Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Scalable Optical Transport Solution FSP 3000R7 Operating System (CC), Version R7 Rel.17.2.4
IC3S/KOL01/ADVA/EAL2/0520/0021
IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
NSCIB-CC-196231-CR
name Scalable Optical Transport Solution FSP 3000R7 Operating System (CC), Version R7 Rel.17.2.4 IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme IN NL
status active archived
not_valid_after 05.01.2026 19.11.2023
not_valid_before 06.01.2021 19.11.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC%20Certificate%20ADVA%20FSP%203000R7%20Rel%2017.2.4.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-18-196231.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-ADVA-FSP3000R7_%20Rel%2017%202%204%20EAL2%20version%201.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-196231-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FSP_3000_R7_Security_Target-2.0%20(17.2.4)_20200421.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-BAC-Lite]%202018_2000037746%20-%20Security%20Target%20Lite%20IDeal%20Pass%20v2.3-i%20JC%20(BAC%20Configuration)%20(v1.0,%202018-09-07).pdf
manufacturer ADVA OPTICAL NETWORKING SE, Fraunhoferstr.9a 82152 Martinsried, Munich, Germany Idemia
manufacturer_web https://www.adva.com https://www.idemia.com
security_level EAL2 ADV_TDS.4, ALC_CMS.5, ATE_DPT.3, ADV_INT.2, ADV_FSP.5, EAL4+, ALC_DVS.2, ALC_TAT.2
dgst 64011f7b79ad2a6f ce867531085e33f8
heuristics/cert_id IC3S/KOL01/ADVA/EAL2/0520/0021 NSCIB-CC-196231-CR
heuristics/cert_lab []
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ALC_CMS.5, AVA_VAN.5, ADV_TDS.4, ATE_DPT.3, ALC_DVS.2, ADV_ARC.1, ADV_FSP.5, ADV_INT.2, ALC_TAT.2, ADV_SPM.1
heuristics/extracted_versions 17.2.4 2.3
heuristics/report_references/directly_referencing {} ANSSI-CC-2018/27, NSCIB-CC-195748-CR
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0782-2012, ANSSI-CC-2016/66, NSCIB-CC-195748-CR, BSI-DSZ-CC-0782-V3-2017, BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2017/59, ANSSI-CC-2018/27, BSI-DSZ-CC-0782-V2-2015
heuristics/scheme_data
heuristics/st_references/directly_referencing {} ANSSI-CC-2018/27
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27
heuristics/protection_profiles {} 60455fc9564e2545
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf
pdf_data/cert_filename Signed certificate CC-18-196231.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-18-196231: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_DVS.2: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_DPT.3: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
  • O:
    • O.M: 1
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ICAO:
    • ICAO: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20181119163400+01'00'
  • /Creator: BHC364e
  • /ModDate: D:20181119163400+01'00'
  • /Producer: KONICA MINOLTA bizhub C364e
  • /Title: BHC364e-20181119163400
  • pdf_file_size_bytes: 202344
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename CR-ADVA-FSP3000R7_ Rel 17 2 4 EAL2 version 1.0.pdf Certification Report NSCIB-CC-196231-CR.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-196231-CR
    • cert_item: IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration
    • cert_lab: Brightsight
    • developer: IDEMIA
pdf_data/report_keywords/cc_cert_id
  • IN:
    • IC3S/KOL01/ADVA/EAL2/0520/0021: 2
    • IC3S/KOL01/ADVA/EAL2/0520/0021 /CR: 1
    • IC3S/KOL01/ADVA/EAL2/0520/0021/CR: 13
  • FR:
    • ANSSI-CC-2018/27: 1
  • NL:
    • CC-19-180045: 1
    • CC-195748: 2
    • NSCIB-CC-196231-CR: 12
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 3
    • EAL2: 5
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
  • AGD:
    • AGD_OPE: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
  • ADV:
    • ADV_FSP.5: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMS.5: 2
    • ALC_DVS.2: 2
    • ALC_TAT.2: 2
  • ATE:
    • ATE_DPT.3: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
pdf_data/report_keywords/vendor
  • Idemia:
    • IDEMIA: 6
  • Infineon:
    • Infineon: 3
pdf_data/report_keywords/eval_facility
  • ERTL:
    • Common Criteria Test Laboratory, ERTL: 4
  • BrightSight:
    • Brightsight: 2
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 4
pdf_data/report_keywords/vulnerability
  • ROCA:
    • ROCA: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 2
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 5
pdf_data/report_keywords/standard_id
  • ICAO:
    • ICAO: 6
  • ISO:
    • ISO/IEC 18013: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. 2.5 Documentation The following documentation is: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: Tapas Bandopadhyay
  • /CreationDate: D:20201113120808+05'30'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20201113120808+05'30'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1049999
  • pdf_hyperlinks: http://www.commoncriteria-india.gov.in/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
  • /Author: p646
  • /CreationDate: D:20181120153406+01'00'
  • /Creator: PDFCreator Version 1.2.0
  • /Keywords:
  • /ModDate: D:20181120153406+01'00'
  • /Producer: GPL Ghostscript 9.0
  • /Subject:
  • /Title: Certification Report NSCIB-CC-196231-CR
  • pdf_file_size_bytes: 630780
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename FSP_3000_R7_Security_Target-2.0 (17.2.4)_20200421.pdf [ST-BAC-Lite] 2018_2000037746 - Security Target Lite IDeal Pass v2.3-i JC (BAC Configuration) (v1.0, 2018-09-07).pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2018/27: 2
  • NL:
    • CC-1: 6
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0055-2009: 1
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-PP-0035: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 4
  • EAL:
    • EAL4: 6
    • EAL4 augmented: 2
    • EAL5: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 4
    • ADV_INT.2: 4
    • ADV_SPM.1: 1
    • ADV_TDS.4: 4
  • AGD:
    • AGD_OPE: 10
    • AGD_PRE: 9
  • ALC:
    • ALC_CMS.5: 4
    • ALC_DVS.2: 5
    • ALC_TAT.2: 4
  • ATE:
    • ATE_DPT.3: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
  • FCS:
    • FCS_CKM.1: 22
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 20
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 34
    • FCS_COP.1.1: 4
    • FCS_SSH_EXT: 1
    • FCS_SSH_EXT.1: 14
    • FCS_SSH_EXT.1.1: 2
    • FCS_SSH_EXT.1.2: 2
    • FCS_SSH_EXT.1.3: 2
    • FCS_SSH_EXT.1.4: 2
    • FCS_SSH_EXT.1.5: 2
    • FCS_SSH_EXT.1.6: 2
    • FCS_SSH_EXT.1.7: 2
    • FCS_TLS_EXT: 1
    • FCS_TLS_EXT.1: 18
    • FCS_TLS_EXT.1.1: 2
  • FIA:
    • FIA_PMG_EXT: 1
    • FIA_PMG_EXT.1: 14
    • FIA_PMG_EXT.1.1: 2
    • FIA_UAU.1: 3
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
  • FMT:
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 4
    • FMT_SMR.2: 10
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 1
    • FPT_APW_EXT.1: 14
    • FPT_APW_EXT.1.1: 2
    • FPT_APW_EXT.1.2: 2
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 13
    • FPT_TST_EXT.1.1: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 8
    • FTA_SSL.4.1: 1
    • FTA_TAB.1: 10
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_TRP.1: 14
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 7
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 30
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 51
    • FCS_COP.1: 9
    • FCS_RND: 9
    • FCS_RND.1: 13
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 4
    • FDP_ITC: 2
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_UCT.1: 11
    • FDP_UCT.1.1: 1
    • FDP_UIT: 1
    • FDP_UIT.1: 10
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_API: 16
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 16
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 4
    • FIA_UAU.6: 12
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 8
    • FMT_LIM.1: 18
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 4
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 35
    • FMT_MTD.1: 5
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS.1: 1
    • FPT_EMS.1.1: 1
    • FPT_EMS.1.2: 1
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECU: 1
    • A.ADMIN_CREDENTIALS_SECURE: 2
    • A.LIMITED_FUNCTIONALITY: 2
    • A.NO_GENERAL_PURPOSE: 1
    • A.NO_THRU_TRAFFIC_PROTE: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 2
    • A.PHYSICAL: 1
    • A.PHYSICAL_PROTECTION: 2
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_ADMINISTRATOR: 2
  • O:
    • O.DISPLAY_BANNER: 7
    • O.PROTECTED_COMMUNIC: 1
    • O.PROTECTED_COMMUNICATIONS: 2
    • O.SESSION_LOCK: 7
    • O.SYSTEM_MONITORING: 6
    • O.TOE_ADMINISTRATION: 10
    • O.TSF_SELF_TEST: 3
  • OE:
    • OE.ADMIN_CREDENTIALS_S: 1
    • OE.ADMIN_CREDENTIALS_SECURE: 3
    • OE.NO_GENERAL_PURPOS: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PR: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 3
    • OE.PHYSICAL: 2
    • OE.TRUSTED_ADMIN: 4
  • T:
    • T.PASSWORD_CRACKING: 3
    • T.SECURITY_FUNCTIONALIT: 2
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 2
    • T.SECURITY_FUNCTIONALITY_FAILURE: 2
    • T.UNAUTHORIZED_ADMINIS: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 2
    • T.UNDETECTED_ACTIVITY: 3
    • T.UNTRUSTED_COMMUNICA: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
    • T.WEAK_AUTHENTICATION_: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 2
  • A:
    • A.MRTD_: 1
  • OE:
    • OE.AA_MRTD: 6
    • OE.MRTD_: 2
pdf_data/st_keywords/vendor
  • Idemia:
    • IDEMIA: 16
  • Infineon:
    • Infineon: 22
pdf_data/st_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
    • tuvit: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 10
  • AES_competition:
    • AES:
      • AES: 11
      • AES-: 1
      • AES-128: 1
  • DES:
    • 3DES:
      • 3DES: 7
      • Triple-DES: 13
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CMAC: 4
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 3
  • FF:
    • DH:
      • DH: 3
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 12
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-256: 3
      • SHA-384: 1
      • SHA-512: 2
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 1
    • SHA2:
      • SHA-2: 2
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 2
      • SHA-512: 1
      • SHA224: 1
      • SHA256: 1
      • SHA384: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 24
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 45
  • TLS:
    • TLS:
      • TLS: 24
      • TLS 1.0: 2
      • TLS 1.1: 2
      • TLS 1.2: 2
      • TLSv1.2: 32
  • PACE:
    • PACE: 16
  • PGP:
    • PGP: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 1
  • CBC:
    • CBC: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-384: 6
    • P-521: 6
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 4
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 7
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 4
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 4
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 9
    • EF.DG1: 27
    • EF.DG13: 4
    • EF.DG14: 3
    • EF.DG15: 8
    • EF.DG16: 27
    • EF.DG2: 10
    • EF.DG3: 7
    • EF.DG4: 6
    • EF.DG5: 8
    • EF.SOD: 9
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS PUB 180-4: 3
    • FIPS PUB 186-4: 9
    • FIPS PUB 197: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38D: 1
  • RFC:
    • RFC 1321: 1
    • RFC 2104: 1
    • RFC 2246: 2
    • RFC 2818: 2
    • RFC 3268: 4
    • RFC 4253: 4
    • RFC 4346: 2
    • RFC 4419: 2
    • RFC 4492: 4
    • RFC 5246: 15
    • RFC 5288: 8
    • RFC 5289: 8
    • RFC 5656: 2
  • X509:
    • X.509: 1
  • BSI:
    • AIS31: 4
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-4: 2
    • FIPS 46-3: 2
    • FIPS PUB 197: 1
    • FIPS46: 1
  • ICAO:
    • ICAO: 20
  • ISO:
    • ISO/IEC 14443: 6
    • ISO/IEC 18013: 6
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
    • ISO/IEC15946-2: 1
  • RFC:
    • RFC 5639: 1
    • RFC-5639: 1
    • RFC3369: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security features: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: BerndK
  • /CreationDate: D:20200421095026+02'00'
  • /ModDate: D:20201223105146+05'30'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - FSP_3000_R7_Security_Target-2.0 (17.2.4)_20200421.docx
  • pdf_file_size_bytes: 1136128
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
  • /Author: IDEMIA
  • /CreationDate: D:20180907132327+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: NSCIB-CC-196231, ASE Lite, ICAO, ePassport, BAC
  • /ModDate: D:20180907132327+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: ASE Lite 2018_2000037746, v1.0, 2018-09-07
  • /Title: Security Target Lite IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
  • pdf_file_size_bytes: 1486764
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 102
state/cert/convert_garbage False True
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different