Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12
ISCB-5-RPT-C112-CR-v1
Giesecke+Devrient Sm@rtCafé® Expert 8.0 C2
NSCIB-CC-2300006-01-CR
name CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12 Giesecke+Devrient Sm@rtCafé® Expert 8.0 C2
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme MY NL
status archived active
not_valid_after 23.10.2025 24.05.2028
not_valid_before 23.10.2020 24.05.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C112-CERTIFICATE-v1%20signed.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01.1-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C112-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CYSECA%20Security%20Target%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01-ST.pdf
manufacturer Pernec Integrated Network Systems Sdn. Bhd. G+D Mobile Security GmbH
manufacturer_web https://www.pernec.com.my/ https://www.gi-de.com/de/de/mobile-security/
security_level EAL2 EAL6+, ALC_FLR.1
dgst 5bbd05b848eb7573 e9c4587f626324cd
heuristics/cert_id ISCB-5-RPT-C112-CR-v1 NSCIB-CC-2300006-01-CR
heuristics/cert_lab []
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_REQ.2, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ASE_INT.2, ASE_ECD.1, ALC_FLR.1, ALC_TAT.3, ALC_LCD.1, ALC_DVS.2, ADV_TDS.5, ASE_SPD.1, ATE_COV.3, ADV_INT.3, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_SPM.1, ADV_ARC.1
heuristics/extracted_versions 1.2.0, 1.1.12 8.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/scheme_data
  • cert_no: 2020-007-C112
  • certification_date: 23.10.2020
  • developer: Pernec Integrated Network Systems Sdn Bhd
  • enhanced:
    • assurance_level: EAL2
    • category: Other Devices and Systems
    • cert_id: C112
    • certification_date: 23.10.2020
    • developer: 21, Jalan Setiawangsa 8,Taman Setiawangsa,54200 Kuala Lumpur,Wilayah Persekutuan Kuala Lumpur Tel: 03-4259 6000Email: [email protected]: https://www.pernec.com.my/
    • expiration_date: 23.10.2025
    • mutual_recognition: CCRA
    • product: CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/ISCB-5-RPT-C112-CR-v1.pdf
    • scope: The Target of Evaluation (TOE) is CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 (TOE Server) and CYSECA Endpoint Application Control Client v1.1.12 (TOE Client). The TOE is an endpoint application control allows organization to enhance the defences against executing unwanted or malicious application on critical endpoint computer. TOE comprise of server and client components that can be operated in one or more instance. TOE is designed with granular policy, extensive application catalogue as well as, real-time monitoring and defences, CYSECA reduces the risk of threat exposures on client. The TOE is designed for Application control implementation for client and allows only selected files or applications that are allowed/whitelisted to be executed while others are being stopped.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/CYSECA_Security_Target_v1.0.pdf
    • type: Other Devices and Systems
  • expiration_date: 23.10.2025
  • level: EAL2
  • product: CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/133
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/protection_profiles {} 7f886b64878b68c1
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf
pdf_data/cert_filename ISCB-5-CERT-C112-CERTIFICATE-v1 signed.pdf NSCIB-CC-2300006-01.1-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-22-0289065: 1
    • NSCIB-2300006-01: 1
    • NSCIB-CC-23-2300006-01: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-V2-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL2: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.3: 1
pdf_data/cert_keywords/vendor
  • GD:
    • Giesecke+Devrient: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 18045:2008: 1
pdf_data/cert_metadata
  • /CreationDate: D:20201105094524+08'00'
  • /Creator: ISCB Printer
  • /ModDate: D:20201105125157+08'00'
  • /Producer: KONICA MINOLTA bizhub C360i
  • /Title: SISCB Print20110509451
  • pdf_file_size_bytes: 226462
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Denise Cater
  • /CreationDate: D:20230813222000+01'00'
  • /Creator: Microsoft® Word 2021
  • /ModDate: D:20230813222000+01'00'
  • /Producer: Microsoft® Word 2021
  • /Title: NSCIB Certificate
  • pdf_file_size_bytes: 94099
  • pdf_hyperlinks: https://www.tuv-nederland.nl/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename ISCB-5-RPT-C112-CR-v1.pdf NSCIB-CC-2300006-01-CR.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-2300006-01-CR
    • cert_item: Sm@rtCafé® Expert 8.0 C2
    • cert_lab: SGS Brightsight B.V.
    • developer: Giesecke+Devrient Mobile Security GmbH
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-3-RPT-C112-CR-v1: 1
    • ISCB-5-RPT-C112-CR-v1: 36
  • DE:
    • BSI-DSZ-CC-1107-V3-2022: 2
  • NL:
    • NSCIB-2300006-01: 1
    • NSCIB-CC-2300006-01-CR: 13
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL2: 1
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL4: 1
    • EAL5+: 1
    • EAL6: 2
    • EAL6 augmented: 2
    • EAL6+: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_FLR.1: 3
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.PHYSICAL: 1
    • A.PLATFORM: 1
    • A.TIMESTAMP: 1
    • A.USER: 1
pdf_data/report_keywords/vendor
  • GD:
    • G&D: 4
    • Giesecke+Devrient: 4
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 3
  • SGS:
    • SGS: 3
    • SGS Brightsight: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CBC-MAC: 3
      • CMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
    • EdDSA:
      • EdDSA: 1
  • RSA:
    • RSA-CRT: 2
    • RSA-PSS: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 3
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • side-channel: 1
  • other:
    • JIL: 2
    • JIL-AAPS: 2
    • JIL-AM: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 2
pdf_data/report_metadata
  • /CreationDate: D:20201111142929Z00'00'
  • /Creator: Word
  • /ModDate: D:20201111142929Z00'00'
  • /Producer: macOS Version 10.15.7 (Build 19H2) Quartz PDFContext
  • pdf_file_size_bytes: 789695
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename CYSECA Security Target v1.0.pdf NSCIB-CC-2300006-01-ST.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-V3-2022: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0099-V2-2020: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 7
  • EAL:
    • EAL 4+: 1
    • EAL 6: 3
    • EAL 6 augmented: 2
    • EAL 6+: 1
    • EAL6: 4
    • EAL6 augmented: 2
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 4
    • ASE_ECD.1: 4
    • ASE_INT.1: 4
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 7
    • ASE_SPD.1: 4
    • ASE_TSS.1: 4
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 5
    • ADV_ARC.1: 5
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 3
    • ADV_FSP.5: 9
    • ADV_IMP.1: 6
    • ADV_IMP.2: 2
    • ADV_INT.3: 1
    • ADV_SPM.1: 3
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 1
    • ADV_TDS.5: 6
  • AGD:
    • AGD_OPE.1: 7
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.5: 3
    • ALC_CMS.1: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 4
    • ALC_FLR.1: 6
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 3
    • ASE_INT.2: 2
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
    • ATE_FUN.2: 1
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FDP:
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 2
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 5
    • FIA_UAU.1: 1
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 6
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 2
  • FTP:
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP.1: 21
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 3
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 7
    • FCS_CKM.1: 36
    • FCS_CKM.2: 4
    • FCS_CKM.4: 29
    • FCS_CKM.4.1: 1
    • FCS_COP: 8
    • FCS_COP.1: 118
    • FCS_RNG: 5
    • FCS_RNG.1: 13
    • FCS_RNG.1.1: 5
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 30
    • FDP_ACC.1: 11
    • FDP_ACC.2: 5
    • FDP_ACF: 29
    • FDP_ACF.1: 13
    • FDP_IFC: 31
    • FDP_IFC.1: 13
    • FDP_IFC.2: 2
    • FDP_IFF: 23
    • FDP_IFF.1: 17
    • FDP_ITC: 12
    • FDP_ITC.1: 8
    • FDP_ITC.2: 20
    • FDP_ITT.1: 1
    • FDP_RIP: 139
    • FDP_RIP.1: 11
    • FDP_ROL: 16
    • FDP_ROL.1: 5
    • FDP_SDC.1: 2
    • FDP_SDI: 15
    • FDP_SDI.2: 4
    • FDP_UIT: 9
    • FDP_UIT.1: 2
  • FIA:
    • FIA_API.1: 1
    • FIA_ATD: 10
    • FIA_ATD.1: 2
    • FIA_UID: 16
    • FIA_UID.1: 9
    • FIA_UID.2: 1
    • FIA_USB: 9
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 4
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA: 101
    • FMT_MSA.1: 10
    • FMT_MSA.2: 2
    • FMT_MSA.3: 17
    • FMT_MTD: 22
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_SMF: 22
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR: 35
    • FMT_SMR.1: 32
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 10
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 39
    • FPT_FLS.1: 21
    • FPT_FLS.1.1: 2
    • FPT_ITT.1: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 3
    • FPT_RCV: 13
    • FPT_RCV.3: 10
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 2
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.PHYSICAL: 4
    • A.PLATFORM: 4
    • A.TIMESTAMP: 3
    • A.USER: 4
  • O:
    • O.ACCESS: 2
    • O.CONFIG: 4
    • O.MANAGE: 1
    • O.SEC_COM: 1
    • O.USER: 5
  • OE:
    • OE.ADMIN: 1
    • OE.PHYSICAL: 1
    • OE.PLATFORM: 2
    • OE.TIMESTAMP: 1
    • OE.TOE_ACCESS: 3
    • OE.USER: 3
  • T:
    • T.AUDIT_COMPROMISE: 2
    • T.CONFIG: 4
    • T.MASQUERADE: 3
    • T.UNAUTHORISED_AC: 1
  • A:
    • A.CAP_FILE: 6
    • A.DELETION: 7
    • A.VERIFICATION: 6
  • D:
    • D.APP_CODE: 1
    • D.APP_I_DATA: 2
    • D.CRYPTO: 2
    • D.PIN: 1
    • D.SEC_DATA: 1
  • O:
    • O.AES: 1
    • O.ALARM: 22
    • O.APPLET: 16
    • O.ARRAY_VIEWS_CONFID: 11
    • O.ARRAY_VIEWS_INTEG: 9
    • O.CARD-: 6
    • O.CARD-MANAGEMENT: 27
    • O.CIPHER: 15
    • O.CODE_CAP: 1
    • O.CODE_CAP_: 1
    • O.CODE_CAP_FILE: 12
    • O.DELETION: 17
    • O.FIREWALL: 43
    • O.GLOBAL_ARRAYS: 1
    • O.GLOBAL_ARRAYS_CONFID: 19
    • O.GLOBAL_ARRAYS_INTEG: 9
    • O.INSTALL: 16
    • O.JAVAOBJEC: 1
    • O.JAVAOBJECT: 46
    • O.KEY-: 8
    • O.KEY-MNGT: 15
    • O.LOAD: 19
    • O.NATIVE: 14
    • O.OBJ-DELETION: 9
    • O.OPERATE: 36
    • O.PIN-: 5
    • O.PIN-MNGT: 18
    • O.PINMNGT: 1
    • O.REALLOCATION: 18
    • O.RESOURCES: 23
    • O.RND: 4
    • O.RNG: 11
    • O.SCP: 64
    • O.SID: 33
    • O.TDES: 2
    • O.TRANSACTION: 19
  • OE:
    • OE.CAP_FILE: 9
    • OE.CARD-MANAGEMENT: 6
    • OE.CODE-: 5
    • OE.CODE-EVIDENCE: 15
    • OE.SCP: 13
    • OE.VERIFICATION: 38
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 4
    • OP.ARRAY_LENGTH: 4
    • OP.ARRAY_T_ALOAD: 2
    • OP.ARRAY_T_ASTORE: 3
    • OP.ARRAY_T_LOAD: 1
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_CAP_FILE: 3
    • OP.DELETE_CAP_FILE_APPLET: 3
    • OP.INSTANCE_FIELD: 3
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 6
    • OP.PUT: 5
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.VERIFICATION: 7
  • R:
    • R.JAVA: 14
  • T:
    • T.CONFID-: 8
    • T.CONFID-APPLI-: 1
    • T.CONFID-APPLI-DATA: 17
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 4
    • T.EXE-CODE: 6
    • T.EXECODE: 1
    • T.INSTALL: 5
    • T.INTEG-: 10
    • T.INTEG-APPLI-: 4
    • T.INTEG-APPLI-CODE: 5
    • T.INTEG-APPLI-DATA: 13
    • T.INTEG-JCS-: 2
    • T.INTEG-JCS-CODE: 4
    • T.INTEG-JCS-DATA: 3
    • T.INTEG-JCSCODE: 1
    • T.INTEGAPPLI-CODE: 2
    • T.INTEGAPPLI-DATA: 1
    • T.INTEGJCS-DATA: 6
    • T.NATIVE: 5
    • T.OBJ-DELETION: 2
    • T.OBJDELETION: 1
    • T.PHYSICAL: 3
    • T.RESOURCES: 7
    • T.SECURE_DELETION: 8
    • T.SID: 16
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STM: 1
  • GD:
    • G&D: 10
    • G+D: 6
    • Giesecke+Devrient: 8
  • Infineon:
    • Infineon: 1
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 29
    • RC:
      • RC2: 1
  • DES:
    • 3DES:
      • 3-DES: 7
      • 3DES: 3
      • TDEA: 1
      • TDES: 3
      • Triple-DES: 4
    • DES:
      • DES: 14
  • constructions:
    • MAC:
      • CBC-MAC: 10
      • CMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 9
    • ECDH:
      • ECDH: 9
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • Diffie-Hellman: 2
  • RSA:
    • RSA-CRT: 12
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 3
      • SHA-256: 4
      • SHA-384: 4
      • SHA-512: 4
    • SHA3:
      • SHA-3: 1
      • SHA-3-224: 3
      • SHA-3-256: 3
      • SHA-3-384: 2
      • SHA-3-512: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 10
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
      • TLS v1.2: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 4
    • RNG: 17
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CFB:
    • CFB: 5
  • CTR:
    • CTR: 5
  • ECB:
    • ECB: 9
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • physical tampering: 5
  • SCA:
    • Leak-Inherent: 2
    • physical probing: 1
  • other:
    • JIL: 2
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 31: 2
    • AIS20: 7
    • AIS31: 5
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 186-4: 7
    • FIPS 197: 10
    • FIPS PUB 202: 4
    • FIPS180-4: 3
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS1: 12
    • PKCS3: 1
    • PKCS5: 3
  • RFC:
    • RFC 4056: 1
    • RFC 5639: 1
    • RFC5639: 5
  • SCP:
    • SCP02: 4
    • SCP03: 3
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 5
    • javacard.framework.applet: 1
    • javacard.security: 7
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation: 1
    • out of Scope: 1
    • within the TOE boundary). The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation. In order to comply with the evaluated configuration, the following hardware and: 1
  • OutOfScope:
    • 3 [AIS20],[AIS31]12 that implements13 : 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10: 1
    • 384, 521}r1[SEC2], brainpoolP{224, 256, 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Giesecke+Devrient MS Security Target Sm@rtCafé® Expert 8.0 C2/Version 4.0/Status 10.05: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 5
    • with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Giesecke+Devrient MS Security Target Sm@rtCafé® Expert 8.0 C2/Version 4.0/Status 10.05: 1
pdf_data/st_metadata
  • /Author: G+D MS / stut
  • /CreationDate: D:20230510174501+02'00'
  • /Creator: Microsoft® Word für Microsoft 365
  • /Keywords: Version 4.0/Status 10.05.2023
  • /ModDate: D:20230510174501+02'00'
  • /Producer: Microsoft® Word für Microsoft 365
  • /Subject: Sm@rtCafé® Expert 8.0 C2
  • /Title: Giesecke+Devrient MS Security Target
  • pdf_file_size_bytes: 1811883
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 134
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different