Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series
None
STARCOS 3.5 ID SAC+EAC+AA C1
BSI-DSZ-CC-0819-2012
name RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series STARCOS 3.5 ID SAC+EAC+AA C1
category Boundary Protection Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme TR DE
not_valid_after 27.03.2017 01.09.2019
not_valid_before 15.03.2013 24.07.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20CERTIFICATION%20REPORT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0819a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20ST-%20v0.9.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0819b_pdf.pdf
manufacturer RIOREY Incorporated G+D Mobile Security GmbH
manufacturer_web https://www.riorey.com/ https://www.gi-de.com/de/de/mobile-security/
security_level EAL4+, ALC_FLR.1 EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5
dgst 53265b9d283d6074 20308cf70a36d288
heuristics/cert_id BSI-DSZ-CC-0819-2012
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ASE_SPD.1, ATE_DPT.2, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ADV_FSP.6, ALC_TAT.3, ALC_FLR.3, ATE_FUN.2, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, APE_OBJ.2, ASE_CCL.1, ADV_TDS.6, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions - 3.5
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0922-2014
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0813-2012
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0922-2014
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0813-2012
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012
pdf_data/report_filename RioRey CERTIFICATION REPORT.pdf 0819a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0819-2012
    • cert_item: STARCOS 3.5 ID SAC+EAC+AA C1
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0813: 1
    • BSI-DSZ-CC-0813-2012: 3
    • BSI-DSZ-CC-0819: 1
    • BSI-DSZ-CC-0819-2012: 21
    • BSI-DSZ-CC-S-0004-2010: 1
    • BSI-DSZ-CC-S-0007-2011: 1
    • BSI-DSZ-CC-S-0008-2011: 1
    • BSI-DSZ-CC-S-0009-2012: 1
    • BSI-DSZ-CC-S-0010-2012: 1
    • BSI-DSZ-CC-S-0012-2012: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012: 5
    • BSI-CC-PP-0068-V2-2011: 5
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4+: 5
    • EAL4: 1
    • EAL4+: 1
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 3
    • EAL 5: 1
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 8
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 6
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FRU:
    • FRU_DDOS_EXT.1: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_COP: 5
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
pdf_data/report_keywords/vendor
  • GD:
    • G&D: 1
    • Giesecke & Devrient: 13
  • Infineon:
    • Infineon: 1
    • Infineon Technologies: 2
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 3
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • TDES: 2
  • constructions:
    • MAC:
      • CMAC: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 5
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 10
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 2
    • physical tampering: 1
  • SCA:
    • side channel: 2
  • other:
    • JIL: 5
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS: 1
    • STARCOS 15: 1
    • STARCOS 3: 35
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • BSI:
    • AIS 20: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 3
    • AIS 36: 2
    • AIS 38: 1
    • AIS36: 1
  • FIPS:
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • ICAO:
    • ICAO: 14
  • ISO:
    • ISO/IEC 9797-1: 3
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • STARCOS 3.5 ID SAC+EAC+AA C1 Security Target, Giesecke & Devrient GmbH, Version 2.2, 10.07.2012 (confidential document) [7] Security Target BSI-DSZ-CC-0819-2012, STARCOS 3.5 ID SAC+EAC+AA C1 Security Target Lite: 1
    • Version 1.1, Date: 11.07.2012, Evaluation Facility: SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile Electronic Passport using Standard Inspection Procedure with PACE: 1
    • to AIS36, M7820 A11, BSI-DSZ-CC-0813, Version 1, 1 June 2012, TÜV Informationstechnik GmbH (confidential document) 22 / 36 BSI-DSZ-CC-0819-2012 Certification Report C Excerpts from the Criteria CC Part1: 1
pdf_data/report_metadata
  • /Author: Tse
  • /CreationDate: D:20130318153433-04'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130318153433-04'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 1
  • pdf_file_size_bytes: 511380
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20130820134044+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, STARCOS 3.5 ID SAC+EAC+AA C1, Giesecke & Devrient GmbH"
  • /ModDate: D:20130820134336+02'00'
  • /Producer: LibreOffice 3.6
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0819-2012
  • pdf_file_size_bytes: 1002013
  • pdf_hyperlinks: https://www.bsi.bund.dea/, https://www.bsi.bund.de/zertifizierung
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename RioRey ST- v0.9.pdf 0819b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0813-2012: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0056-V2-2012: 1
    • BSI-CC-PP-0055-2009: 1
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0068-V2: 1
    • BSI-CC-PP-0068-V2-2011: 2
    • BSI-PP-0002-2001: 1
    • BSI-PP-0035-2007: 1
    • BSI-PP-0056-V2: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4+: 6
  • EAL:
    • EAL 4: 2
    • EAL 5: 2
    • EAL4: 3
    • EAL4 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC.1: 1
  • AGD:
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DEL.1: 1
    • ALC_DVS.2: 5
  • ATE:
    • ATE_DPT.2: 4
  • AVA:
    • AVA_VAN.3: 2
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 13
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 12
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
  • FAU:
    • FAU_SAS: 1
    • FAU_SAS.1: 8
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 31
    • FCS_CKM.1: 9
    • FCS_CKM.2: 5
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 1
    • FCS_COP: 52
    • FCS_COP.1: 5
    • FCS_RND: 1
    • FCS_RND.1: 7
    • FCS_RND.1.1: 1
    • FCS_RNG.1: 3
  • FDP:
    • FDP_ACC: 5
    • FDP_ACC.1: 5
    • FDP_ACF: 5
    • FDP_ACF.1: 10
    • FDP_IFC.1: 3
    • FDP_ITC.1: 7
    • FDP_ITC.2: 7
    • FDP_ITT.1: 1
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 1
    • FDP_UCT: 3
    • FDP_UCT.1: 1
    • FDP_UIT: 3
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 4
    • FIA_AFL.1: 2
    • FIA_API: 9
    • FIA_API.1: 6
    • FIA_API.1.1: 1
    • FIA_UAU: 23
    • FIA_UAU.1: 2
    • FIA_UAU.4: 1
    • FIA_UAU.5: 2
    • FIA_UAU.6: 2
    • FIA_UID: 4
    • FIA_UID.1: 4
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 12
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 11
    • FMT_LIM.2.1: 2
    • FMT_MSA.1: 2
    • FMT_MSA.3: 3
    • FMT_MTD: 34
    • FMT_MTD.1: 10
    • FMT_MTD.3: 5
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR: 12
    • FMT_SMR.1: 2
  • FPT:
    • FPT_EMS: 1
    • FPT_EMS.1: 7
    • FPT_EMS.1.1: 1
    • FPT_EMS.1.2: 1
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 3
  • FRU:
    • FRU_FLT.2: 3
  • FTP:
    • FTP_ITC: 6
    • FTP_ITC.1: 6
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 6
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
  • O:
    • O.MEM_ACCESS: 1
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • GD:
    • Giesecke & Devrient: 9
  • Infineon:
    • Infineon: 4
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 17
  • DES:
    • 3DES:
      • 3DES: 4
      • Triple-DES: 7
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CMAC: 10
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 9
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 7
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • JH:
    • JH: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-2: 1
      • SHA-224: 3
      • SHA-256: 2
      • SHA-384: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • MAC:
    • MAC: 9
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • PACE:
    • PACE: 59
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 3
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 1
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP224r1: 1
    • brainpoolP256r1: 2
    • brainpoolP320r1: 2
    • brainpoolP384r1: 2
    • brainpoolP512r1: 2
  • NIST:
    • secp256r1: 2
    • secp384r1: 2
    • secp521r1: 2
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 10
    • malfunction: 1
    • physical tampering: 4
  • SCA:
    • Leak-Inherent: 6
    • physical probing: 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 2
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 78
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 2
    • EF.DG1: 5
    • EF.DG14: 1
    • EF.DG15: 3
    • EF.DG16: 4
    • EF.DG2: 3
    • EF.DG3: 9
    • EF.DG4: 9
    • EF.DG5: 2
    • EF.SOD: 4
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
    • AIS20: 2
    • AIS31: 1
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 186-2: 1
  • ICAO:
    • ICAO: 15
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-2: 1
    • ISO/IEC 9796-2: 2
  • PKCS:
    • PKCS#3: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
pdf_data/st_metadata
  • /CreationDate: D:20130328162641+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130328162641+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1068348
  • pdf_hyperlinks: https://tools.ietf.org/html/rfc6151
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
  • /Author: stut
  • /Classification: Public
  • /Comments:
  • /Company:
  • /CreationDate: D:20120710091257+02'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /Date: 10.07.2012
  • /Keywords: Version 2.2/10.07.2012
  • /ModDate: D:20120710091301+02'00'
  • /Producer: Acrobat Distiller 9.3.3 (Windows)
  • /State: Draft
  • /Styles: supported
  • /Subject: STARCOS 3.5 ID SAC+EAC+AA C1
  • /TOE_HW: SLE78CLX360P, SLE78CLX800P, SLE78CLX1280P
  • /TOE_Name: STARCOS 3.5 ID SAC+EAC+AA C1
  • /TemplAuthor: Joern Treger
  • /TemplVersion: 1.0
  • /Title: Security Target Lite
  • /Version: 2.2
  • pdf_file_size_bytes: 302976
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different