it is further possible to update the address information of the card holder, the card holder’s PIN for eID applications, and the community ID (“Gemeindeschlüssel”). In addition, the eID application functionality of the PA or eAT can be activated or deactivated. Additionally the TOE ensures secure communication to external control software and provides a tamper-evident enclosure.
Necessary protocols for the communication of the TOE with the electronic identity documents like the ePass, PA or eAT are described in [ICAO_9303], [TR-03110-1], [TR-03110-2], and [TR-03110-3].
- subcategory:
Software with hardware
|
None
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
None
|
BSI-DSZ-CC-1079-2018 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
None
|
BSI-DSZ-CC-1079-2018 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
1181c_pdf.pdf
|
certificat-anssi-cc-2020-65v2.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sar/ALC |
|
|
pdf_data/cert_keywords/cc_security_level/EAL |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
244679
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20211104084818+01'00'
- /Creator:
Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
- /ModDate:
D:20211108192831+01'00'
- /Producer:
LibreOffice 6.3
- /Subject: Bundesdruckerei Document Application withtamper-evident casing
- /Title:
Certification Report BSI-DSZ-CC-1181-2021
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
280367
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
- /CreationDate:
D:20211004103608+02'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20211004103608+02'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
pdf_data/cert_metadata//Author |
Bundesamt für Sicherheit in der Informationstechnik
|
|
pdf_data/cert_metadata//CreationDate |
D:20211104084818+01'00'
|
D:20211004103608+02'00'
|
pdf_data/cert_metadata//Creator |
Writer
|
PScript5.dll Version 5.2.2
|
pdf_data/cert_metadata//ModDate |
D:20211108192831+01'00'
|
D:20211004103608+02'00'
|
pdf_data/cert_metadata//Producer |
LibreOffice 6.3
|
Acrobat Distiller 11.0 (Windows)
|
pdf_data/cert_metadata//Title |
Certification Report BSI-DSZ-CC-1181-2021
|
|
pdf_data/cert_metadata/pdf_file_size_bytes |
244679
|
280367
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/cert_metadata/pdf_number_of_pages |
1
|
2
|
pdf_data/report_filename |
1181a_pdf.pdf
|
anssi-cc-2020_65v2.pdf
|
pdf_data/report_frontpage |
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-1181-2021
- cert_item:
Bundesdruckerei Document Application with tamper-evident casing Document Application Version 2.4.6; (Firmware Vers. 1.3.28, HW Vers. 0
- developer:
Bundesdruckerei GmbH
- cert_lab:
BSI
- ref_protection_profiles:
Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064- V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI
- cc_version:
PP conformant Common Criteria Part 2 extended
- cc_security_level:
Common Criteria Part 3 conformant EAL 3
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1181-2021:
15
- BSI-DSZ-CC-1161-:
1
- BSI-DSZ-CC-1161-2020:
2
- BSI-DSZ-CC-1181:
1
|
- DE:
- BSI-DSZ-CC-1079-2018-MA-01:
1
- FR:
- ANSSI-CC-2020/65v2:
2
- ANSSI-CC-2020/65:
3
|
pdf_data/report_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-1181-2021:
15
- BSI-DSZ-CC-1161-:
1
- BSI-DSZ-CC-1161-2020:
2
- BSI-DSZ-CC-1181:
1
|
- BSI-DSZ-CC-1079-2018-MA-01:
1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0064-:
1
- BSI-CC-PP-0064-V2-2018:
3
|
- BSI-CC-PP-0099-2017:
1
- BSI-PP-0099-2017:
1
- BSI-PP-0084-2014:
1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ADV |
|
- ADV_ARC:
1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_ARC |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC |
|
- ALC_DVS.2: 2
- ALC_FLR:
2
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
3
|
2
|
pdf_data/report_keywords/cc_sar/ATE |
|
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_IND |
5
|
1
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 3:
4
- EAL 2:
2
- EAL 1:
1
- EAL 4:
1
- EAL 2+:
1
|
- EAL:
- EAL 5:
3
- EAL2:
2
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
- ITSEC:
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 3:
4
- EAL 2: 2
- EAL 1:
1
- EAL 4: 1
- EAL 2+: 1
|
- EAL 5: 3
- EAL2: 2
- EAL7: 1
- EAL 1:
1
- EAL 3:
1
- EAL 7: 1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
4
|
1
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FIA:
- FIA_UAU.4:
1
- FIA_UAU.5:
1
- FIA_UAU.6:
1
- FIA_API.1:
1
- FIA_UAU.2:
1
- FIA_UID.2:
1
- FMT:
- FMT_SMR.1:
1
- FMT_SMF.1:
1
- FMT_MTD:
3
- FPT:
- FTP:
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- Evaluation Technical Report, Version 1, 2021-10-11, BSI-DSZ-CC-1181, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile for Document Management Terminal DMT-PP:
1
- Security (BSI) [9] Configuration list for the TOE, Version 1.37, 2021-09-29, Bundesdruckerei GmbH (confidential document) [10] Guidance documentation for the TOE, Version 1.195, 2021-09-17, VISOTEC® V- ÄNDERUNGSTERMINAL:
1
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_protocol/PACE/PACE |
8
|
2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
3
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA256:
10
- SHA384:
6
- SHA512:
1
- SHA224:
1
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework:
1
- javacard.filesystem:
1
- javacard.util:
1
- javacard.open:
1
- javacard.internal:
1
- javacard.ism:
1
- javacard.securemessaging:
1
- javacard.securemessaging.builde:
1
- javacard.securemessaging.intern:
1
- javacard.security:
1
- javacard.tlv:
1
- javacard.iasclassic:
1
- javacard.icao:
1
- javacard.mspnp:
1
- javacard.conformance:
1
- javacard.gpimage:
1
- javacardx:
- javacardx.apdu:
1
- javacardx.crypto:
2
- javacardx.gap:
1
- javacardx.gapplet:
1
- javacardx.biometry:
2
- javacardx.crypto.asymmetric.ecc:
1
- javacardx.crypto.asymmetric.rsa:
1
- javacardx.apdu.util:
1
- javacardx.biometry.biocfg:
1
- javacardx.gdp:
1
- org:
- com:
- com.gemalto.javacard.filesystem:
1
- com.gemalto.javacard.util:
1
- com.gemalto.javacardx.crypto:
1
- com.gemalto.javacard.open:
1
- com.gemalto.javacardx.gapplet:
1
- com.gemalto.javacard.ism:
1
- com.gemalto.javacard.securemessaging.builde:
1
- com.gemalto.javacard.securemessaging.intern:
1
- com.gemalto.javacard.security:
1
- com.gemalto.javacardx:
1
- com.gemalto.javacardx.biometry:
1
- com.gemalto.javacardx.crypto.asymmetric.rsa:
1
- com.gemalto.javacard.iasclassic:
1
- com.gemalto.moc.server:
1
- com.gemalto.javacard.mspnp:
1
- com.gemalto.javacardx.biometry.biocfg:
1
- com.gemalto.emvapi:
1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS186-2:
6
- FIPS180-4:
8
- FIPS PUB 46-3:
2
- FIPS 197:
8
- FIPS186-4:
1
- FIPS197:
1
- BSI:
- AIS 48:
1
- AIS 20:
1
- AIS 32:
1
- AIS 38:
1
- RFC:
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
- ISO/IEC 9797-:
2
- ISO/IEC 15946-:
6
- ICAO:
|
- BSI:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/report_keywords/standard_id/BSI |
- AIS 48:
1
- AIS 20:
1
- AIS 32:
1
- AIS 38:
1
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES |
2
|
1
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG:
1
- Gemalto:
- Microsoft:
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
789441
- pdf_is_encrypted:
False
- pdf_number_of_pages:
29
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20211105104643+01'00'
- /Creator:
Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, BDr, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
- /ModDate:
D:20211108154109+01'00'
- /Producer:
LibreOffice 6.3
- /Subject: Bundesdruckerei Document Application withtamper-evident casing
- /Title:
Certification Report BSI-DSZ-CC-1181-2021
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
|
- pdf_file_size_bytes:
349522
- pdf_is_encrypted:
False
- pdf_number_of_pages:
21
- /Author:
- /CreationDate:
D:20211004103519+02'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20211004103519+02'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
Bundesamt für Sicherheit in der Informationstechnik
|
|
pdf_data/report_metadata//CreationDate |
D:20211105104643+01'00'
|
D:20211004103519+02'00'
|
pdf_data/report_metadata//Creator |
Writer
|
PScript5.dll Version 5.2.2
|
pdf_data/report_metadata//ModDate |
D:20211108154109+01'00'
|
D:20211004103519+02'00'
|
pdf_data/report_metadata//Producer |
LibreOffice 6.3
|
Acrobat Distiller 11.0 (Windows)
|
pdf_data/report_metadata//Title |
Certification Report BSI-DSZ-CC-1181-2021
|
|
pdf_data/report_metadata/pdf_file_size_bytes |
789441
|
349522
|
pdf_data/report_metadata/pdf_hyperlinks |
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte |
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
29
|
21
|
pdf_data/st_filename |
1181b_pdf.pdf
|
cible-anssi-cc-2020-65v2.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH |
2
|
6
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA |
1
|
3
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH |
2
|
8
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
1
|
4
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1079-2018:
1
- BSI-DSZ-CC-1079-2018-MA-01:
1
- NL:
|
pdf_data/st_keywords/cc_cert_id/DE |
|
- BSI-DSZ-CC-1079-2018:
1
- BSI-DSZ-CC-1079-2018-MA-01:
1
|
pdf_data/st_keywords/cc_claims |
|
- D:
- D.APP_CODE:
6
- D.APP_C_DATA:
3
- D.APP_I_DATA:
5
- D.PIN:
4
- D.BIO:
1
- D.API_DATA:
3
- D.CRYPTO:
5
- D.JCS_CODE:
3
- D.JCS_DATA:
5
- D.SEC_DATA:
7
- O:
- O.SID:
13
- O.FIREWALL:
12
- O.GLOBAL_ARRAYS_CONFID:
9
- O.GLOBAL_ARRAYS_INTEG:
5
- O.NATIVE:
11
- O.OPERATE:
15
- O.REALLOCATION:
5
- O.RESOURCES:
9
- O.ALARM:
15
- O.CIPHER:
11
- O.RNG:
9
- O.KEY-MNGT:
7
- O.PIN-MNGT:
6
- O.TRANSACTION:
7
- O.BIO-MNGT:
7
- O.OBJ-DELETION:
4
- O.DELETION:
5
- O.LOAD:
10
- O.INSTALL:
8
- O.SCP:
32
- O.CARD-MANAGEMENT:
2
- O.PIN_MNGT:
1
- O.KEY_MNGT:
1
- O.CARD_MANAGEMENT:
17
- O.PIN-:
1
- O.RND:
3
- O.TDES:
1
- O.AES:
1
- O.APPLET:
28
- O.CODE_PKG:
7
- O.JAVAOBJECT:
66
- O.CODE_PCKG:
16
- O.OBJ_DELETION:
3
- T:
- T.CONFID-APPLI-DATA:
4
- T.CONFID-JCS-CODE:
4
- T.CONFID-JCS-DATA:
4
- T.INTEG-APPLI-CODE:
7
- T.INTEG-APPLI-DATA:
8
- T.INTEG-JCS-CODE:
3
- T.INTEG-JCS-DATA:
4
- T.SID:
8
- T.EXE-CODE:
8
- T.NATIVE:
4
- T.RESOURCES:
3
- T.DELETION:
3
- T.INSTALL:
4
- T.OBJ-DELETION:
4
- T.PHYSICAL:
4
- A:
- A.APPLET:
5
- A.DELETION:
4
- A.VERIFICATION:
4
- R:
- OT:
- OP:
- OP.ARRAY_ACCESS:
7
- OP.ARRAY_LENGTH:
3
- OP.ARRAY_AASTORE:
3
- OP.CREATE:
11
- OP.DELETE_APPLET:
6
- OP.DELETE_PCKG:
4
- OP.DELETE_PCKG_APPLET:
4
- OP.INSTANCE_FIELD:
6
- OP.INVK_VIRTUAL:
8
- OP.INVK_INTERFACE:
10
- OP.JAVA:
8
- OP.THROW:
7
- OP.TYPE_ACCESS:
7
- OP.PUT:
8
- OP.PUTFIELD:
1
- OP.PUTSTATIC:
1
- OE:
- OE.APPLET:
4
- OE.VERIFICATION:
25
- OE.CODE-EVIDENCE:
10
- OE.CODE_EVIDENCE:
1
- OE.CARD-MANAGEMENT:
1
- OSP:
- OSP.VERIFICATION:
4
- OSP.RNG:
1
- OSP.RND:
3
|
pdf_data/st_keywords/cc_claims/A |
|
- A.APPLET:
5
- A.DELETION:
4
- A.VERIFICATION:
4
|
pdf_data/st_keywords/cc_claims/OE |
|
- OE.APPLET:
4
- OE.VERIFICATION:
25
- OE.CODE-EVIDENCE:
10
- OE.CODE_EVIDENCE:
1
- OE.CARD-MANAGEMENT:
1
|
pdf_data/st_keywords/cc_claims/OSP |
|
- OSP.VERIFICATION: 4
- OSP.RNG:
1
- OSP.RND: 3
|
pdf_data/st_keywords/cc_claims/OSP/OSP.RNG |
4
|
1
|
pdf_data/st_keywords/cc_claims/R |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0064-V2-2018:
3
- BSI-CC-PP-0064-:
1
|
- BSI-CC-PP-0084-2014:
1
- BSI-CC-PP-0099-2017:
1
- BSI-CC-PP- 0068-V2-2011-MA-01:
1
- BSI-PP- 0055-2009:
1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_TDS.2:
1
- AGD:
- ALC:
- ALC_CMC.3:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_FUN.1:
1
- AVA:
- AVA_VAN.5:
2
- AVA_VAN.2:
1
- APE:
- ASE:
- ASE_CCL.1:
1
- ASE_INT.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
- ADV:
- ADV_ARC.1:
7
- ADV_TDS.1:
2
- ADV_TDS.4:
7
- ADV_IMP.1:
7
- ADV_TDS.3:
4
- ADV_INT.2:
1
- ADV_FSP.5:
4
- ADV_FSP.1:
1
- ADV_FSP.2:
2
- ADV_FSP.4:
2
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
- AGD:
- AGD_PRE:
2
- AGD_OPE:
2
- AGD_OPE.1:
7
- AGD_PRE.1:
6
- ALC:
- ALC_DVS.2:
7
- ALC_TAT.1:
2
- ALC_TAT.2:
3
- ALC_CMC.4:
1
- ALC_DVS.1:
2
- ALC_LCD.1:
3
- ALC_DEL.1:
1
- ATE:
- ATE_COV.2:
2
- ATE_FUN.1:
6
- ATE_COV.1:
2
- ATE_IND.2:
1
- ATE_DPT.1:
2
- ATE_DPT.3:
1
- AVA:
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_TDS.2: 1
|
- ADV_ARC.1:
7
- ADV_TDS.1: 2
- ADV_TDS.4: 7
- ADV_IMP.1: 7
- ADV_TDS.3: 4
- ADV_INT.2: 1
- ADV_FSP.5: 4
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
7
|
pdf_data/st_keywords/cc_sar/AGD |
|
- AGD_PRE: 2
- AGD_OPE: 2
- AGD_OPE.1:
7
- AGD_PRE.1: 6
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
1
|
7
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_CMC.3: 1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
|
- ALC_DVS.2: 7
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ALC_CMC.4: 1
- ALC_DVS.1: 2
- ALC_LCD.1:
3
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 |
1
|
3
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2:
1
- ATE_FUN.1:
1
|
- ATE_COV.2:
2
- ATE_FUN.1:
6
- ATE_COV.1: 2
- ATE_IND.2: 1
- ATE_DPT.1: 2
- ATE_DPT.3: 1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 |
1
|
2
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
6
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_VAN.5:
2
- AVA_VAN.2: 1
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 |
2
|
7
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL 3:
4
- EAL4+:
2
- EAL3:
1
|
- EAL 5+:
1
- EAL6:
1
- EAL6+:
1
- EAL5+:
1
- EAL5:
6
- EAL 6+:
1
- EAL6 augmented:
1
- EAL5 augmented:
2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
5
- FAU_GEN.1.1:
3
- FAU_GEN.1.2:
2
- FAU_GEN:
1
- FCS:
- FCS_RNG.1:
6
- FCS_COP:
29
- FCS_CKM:
13
- FCS_CKM.1:
15
- FCS_CKM.4:
5
- FCS_CKM.4.1:
1
- FCS_COP.1:
25
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_RNG:
3
- FDP:
- FDP_RIP.1:
4
- FDP_RIP.1.1:
1
- FIA:
- FIA_API.1:
6
- FIA_UAU.4:
5
- FIA_API:
1
- FIA_API.1.1:
1
- FIA_UAU.2:
6
- FIA_UAU.2.1:
1
- FIA_UAU.1:
3
- FIA_UAU.4.1:
1
- FIA_UAU.5:
4
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.6:
4
- FIA_UAU.6.1:
1
- FIA_UID.2:
6
- FIA_UID.2.1:
1
- FIA_UID.1:
2
- FMT:
- FMT_MTD:
22
- FMT_MTD.1:
5
- FMT_SMF.1:
7
- FMT_SMF.1.1:
1
- FMT_SMR.1:
5
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FTP:
- FTP_TRP:
4
- FTP_TRP.1:
3
- FTP_TRP.1.2:
1
|
- FAU:
- FAU_ARP.1:
16
- FAU_ARP.1.1:
1
- FAU_SAA.1:
2
- FCO:
- FCS:
- FCS_RNG:
18
- FCS_CKM:
46
- FCS_COP:
35
- FCS_RNG.1:
8
- FCS_RNG.1.1:
3
- FCS_RNG.1.2:
3
- FCS_CKM.1:
27
- FCS_CKM.1.1:
3
- FCS_CKM.4:
21
- FCS_CKM.4.1:
2
- FCS_COP.1:
24
- FCS_COP.1.1:
5
- FDP:
- FDP_ACF:
30
- FDP_ACC:
35
- FDP_ACC.2:
6
- FDP_ACF.1:
16
- FDP_IFC:
20
- FDP_IFC.1:
12
- FDP_IFF:
13
- FDP_IFF.1:
17
- FDP_RIP:
98
- FDP_RIP.1:
11
- FDP_ROL.1:
5
- FDP_ROL:
14
- FDP_SDI:
6
- FDP_SDI.2:
3
- FDP_ITC:
10
- FDP_ITC.2:
15
- FDP_IFC.2:
2
- FDP_UIT:
5
- FDP_UIT.1:
2
- FDP_ACC.1:
14
- FDP_ITC.1:
10
- FDP_RIP.1.1:
1
- FIA:
- FIA_AFL:
21
- FIA_ATD:
7
- FIA_ATD.1:
2
- FIA_UID:
33
- FIA_UID.2:
1
- FIA_USB:
6
- FIA_USB.1:
3
- FIA_UAU:
50
- FIA_UAU.1:
6
- FIA_UID.1:
18
- FIA_UAU.4:
1
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.4.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.6.1:
1
- FMT:
- FMT_LIM:
18
- FMT_LIM.1:
15
- FMT_LIM.2:
14
- FMT_LIM.1.1:
3
- FMT_LIM.2.1:
3
- FMT_MSA:
73
- FMT_MSA.1:
11
- FMT_MSA.2:
2
- FMT_MSA.3:
17
- FMT_SMR:
62
- FMT_SMR.1:
29
- FMT_SMF:
50
- FMT_SMF.1:
19
- FMT_MTD:
31
- FMT_MTD.1:
9
- FMT_MTD.3:
1
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
2
- FPR:
- FPR_UNO.1:
10
- FPR_UNO.1.1:
1
- FPR_UNO:
5
- FPT:
- FPT_EMS:
4
- FPT_TST:
7
- FPT_EMS.1:
12
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS:
34
- FPT_FLS.1:
14
- FPT_TDC.1:
7
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
1
- FPT_RCV:
12
- FPT_RCV.3:
7
- FPT_FLS.1.1:
2
- FPT_TST.1:
13
- FPT_PHP:
5
- FPT_PHP.3:
12
- FPT_RCV.4:
2
- FPT_ITT:
5
- FPT_ITT.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
- FTP:
- FTP_ITC:
14
- FTP_ITC.1:
5
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
2
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
5
- FAU_GEN.1.1:
3
- FAU_GEN.1.2:
2
- FAU_GEN:
1
|
- FAU_ARP.1:
16
- FAU_ARP.1.1:
1
- FAU_SAA.1:
2
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RNG.1:
6
- FCS_COP:
29
- FCS_CKM:
13
- FCS_CKM.1:
15
- FCS_CKM.4:
5
- FCS_CKM.4.1:
1
- FCS_COP.1:
25
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_RNG:
3
|
- FCS_RNG:
18
- FCS_CKM:
46
- FCS_COP:
35
- FCS_RNG.1:
8
- FCS_RNG.1.1:
3
- FCS_RNG.1.2:
3
- FCS_CKM.1:
27
- FCS_CKM.1.1: 3
- FCS_CKM.4:
21
- FCS_CKM.4.1:
2
- FCS_COP.1:
24
- FCS_COP.1.1: 5
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
13
|
46
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
15
|
27
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
5
|
21
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
29
|
35
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
25
|
24
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG |
3
|
18
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 |
6
|
8
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_RIP.1:
4
- FDP_RIP.1.1:
1
|
- FDP_ACF: 30
- FDP_ACC: 35
- FDP_ACC.2: 6
- FDP_ACF.1: 16
- FDP_IFC: 20
- FDP_IFC.1: 12
- FDP_IFF: 13
- FDP_IFF.1: 17
- FDP_RIP: 98
- FDP_RIP.1:
11
- FDP_ROL.1: 5
- FDP_ROL: 14
- FDP_SDI: 6
- FDP_SDI.2: 3
- FDP_ITC: 10
- FDP_ITC.2: 15
- FDP_IFC.2: 2
- FDP_UIT: 5
- FDP_UIT.1: 2
- FDP_ACC.1: 14
- FDP_ITC.1: 10
- FDP_RIP.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
4
|
11
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API.1: 6
- FIA_UAU.4:
5
- FIA_API: 1
- FIA_API.1.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.1:
3
- FIA_UAU.4.1:
1
- FIA_UAU.5: 4
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.6: 4
- FIA_UAU.6.1:
1
- FIA_UID.2:
6
- FIA_UID.2.1: 1
- FIA_UID.1:
2
|
- FIA_AFL: 21
- FIA_ATD: 7
- FIA_ATD.1: 2
- FIA_UID: 33
- FIA_UID.2:
1
- FIA_USB: 6
- FIA_USB.1: 3
- FIA_UAU: 50
- FIA_UAU.1:
6
- FIA_UID.1:
18
- FIA_UAU.4:
1
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.6.1:
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
3
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4 |
5
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
2
|
18
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 |
6
|
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MTD:
22
- FMT_MTD.1:
5
- FMT_SMF.1:
7
- FMT_SMF.1.1:
1
- FMT_SMR.1:
5
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_LIM: 18
- FMT_LIM.1: 15
- FMT_LIM.2: 14
- FMT_LIM.1.1: 3
- FMT_LIM.2.1: 3
- FMT_MSA: 73
- FMT_MSA.1: 11
- FMT_MSA.2: 2
- FMT_MSA.3: 17
- FMT_SMR: 62
- FMT_SMR.1:
29
- FMT_SMF: 50
- FMT_SMF.1:
19
- FMT_MTD:
31
- FMT_MTD.1:
9
- FMT_MTD.3: 1
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
22
|
31
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
5
|
9
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
7
|
19
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
5
|
29
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FPT |
|
- FPT_EMS: 4
- FPT_TST: 7
- FPT_EMS.1: 12
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 34
- FPT_FLS.1: 14
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_RCV: 12
- FPT_RCV.3: 7
- FPT_FLS.1.1: 2
- FPT_TST.1: 13
- FPT_PHP:
5
- FPT_PHP.3: 12
- FPT_RCV.4: 2
- FPT_ITT: 5
- FPT_ITT.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_PHP.3.1: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP |
4
|
5
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_TRP: 4
- FTP_TRP.1:
3
- FTP_TRP.1.2: 1
|
- FTP_ITC: 14
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1:
2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
3
|
2
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope:
1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are:
1
|
pdf_data/st_keywords/cipher_mode/CBC/CBC |
4
|
2
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_protocol/PACE/PACE |
27
|
162
|
pdf_data/st_keywords/crypto_scheme |
|
- MAC:
- KA:
- Key Agreement:
3
- Key agreement:
2
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
12
|
16
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256:
2
- P-384:
1
- NIST P-384:
1
- secp384r1:
3
- secp256r1:
1
- secp521r1:
1
- prime256v1:
2
- Brainpool:
- brainpoolP224r1:
1
- brainpoolP256r1:
2
- brainpoolP384r1:
2
- brainpoolP512r1:
2
|
|
pdf_data/st_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security:
1
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 |
7
|
4
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 |
2
|
2
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
- SHA-256:
5
- SHA-224:
2
- SHA-384:
2
- SHA-512:
2
- SHA256:
2
|
- SHA-224:
4
- SHA224: 3
- SHA256:
1
- SHA384: 1
- SHA512: 1
- SHA-256:
4
- SHA-512:
4
- SHA-384:
2
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 |
2
|
4
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 |
5
|
4
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 |
2
|
2
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 |
2
|
4
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 |
2
|
1
|
pdf_data/st_keywords/ic_data_group/EF |
- EF.DG1:
2
- EF.DG2: 1
- EF.DG3: 2
- EF.DG4: 2
- EF.DG5: 1
- EF.DG16:
2
- EF.DG13: 1
- EF.COM: 2
- EF.SOD: 2
|
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG1 |
2
|
6
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG16 |
2
|
6
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.security:
3
- javacard.framework:
3
- javacardx:
- javacardx.biometry:
1
- javacardx.crypto:
2
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2.2:
3
- Java Card 3.0.5:
5
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
25
|
32
|
pdf_data/st_keywords/side_channel_analysis |
|
- SCA:
- Leak-Inherent:
5
- physical probing:
6
- DPA:
2
- SPA:
1
- timing attacks:
1
- FI:
- physical tampering:
1
- Physical Tampering:
3
- malfunction:
8
- Malfunction:
9
- fault induction:
2
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
- physical tampering:
1
- Physical Tampering: 3
- malfunction: 8
- Malfunction: 9
- fault induction: 2
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
5
|
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4:
2
- FIPS186-4:
3
- FIPS180-4:
3
- FIPS186-2:
2
- FIPS197:
2
- FIPS 186-2:
1
- FIPS 186-4:
1
- FIPS PUB 197:
1
- BSI:
- RFC:
- ISO:
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
- ICAO:
|
- FIPS:
- FIPS180-2:
1
- FIPS197:
5
- FIPS 140-2:
3
- FIPS 46-3:
1
- FIPS 197:
1
- NIST:
- PKCS:
- BSI:
- ISO:
- ICAO:
- SCP:
- SCP01:
6
- SCP02:
6
- SCP03:
5
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 |
2
|
4
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS 180-4: 2
- FIPS186-4: 3
- FIPS180-4: 3
- FIPS186-2: 2
- FIPS197:
2
- FIPS 186-2: 1
- FIPS 186-4: 1
- FIPS PUB 197: 1
|
- FIPS180-2: 1
- FIPS197:
5
- FIPS 140-2: 3
- FIPS 46-3: 1
- FIPS 197: 1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS197 |
2
|
5
|
pdf_data/st_keywords/standard_id/ICAO/ICAO |
13
|
1
|
pdf_data/st_keywords/standard_id/ISO |
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
8
|
28
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
- TDEA: 1
- 3DES:
2
- TDES: 15
- Triple-DES:
3
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES |
4
|
2
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES |
4
|
3
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
1
|
20
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CMAC |
2
|
2
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/KMAC |
1
|
2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon:
15
- Infineon Technologies AG:
2
- Gemalto:
- Thales:
- Microsoft:
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Alexander Haferland
|
D1487827
|
pdf_data/st_metadata//CreationDate |
D:20210909141650+02'00'
|
D:20210505092700+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2016
|
Microsoft® Word 2013
|
pdf_data/st_metadata//Keywords |
CC, ST, Common Criteria, Security Target, Inspection System, PA, eAT, ePass
|
04-05-2021
|
pdf_data/st_metadata//ModDate |
D:20210909141650+02'00'
|
D:20210505092700+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2016
|
Microsoft® Word 2013
|
pdf_data/st_metadata//Subject |
Security Target
|
1.18
|
pdf_data/st_metadata//Title |
Bundesdruckerei Document Application Common Criteria Evaluation
|
MultiApp V4.2: JCS Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
1655411
|
2496334
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
92
|
157
|
dgst |
4be309edc35f4fe0
|
1412d1d9e0d553c1
|