name |
Microsoft Surface Pro 3, Windows 8.1 |
Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
DE |
status |
archived |
archived |
not_valid_after |
21.04.2017 |
19.12.2024 |
not_valid_before |
21.04.2015 |
19.12.2019 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V4c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10632-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V4a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10632-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V4b_pdf.pdf |
manufacturer |
Microsoft |
Infineon Technologies AG |
manufacturer_web |
https://www.microsoft.com |
https://www.infineon.com/ |
security_level |
{} |
EAL6+, ALC_FLR.1 |
dgst |
6ebb0f24d36521bc |
fb4bf65f76dceaa5 |
heuristics/cert_id |
CCEVS-VR-10632-2015 |
BSI-DSZ-CC-0891-V4-2019 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_FLR.3, ALC_CMS.1, AGD_PRE.1, ADV_FSP.1, AVA_VAN.1, ASE_ECD.1, ASE_OBJ.1, ALC_TSU_EXT.1, ATE_IND.1, ASE_TSS.1, ASE_REQ.1, ALC_CMC.1, AGD_OPE.1 |
ADV_IMP.2, ADV_ARC.1, AVA_VAN.5, ADV_FSP.5, ALC_CMC.5, ASE_TSS.1, ADV_TDS.5, AGD_OPE.1, ATE_DPT.3, ATE_COV.3, ASE_REQ.2, ADV_SPM.1, ATE_FUN.2, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_INT.3, ALC_DEL.1, ASE_OBJ.2, ALC_FLR.1, ASE_INT.1, ALC_TAT.3, ASE_SPD.1, ALC_CMS.5, ALC_LCD.1 |
heuristics/extracted_versions |
8.1 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0891-V5-2021, BSI-DSZ-CC-1112-V2-2021, ANSSI-CC-2020/33, ANSSI-CC-2020/45, ANSSI-CC-2020/49, BSI-DSZ-CC-0891-V6-2021, BSI-DSZ-CC-1034-V2-2021, ANSSI-CC-2020/42, ANSSI-CC-2020/43, BSI-DSZ-CC-1033-V2-2021, NSCIB-CC-0112113-CR, BSI-DSZ-CC-1112-2020, ANSSI-CC-2020/44, NSCIB-CC-146301-CR2 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0891-V3-2018 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2020/42, ANSSI-CC-2020/45, BSI-DSZ-CC-1219-2024, ANSSI-CC-2020/44-R01, ANSSI-CC-2020/45-R01, NSCIB-CC-0112113-CR, 2021-43-INF-4154, ANSSI-CC-2020/42-R01, BSI-DSZ-CC-1112-V2-2021, 2021-44-INF-4142, ANSSI-CC-2020/49, ANSSI-CC-2020/43-R01, BSI-DSZ-CC-1112-2020, NSCIB-CC-146301-CR2, BSI-DSZ-CC-0891-V5-2021, ANSSI-CC-2020/33, ANSSI-CC-2020/43, BSI-DSZ-CC-0891-V6-2021, BSI-DSZ-CC-0891-V7-2024, ANSSI-CC-2020/44, ANSSI-CC-2020/49-R01, 2018-20-INF-4155, BSI-DSZ-CC-1220-2024, BSI-DSZ-CC-1034-V2-2021, BSI-DSZ-CC-1033-V2-2021 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0782-2012 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1112-V2-2021, BSI-DSZ-CC-1105-2020, ANSSI-CC-2020/45, ANSSI-CC-2020/49, ANSSI-CC-2020/42, BSI-DSZ-CC-1034-V2-2021, ANSSI-CC-2020/43, BSI-DSZ-CC-1033-V2-2021, NSCIB-CC-0112113-CR, BSI-DSZ-CC-1112-2020, ANSSI-CC-2020/44, NSCIB-CC-146301-CR2 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0891-V3-2018 |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1112-V2-2021, BSI-DSZ-CC-1105-2020, ANSSI-CC-2020/45, ANSSI-CC-2020/49, ANSSI-CC-2020/42, BSI-DSZ-CC-1034-V2-2021, ANSSI-CC-2020/43, BSI-DSZ-CC-1033-V2-2021, NSCIB-CC-0112113-CR, BSI-DSZ-CC-1112-2020, ANSSI-CC-2020/44, NSCIB-CC-146301-CR2 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0891-V2-2016 |
heuristics/protection_profiles |
7a7b216fc3e5f2ae |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MD_v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
|
0891V4c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0891-V4-2019: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 1
- EAL 6: 1
- EAL 6 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 1
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20191220112920+01'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software, Infineon Technologies AG
- /ModDate: D:20191220113447+01'00'
- /Producer: LibreOffice 6.2
- /Subject: Common Criteria Certification
- /Title: Certificate BSI-DSZ-CC-0891-V4-2019
- pdf_file_size_bytes: 292191
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid10632-vr.pdf |
0891V4a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-10632-2015
- cert_item: for Microsoft Windows 8.1 Microsoft Surface Pro 3
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0891-V4-2019
- cert_item: Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- US:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0891-V3-2018: 3
- BSI-DSZ-CC-0891-V4-2019: 23
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0084-2014: 3
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 1
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 5
- EAL 6 augmented: 3
- EAL6: 3
- EAL6 augmented: 3
- EAL6+: 3
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ATE:
- AVA:
|
- ALC:
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Microsoft:
- Microsoft: 79
- Microsoft Corporation: 1
|
- GD:
- G&D: 1
- Giesecke & Devrient: 1
- Infineon:
- Infineon: 10
- Infineon Technologies: 1
- Infineon Technologies AG: 20
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDES: 3
- Triple-DES: 2
- DES:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-2: 10
- SHA-256: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- physical tampering: 1
- SCA:
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 1
- AIS 23: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 37: 1
- AIS 38: 1
- AIS 46: 1
- AIS31: 2
- FIPS:
- FIPS180-4: 1
- FIPS186-4: 4
- FIPS197: 2
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 2, 2019-12-16, “Evaluation Technical Report Summary (ETR Summary)”, TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- Common Criteria EAL6 augmented / EAL6+ M7892 Design Steps D11 and G12”, Infineon Technologies AG (confidential document) 9 specifically • AIS 1, Version 14, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
- Level EAL6 augmented (EAL6+) M7892 D11 and G12”, Version 2.0, 2017-10-30, Infineon Technologies AG (confidential document) [12] M7892 Security Guidelines, 2019-09-25, Infineon Technologies AG [13] M7892 SOLID FLASH: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- “Evaluation Technical Report for Conmposite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, “Configuration Management Scope for Common Criteria with: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20150430105125-04'00'
- /ModDate: D:20150430105125-04'00'
- pdf_file_size_bytes: 399256
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20191220111937+01'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software, Infineon Technologies AG
- /ModDate: D:20191220112856+01'00'
- /Producer: LibreOffice 6.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0891-V4-2019
- pdf_file_size_bytes: 841581
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
st_vid10632-st.pdf |
0891V4b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0891-V3-: 1
- BSI-DSZ-CC-0891-V3-2018: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4+: 1
- EAL6: 8
- EAL6 augmented: 5
- EAL6+: 6
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 1
- AGD_PRE: 1
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_FLR: 1
- ALC_FLR.3: 1
- ALC_TSU_EXT: 1
- ALC_TSU_EXT.1: 7
- ASE:
- ASE_CCL: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.4: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_IMP.2: 2
- ADV_INT.3: 1
- ADV_SPM: 2
- ADV_SPM.1: 6
- ADV_TDS.5: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 3
- ALC_CMC.5: 3
- ALC_CMS: 2
- ALC_CMS.4: 2
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS.2: 3
- ALC_FLR.1: 11
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 3
- ATE_COV.3: 4
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 2
- FAU_SEL: 1
- FAU_SEL.1: 7
- FAU_SEL.1.1: 1
- FAU_STG.3: 1
- FAU_STG_EXT: 1
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 42
- FCS_CKM.1.1: 3
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM.4: 1
- FCS_CKM_EXT: 5
- FCS_CKM_EXT.1: 6
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.2: 11
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.3: 10
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 10
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 7
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 6
- FCS_CKM_EXT.6.1: 1
- FCS_COP: 3
- FCS_COP.1: 59
- FCS_COP.1.1: 8
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 20
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_RBG_EXT.1.3: 2
- FCS_SRV_EXT: 1
- FCS_SRV_EXT.1: 6
- FCS_SRV_EXT.1.1: 1
- FCS_STG_EXT: 3
- FCS_STG_EXT.1: 8
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 2
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 11
- FCS_STG_EXT.2.1: 1
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 8
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_TLS_EXT.1: 7
- FCS_TLS_EXT.1.1: 1
- FCS_TLS_EXT.1.2: 1
- FCS_TLS_EXT.2: 8
- FCS_TLS_EXT.2.1: 1
- FCS_TLS_EXT.2.2: 1
- FDP:
- FDP_ACF_EXT: 1
- FDP_ACF_EXT.1: 6
- FDP_ACF_EXT.1.1: 1
- FDP_DAR_EXT: 1
- FDP_DAR_EXT.1: 7
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_IFC.1.1: 1
- FDP_IFC_EXT: 1
- FDP_IFC_EXT.1: 6
- FDP_IFC_EXT.1.1: 1
- FDP_ITC_EXT.1: 1
- FDP_STG_EXT: 1
- FDP_STG_EXT.1: 7
- FDP_STG_EXT.1.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_AFL_EXT: 1
- FIA_AFL_EXT.1: 8
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_BLT_EXT: 1
- FIA_BLT_EXT.1: 6
- FIA_BLT_EXT.1.1: 1
- FIA_PAE_EXT: 1
- FIA_PAE_EXT.1: 6
- FIA_PAE_EXT.1.1: 1
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 1
- FIA_TRT_EXT: 1
- FIA_TRT_EXT.1: 6
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 3
- FIA_UAU_EXT.1: 8
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 8
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.2.2: 1
- FIA_UAU_EXT.3: 6
- FIA_UAU_EXT.3.1: 1
- FIA_UID.1: 2
- FMT:
- FMT_MOF.1: 28
- FMT_MOF.1.1: 3
- FMT_SMF: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 2
- FMT_SMF_EXT: 1
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 1
- FPT:
- FPT_AEX_EXT: 4
- FPT_AEX_EXT.1: 6
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.1.3: 3
- FPT_AEX_EXT.1.4: 1
- FPT_AEX_EXT.2: 6
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.2.2: 2
- FPT_AEX_EXT.3: 6
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 6
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_ITC_EXT: 1
- FPT_KST_EXT: 3
- FPT_KST_EXT.1: 8
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 6
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 6
- FPT_KST_EXT.3.1: 1
- FPT_NOT_EXT: 1
- FPT_NOT_EXT.1: 6
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 6
- FPT_TST_EXT.2.1: 1
- FPT_TST_EXT.2.2: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FPT_TUD_EXT.1.4: 1
- FPT_TUD_EXT.2: 6
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.2.4: 1
- FPT_TUD_EXT.2.5: 3
- FPT_TUD_EXT.2.6: 2
- FTA:
- FTA_SSL_EXT: 1
- FTA_SSL_EXT.1: 7
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTA_WSE_EXT: 1
- FTA_WSE_EXT.1: 6
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_ITC_EXT.1: 7
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 10
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 94
- FCS_CKM.1: 33
- FCS_CKM.2: 4
- FCS_CKM.4: 29
- FCS_COP: 114
- FCS_COP.1: 24
- FCS_RNG: 7
- FCS_RNG.1: 13
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 17
- FDP_ACC.1: 27
- FDP_ACC.1.1: 1
- FDP_ACF: 17
- FDP_ACF.1: 25
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 16
- FDP_ITC.1: 27
- FDP_ITC.2: 27
- FDP_ITT.1: 18
- FDP_SDC: 2
- FDP_SDC.1: 9
- FDP_SDC.1.1: 1
- FDP_SDI.1: 15
- FDP_SDI.1.1: 1
- FDP_SDI.2: 11
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_API: 2
- FIA_API.1: 11
- FIA_API.1.1: 1
- FMT:
- FMT_CKM.4: 1
- FMT_LIM: 27
- FMT_LIM.1: 9
- FMT_LIM.2: 8
- FMT_MSA.1: 18
- FMT_MSA.1.1: 1
- FMT_MSA.3: 24
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 5
- FPT:
- FPT_FLS.1: 18
- FPT_ITT: 3
- FPT_ITT.1: 14
- FPT_LIM: 2
- FPT_LIM.1: 2
- FPT_PHP.3: 24
- FPT_TST: 5
- FPT_TST.1: 11
- FPT_TST.2: 33
- FPT_TST.2.1: 2
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.PRECAUTION: 1
- O:
- O.AUTH: 1
- O.COMMS: 1
- O.CONFIG: 1
- O.INTEGRITY: 1
- O.STORAGE: 1
- OE:
- OE.CONFIG: 1
- OE.NOTIFY: 1
- OE.PRECAUTION: 1
- T:
- T.EAVESDROP: 1
- T.FLAWAPP: 1
- T.NETWORK: 1
- T.PERSISTENT: 1
- T.PHYSICAL: 1
|
- O:
- O.AES: 10
- O.RND: 3
- O.SHA: 6
- O.TDES: 10
- T:
|
pdf_data/st_keywords/vendor |
- Cisco:
- Microsoft:
- Microsoft: 188
- Microsoft Corporation: 5
|
- Infineon:
- Infineon: 13
- Infineon Technologies: 10
- Infineon Technologies AG: 20
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 37
- AES-: 2
- AES-128: 7
- AES-256: 5
- AES256: 1
- RC:
- DES:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 23
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
- HMAC-SHA-512: 3
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 8
- DHE: 2
- Diffie-Hellman: 10
- DSA:
- RSA:
|
- ECC:
- FF:
- RSA:
- RSA-2048: 1
- RSA2048: 2
- RSA4096: 2
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-256: 6
- SHA-384: 6
- SHA-512: 7
- SHA256: 3
|
- SHA:
- SHA2:
- SHA-2: 62
- SHA-256: 3
- SHA-512: 3
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- KA: 16
- Key Agreement: 10
- Key agreement: 1
- KEX:
- MAC:
|
- KA:
- Key Agreement: 2
- Key agreement: 2
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 11
- IKEv1: 2
- IKEv2: 2
- IPsec:
- TLS:
- SSL:
- TLS:
- TLS: 71
- TLS 1.0: 7
- TLS 1.1: 1
- TLS 1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 20
- P-284: 6
- P-384: 8
- P-521: 14
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 5
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
|
pdf_data/st_keywords/crypto_library |
|
- Generic:
- Crypto Library v2.02.010: 1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 9
- Malfunction: 8
- fault induction: 1
- SCA:
- DPA: 13
- Leak-Inherent: 10
- Physical Probing: 2
- SPA: 7
- physical probing: 1
- side channel: 9
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 1
- FIPS 140-1: 2
- FIPS 140-2: 5
- FIPS 180-3: 1
- FIPS 186-4: 12
- FIPS 197: 2
- FIPS 198-1: 1
- FIPS 198-2: 1
- FIPS PUB 186-4: 5
- FIPS PUB 197: 1
- NIST:
- NIST SP 800-108: 1
- NIST SP 800-132: 2
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38F: 5
- NIST SP 800-56A: 3
- NIST SP 800-56B: 2
- NIST SP 800-57: 1
- NIST SP 800-90: 1
- SP 800-108: 2
- SP 800-132: 1
- SP 800-56A: 3
- SP 800-90: 2
- RFC:
- RFC 2246: 4
- RFC 2396: 1
- RFC 2560: 1
- RFC 2818: 2
- RFC 2986: 2
- RFC 3268: 1
- RFC 3546: 2
- RFC 4301: 1
- RFC 4306: 1
- RFC 4346: 1
- RFC 4366: 1
- RFC 4492: 1
- RFC 4681: 1
- RFC 5216: 1
- RFC 5246: 8
- RFC 5280: 4
- RFC 5289: 5
- RFC 5759: 1
- RFC 6460: 4
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 4
- FIPS PUB 180-4: 2
- FIPS PUB 186-4: 2
- FIPS PUB 197: 2
- FIPS PUB 800-38: 1
- ISO:
- ISO/IEC 10118: 2
- ISO/IEC 11770-: 1
- ISO/IEC 11770-3: 2
- ISO/IEC 14888-3: 2
- ISO/IEC 18033: 2
- ISO/IEC 18092: 4
- ISO/IEC 9797-1: 2
- ISO/IEC 9798-2: 1
- ISO/IEC14443-3: 1
- NIST:
- SP 800-38A: 7
- SP 800-67: 4
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this security target. T.FLAWAPP Malicious or Flawed Application: Applications loaded onto the: 1
- out of scope: 1
|
- OutOfScope:
- SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use- case and the authentication functionality is no longer available. 1 Bundesamt: 1
- SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. CC Developer: 1
- out of scope: 3
- related to the TOE authentication is regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. The following: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20150430105248-04'00'
- /ModDate: D:20150430105248-04'00'
- pdf_file_size_bytes: 2083029
- pdf_hyperlinks: http://www.ietf.org/rfc/rfc5246.txt, http://www.ietf.org/rfc/rfc4346.txt, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.signasync.aspx, http://msdn.microsoft.com/en-us/library/ms725473(v=vs.85).aspx, http://msdn.microsoft.com/en-us/library/windows/desktop/aa374757(v=vs.85).aspx), http://www.ietf.org/rfc/rfc2246.txt, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.encrypt.aspx, http://www.ietf.org/rfc/rfc4366.txt, http://technet.microsoft.com/en-us/library/cc733982(v=WS.10).aspx, http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf, http://www.ietf.org/rfc/rfc4301.txt, http://msdn.microsoft.com/en-us/library/windows/apps/windows.networking.vpn.aspxn, https://www.niap-ccevs.org/pp/pp_swfde_v1.1.pdf, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.sign.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.security.cryptography.core.asymmetrickeyalgorithmprovider.importkeypair.aspx, http://tools.ietf.org/html/rfc5280, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.signhasheddataasync.aspx, https://www.niap-ccevs.org/st/st_vid10540-vr.pdf, http://csrc.nist.gov/publications/nistpubs/800-56B/sp800-56B.pdf, http://www.trustedcomputinggroup.org/files/static_page_files/8C56AE3E-1A4B-B294-D0F43097156A55D8/TPM%20Rev%202.0%20Part%201%20-%20Architecture%2001.16.pdf, http://msdn.microsoft.com/en-us/library/windows/apps/windows.web.http.httpclient.aspx, http://www.trustedcomputinggroup.org/files/static_page_files/0328C641-1A4B-B294-D0D3151FB2B30179/TCG_PP_PC_client_specific_TPM_SecV2_v10_PublicReview.pdf, https://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00, http://msdn.microsoft.com/en-us/library/jj709814.aspx, http://creativecommons.org/licenses/by-nd-nc/1.0/, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.hashalgorithmprovider.hashdata.aspx, http://technet.microsoft.com/en-us/library/cc783349(v=WS.10).aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.cryptographicbuffer.generaterandomnumber.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/dn298266.aspx, http://msdn.microsoft.com/en-us/library/ms724962(v=vs.85).aspx, http://msdn.microsoft.com/en-us/library/windows/apps/dn279161.aspx, http://msdn.microsoft.com/en-us/library/windows/hardware/ff556022(v=vs.85).aspx, https://www.niap-ccevs.org/st/st_vid10540-st.pdf, http://www.ietf.org/rfc/rfc5289.txt, https://www.wi-fi.org/product-finder-results?keywords=19950, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.verifysignaturewithhashinput.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.devices.bluetooth.rfcomm.aspx, http://support.microsoft.com/kb/816042#method2, http://msdn.microsoft.com/en-us/library/windows/desktop/aa374757(v=vs.85).aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.cryptographicbuffer.generaterandom.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.dataprotection.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.security.cryptography.certificates.certificate.buildchainasync.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.signhasheddata.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.devices.humaninterfacedevice.aspx, http://www.ietf.org/rfc/rfc4306.txt, http://www.ietf.org/rfc/rfc4492.txt, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.asymmetrickeyalgorithmprovider.createkeypair.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.hashalgorithmprovider.createhash.aspx, http://www.ietf.org/rfc/rfc3546.txt, http://msdn.microsoft.com/en-us/library/windows/desktop/aa376545(v=vs.85).aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.verifysignature.aspx, http://www.intel.com/content/www/us/en/processors/core/4th-gen-core-family-mobile-u-y-processor-lines-vol-1-datasheet.html, http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm, http://www.ietf.org/rfc/rfc4681.txt, http://msdn.microsoft.com/en-us/library/windows/apps/windows.security.cryptography.certificates.certificateenrollmentmanager.importpfxdataasync.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/dn298272.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.security.cryptography.core.keyderivationparameters.buildforpbkdf2.aspx, http://www.ietf.org/rfc/rfc3268.txt, http://www.microsoft.com/security/default.aspx, http://technet.microsoft.com/en-us/library/cc773013(v=WS.10).aspx, http://msdn.microsoft.com/en-us/library/aa375458(v=VS.85).aspx, https://www.niap-ccevs.org/st/st_vid10520-st.pdf, http://msdn.microsoft.com/en-us/library/windows/apps/windows.devices.usb.aspx, http://www.ietf.org/rfc/rfc2409.txt, http://msdn.microsoft.com/en-us/library/windows/apps/windows.networking.vpn.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.decrypt.aspx, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 155
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |