Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CEITEC ePassport Module, CTC21001, v1.0 (supporting EAC)
SERTIT-080
Morpho_HC_Germany_G2_COS V1
BSI-DSZ-CC-0938-2016
name CEITEC ePassport Module, CTC21001, v1.0 (supporting EAC) Morpho_HC_Germany_G2_COS V1
scheme NO DE
not_valid_after 17.01.2022 28.10.2021
not_valid_before 17.01.2017 28.10.2016
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20170117%20S-080%20CR%20Ceitec%20EAC.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0938a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STlite-EAC]%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0938b_pdf.pdf
manufacturer CEITEC S.A. Morpho Cards GmbH
manufacturer_web https://www.ceitec-sa.com https://www.morpho.com/e-documents
security_level EAL4+, ALC_DVS.2, AVA_VAN.5 EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5
dgst 8856518b423e12c4 7950b51171b0f96d
heuristics/cert_id SERTIT-080 BSI-DSZ-CC-0938-2016
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, ALC_DVS.2, ADV_FSP.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ASE_APD.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions 1.0 -
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0782-V2-2015
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0782-2012
heuristics/scheme_data
  • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
  • certification_date: 17.01.2017
  • developer: CEITEC S.A.
  • enhanced:
    • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
    • cert_id: SERTIT-080
    • certification_date: 17.01.2017
    • description: The TOE is an electronic module for machine readable travel documents (MRTDs) based on the requirements of the International Civil Aviation Organization, as defined in ICAO Doc 9303. The TOE is developed and produced by CEITEC and delivered to the passport manufacturer as micro modules. The TOE contains at the physical level: Integrated circuit chip; IC Software; data necessary to enable the MRTD personalization; the associated guidance documentation. The TOE also provides the security functions: integrity and confidentiality of personal data; access control, identification and authentication; protection against abuse of functionality, information leakage, physical tampering, malfunctions.
    • developer: CEITEC S.A.
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135163-1607953148/SERTIT/Sertifikater/2017/80/20170117%20Sertit-080%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135166-1607953151/SERTIT/Sertifikater/2017/80/%5BSTlite-EAC%5D%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135160-1607953146/SERTIT/Sertifikater/2017/80/20170117%20S-080%20CR%20Ceitec%20EAC.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 4, ALC_DVS.2, AVA_VAN.5
    • mutual_recognition: CCRA, SOG-IS
    • product: 1.0
    • protection_profile: BSI-CC-PP-0056, "Machine Readable Travel Document with 'ICAO Application', Extended Access Control"
    • sponsor: CEITEC S.A.
  • product: CEITEC ePassport Module CTC21001
  • url: https://sertit.no/certified-products/product-archive/ceitec-epassport-module-ctc21001
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0782-V2-2015
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0782-V2-2015
heuristics/protection_profiles a33327d40f253f46 ecc28509c30de1a5
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0082V2b_pdf.pdf
pdf_data/report_filename 20170117 S-080 CR Ceitec EAC.pdf 0938a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5, ATE_DPT.2 and ALC_DVS.2
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0938-2016
    • cert_item: Morpho_HC_Germany_G2_COS V1
    • cert_lab: BSI
    • developer: Morpho Cards GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Card Operating System Generation 2 (PP COS G2), Version 1.9, 18 November 2014, BSI-CC-PP-0082-V2-2014
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-080: 19
  • DE:
    • BSI-DSZ-CC-0782-V2-2015: 8
    • BSI-DSZ-CC-0938-2016: 30
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0056: 1
  • BSI:
    • BSI-CC-PP-0082-V2-2014: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4+: 19
    • EAL1: 1
    • EAL4: 1
    • EAL7: 1
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 13
    • EAL 4 augmented: 3
    • EAL 5: 10
    • EAL 5+: 1
    • EAL 6: 4
    • EAL 7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 6
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP: 4
    • FCS_RND.1: 4
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_UCT.1: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_API.1: 4
    • FIA_UAU.1: 1
    • FIA_UAU.4: 1
    • FIA_UAU.5: 1
    • FIA_UAU.6: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
    • FMT_MTD: 8
    • FMT_MTD.3: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_PHP.3: 1
    • FPT_TST.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_COP: 20
    • FCS_RNG: 3
  • FPT:
    • FPT_ITE.1: 1
pdf_data/report_keywords/cc_claims
  • SA:
    • SA.S: 2
    • SA.V: 2
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 8
    • Infineon Technologies AG: 7
  • Morpho:
    • Morpho: 21
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SRC:
    • SRC Security Research & Consulting: 3
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 10
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 5
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CMAC: 4
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDSA:
      • ECDSA: 5
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 2
      • SHA-256: 7
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 4
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 4
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 5
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 4
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 6
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • other:
    • JIL: 1
  • FI:
    • DFA: 1
    • fault injection: 1
    • malfunction: 1
  • SCA:
    • DPA: 1
    • Template attack: 1
    • side channel: 1
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-03116-1: 1
    • BSI TR-03143: 4
    • BSI TR-03144: 14
pdf_data/report_keywords/cplc_data
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 15408: 2
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 2
    • AIS 23: 1
    • AIS 25: 2
    • AIS 26: 3
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 1
    • AIS 36: 4
    • AIS 38: 1
    • AIS31: 1
  • FIPS:
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 1
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 3447: 1
    • RFC 5639: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1.11, 01.09.2016, Morpho Cards GmbH (confidential document) [11] Guidance Documentation Morpho_HC_Germany_G2_COS V1 - OS Preparation Guidance, Version 1.13: 1
    • Security Target Morpho_HC_Germany_G2_COS V1, Version 1.09, 30.08.2016, Morpho Cards GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-0938-2016, Security Target Lite Morpho_HC_Germany_G2_COS V1: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • for Morpho_HC_Germany_G2_COS V1, Version 2.0, 02.09.2016, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0938-2016, Configuration List Morpho_HC_Germany_G2_COS V1: 1
    • procedure BSI-DSZ-CC-0782-V2-2015, Version 7, 21 October 2015, TÜV Informationstechnik GmbH (confidential document) [18] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische: 1
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Kjaertan
  • /CreationDate: D:20170118113117Z00'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ugradert
  • /ModDate: D:20170118113117Z00'00'
  • /Producer: Mac OS X 10.12.2 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 650258
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename [STlite-EAC] CEITECSA 5.410.052 - ST-Lite ePassport Module EAC 2.0.pdf 0938b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-V2-2015: 2
    • BSI-DSZ-CC-0938: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056: 7
    • BSI-PP-0056: 1
    • BSI-PP-CC-0056: 1
  • BSI:
    • BSI-CC-PP- 0084-2014: 1
    • BSI-CC-PP-0035: 1
    • BSI-CC-PP-0035-: 1
    • BSI-CC-PP-0035-2007: 9
    • BSI-CC-PP-0059: 1
    • BSI-CC-PP-0071: 1
    • BSI-CC-PP-0072: 1
    • BSI-CC-PP-0075: 1
    • BSI-CC-PP-0082-V2: 1
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0035: 3
    • BSI-PP-0035-: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 8
    • EAL4 augmented: 2
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL4: 11
    • EAL4 augmented: 5
    • EAL4+: 1
    • EAL5: 1
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 5
  • APE:
    • APE_SRE: 1
  • AVA:
    • AVA_VAN.5: 5
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 16
    • ADV_FSP: 1
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 20
    • ADV_IMP: 1
    • ADV_IMP.1: 11
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 24
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 15
    • AGD_PRE: 1
    • AGD_PRE.1: 11
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 16
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.4: 7
    • ALC_DEL: 1
    • ALC_DEL.1: 6
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 20
    • ALC_LCD: 1
    • ALC_LCD.1: 9
    • ALC_TAT: 1
    • ALC_TAT.1: 10
  • ASE:
    • ASE_APD.1: 1
    • ASE_CCL: 1
    • ASE_CCL.1: 15
    • ASE_ECD: 1
    • ASE_ECD.1: 14
    • ASE_INT: 1
    • ASE_INT.1: 17
    • ASE_OBJ: 1
    • ASE_OBJ.2: 13
    • ASE_REQ: 1
    • ASE_REQ.1: 2
    • ASE_REQ.2: 15
    • ASE_SPD: 1
    • ASE_SPD.1: 8
    • ASE_TSS: 1
    • ASE_TSS.1: 6
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 2
    • ATE_COV.2: 8
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 18
    • ATE_FUN: 1
    • ATE_FUN.1: 14
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 22
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM.1: 26
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 36
    • FCS_COP.1: 7
    • FCS_RND: 7
    • FCS_RND.1: 11
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 20
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 4
    • FDP_ITC: 1
    • FDP_ITC.1: 10
    • FDP_ITC.2: 10
    • FDP_UCT.1: 8
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 6
    • FIA_API.1: 10
    • FIA_API.1.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 8
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 21
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 18
    • FMT_LIM.2.1: 2
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 46
    • FMT_MTD.1: 11
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 34
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 38
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
  • FAU:
    • FAU_SAS: 11
    • FAU_SAS.1: 4
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 63
    • FCS_CKM.1: 18
    • FCS_CKM.2: 4
    • FCS_CKM.4: 39
    • FCS_CKM.4.1: 1
    • FCS_COP: 129
    • FCS_COP.1: 16
    • FCS_RNG: 10
    • FCS_RNG.1: 16
    • FCS_RNG.1.1: 4
    • FCS_RNG.1.2: 3
  • FDP:
    • FDP_ACC: 71
    • FDP_ACC.1: 20
    • FDP_ACF: 59
    • FDP_ACF.1: 32
    • FDP_IFC: 12
    • FDP_IFC.1: 7
    • FDP_IFF.1: 2
    • FDP_ITC.1: 14
    • FDP_ITC.2: 14
    • FDP_ITT: 10
    • FDP_ITT.1: 2
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL: 16
    • FIA_AFL.1: 4
    • FIA_API: 2
    • FIA_API.1: 9
    • FIA_API.1.1: 2
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 3
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 8
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 11
    • FIA_UID.1.1: 3
    • FIA_UID.1.2: 1
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM: 20
    • FMT_LIM.1: 10
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 9
    • FMT_LIM.2.1: 1
    • FMT_MSA: 46
    • FMT_MSA.1: 7
    • FMT_MSA.3: 19
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 28
    • FMT_MTD.1: 3
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 26
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 3
    • FPT_EMS.1: 10
    • FPT_EMS.1.1: 2
    • FPT_EMS.1.2: 2
    • FPT_FLS: 9
    • FPT_FLS.1: 16
    • FPT_FLS.1.1: 1
    • FPT_ITE: 6
    • FPT_ITE.1: 10
    • FPT_ITE.1.1: 2
    • FPT_ITE.1.2: 2
    • FPT_ITE.2: 13
    • FPT_ITE.2.1: 4
    • FPT_ITE.2.2: 2
    • FPT_ITT: 10
    • FPT_ITT.1: 2
    • FPT_PHP: 10
    • FPT_PHP.3: 3
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT: 8
    • FRU_FLT.2: 3
  • FTP:
    • FTP_ITC: 8
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.BAC-PP: 2
    • OE.BAC_PP: 1
    • OE.MRTD_: 2
  • O:
    • O.RND: 10
  • T:
    • T.RND: 6
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 5
    • Infineon Technologies AG: 8
  • Morpho:
    • Morpho: 20
  • NXP:
    • NXP Semiconductors: 2
  • STMicroelectronics:
    • STMicroelectronics: 1
pdf_data/st_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 1
  • TrustedLabs:
    • Trusted Labs: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 2
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 24
    • HPC:
      • HPC: 1
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CMAC: 16
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
  • FF:
    • DH:
      • Diffie-Hellman: 5
  • ECC:
    • ECC:
      • ECC: 7
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 42
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
  • SHA:
    • SHA1:
      • SHA-1: 2
      • SHA1: 1
    • SHA2:
      • SHA-2: 4
      • SHA-256: 13
      • SHA-384: 5
      • SHA-512: 4
      • SHA2: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 11
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 7
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 18
    • RNG: 18
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 1
    • brainpoolP384r1: 1
    • brainpoolP512r1: 1
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 9
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • Physical Tampering: 7
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 5
  • SCA:
    • DPA: 3
    • SPA: 2
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
  • FI:
    • DFA: 1
    • Malfunction: 20
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 19
    • Physical Probing: 2
    • SPA: 2
    • physical probing: 1
    • side channel: 1
  • other:
    • JIL: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 10
    • EF.DG1: 20
    • EF.DG13: 2
    • EF.DG14: 7
    • EF.DG16: 17
    • EF.DG2: 7
    • EF.DG3: 20
    • EF.DG4: 18
    • EF.DG5: 5
    • EF.SOD: 10
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-411: 1
  • ICAO:
    • ICAO: 9
  • PKCS:
    • PKCS#3: 2
    • PKCS#34: 1
  • CC:
    • CCMB-2012-09-001: 3
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 197: 2
  • ISO:
    • ISO/IEC 7816: 4
    • ISO/IEC 7816-3: 2
    • ISO/IEC 9797-1: 1
  • NIST:
    • NIST SP 800-38B: 1
    • NIST SP 800-67: 2
  • RFC:
    • RFC 5639: 1
    • RFC5639: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • statements of SPD, security objectives and security requirements of the optional packages are out of scope. 4.5.1 TOE type consistency The TOE type is smart card without the application named as a whole: 1
pdf_data/st_metadata
  • /Author: Marcos Kordyas Dossa
  • /CreationDate: D:20161212160233-02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20161212160233-02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1330959
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 71
  • /Author: Thomas HOFFMANN, Agnes DILLER, Sebastian BOND
  • /CreationDate: D:20161206164752+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: Security Target Morpho MORPHO_HC_GERMANY_G2_COS COS
  • /ModDate: D:20161206164752+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: SECURITY TARGET LITE MORPHO_HC_GERMANY_G2_COS V1
  • /Title: SECURITY TARGET LITE MORPHO_HC_GERMANY_G2_COS V1
  • pdf_file_size_bytes: 1471239
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 185
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different