Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft Windows 10 version 2004 (May 2020 Update), Microsoft Windows Server version 2004 (May 2020 Update) and others
2020-50-INF-3671
Infineon smart card IC (Security Controller) IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 with optional libraries CCL V02.00.0004, RSA2048/4096 V2.08.007 / V2.07.003 / V2.06.003, EC V2.08.007 / V2.07.003 / V2.06.003, Toolbox V2.08.007 / V2.07.003 / V2.06.003, HSL V03.12.8812 / V03.11.8339 / V02.01.6634 / V01.22.4346, SCL V2.04.002 / V2.02.010 and with specific IC dedicated software
BSI-DSZ-CC-0961-V4-2019
name Microsoft Windows 10 version 2004 (May 2020 Update), Microsoft Windows Server version 2004 (May 2020 Update) and others Infineon smart card IC (Security Controller) IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 with optional libraries CCL V02.00.0004, RSA2048/4096 V2.08.007 / V2.07.003 / V2.06.003, EC V2.08.007 / V2.07.003 / V2.06.003, Toolbox V2.08.007 / V2.07.003 / V2.06.003, HSL V03.12.8812 / V03.11.8339 / V02.01.6634 / V01.22.4346, SCL V2.04.002 / V2.02.010 and with specific IC dedicated software
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme ES DE
status active archived
not_valid_after 31.12.2026 18.12.2024
not_valid_before 31.12.2021 18.12.2019
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-50-Certificate.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0961V4c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-50-INF-3671.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0961V4a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-50-ST_lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0961V4b_pdf.pdf
manufacturer Microsoft Corporation Infineon Technologies AG
manufacturer_web https://www.microsoft.com https://www.infineon.com/
security_level {} EAL6+, ALC_FLR.1
dgst 87d47655fcd5ec9e 51639df3c11fd372
heuristics/cert_id 2020-50-INF-3671 BSI-DSZ-CC-0961-V4-2019
heuristics/cert_lab [] BSI
heuristics/cpe_matches cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.488:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1387:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1288:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.906:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.964:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.610:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.789:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1320:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.329:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.264:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.867:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.508:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.329:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.388:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.985:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.870:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.488:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.450:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.685:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.685:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.423:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1266:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.546:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.630:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1415:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.264:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.906:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.572:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1387:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.985:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.331:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.844:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1387:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.331:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1415:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.546:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.844:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1348:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.329:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.662:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.388:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1237:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1266:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.804:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.631:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.264:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.450:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.331:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.631:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1320:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.630:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1348:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.804:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.488:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.867:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.867:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.928:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.868:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.870:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.844:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1415:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.789:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.610:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.928:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.631:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.610:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.746:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1237:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.423:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.906:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.868:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.964:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1320:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.423:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.630:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1288:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.450:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.662:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.985:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.746:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.685:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.546:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.868:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1348:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.508:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.508:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1288:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1266:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.572:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.572:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.964:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.928:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.662:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.789:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.746:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.804:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.870:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.388:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1237:*:*:*:*:*:arm64:* {}
heuristics/related_cves CVE-2021-33739, CVE-2021-40449, CVE-2021-34486, CVE-2021-31956, CVE-2021-31199, CVE-2021-36934, CVE-2021-31955, CVE-2021-41357, CVE-2021-31166, CVE-2021-40450, CVE-2021-36955, CVE-2021-31979, CVE-2021-34448, CVE-2021-1675, CVE-2021-31201, CVE-2021-41379, CVE-2021-34484, CVE-2021-33771, CVE-2021-40444, CVE-2021-36948, CVE-2021-33742 {}
heuristics/extracted_sars AGD_PRE.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, ASE_REQ.2 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ADV_CMC.5, ALC_CMC.5, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 2020, 2004, 10 2.04.002, 2.02.010, 01.22.4346, 2.08.007, 03.12.8812, 2.07.003, 2.06.003, 02.01.6634, 03.11.8339, 02.00.0004
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0961-V5-2020
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0961-V3-2018
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0961-V5-2020, BSI-DSZ-CC-0961-V6-2022, BSI-DSZ-CC-0961-V7-2024
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0961-2017, BSI-DSZ-CC-0961-V2-2018, BSI-DSZ-CC-0961-V3-2018, BSI-DSZ-CC-0891-V2-2016
heuristics/scheme_data
  • category: Operating systems
  • certification_date: 31.12.2021
  • enhanced:
    • category: Operating systems
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1306
    • certification_date: 31.12.2021
    • description: Descripción del TOE certificado Sistemas Operativos Windows: Microsoft Windows 10 Home edition (May 2020 Update) (64-bit version) Microsoft Windows 10 Pro edition (May 2020 Update) (64-bit version) Microsoft Windows 10 Enterprise edition (May 2020 Update) (64- bit version) Microsoft Windows Server Standard edition (May 2020 Update) Microsoft Windows Server Datacenter edition (May 2020 Update) Microsoft Windows Server Core Datacenter “Azure Fabric Controller” Microsoft Windows Server Core Datacenter ”Azure Stack” Versiones del TOE: Windows 10: build 10.0.19041 (also known as version 2004) Windows Server: build 10.0.19401 (also known as version 2004) Azure Fabric Controller: build 10.0.14393 Azure Stack: build 10.0.17763 Actualizaciones del TOE: Windows 10 and Windows Server version 2004: todas las actualizaciones críticas a partir del 1 de septiembre de 2020.
    • evaluation_facility: DEKRA Testing and Certification S.A.U.
    • level: PP Compliant
    • manufacturer: Microsoft Corp.
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1307
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1305
    • type: Product
  • manufacturer: Microsoft Corp.
  • product: Microsoft Windows 10 version 2004 (May 2020 Update), Microsoft Windows Server version 2004 (May 2020 Update) and others
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/759-microsoft-windows-10-version-2004-may-2020-update-microsoft-windows-server-version-2004-may-2020-update-and-others
heuristics/protection_profiles e34797b67a3163c5, c88af12926be2779, f4474c6c73660987 cf0f01bcd7be3e9c
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename 2020-50-Certificate.pdf 0961V4c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0961-V4-2019: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
  • EAL:
    • EAL 2: 1
    • EAL 5: 1
    • EAL 6: 1
    • EAL 6 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.U: 1
  • O:
    • O.E: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/vendor
  • Microsoft:
    • Microsoft: 5
    • Microsoft Corporation: 1
  • Infineon:
    • Infineon: 1
    • Infineon Technologies AG: 1
pdf_data/cert_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20211122114618+01'00'
  • /Creator: RICOH IM C3000
  • /ModDate: D:20211122114618+01'00'
  • /Producer: RICOH IM C3000
  • pdf_file_size_bytes: 970426
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20191219115853+01'00'
  • /Creator: Writer
  • /Keywords: Common Criteria, Certification, Zertifizierung, SmartCard, Security IC, PP-0084, Infineon Technologies AG
  • /ModDate: D:20191219120047+01'00'
  • /Producer: LibreOffice 6.2
  • /Subject: Common Criteria Certification
  • /Title: Certificate BSI-DSZ-CC-0961-V4-2019
  • pdf_file_size_bytes: 295736
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 2020-50-INF-3671.pdf 0961V4a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0961-V4-2019
    • cert_item: Infineon smart card IC (Security Controller) IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 with optional libraries CCL V02.00.0004, RSA2048/4096 V2.08.007 / V2.07.003 / V2.06.003, EC V2.08.007 / V2.07.003 / V2.06.003, Toolbox V2.08.007 / V2.07.003 / V2.06.003, HSL V03.12.8812 / V03.11.8339 / V02.01.6634 / V01.22.4346, SCL V2.04.002 / V2.02.010 and with specific IC dedicated software
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP- 0084-2014
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2020-50-INF-3671- v1: 1
  • DE:
    • BSI-DSZ-CC-0961-V3-: 1
    • BSI-DSZ-CC-0961-V3-2018: 2
    • BSI-DSZ-CC-0961-V4-2019: 22
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0084-2014: 1
    • BSI-CC-PP-0084-2014: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 1
    • EAL 5: 4
    • EAL 6: 4
    • EAL 6 augmented: 3
    • EAL5+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_FLR: 2
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
  • ALC:
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 5
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 5
    • FAU_SEL.1: 2
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.2: 3
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.4: 2
    • FCS_COP.1: 8
    • FCS_DTLS_EXT.1: 2
    • FCS_RBG_EXT.1: 2
    • FCS_STO_EXT.1: 2
    • FCS_TLSC_EXT.1: 3
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.3: 2
    • FCS_TLSC_EXT.4: 2
  • FDP:
    • FDP_ACF_EXT.1: 2
    • FDP_IFC_EXT.1: 4
    • FDP_RIP.2: 2
  • FIA:
    • FIA_AFL.1: 2
    • FIA_PAE_EXT.1: 1
    • FIA_PSK_EXT.1: 2
    • FIA_UAU.5: 2
  • FMT:
    • FMT_MOF_EXT.1: 2
    • FMT_SMF.1: 2
    • FMT_SMF_EXT.1: 3
  • FPT:
    • FPT_ACF_EXT.1: 2
    • FPT_ASLR_EXT.1: 2
    • FPT_SBOP_EXT.1: 2
    • FPT_SRP_EXT.1: 2
    • FPT_TST_EXT.1: 5
    • FPT_TUD_EXT.1: 2
    • FPT_TUD_EXT.2: 2
  • FTA:
    • FTA_TAB.1: 2
    • FTA_WSE_EXT.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_ITC_EXT.1: 5
    • FTP_TRP.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.U: 4
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 64
    • Microsoft Corporation: 3
  • GD:
    • G&D: 1
  • Infineon:
    • Infineon: 24
    • Infineon Technologies: 1
    • Infineon Technologies AG: 24
pdf_data/report_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 4
  • TSystems:
    • T-Systems International: 4
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 17
  • DES:
    • 3DES:
      • TDEA: 2
      • TDES: 2
      • Triple-DES: 3
    • DES:
      • DES: 5
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 1
  • RSA:
    • RSA2048: 3
    • RSA4096: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 3
  • IPsec:
    • IPsec: 13
  • TLS:
    • DTLS:
      • DTLS: 5
    • TLS:
      • TLS: 12
  • VPN:
    • VPN: 15
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CFB:
    • CFB: 2
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 2
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 2
    • physical probing: 1
  • other:
    • JIL: 5
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
  • X509:
    • X.509: 8
  • BSI:
    • AIS 29: 1
    • AIS 31: 1
    • AIS 34: 1
    • AIS 35: 1
    • AIS 36: 1
    • AIS1: 1
    • AIS14: 1
    • AIS19: 1
    • AIS20: 3
    • AIS25: 2
    • AIS26: 1
    • AIS31: 4
    • AIS32: 1
    • AIS34: 1
    • AIS35: 2
    • AIS36: 3
    • AIS38: 1
    • AIS39: 3
    • AIS46: 4
  • FIPS:
    • FIPS 197: 1
    • FIPS PUB 186-4: 1
  • ISO:
    • ISO/IEC 11770-3: 1
    • ISO/IEC 14888-3: 1
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18033: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 9797-1: 1
  • NIST:
    • SP 800-38A: 1
    • SP 800-38B: 1
  • PKCS:
    • PKCS #1: 2
  • RFC:
    • RFC 5639: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • IFX_CCI_000018h, IFX_CCI_000023h, IFX_CCI_000024h, design step G13”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for the Product BSI-DSZ-CC-0961-V4-2019, v4.00, 2019-08-15: 1
    • Technical Report - Summary”, T-Systems International GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • Version 4.00, 2019-08-06, ETR for composite evaluation (EFC), T-Systems International GmbH (confidential document) [11] 16-Bit Security Controller - V02, Security Guidelines, Rev. 1.01-1958, Infineon Technologies: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • OutOfScope:
    • context, are solely relevant in the GBIC context and not in the CC context (hence for CC these are out of scope). As a result of the evaluation the verdict PASS is confirmed for the following assurance: 1
    • hence for CC these are out of scope: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20220112084436+01'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220112084436+01'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 949729
  • pdf_hyperlinks: https://www.sogis.org/, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename 2020-50-ST_lite.pdf 0961V4b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0084-2014: 1
    • BSI-CC-PP-0084-2014: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL6: 163
    • EAL6 augmented: 159
    • EAL6+: 159
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_CMC.5: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_IMP.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 10
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 2
    • ALC_CMS: 2
    • ALC_CMS.4: 3
    • ALC_CMS.5: 3
    • ALC_DEL: 2
    • ALC_DEL.1: 1
    • ALC_DVS: 3
    • ALC_DVS.2: 3
    • ALC_FLR.1: 10
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL: 7
    • ASE_CCL.1: 1
    • ASE_ECD: 4
    • ASE_ECD.1: 1
    • ASE_INT: 18
    • ASE_INT.1: 1
    • ASE_OBJ: 13
    • ASE_OBJ.2: 1
    • ASE_REQ: 63
    • ASE_REQ.2: 1
    • ASE_SPD: 8
    • ASE_SPD.1: 1
    • ASE_TSS: 24
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 3
    • ATE_COV.3: 4
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 28
    • FAU_GEN.1.1: 3
    • FAU_GEN.1.2: 5
    • FAU_SEL: 1
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
  • FCS:
    • FCS_CKM: 15
    • FCS_CKM.1: 52
    • FCS_CKM.1.1: 4
    • FCS_CKM.2: 34
    • FCS_CKM.2.1: 2
    • FCS_CKM_EXT: 2
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.2: 6
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.4: 7
    • FCS_CKM_EXT.4.1: 3
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP.1: 82
    • FCS_COP.1.1: 5
    • FCS_DTLS_EXT: 1
    • FCS_DTLS_EXT.1: 11
    • FCS_DTLS_EXT.1.1: 2
    • FCS_DTLS_EXT.1.2: 2
    • FCS_IPSC_EXT.1: 2
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 17
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_STO_EXT: 1
    • FCS_STO_EXT.1: 7
    • FCS_STO_EXT.1.1: 1
    • FCS_TLCS_EXT: 1
    • FCS_TLCS_EXT.1: 1
    • FCS_TLSC: 2
    • FCS_TLSC_EXT: 9
    • FCS_TLSC_EXT.1: 21
    • FCS_TLSC_EXT.1.1: 3
    • FCS_TLSC_EXT.1.2: 3
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.1.5: 1
    • FCS_TLSC_EXT.2: 19
    • FCS_TLSC_EXT.2.1: 2
    • FCS_TLSC_EXT.3: 11
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.4: 10
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLS_EXT: 1
    • FCS_TLS_EXT.1: 2
    • FCS_TLS_EXT.2: 2
    • FCS_TLS_EXT.3: 1
  • FDP:
    • FDP_ACF_EXT: 1
    • FDP_ACF_EXT.1: 7
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT.1: 20
    • FDP_IFC_EXT.1.1: 2
    • FDP_RDP.2: 1
    • FDP_RIP: 1
    • FDP_RIP.2: 9
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_PAE_EXT: 1
    • FIA_PAE_EXT.1: 8
    • FIA_PAE_EXT.1.1: 1
    • FIA_PSK_EXT: 1
    • FIA_PSK_EXT.1: 7
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_UAU: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF_EXT.1: 8
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMF_EXT: 8
    • FMT_SMF_EXT.1: 20
    • FMT_SMF_EXT.1.1: 3
  • FPT:
    • FPT_ACF_EXT: 1
    • FPT_ACF_EXT.1: 7
    • FPT_ACF_EXT.1.1: 2
    • FPT_ACF_EXT.1.2: 2
    • FPT_ASLR_EXT: 1
    • FPT_ASLR_EXT.1: 7
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT: 1
    • FPT_SBOP_EXT.1: 7
    • FPT_SBOP_EXT.1.1: 1
    • FPT_SRP_EXT: 1
    • FPT_SRP_EXT.1: 7
    • FPT_SRP_EXT.1.1: 1
    • FPT_TST_EXT: 6
    • FPT_TST_EXT.1: 30
    • FPT_TST_EXT.1.1: 3
    • FPT_TST_EXT.1.2: 2
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 13
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.2: 8
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 2
    • FTA_WSE_EXT.1: 9
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC_EXT: 3
    • FTP_ITC_EXT.1: 29
    • FTP_ITC_EXT.1.1: 3
    • FTP_ITC_EXT.1.2: 1
    • FTP_TRP: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_SAS: 3
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 157
    • FCS_CKM.1: 42
    • FCS_CKM.2: 7
    • FCS_CKM.4: 43
    • FCS_COP: 191
    • FCS_COP.1: 39
    • FCS_RNG: 38
    • FCS_RNG.1: 15
  • FDP:
    • FDP_ACC: 15
    • FDP_ACC.1: 29
    • FDP_ACC.1.1: 1
    • FDP_ACF: 15
    • FDP_ACF.1: 26
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 19
    • FDP_ITC.1: 35
    • FDP_ITC.2: 35
    • FDP_ITT.1: 21
    • FDP_SDC: 1
    • FDP_SDC.1: 11
    • FDP_SDC.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 26
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 12
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 12
    • FDP_UIT.1.1: 1
  • FIA:
    • FIA_API: 4
    • FIA_API.1: 14
    • FIA_API.1.1: 1
  • FMT:
    • FMT_LIM: 35
    • FMT_LIM.1: 9
    • FMT_LIM.2: 8
    • FMT_MSA.1: 18
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 3
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS.1: 31
    • FPT_ITT.1: 22
    • FPT_PHP.3: 34
    • FPT_TST: 5
    • FPT_TST.1: 11
    • FPT_TST.2: 31
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ACF: 1
    • FTP_ITC.1: 18
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_TOE_BYPASS: 6
    • A.PHYSICAL: 3
    • A.PLATFORM: 3
    • A.PROPER_ADMIN: 3
    • A.PROPER_USER: 3
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 3
  • O:
    • O.ACCOUNTABILITY: 11
    • O.AUTH_COMM: 4
    • O.CRYPTOGRAPHIC_FUNCTIONS: 3
    • O.INTEGRITY: 11
    • O.MANAGEMENT: 10
    • O.PROTECTED_COMMS: 10
    • O.PROTECTED_STORAGE: 5
    • O.SYSTEM_MONITORING: 4
    • O.TOE_ADMINISTRATION: 4
    • O.TSF_SELF_TEST: 4
    • O.WIRELESS_ACCESS_POINT_: 1
    • O.WIRELESS_ACCESS_POINT_CO: 2
    • O.WIRELESS_ACCESS_POINT_CONNECTION: 1
  • OE:
    • OE.NO_TOE_BYPASS: 6
    • OE.PHYSICAL: 3
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
    • OE.TRUSTED_ADMIN: 3
    • OE.TRUSTED_CONFIG: 3
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 2
    • T.LOCAL_ATTACK: 5
    • T.NETWORK_ATTACK: 7
    • T.NETWORK_EAVESDROP: 6
    • T.TSF_CONFIGURATION: 2
    • T.TSF_FAILURE: 4
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNAUTHORIZED_UPDATE: 2
    • T.UNDETECTED_ACTIONS: 2
    • T.USER_DATA_REUSE: 2
  • O:
    • O.AES: 8
    • O.RND: 4
    • O.TDES: 7
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 1
  • Microsoft:
    • Microsoft: 247
    • Microsoft Corporation: 5
  • Infineon:
    • Infineon: 18
    • Infineon Technologies: 24
    • Infineon Technologies AG: 16
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 29
      • AES-: 1
      • AES-128: 1
      • AES-256: 4
    • RC:
      • RC4: 1
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 20
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 88
      • AES-128: 4
  • DES:
    • 3DES:
      • 3DES: 4
      • TDEA: 3
      • TDES: 56
      • Triple-DES: 3
      • TripleDES: 2
    • DES:
      • DES: 32
  • constructions:
    • MAC:
      • CBC-MAC: 6
      • CMAC: 33
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 12
    • ECDH:
      • ECDH: 6
      • ECDHE: 7
    • ECDSA:
      • ECDSA: 25
  • FF:
    • DH:
      • DH: 11
      • DHE: 4
      • Diffie-Hellman: 10
    • DSA:
      • DSA: 11
  • ECC:
    • ECC:
      • ECC: 18
    • ECDH:
      • ECDH: 12
    • ECDSA:
      • ECDSA: 31
  • FF:
    • DH:
      • Diffie-Hellman: 14
    • DSA:
      • DSA: 2
  • RSA:
    • RSA2048: 1
    • RSA4096: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
      • SHA1: 2
    • SHA2:
      • SHA-2: 1
      • SHA-256: 13
      • SHA-384: 4
      • SHA-512: 1
      • SHA256: 4
      • SHA384: 3
      • SHA512: 3
  • MD:
    • MD5:
      • MD5: 27
  • SHA:
    • SHA1:
      • SHA-1: 26
      • SHA1: 1
    • SHA2:
      • SHA-256: 26
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 3
  • KEX:
    • Key Exchange: 23
  • MAC:
    • MAC: 21
  • KA:
    • Key Agreement: 2
    • Key agreement: 3
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 50
    • IKEv1: 30
    • IKEv2: 26
  • IPsec:
    • IPsec: 214
  • PGP:
    • PGP: 1
  • TLS:
    • DTLS:
      • DTLS: 23
      • DTLS 1.0: 2
      • DTLS 1.2: 3
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 107
      • TLS 1.0: 3
      • TLS 1.1: 3
      • TLS 1.2: 5
  • VPN:
    • VPN: 135
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
    • PRNG: 2
  • RNG:
    • RBG: 14
    • RNG: 7
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 5
    • RNG: 25
  • TRNG:
    • DTRNG: 1
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • CCM:
    • CCM: 3
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 6
  • XTS:
    • XTS: 3
  • CBC:
    • CBC: 14
  • CFB:
    • CFB: 9
  • CTR:
    • CTR: 8
  • ECB:
    • ECB: 17
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 16
    • P-521: 12
    • secp256r1: 3
    • secp384r1: 3
    • secp521r1: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_NULL_WITH_NULL_NULL: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 5
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 3
    • Malfunction: 13
    • fault induction: 1
    • fault injection: 5
    • malfunction: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 12
    • Physical Probing: 2
    • SPA: 1
    • physical probing: 1
    • side channel: 18
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
    • BSI TR-03111: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 1
    • FIPS 180-4: 3
    • FIPS 186-4: 28
    • FIPS 197: 4
    • FIPS 198-1: 1
    • FIPS 198-2: 3
    • FIPS PUB 186-4: 3
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 2900-2: 1
  • NIST:
    • NIST SP 800-38A: 4
    • NIST SP 800-38C: 3
    • NIST SP 800-38D: 4
    • NIST SP 800-38E: 4
    • NIST SP 800-38F: 4
    • NIST SP 800-56A: 4
    • NIST SP 800-56B: 3
    • NIST SP 800-57: 1
    • NIST SP 800-90: 3
    • NIST SP 800-90A: 1
    • NIST SP 800-90B: 1
    • SP 800-56A: 1
    • SP 800-90: 1
  • PKCS:
    • PKCS #7: 1
  • RFC:
    • RFC 2246: 3
    • RFC 2396: 1
    • RFC 2404: 1
    • RFC 2408: 1
    • RFC 2818: 1
    • RFC 3268: 1
    • RFC 3394: 1
    • RFC 3526: 2
    • RFC 3546: 2
    • RFC 3602: 1
    • RFC 4106: 1
    • RFC 4109: 1
    • RFC 4301: 5
    • RFC 4303: 1
    • RFC 4304: 1
    • RFC 4306: 1
    • RFC 4346: 1
    • RFC 4347: 1
    • RFC 4366: 1
    • RFC 4492: 1
    • RFC 4681: 1
    • RFC 4868: 3
    • RFC 4945: 1
    • RFC 5216: 1
    • RFC 5246: 15
    • RFC 5280: 7
    • RFC 5288: 8
    • RFC 5289: 18
    • RFC 5430: 2
    • RFC 5759: 1
    • RFC 6066: 2
    • RFC 6125: 1
    • RFC 6347: 2
    • RFC 6379: 1
    • RFC 6960: 1
    • RFC 6961: 1
    • RFC 7296: 2
  • X509:
    • X.509: 27
    • x.509: 2
  • BSI:
    • AIS 31: 1
    • AIS31: 24
    • AIS32: 10
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS 140-2: 2
    • FIPS 197: 2
    • FIPS PUB 186-4: 1
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 11770-3: 1
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18033: 2
    • ISO/IEC 18033-3: 8
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9797-1: 7
    • ISO/IEC 9798-2: 2
  • NIST:
    • NIST SP 800-90A: 2
    • SP 800-22: 1
    • SP 800-38A: 16
    • SP 800-38B: 4
    • SP 800-67: 4
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
  • RFC:
    • RFC 5639: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • kernel. Software loaded for execution directly by the platform (e.g. first-stage bootloaders) is out of scope. For each additional category of executable code verified before execution, the evaluator will: 1
    • out of scope: 2
  • OutOfScope:
    • certification. The user operating system and further applications implemented on the TOE are also out of scope of this certification. To summarize, if used with the PCD software the certification view equals to: 1
    • is enabled to communicate via the selected interfaces. The surrounding environment is in both cases out of scope. The CIPURSE™ CL is delivered as object code and in this way integrated in the user software. Note: 1
    • out of scope: 2
pdf_data/st_metadata
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different