| name |
Rambus PKE4 Core version 4.1 |
Akis Gezgin_N SAC&EAC Configuration v1.0.1.0 |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
NL |
TR |
| status |
active |
archived |
| not_valid_after |
11.12.2028 |
22.03.2024 |
| not_valid_before |
11.12.2023 |
22.03.2021 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0503107-CERT.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS_GEZGiN_N_SAC&EAC_cc.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0503107-CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS_GEZGiN_N_SAC&EAC_CR.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-LITE]%20Rambus_PKE4_Core_version_4.1_Security_Target_Lite_RevD.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS%20GEZGiN_N%20SAC%20&%20EAC%20Security%20Target%20Lite.pdf |
| manufacturer |
Rambus Inc. |
TÜBİTAK BİLGEM UEKAE |
| manufacturer_web |
https://www.rambus.com/ |
https://www.uekae.tubitak.gov.tr |
| security_level |
EAL4+, ATE_DPT.2, AVA_VAN.5, ALC_DVS.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
505cf4bb7f73e46d |
6cb9f17e70d5dc02 |
| heuristics/cert_id |
NSCIB-CC-0503107-CR |
21.0.03/TSE-CCCS-72 |
| heuristics/cert_lab |
|
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ALC_DVS.2, ATE_DPT.2, ASE_SPD.1, ATE_COV.2, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
ADV_TDS.3, ASE_CCL.1, AGD_COMP.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ADV_COMP.1, ASE_REQ.2, ADV_INT.2, ASE_COMP.1, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_FLR.1, ADV_IMP.1, ALC_LCD.1, ADV_FSP.4, ALC_DVS.2, ASE_SPD.1, ALC_COMP.1, ATE_COV.2, ASE_TSS.2, ATE_COMP.1, ALC_CMS.5, AVA_COMP.1, AGD_OPE.1, ALC_DEL.1, ADV_ARC.1, ALC_TAT.2 |
| heuristics/extracted_versions |
4.1 |
1.0.1.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
| heuristics/protection_profiles |
{} |
a33327d40f253f46 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
| pdf_data/cert_filename |
NSCIB-CC-0503107-CERT.pdf |
AKiS_GEZGiN_N_SAC&EAC_cc.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL7: 1
|
|
| pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_DVS.2: 1
- ALC_FLR.3: 2
- ATE:
- AVA:
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /Author: kruitr
- /CreationDate: D:20231220083238+01'00'
- /Creator: Bullzip PDF Printer (11.10.0.2761)
- /ModDate: D:20231220083308+01'00'
- /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
- /Title: Microsoft Word - NSCIB-CC-0503107-CERT.doc
- pdf_file_size_bytes: 266966
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Cem ERDİVAN
- /CreationDate: D:20210330120805+03'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20210330120805+03'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 152539
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
NSCIB-CC-0503107-CR.pdf |
AKiS_GEZGiN_N_SAC&EAC_CR.pdf |
| pdf_data/report_frontpage |
- NL:
- cert_id: NSCIB-CC-0503107-CR
- cert_item: PKE4 Core version 4.1
- cert_lab: SGS Brightsight B.V.
- developer: Rambus Inc
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0035: 1
- BSI-PP-0056-V2-2012: 1
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 6
- EAL4 augmented: 3
- EAL4+: 7
|
- EAL:
- EAL 4+: 1
- EAL 5: 1
- EAL 5+: 4
- EAL2: 1
- EAL5+: 1
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_COMP.1: 1
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COMP.1: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_COMP.1: 1
- AVA_VAN.5: 7
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 2
- SGS Brightsight: 2
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
- Curve:
- Edwards:
- NIST:
- NIST P-192: 2
- NIST P-224: 2
- NIST P-256: 2
- NIST P-384: 2
- NIST P-521: 2
- P-192: 2
- P-224: 2
- P-256: 2
- P-384: 2
- P-521: 2
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
- FI:
- DFA: 1
- Fault Injection: 1
- SCA:
- other:
- JIL: 2
- JIL-AAPS: 2
- JIL-AM: 2
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
- /Author: TSE KSDB
- /CreationDate: D:20210330120917+03'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20210330120917+03'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 649800
- pdf_hyperlinks: http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
| pdf_data/st_filename |
[ST-LITE] Rambus_PKE4_Core_version_4.1_Security_Target_Lite_RevD.pdf |
AKiS GEZGiN_N SAC & EAC Security Target Lite.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1136-V3-2022: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0084-2014: 2
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0056-V2-2012: 5
- BSI-CC-PP-0068-: 1
- BSI-CC-PP-0068-V2-2011: 2
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 10
- EAL4 augmented: 2
|
- EAL:
- EAL 5: 9
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 3
- EAL 6 augmented: 3
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 3
- ADV_FSP: 1
- ADV_FSP.4: 2
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_TDS.3: 3
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 2
- AGD_PRE: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_DPT.2: 7
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 5
- ADV_FSP.4: 1
- ADV_IMP.1: 8
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.2: 8
- ALC_FLR.1: 2
- ASE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 34
- FCS_CKM.1: 17
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.4: 28
- FCS_CKM.4.1: 1
- FCS_COP: 37
- FCS_COP.1: 16
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_IFC.1: 15
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 30
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 6
- FDP_ITT.1: 10
- FDP_ITT.1.1: 1
- FMT:
- FPT:
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_ITT.1: 10
- FPT_ITT.1.1: 1
- FRU:
- FRU_FLT.2: 11
- FRU_FLT.2.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 15
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 45
- FCS_CKM.1: 21
- FCS_CKM.2: 5
- FCS_CKM.4: 39
- FCS_CKM.4.1: 1
- FCS_COP: 87
- FCS_COP.1: 11
- FCS_RND: 6
- FCS_RND.1: 17
- FCS_RND.1.1: 1
- FCS_RNG: 3
- FDP:
- FDP_ACC: 26
- FDP_ACC.1: 11
- FDP_ACF: 26
- FDP_ACF.1: 23
- FDP_IFC.1: 5
- FDP_ITC: 1
- FDP_ITC.1: 16
- FDP_ITC.2: 16
- FDP_ITT.1: 1
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FDP_SDC.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 9
- FDP_UCT.1: 1
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 14
- FIA_AFL.1: 4
- FIA_API: 5
- FIA_API.1: 12
- FIA_API.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU: 65
- FIA_UAU.1: 6
- FIA_UAU.4: 1
- FIA_UAU.5: 2
- FIA_UAU.6: 2
- FIA_UID: 15
- FIA_UID.1: 6
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 23
- FMT_LIM.1.1: 2
- FMT_LIM.2: 22
- FMT_LIM.2.1: 2
- FMT_MSA: 2
- FMT_MSA.3: 6
- FMT_MTD: 90
- FMT_MTD.1: 13
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 46
- FMT_SMF.1.1: 1
- FMT_SMR: 23
- FMT_SMR.1: 24
- FPT:
- FPT_EMS: 3
- FPT_EMS.1: 19
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 16
- FPT_PHP.3.1: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 13
- FTP_ITC.1: 7
- FTP_TRP.1: 4
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 6
- NXP Semiconductors: 1
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 14
- AES128: 1
- AES192: 1
- AES256: 1
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 11
- Diffie-Hellman: 14
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 5
- SHA-384: 4
- SHA-512: 5
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- Curve:
- Edwards:
- NIST:
- NIST P-192: 6
- NIST P-224: 5
- NIST P-256: 6
- NIST P-384: 6
- NIST P-521: 6
- P-192: 6
- P-224: 5
- P-256: 6
- P-384: 6
- P-521: 6
|
- ANSSI:
- Brainpool:
- brainpoolP192r1: 1
- brainpoolP224r1: 4
- brainpoolP224t1: 3
- brainpoolP256r1: 5
- brainpoolP256t1: 3
- brainpoolP320r1: 4
- brainpoolP320t1: 3
- brainpoolP384r1: 5
- brainpoolP384t1: 3
- brainpoolP512r1: 5
- brainpoolP512t1: 3
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- Fault Injection: 1
- fault injection: 1
- malfunction: 1
- SCA:
- DPA: 3
- SPA: 1
- side channel: 1
- side-channel: 6
- template attacks: 1
|
- FI:
- DFA: 1
- Malfunction: 4
- Physical Tampering: 4
- fault injection: 1
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 5
- EF.CardAccess: 3
- EF.DG1: 15
- EF.DG11: 1
- EF.DG14: 17
- EF.DG16: 9
- EF.DG2: 2
- EF.DG3: 12
- EF.DG4: 13
- EF.DG5: 1
- EF.DG6: 1
- EF.DG7: 12
- EF.DG8: 12
- EF.DG9: 1
- EF.SOD: 6
|
| pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-0004: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 186-4: 6
- FIPS PUB 140-2: 1
- NIST:
- PKCS:
- RFC:
- RFC 5639: 5
- RFC 7748: 4
- RFC 8032: 5
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 197: 1
- FIPS PUB 197: 1
- ICAO:
- NIST:
- PKCS:
- PKCS #1: 1
- PKCS #15: 1
- PKCS #3: 1
- PKCS#1: 1
- PKCS#3: 2
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
- curves:
- SM2: 16
- X25519: 1
- X448: 1
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- 240 in [PP] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE 241 in [PP] This refinement refers to downloading of embedded software. This refinement: 1
- This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP] This refinement is applicable without any adjustments. Guidance documents: 1
- contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP] The ST redefines this refinement as follows. The Functional Specification: 1
- in [PP] This refinement is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP] This refinement is out of scope: 1
- mechanisms. 218 in [PP] This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP] This refinement is applicable without any adjustments. It must be: 1
- must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP] This refinement relates to physical testing. This refinement is out of: 1
- out of scope: 12
- out of scope for the TOE. AVA_VAN 245 in [PP] The ST redefines this refinement as follows. The vulnerability: 1
- related to the development and production of the TOE. ALC_CMS 199 in [PP] This refinement is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery: 1
- to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP] This refinement refers to features that do not provide functionality but: 1
- transitions of power save modes if provided by the TOE. 210 in [PP] This refinement in [PP] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP] This: 1
|
- OutOfScope:
- SHA-1. However, this algorithm is out of scope for the certification due to security considerations. The cryptographic functionality of the TOE: 2
- and the list of security mechanisms given in “ICAO Doc 9303” (please see [ 11 ]), this algorithm is out of scope for the certification as well. FCS_COP.1/SIG_GEN Cryptographic Operation - Signature generation: 1
- brainpoolP384r1, and brainpoolP512r1. In addition, RSA key lengths under 1976 bits are out of scope for the certification. FCS_CKM.1/CA Cryptographic Key Generation - Diffie-Hellman for Chip: 1
- considerations and BSI and SOGIS recommendations (please see [ 31 ] and [ 32 ]), this algorithm is out of scope for the certification as well. FCS_COP.1/CA_MAC Cryptographic Operation - MAC for CA protocol: 1
- out of scope: 9
- paper or the plastic card is achieved by physical and organizational security measures which are out of scope of this ST. The physical scope of the TOE is composed of the IC dedicated software, the IC embedded: 1
- please see [ 11 ]), this algorithm is out of scope for the certification as well: 1
- please see [ 31 ] and [ 32 ]), this algorithm is out of scope for the certification as well: 1
- the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. Application Note 6: The cryptographic functionality of the TOE includes hash: 1
- the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. Application Note 8: The cryptographic functionality of the TOE includes hash: 1
- the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. FCS_CKM.4 Cryptographic Key Destruction Hierarchical to: No other components: 1
|
| pdf_data/st_metadata |
|
- /Author: Ali YILDIRIM
- /CreationDate: D:20240219152217+03'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20240219152217+03'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 2020528
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 128
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |