name |
Sourcefire 3D System Version 5.2.0.1 |
fiskaly Security Module Application for Electronic Record-keeping Systems, Version 1.0.5 |
category |
Detection Devices and Systems |
Other Devices and Systems |
scheme |
US |
DE |
status |
archived |
active |
not_valid_after |
21.03.2016 |
16.05.2029 |
not_valid_before |
06.08.2014 |
17.05.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1130c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1130a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1130b_pdf.pdf |
manufacturer |
Sourcefire Inc. |
fiskaly GmbH |
manufacturer_web |
https://www.sourcefire.com/ |
https://fiskaly.com |
security_level |
{} |
EAL2+, ALC_CMC.3, ALC_LCD.1 |
dgst |
79f1b9da6ca5a71c |
d3ce80848d8f745d |
heuristics/cert_id |
CCEVS-VR-VID-10537-2014 |
BSI-DSZ-CC-1130-2021 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
ATE_IND.2, ALC_LCD.1, ADV_ARC.1, ALC_CMC.3, ALC_CMS.3 |
heuristics/extracted_versions |
5.2.0.1 |
1.0.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1130-V2-2021 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1153-2021 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1130-V3-2025, BSI-DSZ-CC-1130-V2-2021 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1153-2021 |
heuristics/scheme_data |
- category: Firewall, Wireless Monitoring
- certification_date: 06.08.2014
- evaluation_facility: COACT, Inc. Labs
- expiration_date: 06.08.2016
- id: CCEVS-VR-VID10537
- product: Sourcefire 3D System Version 5.2.0.1
- scheme: US
- url: https://www.niap-ccevs.org/product/10537
- vendor: Sourcefire, Inc.
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
ac9abe3d5c5a31f0 |
faf328d504ee2404 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0105b_pdf.pdf |
pdf_data/cert_filename |
|
1130c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0105-V2-2020: 1
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
- EAL 4: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_CMS.3: 1
- ALC_LCD.1: 1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210517142424+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung"
- /ModDate: D:20210521101645+02'00'
- /Producer: LibreOffice 6.3
- /Subject: fiskaly Security Module Application for Electronic Record-keeping Systems Version 1.0.5
- /Title: BSI-DSZ-CC-1130-2021
- pdf_file_size_bytes: 316211
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid10537-vr.pdf |
1130a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID10537-2014
- cert_item: Sourcefire 3D System Version 5.2.0.1
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 2 augmented by ALC_LCD.1 and ALC_CMS.3 SOGIS Recognition Agreement for components up to EAL 4
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1130-2021
- cert_item: fiskaly Security Module Application for Electronic Record-keeping Systems, Version 1.0.5
- cert_lab: BSI
- developer: fiskaly GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security Module Application for Electronic-keeping Systems (SMAERS) Version 1.0, 28 July 2020, BSI-CC-PP-0105-V2-2020
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10537-2014: 1
|
- DE:
- BSI-DSZ-CC-1130-2021: 14
- BSI-DSZ-CC-1153-2021: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0105-V2-2020: 4
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 6
- EAL 2 augmented: 3
- EAL 2+: 1
- EAL 4: 2
- EAL2: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMS.3: 4
- ALC_FLR: 2
- ALC_LCD.1: 4
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM.1: 2
- FCS_COP.1: 1
- FCS_RNG.1: 1
- FMT:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS 32: 1
- AIS20: 4
- AIS31: 1
- FIPS:
- FIPS 186-4: 4
- FIPS PUB 186-4: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Record-keeping Systems TOE Ver-sion 1.0.5, Version: 1.1.6, Date: 2021-05-11, fiskaly GmbH (confidential document) [12] Functional Specification Documentation fiskaly Security Module Application for Electronic: 1
- SHA256 value 119C677A27C8EBAA14C8E240C5CC29AE8E- 08FF19468C959883569A74FAF5A9CB, fiskaly GmbH (confidential document) [11] Preparative Procedures & Operational User Guidance Documentation fiskaly Security Module: 1
- Systems TOE Version 1.0.5, Version: 1.1.4, Date: 2021- 05-06 , fiskaly GmbH (confidential document) [13] Umgebungsschutzkonzept fiskaly Security Module Application for Electronic Record-keeping: 1
- Systems Version 1.0.5, Version 1.96, Date: 12.05.2021, SRC Security Research & Consulting GmbH, (confidential document) [8] Security Module Application for Electronic-keeping Systems (SMAERS) Version 1.0, 28 July 2020: 1
- TOE Version 1.0.5, Version: 1.3.5, Date: 2021-04-21, fiskaly GmbH (confidential document) 7 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: Robert Roland
- /Comments:
- /Company: COACT
- /CreationDate: D:20140807135046-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Keywords:
- /ModDate: D:20140807135101-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140807175026
- /Subject:
- /Title:
- pdf_file_size_bytes: 136944
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
|
pdf_data/st_filename |
st_vid10537-st.pdf |
1130b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0104-2019: 1
- BSI-CC-PP-0105-V2-2020: 5
- BSI-CC-PP-0108-2019: 1
- BSI-CC-PP-0111-2019: 1
- BSI-CC-PP-0113-2020: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL2: 5
- EAL2 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 15
- AGD_PRE: 1
- AGD_PRE.1: 11
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 5
- ALC_CMS: 1
- ALC_CMS.1: 6
- ATE:
- AVA:
|
- ADV:
- ALC:
- ALC_CMS.3: 5
- ALC_LCD.1: 4
- ATE:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 11
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 5
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 5
- FCS_CKM_EXT: 5
- FCS_CKM_EXT.4: 8
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 33
- FCS_COP.1.1: 4
- FCS_RBG_EXT: 5
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT: 5
- FCS_SSH_EXT.1: 4
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_TLS_EXT: 5
- FCS_TLS_EXT.1: 6
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP: 5
- FDP_RIP.2: 3
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT: 5
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU: 5
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 5
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 4
- FIA_UIA_EXT.1: 7
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 2
- FIA_UID_EXT: 1
- FMT:
- FMT_MTD: 5
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF: 6
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR: 5
- FMT_SMR.2: 3
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 3
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_AWP_EXT: 2
- FPT_ITT: 5
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_SKP_EXT: 5
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM: 5
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 5
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 5
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL: 12
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 6
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 5
- FTA_TAB.1: 4
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 5
- FTP_ITC.1: 3
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 6
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 7
- FAU_GEN.1: 3
- FAU_STG: 9
- FAU_STG.1: 3
- FAU_STG.3: 5
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_COP.1: 5
- FCS_COP.1.1: 1
- FCS_RNG: 4
- FCS_RNG.1: 9
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 6
- FDP_ACC.1: 16
- FDP_ACF: 10
- FDP_ACF.1: 14
- FDP_DAU: 5
- FDP_ETC: 15
- FDP_ETC.2: 12
- FDP_IFC.1: 9
- FDP_ITC: 12
- FDP_ITC.1: 2
- FDP_ITC.2: 19
- FDP_RIP: 2
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 4
- FIA_API.1: 8
- FIA_API.1.1: 2
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_UAU: 3
- FIA_UAU.1: 4
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 5
- FIA_UAU.6: 3
- FIA_UAU.6.1: 1
- FIA_UID.1: 5
- FIA_UID.1.1: 2
- FIA_UID.1.2: 1
- FIA_USB.1: 2
- FIA_USB.1.1: 3
- FIA_USB.1.2: 1
- FIA_USB.1.3: 4
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 3
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.2: 3
- FMT_MSA.2.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 4
- FMT_MSA.4.1: 1
- FMT_MTD: 16
- FMT_MTD.1: 4
- FMT_MTD.3: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 5
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS: 2
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_STM.1: 2
- FPT_STM.1.1: 1
- FPT_TDC.1: 5
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TEE.1: 19
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 7
- FTP_ITC.1: 6
- FTP_TEE.1: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECTIONS: 4
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.ADDRESS_FILTERING: 5
- O.DISPLAY_BANNER: 1
- O.PORT_FILTERING: 5
- O.PROTECTED_COMMUNICATIONS: 1
- O.RELATED_CONNECTION_FILTERING: 5
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.STATEFUL_INSPECTION: 5
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- OE:
- T:
- T.ADMIN_ERROR: 1
- T.NETWORK_ACCESS: 3
- T.NETWORK_DISCLOSURE: 2
- T.NETWORK_DOS: 4
- T.NETWORK_MISUSE: 2
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
- A:
- O:
- O.IAA: 4
- O.TEE: 8
- O.TST: 4
- OE:
- OE.CSP: 5
- OE.ERS: 7
- OE.SUCP: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 2
- SHA-384: 5
- SHA-512: 12
|
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 1
- Key agreement: 1
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- SSH: 37
- SSHv1: 2
- SSHv2: 19
- TLS:
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03116: 1
- BSI TR-03116-5: 1
- BSI TR-03151: 6
- BSI TR-03153: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 4
- FIPS 186-2: 1
- FIPS 186-3: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-2: 2
- FIPS PUB 186-3: 1
- FIPS PUB 197: 2
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-56B: 1
- SP 800-56B: 3
- SP 800-90: 1
- RFC:
- RFC 2246: 2
- RFC 2460: 2
- RFC 2818: 2
- RFC 3513: 2
- RFC 4253: 1
- RFC 4443: 2
- RFC 5735: 2
- RFC 768: 2
- RFC 791: 2
- RFC 792: 2
- RFC 793: 2
- RFC 959: 1
|
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- ICAO:
- ISO:
- NIST:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- NTP Server SMTP Server Audit Server SNMP Server Network Assets Legend TOE Operational Environment Out of Scope … … Sourcefire 3D System Security Target 13 The TOE main subsystems are summarized as followed: •: 1
- Out of Scope: 1
- in the update header to ensure they match. 12 This process requires access to the Internet and is out of scope of the evaluation. Sourcefire 3D System Security Target 61 During the update process, if the Snort: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
- /Author: fiskaly
- /CreationDate: D:20210511144101Z
- /Creator: LaTeX with hyperref
- /Keywords: fiskaly
SMAERS
Common Criteria
CC
Security Target
- /ModDate: D:20210511164416+02'00'
- /PTEX.Fullbanner: This is pdfTeX, Version 3.14159265-2.6-1.40.20 (TeX Live 2019) kpathsea version 6.3.1
- /Producer: pdfTeX-1.40.20
- /Subject: Common Criteria Security Target v1.1.6 for fiskaly SMEARS v1.0.5
- /Title: Security Target fiskaly Security Module Application for Electronic Record-keeping Systems v1.1.6
- /Trapped: /False
- pdf_file_size_bytes: 654364
- pdf_hyperlinks: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03153/TR-03153-TS-Ergaenzungen.pdf?__blob=publicationFile&v=2, https://www.bundesfinanzministerium.de/Content/DE/Gesetzestexte/Gesetze_Verordnungen/2017-10-06-KassenSichV.html, https://www.bsi.bund.de/DE/Publikationen/TechnischeRichtlinien/tr03116/index_htm.html, https://www.icao.int/publications/Documents/9303_p11_cons_en.pdf, https://jedisct1.github.io/minisign/, https://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf, https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/PP/aktuell/PP_0111.html, https://www.openbsd.org/papers/bsdcan-signify.html, https://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf, https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_Functionality_classes_for_random_number_generators_e.pdf, https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/PP/aktuell/PP_0107.html, https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/PP/aktuell/PP_0113.html, https://www.bsi.bund.de/DE/Publikationen/TechnischeRichtlinien/tr03151/index_htm.html, https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/PP/aktuell/PP_0105_0105_V2.html, https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/PP/aktuell/PP_0104.html, https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/PP/aktuell/PP_0108.html, https://www.bsi.bund.de/DE/Publikationen/TechnischeRichtlinien/tr03153/index_htm.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 84
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |