Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CEITEC ePassport Module, CTC21001, v1.0 (supporting EAC)
SERTIT-080
STARCOS 3.5 ID GCC C3
BSI-DSZ-CC-0952-V2-2016
name CEITEC ePassport Module, CTC21001, v1.0 (supporting EAC) STARCOS 3.5 ID GCC C3
scheme NO DE
not_valid_after 17.01.2022 16.12.2021
not_valid_before 17.01.2017 16.12.2016
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20170117%20S-080%20CR%20Ceitec%20EAC.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STlite-EAC]%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952V2b_pdf.pdf
manufacturer CEITEC S.A. G+D Mobile Security GmbH
manufacturer_web https://www.ceitec-sa.com https://www.gi-de.com/de/de/mobile-security/
security_level EAL4+, ALC_DVS.2, AVA_VAN.5 EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5
dgst 8856518b423e12c4 aaa5c2239e7c1d9e
heuristics/cert_id SERTIT-080 BSI-DSZ-CC-0952-V2-2016
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, ALC_DVS.2, ADV_FSP.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ASE_SPD.1, ATE_DPT.2, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 1.0 3.5
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0829-V2-2015
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0829-V2-2015, BSI-DSZ-CC-0640-2010
heuristics/scheme_data
  • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
  • certification_date: 17.01.2017
  • developer: CEITEC S.A.
  • enhanced:
    • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
    • cert_id: SERTIT-080
    • certification_date: 17.01.2017
    • description: The TOE is an electronic module for machine readable travel documents (MRTDs) based on the requirements of the International Civil Aviation Organization, as defined in ICAO Doc 9303. The TOE is developed and produced by CEITEC and delivered to the passport manufacturer as micro modules. The TOE contains at the physical level: Integrated circuit chip; IC Software; data necessary to enable the MRTD personalization; the associated guidance documentation. The TOE also provides the security functions: integrity and confidentiality of personal data; access control, identification and authentication; protection against abuse of functionality, information leakage, physical tampering, malfunctions.
    • developer: CEITEC S.A.
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135163-1607953148/SERTIT/Sertifikater/2017/80/20170117%20Sertit-080%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135166-1607953151/SERTIT/Sertifikater/2017/80/%5BSTlite-EAC%5D%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135160-1607953146/SERTIT/Sertifikater/2017/80/20170117%20S-080%20CR%20Ceitec%20EAC.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 4, ALC_DVS.2, AVA_VAN.5
    • mutual_recognition: CCRA, SOG-IS
    • product: 1.0
    • protection_profile: BSI-CC-PP-0056, "Machine Readable Travel Document with 'ICAO Application', Extended Access Control"
    • sponsor: CEITEC S.A.
  • product: CEITEC ePassport Module CTC21001
  • url: https://sertit.no/certified-products/product-archive/ceitec-epassport-module-ctc21001
heuristics/protection_profiles a33327d40f253f46 0e62a9ea5e7ca3a7
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0061b_pdf.pdf
pdf_data/report_filename 20170117 S-080 CR Ceitec EAC.pdf 0952V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 The IT Product identified in this certificate has been evaluated at an approved evaluation facility using the Common Methodology for IT Security Evaluation (CEM), Version 3.1 extended by Scheme Interpretations, by advice of the Certification Body for components beyond EAL 5 and CC Supporting Documents as listed in the Certification Report for conformance to the Common Criteria for IT Security Evaluation (CC), Version 3.1. CC and CEM are also published as ISO/IEC 15408 and ISO/IEC 18045. (*) This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report and Notification. For details on the validity see Certification Report part A chapter 4 (**
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0952-V2-2016
    • cert_item: STARCOS 3.5 ID GCC C3
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15 December 2009, BSI-CC-PP-0061-2009 (**) and in accordance with BSI Technische Richtlinie BSI-TR-03116-2, 2016
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-080: 19
  • DE:
    • BSI-DSZ-CC-0829-V2-2015: 4
    • BSI-DSZ-CC-0829-V2-2015-MA-01: 1
    • BSI-DSZ-CC-0952-2014: 4
    • BSI-DSZ-CC-0952-V2-2016: 21
    • BSI-DSZ-CC-S-0053-2016: 2
    • BSI-DSZ-CC-S-0057-2015: 2
    • BSI-DSZ-CC-S-0062-2016: 2
    • BSI-DSZ-CC-S-0070-2016: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0056: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 3
    • BSI-CC-PP-0061-2009: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4+: 19
    • EAL1: 1
    • EAL4: 1
    • EAL7: 1
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 13
    • EAL 4 augmented: 3
    • EAL 5: 8
    • EAL 5+: 1
    • EAL 6: 4
    • EAL 7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 6
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP: 4
    • FCS_RND.1: 4
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_UCT.1: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_API.1: 4
    • FIA_UAU.1: 1
    • FIA_UAU.4: 1
    • FIA_UAU.5: 1
    • FIA_UAU.6: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
    • FMT_MTD: 8
    • FMT_MTD.3: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_PHP.3: 1
    • FPT_TST.1: 1
pdf_data/report_keywords/vendor
  • GD:
    • G&D: 1
    • Giesecke & Devrient: 17
  • Infineon:
    • Infineon: 4
    • Infineon Technologies: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SRC:
    • SRC Security Research & Consulting: 3
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 2
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 3
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • other:
    • JIL: 1
  • FI:
    • Fault Injection: 1
    • fault injection: 1
    • physical tampering: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 22: 1
    • BSI 7148: 1
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 27
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 15408: 2
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 4
    • AIS 38: 1
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 15408: 6
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 6
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C3, SRC Security Research & Consulting GmbH (confidential document) 10 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
    • M7820 A11, Version 5, 16.07.2015, TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [11] STARCOS 3.5 ID GCC C2 Configuration 1, Application Specification, Version 1.0, 14.03.2013: 1
    • Version 1.10, 06.12.2016, STARCOS 3.5 ID GCC C3 Security Target, Giesecke & Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15: 1
    • Version 1.2, 06.12.2016, Konfigurationsliste von STARCOS 3.5 ID GCC C3, Giesecke & Devrient GmbH (confidential document) [30] BSI-CC-PP-0059-2009-MA-02, Common Criteria Protection Profile: EN 419211-2:2013 - Protection: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Kjaertan
  • /CreationDate: D:20170118113117Z00'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ugradert
  • /ModDate: D:20170118113117Z00'00'
  • /Producer: Mac OS X 10.12.2 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 650258
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename [STlite-EAC] CEITECSA 5.410.052 - ST-Lite ePassport Module EAC 2.0.pdf 0952V2b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0829-V2-2015-MA-01: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056: 7
    • BSI-PP-0056: 1
    • BSI-PP-CC-0056: 1
  • BSI:
    • BSI-CC-PP- 0084-2014: 1
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0061: 2
    • BSI-PP-0055: 1
    • BSI-PP-0056: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 8
    • EAL4 augmented: 2
  • EAL:
    • EAL 4: 2
    • EAL 5: 2
    • EAL4: 13
    • EAL4 augmented: 3
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 5
  • APE:
    • APE_SRE: 1
  • AVA:
    • AVA_VAN.5: 5
  • ADV:
    • ADV_ARC.1: 4
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_ECD: 1
  • ATE:
    • ATE_DPT.1: 2
    • ATE_DPT.2: 9
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM.1: 26
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 36
    • FCS_COP.1: 7
    • FCS_RND: 7
    • FCS_RND.1: 11
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 20
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 4
    • FDP_ITC: 1
    • FDP_ITC.1: 10
    • FDP_ITC.2: 10
    • FDP_UCT.1: 8
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 6
    • FIA_API.1: 10
    • FIA_API.1.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 8
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 21
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 18
    • FMT_LIM.2.1: 2
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 46
    • FMT_MTD.1: 11
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 34
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 38
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 5
    • FAU_SAS.1: 18
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 52
    • FCS_CKM.1: 16
    • FCS_CKM.2: 4
    • FCS_CKM.4: 20
    • FCS_COP: 55
    • FCS_COP.1: 11
    • FCS_RND: 7
    • FCS_RND.1: 12
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 4
  • FDP:
    • FDP_ACC: 16
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF: 23
    • FDP_ACF.1: 21
    • FDP_IFC.1: 5
    • FDP_ITC.1: 7
    • FDP_ITC.2: 8
    • FDP_ITT.1: 1
    • FDP_RIP: 4
    • FDP_RIP.1: 13
    • FDP_SDI: 14
    • FDP_SDI.1: 3
    • FDP_SDI.2: 4
  • FIA:
    • FIA_AFL: 33
    • FIA_AFL.1: 6
    • FIA_API: 20
    • FIA_API.1: 4
    • FIA_API.1.1: 3
    • FIA_SOS.2: 1
    • FIA_UAU: 45
    • FIA_UAU.1: 8
    • FIA_UAU.4: 6
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 13
    • FIA_UAU.6: 7
    • FIA_UIA: 1
    • FIA_UID: 25
    • FIA_UID.1: 9
  • FMT:
    • FMT_LIM: 14
    • FMT_LIM.1: 16
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 15
    • FMT_LIM.2.1: 2
    • FMT_MOF: 3
    • FMT_MSA: 15
    • FMT_MSA.1: 4
    • FMT_MSA.3: 6
    • FMT_MTD: 86
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 9
    • FMT_SMF: 5
    • FMT_SMF.1: 37
    • FMT_SMR: 5
    • FMT_SMR.1: 29
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP: 6
    • FPT_PHP.1: 5
    • FPT_PHP.3: 14
    • FPT_TST: 2
    • FPT_TST.1: 15
    • FPT_TST.1.3: 1
    • FPT_TST.2: 3
  • FRU:
    • FRU_FLT.2: 4
  • FTP:
    • FTP_ITC: 23
    • FTP_ITC.1: 6
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.BAC-PP: 2
    • OE.BAC_PP: 1
    • OE.MRTD_: 2
  • A:
    • A.CGA: 2
    • A.SCA: 2
  • O:
    • O.MEM_ACCESS: 1
    • O.RND: 3
  • OE:
    • OE.CGA_SSCD: 3
    • OE.CGA_TC_SVD: 2
    • OE.HID_TC_VAD: 1
    • OE.HID_VAD: 2
    • OE.SCA_TC_DTBS: 1
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • GD:
    • Giesecke & Devrient: 7
  • Infineon:
    • Infineon: 3
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 2
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 19
  • DES:
    • 3DES:
      • Triple-DES: 6
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 8
      • KMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
  • FF:
    • DH:
      • Diffie-Hellman: 5
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 7
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 8
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-2: 1
      • SHA-224: 2
      • SHA-256: 5
      • SHA-384: 3
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
  • KA:
    • Key Agreement: 3
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 94
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 6
    • RNG: 8
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CBC:
    • CBC: 3
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • Physical Tampering: 7
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 5
  • SCA:
    • DPA: 3
    • SPA: 2
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
  • FI:
    • Malfunction: 14
    • Physical Tampering: 4
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 7
  • SCA:
    • DPA: 2
    • Leak-Inherent: 6
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 148
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 10
    • EF.DG1: 20
    • EF.DG13: 2
    • EF.DG14: 7
    • EF.DG16: 17
    • EF.DG2: 7
    • EF.DG3: 20
    • EF.DG4: 18
    • EF.DG5: 5
    • EF.SOD: 10
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-411: 1
  • ICAO:
    • ICAO: 9
  • PKCS:
    • PKCS#3: 2
    • PKCS#34: 1
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
    • AIS20: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 197: 1
    • FIPS PUB 180-2: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#3: 3
  • RFC:
    • RFC 5639: 5
    • RFC3369: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • to the plastic Identity Card is achieved by physical and organisational security measures being out of scope of the current ST. The TOE shall comprise at least a) the circuitry of the contactless chip incl: 1
pdf_data/st_metadata
  • /Author: Marcos Kordyas Dossa
  • /CreationDate: D:20161212160233-02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20161212160233-02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1330959
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 71
  • /Author: eij
  • /CreationDate: D:20161216094745+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: Common Criteria, Certification, Zertifizierung, Giesecke & Devrient GmbH, G&D, StarCOS, nPA, Personalausweis, eID, electronic identity, eGovernment, eIDAS, QES, qualified electronic signature, travel document, passport
  • /ModDate: D:20161216094745+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: STARCOS 3.5 ID GCC C3
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 2002351
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 133
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different