Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
LG Electronic, Inc. G3 Smartphone Lollipop OS
CCEVS-VR-10621-2015
CardOS V5.3 QES, V1.0
BSI-DSZ-CC-0921-2014
name LG Electronic, Inc. G3 Smartphone Lollipop OS CardOS V5.3 QES, V1.0
category Mobility Products for Digital Signatures
scheme US DE
not_valid_after 30.06.2017 01.09.2019
not_valid_before 30.03.2015 06.08.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10621-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0921a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10621-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0921b_pdf.pdf
manufacturer LG Electronics, Inc. Atos IT Solutions and Services GmbH
manufacturer_web https://www.lge.com https://www.de.atos.net
security_level {} EAL4+, AVA_VAN.5
dgst 6ba0d3f05a716056 60c5f6b486bdffeb
heuristics/cert_id CCEVS-VR-10621-2015 BSI-DSZ-CC-0921-2014
heuristics/cert_lab US BSI
heuristics/extracted_sars ALC_CMS.2, ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions - 1.0, 5.3
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0782-2012
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0782-2012
heuristics/scheme_data
  • category: Mobility
  • certification_date: 30.03.2015
  • evaluation_facility: Gossamer Security Solutions
  • expiration_date: 30.06.2017
  • id: CCEVS-VR-VID10621
  • product: LG Electronics, Inc. G3 Smartphone Lollipop OS
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10621
  • vendor: LG Electronics, Inc.
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-1193-2024
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-1193-2024
heuristics/protection_profiles 7a7b216fc3e5f2ae d918b28fd7bb5d79
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MD_v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf
pdf_data/report_filename st_vid10621-vr.pdf 0921a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-10621-2015
    • cert_item: LG Electronics Inc. 20 Yoido-dong, Youngdungpogu, Seoul 152-721, Korea LG Electronics Inc. G3 Smartphone
    • cert_lab: US NIAP
  • DE:
    • cert_id: BSI-DSZ-CC-0921-2014
    • cert_item: CardOS V5.3 QES, V1.0
    • cert_lab: BSI
    • developer: Atos IT Solutions and Services GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-10621-2015: 1
  • DE:
    • BSI-DSZ-CC-0782: 1
    • BSI-DSZ-CC-0782-2012: 2
    • BSI-DSZ-CC-0782-2012-MA-01: 4
    • BSI-DSZ-CC-0921-2014: 27
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 7
    • EAL1: 1
  • EAL:
    • EAL 4: 6
    • EAL 4 augmented: 3
    • EAL 5: 2
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 9
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 1
    • ADV_COMP.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 2
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 4
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 2
    • FCS_COP: 2
  • FIA:
    • FIA_AFL: 3
    • FIA_UAU.1: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_MTD: 4
    • FMT_SMF.1: 2
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.HID_VAD: 1
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 3
  • Infineon:
    • Infineon: 9
    • Infineon Technologies AG: 5
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 5
  • TUV:
    • TÜV Informationstechnik: 4
    • TÜViT: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 11
  • DES:
    • 3DES:
      • 3DES: 4
      • TDEA: 1
      • TDES: 5
      • Triple-DES: 1
  • constructions:
    • MAC:
      • CMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DSA:
      • DSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 5
      • SHA-256: 6
      • SHA-384: 3
      • SHA-512: 2
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/report_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 3
    • brainpoolP384r1: 3
  • NIST:
    • Curve P-256: 4
    • Curve P-384: 4
    • P-256: 5
    • P-384: 5
    • curve P-256: 1
    • curve P-384: 1
    • secp256r1: 2
    • secp384r1: 2
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 11
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 32: 2
    • AIS 34: 2
    • AIS 36: 3
    • AIS 38: 1
  • FIPS:
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 15946-2: 1
  • PKCS:
    • PKCS1: 4
  • RFC:
    • RFC 5639: 1
    • RFC3447: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • & Release Notes 'CardOS V5.3 QES, V1.0', Edition 05/2014, Atos IT Solutions and Services GmbH, (confidential document) [15] Administrator Guidance 'CardOS V5.3 QES, V1.0', Revision 1.20, 07 May 2014, Atos IT Solutions: 1
    • ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜV Informationstechnik GmbH, (confidential document) [12] Configuration List 'CardOS V5.3 QES, V1.0', Revision 1.30, 30 July 2014, Atos IT Solutions: 1
    • GmbH, (confidential document) [17] Application Digital Signature 'CardOS V5.3 QES, V1.0', Revision 1.10, 07 May 2014, Atos IT: 1
    • Services GmbH, (confidential document) [13] Users Manual CardOS V5.3, Edition 05/2014, Atos IT Solutions and Services GmbH, (confidential: 1
    • Services GmbH, (confidential document) [16] User Guidance 'CardOS V5.3 QES, V1.0', Revision 1.30, 02 May 2014, Atos IT Solutions and: 1
    • Technical Report BSI-DSZ-CC-0921-2014, Version 3.0, 31 July 2014, TÜV Informationstechnik GmbH, (confidential document) [9] Certification Report BSI-DSZ-CC-0782-2012 for Infineon Security Controller M7892 B11 with: 1
    • and Services GmbH, (confidential document) [18] ISO 7816 Part 3: Electronic Signals and Transmission Protocols – ISO/IEC 7816-3:1997/Amd: 1
pdf_data/report_metadata
  • /CreationDate: D:20150401151737-04'00'
  • /ModDate: D:20150401151737-04'00'
  • pdf_file_size_bytes: 460564
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename st_vid10621-st.pdf 0921b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-2012-MA-01: 6
    • BSI-DSZ-CC-921: 1
  • NL:
    • CC-3: 10
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0059-2009-MA-01: 1
    • BSI-CC-PP-0035-2007: 2
    • BSI-CC-PP-0059-: 3
    • BSI-CC-PP-0059-2009-MA-: 2
    • BSI-CC-PP-0059-2009-MA-01: 45
    • BSI-CC-PP-0071: 4
    • BSI-CC-PP-0071-2012: 2
    • BSI-PP-0006-2002: 1
    • BSI-PP-0035: 4
    • BSI-PP0059-2009: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 6
    • EAL 1 augmented: 6
  • EAL:
    • EAL 4: 2
    • EAL 4+: 1
    • EAL 6+: 3
    • EAL4: 8
    • EAL4 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 4
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 4
    • ALC_TSU_EXT: 2
    • ALC_TSU_EXT.1: 12
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL: 10
    • ASE_CCL.1: 1
    • ASE_ECD: 5
    • ASE_ECD.1: 1
    • ASE_INT: 16
    • ASE_INT.1: 1
    • ASE_OBJ: 11
    • ASE_OBJ.2: 1
    • ASE_REQ: 33
    • ASE_REQ.2: 1
    • ASE_SPD: 6
    • ASE_SPD.1: 1
    • ASE_TSS: 17
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 2
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 19
    • FCS_CKM.2: 1
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 1
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.1.4: 1
    • FCS_CKM_EXT.2: 1
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.3: 1
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 1
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 1
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 32
    • FCS_RBG_EXT.1: 17
    • FCS_SRV_EXT: 3
    • FCS_SRV_EXT.1: 1
    • FCS_SRV_EXT.1.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 1
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 3
    • FCS_STG_EXT.2.1: 1
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 1
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLS_EXT: 5
    • FCS_TLS_EXT.1: 1
    • FCS_TLS_EXT.1.1: 1
    • FCS_TLS_EXT.1.2: 1
    • FCS_TLS_EXT.2: 2
    • FCS_TLS_EXT.2.1: 1
    • FCS_TLS_EXT.2.2: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 1
    • FDP_ACF_EXT: 3
    • FDP_ACF_EXT.1: 1
    • FDP_ACF_EXT.1.1: 1
    • FDP_DAR_EXT: 3
    • FDP_DAR_EXT.1: 1
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_IFC_EXT: 3
    • FDP_IFC_EXT.1: 1
    • FDP_IFC_EXT.1.1: 1
    • FDP_STG_EXT: 1
    • FDP_STG_EXT.1: 4
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 2
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 1
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 1
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.7: 1
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 9
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 4
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.3: 1
    • FIA_UAU_EXT.3.1: 1
  • FMT:
    • FMT_MOF.1: 8
    • FMT_SMF: 2
    • FMT_SMF.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMF_EXT: 3
    • FMT_SMF_EXT.1: 1
    • FMT_SMF_EXT.1.1: 1
  • FPT:
    • FPT_AEX_EXT: 12
    • FPT_AEX_EXT.1: 1
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 1
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 1
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 1
    • FPT_BBD_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 1
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 1
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 1
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 1
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 6
    • FPT_TST_EXT.1: 1
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 1
    • FPT_TST_EXT.2.1: 1
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 1
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 1
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 3
    • FTA_TAB.1: 1
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 1
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC_EXT: 3
    • FTP_ITC_EXT.1: 1
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM: 62
    • FCS_CKM.1: 26
    • FCS_CKM.2: 6
    • FCS_CKM.4: 33
    • FCS_CKM.4.1: 1
    • FCS_COP: 98
    • FCS_COP.1: 15
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 55
    • FDP_ACC.1: 23
    • FDP_ACF: 39
    • FDP_ACF.1: 25
    • FDP_IFC.1: 11
    • FDP_ITC.1: 20
    • FDP_ITC.2: 20
    • FDP_ITT.1: 1
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_SDI: 19
    • FDP_SDI.1: 3
    • FDP_SDI.2: 5
  • FIA:
    • FIA_AFL: 54
    • FIA_AFL.1: 14
    • FIA_API: 17
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_UAU.1: 21
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 28
    • FMT_MSA.1: 7
    • FMT_MSA.2: 12
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 25
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 8
    • FMT_MSA.4.1: 1
    • FMT_MTD: 40
    • FMT_MTD.1: 3
    • FMT_SMF.1: 39
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 8
    • FPT_EMS.1: 22
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 8
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 14
    • FPT_TST.1.1: 6
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 8
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.PRECAUTION: 1
  • A:
    • A.CGA: 4
    • A.III: 2
    • A.SCA: 5
  • OE:
    • OE.HID_VAD: 3
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 17
    • Infineon Technologies: 1
    • Infineon Technologies AG: 3
  • NXP:
    • NXP Semiconductors: 1
  • STMicroelectronics:
    • STMicroelectronics: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 21
      • AES-128: 7
      • AES-256: 11
  • constructions:
    • MAC:
      • HMAC: 9
      • HMAC-SHA-256: 5
      • HMAC-SHA-384: 1
  • AES_competition:
    • AES:
      • AES: 34
  • DES:
    • 3DES:
      • 3DES: 7
      • TDES: 15
      • Triple-DES: 10
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DH:
      • DH: 1
  • ECC:
    • ECC:
      • ECC: 3
    • ECDSA:
      • ECDSA: 14
  • FF:
    • DSA:
      • DSA: 3
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF: 1
    • PBKDF2: 2
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 6
      • SHA-384: 2
      • SHA-512: 1
      • SHA256: 4
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-2: 11
      • SHA-256: 15
      • SHA-384: 8
      • SHA-512: 6
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 17
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • TLS:
    • TLS:
      • TLS: 27
      • TLS 1.0: 2
      • TLS 1.1: 1
      • TLS 1.2: 1
      • TLS v1.2: 1
  • VPN:
    • VPN: 10
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 6
  • RNG:
    • RBG: 15
    • RNG: 2
  • RNG:
    • RNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • CCM:
    • CCM: 1
  • GCM:
    • GCM: 1
  • CBC:
    • CBC: 7
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 6
    • P-384: 6
    • P-521: 6
  • Brainpool:
    • brainpoolP256r1: 5
    • brainpoolP384r1: 5
  • NIST:
    • Curve P-256: 4
    • Curve P-384: 4
    • P-256: 8
    • P-384: 8
    • secp256r1: 3
    • secp384r1: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 16
  • Infineon:
    • v1.02.013: 15
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • fault injection: 1
    • physical tampering: 5
  • SCA:
    • DPA: 2
    • SPA: 3
    • physical probing: 2
    • timing attacks: 2
pdf_data/st_keywords/tee_name
  • other:
    • TEE: 9
  • IBM:
    • SE: 1
    • SSC: 7
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 2
    • FIPS 186-4: 2
    • FIPS 197: 2
    • FIPS 198-1: 3
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 1
  • NIST:
    • NIST SP 800-132: 1
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 2
    • SP 800-132: 1
    • SP 800-38A: 1
    • SP 800-38F: 1
    • SP 800-56A: 1
    • SP 800-90A: 1
  • RFC:
    • RFC 2246: 2
    • RFC 2818: 2
    • RFC 3394: 1
    • RFC 4346: 1
    • RFC 5216: 1
    • RFC 5246: 5
    • RFC 5280: 2
    • RFC 5289: 2
    • RFC 5759: 1
    • RFC 6460: 2
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS PUB 197: 4
  • PKCS:
    • PKCS1: 8
  • RFC:
    • RFC 5639: 1
    • RFC3447: 7
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • no longer needed for any tasks concerning Application for QES. It has to be deleted. 10. Step 22 is out of scope of the TOE. 28 Security Target 'CardOS V5.3 QES, V1.0', Rev. 1.61, Edition 07/2014 Copyright © Atos: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Atos IT Solutions and Services GmbH
  • /CreationDate: D:20140723191014+02'00'
  • /Creator: Writer
  • /Keywords: Common Criteria, Security Target, CardOS
  • /ModDate: D:20140723191641+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Security Target CardOS V5.3 QES (SSCD for QES)
  • /Title: Security Target 'CardOS V5.3 QES, V1.0', Rev. 1.61, Edition 07/2014
  • pdf_file_size_bytes: 530532
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 102
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different