name |
TCOS eEnergy Security Module Version 2.0 Release 1/P71
|
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6)
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
Other Devices and Systems
|
not_valid_before |
2024-02-29
|
2018-01-15
|
not_valid_after |
2034-03-01
|
2021-01-14
|
scheme |
DE
|
TR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1217b_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NCR%20e10%20Security%20Target%202.7.pdf
|
status |
active
|
archived
|
manufacturer |
Deutsche Telekom Security GmbH
|
Encore Bilişim Sistemleri Ltd. Şti.
|
manufacturer_web |
https://www.telekom.de/security
|
https://www.ncr.com/
|
security_level |
ALC_DVS.2, AVA_VAN.5, EAL4+, ATE_DPT.2 |
EAL2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1217a_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NCR%20v2.0%20CR.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1217c_pdf.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for the Security Module of a Smart Metering System', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0077b_pdf.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'New Generation Cash Register Fiscal Application Software Protection Profile', 'pp_eal': 'EAL2', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/NGCRFAS_PP_v2%200.pdf', 'pp_ids': frozenset({'NGCRFAS PP'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
b614936b2d1f7d1555bee0f16f96141cdb06b86ef7c0fed1e6d10a8a1dfd526e
|
None
|
state/cert/txt_hash |
b70df464e41897e798d8a03b2ce1befe8a7e3d3f522bd148caf7f7b9caa7f3b2
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
0bedd2a193c3ba00bedfcc429bd9dcf1a852eea6bf7c207e1a7cd1f5701d9013
|
44336d31760811c7d0394f7569d153e671cabba2e4f5d09cd4cbb3ccf7a84538
|
state/report/txt_hash |
6b201fec135c46f5fa06400244b7f4a18aac436ce3b7d94eab3451bca1982a37
|
5286f02707797ad72414d7a2f167934f340b9fa9a6c744af5f0e861f7aacabb8
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
3d8976b02e8509887aab898939d770d74abd3dc38e4a2df47b1fa7ff6263704b
|
ef7f2346152e8a89e7204d78962b5a3c487a2827c0497c7a8c47fc105f1a2387
|
state/st/txt_hash |
8596b1c4e04223e6f206e3aa7294881be123c7bce9e9cee470c09fbefef12699
|
25066db009017c2e24485b69db5be2dc4c96851b30201b3455150322ab1dfd4d
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-1217-2024
|
21.0.03/TSE-CCCS-48
|
heuristics/cert_lab |
BSI |
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1149-V3-2023 |
None
|
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1149-V3-2023, BSI-DSZ-CC-1149-2022, BSI-DSZ-CC-1149-V2-2023 |
None
|
heuristics/scheme_data |
- cert_id:
BSI-DSZ-CC-1217-2024
- product:
TCOS eEnergy Security Module Version 2.0 Release 1/P71
- vendor:
Deutsche Telekom Security GmbH
- certification_date:
29.02.2024
- category:
Intelligent measuring systems
- url:
https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Smartmeter_Sicherheitsmodule/1217.html
- enhanced:
- product:
TCOS eEnergy Security Module Version 2.0 Release 1/P71
- applicant:
Deutsche Telekom Security GmbH
Untere Industriestraße 20
57250 Netphen
- evaluation_facility:
SRC Security Research & Consulting GmbH
- assurance_level:
EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5
- protection_profile:
Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP), Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015
- certification_date:
29.02.2024
- expiration_date:
28.02.2034
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1217a_pdf.pdf?__blob=publicationFile&v=2
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1217b_pdf.pdf?__blob=publicationFile&v=2
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1217c_pdf.pdf?__blob=publicationFile&v=2
- description:
The Target of Evaluation (TOE) is the product TCOS eEnergy Security Module Version 2.0 Release 1/P71 developed by Deutsche Telekom Security GmbH. The TOE is a Smart Meter Security Module according to the Technical Guideline BSI TR-03109-2, Version 1.1 intended to be used by a Smart Meter Gateway in a Smart Metering System. The TOE serves as cryptographic service provider for the Smart Meter Gateway and supports the Smart Meter Gateway for its specific cryptographic needs. These cryptographic services cover the following issues: Digital Signature Generation, Digital Signature Verification, Key Agreement for TLS, Key Agreement for Content Data Encryption, Key Pair Generation, Random Number Generation, Component Authentication via the PACE Protocol with Negotiation of Session Keys, Secure Messaging, and Secure Storage of Key Material and further data relevant for the Gateway.
- subcategory:
Security module for an Smart Metering Gateway
|
None
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-1149-V3-2023 |
None
|
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-1149-V3-2023 |
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
1217c_pdf.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- BSI:
- BSI-CC-PP-0077-V2-2015:
1
- cc_security_level:
- EAL:
- EAL 4:
1
- EAL 5:
1
- EAL 2:
1
- EAL 4 augmented:
1
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- DeutscheTelekom:
- Deutsche Telekom Security:
1
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
233498
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /Keywords:
"Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2"
- /Subject:
Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2
- /Title:
Certificate BSI-DSZ-CC-1217-2024
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
1217a_pdf.pdf
|
NCR v2.0 CR.pdf
|
pdf_data/report_frontpage |
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-1217-2024
- cert_item:
TCOS eEnergy Security Module Version 2.0 Release 1/P71
- developer:
Deutsche Telekom Security GmbH
- cert_lab:
BSI
- ref_protection_profiles:
Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP), Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015
- cc_version:
PP conformant plus product specific extensions Common Criteria Part 2 extended
- cc_security_level:
Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 valid until: 28 February 2034
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA |
6
|
1
|
pdf_data/report_keywords/asymmetric_crypto/FF |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1217-2024:
16
- BSI-DSZ-CC-1149-V3-2023:
5
- BSI-DSZ-CC-1217:
3
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0077-V2-2015:
4
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ALC:
- ALC_DVS.2:
5
- ALC_FLR:
2
- ALC_CMC.4:
1
- ALC_CMS.4:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.1:
1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/report_keywords/cc_sar/ADV |
|
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1:
1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
|
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1:
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE |
|
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 4: 5
- EAL 5: 4
- EAL 2:
3
- EAL 1: 1
- EAL5+: 1
- EAL6: 1
- EAL 5+: 1
- EAL 6: 1
- EAL 4 augmented: 3
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 |
3
|
2
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_COP:
6
- FCS_CKM:
4
- FCS_RNG.1:
1
- FIA:
- FIA_UID.1:
1
- FIA_UAU.4:
1
- FIA_UAU.5:
1
- FTP:
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- Version 2.0 Release 1/P71, Version 1.1, 16 February 2024, SRC Security Research & Consulting GmbH (confidential document) [9] Configuration List BSI-DSZ-CC-1217, Konfigurationsliste von TCOS eESM Version 2.0 Release:
1
- P71D600, Version 1.0, 13 February 2024, Deutsche Telekom Security GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-1217, Operational Guidance for users and administrators:
1
- R1/R2R3), BSI- DSZ-CC-1149-V3-2023, Version 2, 1 December 2023, TÜV Informationstechnik GmbH (confidential document) [14] Technische Richtlinie BSI TR-03109-1: Smart Meter Gateway - Anforderungen an die:
1
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_protocol/TLS |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
1
- DeutscheTelekom:
- Deutsche Telekom Security:
15
- SRC:
- SRC Security Research & Consulting:
3
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
- SCA:
- FI:
- malfunction:
1
- fault injection:
2
- other:
|
- SCA:
- side channel:
1
- SPA:
2
- DPA:
2
- FI:
- physical tampering:
3
- Malfunction:
1
- malfunction:
2
- DFA:
1
|
pdf_data/report_keywords/side_channel_analysis/FI |
- malfunction:
1
- fault injection: 2
|
- physical tampering: 3
- Malfunction: 1
- malfunction:
2
- DFA: 1
|
pdf_data/report_keywords/side_channel_analysis/FI/malfunction |
1
|
2
|
pdf_data/report_keywords/side_channel_analysis/SCA |
|
- side channel:
1
- SPA: 2
- DPA: 2
|
pdf_data/report_keywords/side_channel_analysis/SCA/side channel |
2
|
1
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 180-4:
2
- FIPS 186:
5
- FIPS 197:
2
- BSI:
- AIS 34:
4
- AIS 36:
7
- AIS 37:
3
- AIS 26:
4
- AIS 25:
4
- AIS 20:
3
- AIS 31:
3
- AIS 46:
3
- AIS 1:
1
- AIS 14:
1
- AIS 19:
1
- AIS 32:
1
- AIS 35:
1
- AIS 38:
1
- RFC:
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
- ISO:
- X509:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/report_keywords/standard_id/ISO |
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
6
|
5
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI TR-03109-2:
1
- BSI 7148:
1
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- NXP:
- NXP:
5
- NXP Semiconductors:
9
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
416984
- pdf_is_encrypted:
False
- pdf_number_of_pages:
29
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2"
- /Subject: Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2
- /Title: Certification Report BSI-DSZ-CC-1217-2024
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
|
- pdf_file_size_bytes:
536471
- pdf_is_encrypted:
False
- pdf_number_of_pages:
21
- /Author:
Cengiz GÖREN
- /Creator: Microsoft® Word 2019
- /CreationDate: D:20191213114059+03'00'
- /ModDate: D:20191213114059+03'00'
- /Producer: Microsoft® Word 2019
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
Bundesamt für Sicherheit in der Informationstechnik
|
Cengiz GÖREN
|
pdf_data/report_metadata/pdf_file_size_bytes |
416984
|
536471
|
pdf_data/report_metadata/pdf_hyperlinks |
https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte |
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
29
|
21
|
pdf_data/st_filename |
1217b_pdf.pdf
|
NCR e10 Security Target 2.7.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1217:
1
- BSI-DSZ-CC-1149-V3-2023:
1
|
|
pdf_data/st_keywords/cc_claims |
- O:
- O.PACE:
5
- O.RND:
2
- O.AES:
1
- O.TDES:
1
- O.RSA:
1
- O.ECC:
1
- O.PUF:
1
- OE:
- OSP:
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0077-V2-2015:
2
- BSI-CC-PP-0073-2014:
1
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_TDS: 2
- ADV_ARC.1:
2
- ADV_TDS.3: 2
- ADV_FUN.1: 1
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
|
- ADV_ARC.1:
1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
2
|
1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
1
|
3
|
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.1: 2
- ALC_DVS.2: 8
- ALC_DEL.1:
2
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
|
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
|
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_DPT.2: 8
- ATE_COV.2: 1
- ATE_FUN.1:
1
|
- ATE_COV.1: 1
- ATE_FUN.1:
1
- ATE_IND.2: 1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL4:
6
- EAL 6+:
1
- EAL 4:
5
- EAL 6:
1
- EAL4 augmented:
3
- EAL 6 augmented:
1
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_RNG:
9
- FCS_RNG.1:
17
- FCS_RNG.1.1:
2
- FCS_RNG.1.2:
2
- FCS_CKM:
61
- FCS_CKM.4:
45
- FCS_COP:
67
- FCS_CKM.1:
16
- FCS_CKM.2:
8
- FCS_COP.1:
12
- FCS_CKM.4.1:
1
- FDP:
- FDP_ACF:
4
- FDP_ACC.2:
17
- FDP_ACF.1:
8
- FDP_SDI.2:
8
- FDP_RIP.1:
7
- FDP_ETC.1:
7
- FDP_ITC.1:
20
- FDP_UCT.1:
8
- FDP_UIT.1:
7
- FDP_ITC.2:
14
- FDP_ACC.1:
12
- FDP_ACC.2.1:
1
- FDP_ACC.2.2:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_SDI.1:
2
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_RIP.1.1:
1
- FDP_IFC:
1
- FDP_ETC.1.1:
1
- FDP_ETC.1.2:
1
- FDP_IFC.1:
8
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_UIT.1.2:
1
- FDP_ITC:
8
- FDP_SDI:
1
- FDP_RIP:
1
- FDP_UIT:
2
- FDP_SDC.1:
1
- FDP_ITT.1:
1
- FDP_ACC:
2
- FDP_UCT:
1
- FIA:
- FIA_ATD.1:
10
- FIA_SOS.1:
3
- FIA_UAU:
18
- FIA_UAU.4:
6
- FIA_UAU.5:
6
- FIA_UID.1:
14
- FIA_USB.1:
6
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.1:
5
- FIA_UAU.4.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_SOS:
1
- FIA_UID:
1
- FIA_USB:
1
- FMT:
- FMT_LIM:
7
- FMT_LIM.1:
23
- FMT_LIM.2:
21
- FMT_LIM.1.1:
2
- FMT_LIM.2.1:
2
- FMT_SMF.1:
10
- FMT_SMR.1:
6
- FMT_MSA.3:
4
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMR:
1
- FMT_MSA:
2
- FPT:
- FPT_EMS:
6
- FPT_EMS.1:
14
- FPT_EMS.1.1:
2
- FPT_EMS.1.2:
2
- FPT_FLS.1:
8
- FPT_PHP.3:
9
- FPT_TST.1:
9
- FPT_FLS.1.1:
1
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_FLS:
1
- FPT_PHP:
1
- FPT_TST:
1
- FPT_ITT.1:
1
- FRU:
- FTP:
- FTP_ITC.1:
10
- FTP_TRP.1:
4
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_ICT.1:
4
- FTP_ITC:
2
|
- FAU:
- FAU_GEN:
1
- FAU_GEN.1:
6
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_SAR:
1
- FAU_SAR.1:
4
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_STG:
1
- FAU_STG.1:
5
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.4:
4
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FCO:
- FCO_NRO:
1
- FCO_NRO.2:
4
- FCO_NRO.1:
1
- FCO_NRO.2.1:
1
- FCO_NRO.2.2:
1
- FCO_NRO.2.3:
1
- FCS:
- FCS_CKM:
27
- FCS_CKM.2:
15
- FCS_COP.1:
12
- FCS_CKM.4:
55
- FCS_CKM.1.1:
6
- FCS_CKM.1:
27
- FCS_CKM.2.1:
1
- FCS_CKM.4.1:
1
- FCS_COP:
43
- FCS_COP.1.1:
11
- FDP:
- FDP_ITC.1:
27
- FDP_ITC.2:
27
- FDP_ACC:
1
- FDP_ACC.1:
25
- FDP_ACF.1:
5
- FDP_ACC.1.1:
1
- FDP_ACF:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ETC:
9
- FDP_IFC.1:
22
- FDP_ETC.2.1:
2
- FDP_ETC.2.2:
2
- FDP_ETC.2.3:
2
- FDP_ETC.2.4:
2
- FDP_IFC:
18
- FDP_IFF.1:
4
- FDP_IFC.1.1:
2
- FDP_IFF:
9
- FDP_IFF.1.1:
2
- FDP_IFF.1.2:
2
- FDP_IFF.1.3:
2
- FDP_IFF.1.4:
2
- FDP_IFF.1.5:
2
- FDP_ITC:
11
- FDP_ITC.2.1:
2
- FDP_ITC.2.2:
2
- FDP_ITC.2.3:
2
- FDP_ITC.2.4:
2
- FDP_ITC.2.5:
1
- FDP_SDI:
6
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_SDI.2:
3
- FIA:
- FIA_UID.1:
9
- FIA_AFL:
9
- FIA_UAU.1:
8
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
2
- FIA_UAU:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.4:
4
- FIA_UAU.4.1:
1
- FIA_UID:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FMT:
- FMT_MSA.3:
6
- FMT_MOF:
1
- FMT_MOF.1:
6
- FMT_SMR.1:
30
- FMT_SMF.1:
23
- FMT_MSA:
34
- FMT_MSA.1.1:
5
- FMT_MSA.1:
4
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD:
9
- FMT_MTD.1.1:
1
- FMT_SMF:
1
- FMT_SMF.1.1:
1
- FMT_SMR:
1
- FMT_SMR.2:
11
- FMT_SMR.2.1:
1
- FMT_SMR.2.2:
1
- FMT_SMR.2.3:
1
- FPT:
- FPT_STM.1:
7
- FPT_TDC.1:
5
- FPT_FLS:
1
- FPT_FLS.1:
4
- FPT_PHP:
1
- FPT_PHP.2:
4
- FPT_PHP.1:
1
- FPT_PHP.2.1:
1
- FPT_PHP.2.2:
1
- FPT_PHP.2.3:
1
- FPT_RCV:
1
- FPT_RCV.1:
4
- FPT_RCV.1.1:
1
- FPT_RCV.4:
4
- FPT_RCV.4.1:
1
- FPT_STM:
1
- FPT_STM.1.1:
1
- FPT_TDC:
9
- FPT_TDC.1.2:
2
- FPT_TDC.1.1:
1
- FPT_TEE:
9
- FPT_TEE.1.1:
2
- FPT_TEE.1.2:
2
- FTP:
- FTP_ITC.1:
5
- FTP_TRP.1:
4
- FTP_ITC:
10
- FTP_ITC.1.1:
2
- FTP_ITC.1.2:
2
- FTP_ITC.1.3:
2
|
pdf_data/st_keywords/cc_sfr/FAU |
|
- FAU_GEN:
1
- FAU_GEN.1:
6
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_SAR:
1
- FAU_SAR.1:
4
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_STG:
1
- FAU_STG.1:
5
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.4:
4
- FAU_STG.3:
1
- FAU_STG.4.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RNG: 9
- FCS_RNG.1: 17
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FCS_CKM:
61
- FCS_CKM.4:
45
- FCS_COP:
67
- FCS_CKM.1:
16
- FCS_CKM.2:
8
- FCS_COP.1:
12
- FCS_CKM.4.1:
1
|
- FCS_CKM:
27
- FCS_CKM.2:
15
- FCS_COP.1:
12
- FCS_CKM.4:
55
- FCS_CKM.1.1: 6
- FCS_CKM.1:
27
- FCS_CKM.2.1: 1
- FCS_CKM.4.1:
1
- FCS_COP:
43
- FCS_COP.1.1: 11
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
61
|
27
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
16
|
27
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
8
|
15
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
45
|
55
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
67
|
43
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
12
|
12
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACF:
4
- FDP_ACC.2: 17
- FDP_ACF.1:
8
- FDP_SDI.2:
8
- FDP_RIP.1: 7
- FDP_ETC.1: 7
- FDP_ITC.1:
20
- FDP_UCT.1: 8
- FDP_UIT.1: 7
- FDP_ITC.2:
14
- FDP_ACC.1:
12
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_SDI.1:
2
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_RIP.1.1: 1
- FDP_IFC:
1
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC.1:
8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_UIT.1.2: 1
- FDP_ITC:
8
- FDP_SDI:
1
- FDP_RIP: 1
- FDP_UIT: 2
- FDP_SDC.1: 1
- FDP_ITT.1: 1
- FDP_ACC:
2
- FDP_UCT: 1
|
- FDP_ITC.1:
27
- FDP_ITC.2:
27
- FDP_ACC:
1
- FDP_ACC.1:
25
- FDP_ACF.1:
5
- FDP_ACC.1.1: 1
- FDP_ACF:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ETC: 9
- FDP_IFC.1:
22
- FDP_ETC.2.1: 2
- FDP_ETC.2.2: 2
- FDP_ETC.2.3: 2
- FDP_ETC.2.4: 2
- FDP_IFC:
18
- FDP_IFF.1: 4
- FDP_IFC.1.1: 2
- FDP_IFF: 9
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_ITC:
11
- FDP_ITC.2.1: 2
- FDP_ITC.2.2: 2
- FDP_ITC.2.3: 2
- FDP_ITC.2.4: 2
- FDP_ITC.2.5: 1
- FDP_SDI:
6
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_SDI.2:
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
12
|
25
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
8
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC |
1
|
18
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
8
|
22
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
8
|
11
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
20
|
27
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
14
|
27
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI |
1
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 |
8
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_ATD.1: 10
- FIA_SOS.1: 3
- FIA_UAU:
18
- FIA_UAU.4:
6
- FIA_UAU.5: 6
- FIA_UID.1:
14
- FIA_USB.1: 6
- FIA_ATD.1.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.1:
5
- FIA_UAU.4.1:
1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FIA_SOS: 1
- FIA_UID:
1
- FIA_USB: 1
|
- FIA_UID.1:
9
- FIA_AFL: 9
- FIA_UAU.1:
8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_UAU:
1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4:
4
- FIA_UAU.4.1:
1
- FIA_UID:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
18
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
5
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4 |
6
|
4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
14
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM: 7
- FMT_LIM.1: 23
- FMT_LIM.2: 21
- FMT_LIM.1.1: 2
- FMT_LIM.2.1: 2
- FMT_SMF.1:
10
- FMT_SMR.1:
6
- FMT_MSA.3:
4
- FMT_SMF.1.1:
1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMR:
1
- FMT_MSA:
2
|
- FMT_MSA.3:
6
- FMT_MOF: 1
- FMT_MOF.1: 6
- FMT_SMR.1:
30
- FMT_SMF.1:
23
- FMT_MSA:
34
- FMT_MSA.1.1: 5
- FMT_MSA.1: 4
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD: 9
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1.1:
1
- FMT_SMR:
1
- FMT_SMR.2: 11
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA |
2
|
34
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
4
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
10
|
23
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
6
|
30
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS: 6
- FPT_EMS.1: 14
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS.1:
8
- FPT_PHP.3: 9
- FPT_TST.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP.3.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_FLS:
1
- FPT_PHP:
1
- FPT_TST: 1
- FPT_ITT.1: 1
|
- FPT_STM.1: 7
- FPT_TDC.1: 5
- FPT_FLS:
1
- FPT_FLS.1:
4
- FPT_PHP:
1
- FPT_PHP.2: 4
- FPT_PHP.1: 1
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 1
- FPT_RCV: 1
- FPT_RCV.1: 4
- FPT_RCV.1.1: 1
- FPT_RCV.4: 4
- FPT_RCV.4.1: 1
- FPT_STM: 1
- FPT_STM.1.1: 1
- FPT_TDC: 9
- FPT_TDC.1.2: 2
- FPT_TDC.1.1: 1
- FPT_TEE: 9
- FPT_TEE.1.1: 2
- FPT_TEE.1.2: 2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
8
|
4
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
10
- FTP_TRP.1:
4
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_ICT.1: 4
- FTP_ITC:
2
|
- FTP_ITC.1:
5
- FTP_TRP.1:
4
- FTP_ITC:
10
- FTP_ITC.1.1:
2
- FTP_ITC.1.2:
2
- FTP_ITC.1.3:
2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC |
2
|
10
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
10
|
5
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
4
|
4
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- out of scope:
1
- entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the:
1
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC |
4
|
8
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_protocol/TLS |
|
|
pdf_data/st_keywords/crypto_protocol/TLS/TLS |
|
|
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS |
28
|
2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256:
11
- P-384:
15
- NIST P-256:
1
- NIST P-384:
1
- secp256r1:
1
- secp384r1:
1
- Brainpool:
- brainpoolP256r1:
2
- brainpoolP384r1:
2
- brainpoolP512r1:
2
|
|
pdf_data/st_keywords/eval_facility |
- DeutscheTelekom:
- Deutsche Telekom Security:
81
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
7
|
2
|
pdf_data/st_keywords/side_channel_analysis/FI |
- Physical tampering: 1
- physical tampering:
5
- Malfunction:
9
- malfunction:
3
- DFA:
1
- fault injection: 1
|
- physical tampering:
9
- Malfunction:
3
- malfunction:
2
- DFA:
1
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
9
|
3
|
pdf_data/st_keywords/side_channel_analysis/FI/malfunction |
3
|
2
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
5
|
9
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent: 2
- Physical Probing: 1
- physical probing: 2
- side channels: 1
- side channel:
1
- side-channels: 1
- SPA:
2
- DPA:
2
- timing attacks: 1
|
- side channel:
3
- SPA:
3
- DPA:
3
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
2
|
3
|
pdf_data/st_keywords/side_channel_analysis/SCA/SPA |
2
|
3
|
pdf_data/st_keywords/side_channel_analysis/SCA/side channel |
1
|
3
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS186:
10
- FIPS197:
3
- FIPS PUB 186-4:
1
- BSI:
- RFC:
- X509:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
2
|
- FIPS:
- FIPS 198-1:
2
- FIPS PUB 180-2:
3
- NIST:
- PKCS:
- RFC:
- X509:
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
2
|
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS186:
10
- FIPS197:
3
- FIPS PUB 186-4:
1
|
- FIPS 198-1:
2
- FIPS PUB 180-2:
3
|
pdf_data/st_keywords/standard_id/RFC |
|
|
pdf_data/st_keywords/standard_id/X509/X.509 |
2
|
3
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
12
|
19
|
pdf_data/st_keywords/symmetric_crypto/DES |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- NXP:
- NXP:
2
- NXP Semiconductors:
1
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
930419
- pdf_is_encrypted:
False
- pdf_number_of_pages:
75
- /Author:
Deutsche Telekom Security GmbH
- /Keywords: "TCOS Security Module, Sicherheitsmodul, Smart Meter"
- /Subject: TCOS Smart Meter Security Module Version 1.0 Release 1
- /Title: Security Target TCOS Smart Meter Security Module (NXP)
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1042698
- pdf_is_encrypted:
False
- pdf_number_of_pages:
73
- /Author:
FK
- /Creator: Microsoft® Word 2019
- /CreationDate: D:20191213114041+03'00'
- /ModDate: D:20191213114041+03'00'
- /Producer: Microsoft® Word 2019
- pdf_hyperlinks:
http://en.wikipedia.org/wiki/Receipt
|
pdf_data/st_metadata//Author |
Deutsche Telekom Security GmbH
|
FK
|
pdf_data/st_metadata/pdf_file_size_bytes |
930419
|
1042698
|
pdf_data/st_metadata/pdf_hyperlinks |
|
http://en.wikipedia.org/wiki/Receipt |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
75
|
73
|
dgst |
8239b6c33b01617f
|
4260aad8ebfc5357
|