| name |
MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations |
STARCOS 3.5 ID SAC+EAC+AA C1R |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
ES |
DE |
| status |
active |
archived |
| not_valid_after |
18.06.2026 |
01.09.2019 |
| not_valid_before |
18.06.2021 |
23.05.2014 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20CCRA.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20INF-3550.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0922a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-33%20ST_lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0922b_pdf.pdf |
| manufacturer |
THALES DIS FRANCE SA |
G+D Mobile Security GmbH |
| manufacturer_web |
https://www.thalesgroup.com/en/europe/france |
https://www.gi-de.com/de/de/mobile-security/ |
| security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
8ba234174b5f18cb |
8a8e6bef1e44dd23 |
| heuristics/cert_id |
2020-33-INF-3550 |
BSI-DSZ-CC-0922-2014 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_FLR.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 |
ALC_FLR.3, ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, AVA_VAN.5, ASE_INT.1, APE_ECD.1, ASE_REQ.2, ATE_DPT.4, ADV_FSP.6, ADV_TDS.6, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.3, ASE_ECD.1, APE_OBJ.2, ALC_TAT.3, ALC_DVS.2, ASE_SPD.1, APE_INT.1, ATE_COV.3, ADV_INT.3, ALC_LCD.2, ASE_TSS.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ALC_DEL.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2 |
| heuristics/extracted_versions |
1.1 |
3.5 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0819-2012, BSI-DSZ-CC-0813-2012 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0819-2012, BSI-DSZ-CC-0813-2012 |
| heuristics/scheme_data |
- category: Smart Cards and similiar devices
- certification_date: 18.06.2021
- enhanced:
- category: Smart Cards and similiar devices
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1214
- certification_date: 18.06.2021
- description: The MultiApp Essential V1.1 Platform is a smart card operating system (IC and OS) that complies with two major industry standards: Sun Java Card 3.0.4, which consists of the Java Card 3.0.4 Virtual Machine [JCVM304], the Java Card 3.0.4 Runtime Environment [JCRE304] and the Java Card 3.0.4 Application Programming Interface [JCAPI304]. The Global Platform Card Specification version 2.2.1 [GP221]. It is intended to host a set of Java Card applications and provides cryptographic services for symmetric (3DES, AES), asymmetric (RSA) and hash (SHA) operations, Moreover, it also provides random number generation and integrity check features. The TOE allows the loading of applets before or after the issuance of the card, but the Issuer can forbid this operation to be carried out. The TOE has four possible configurations: Full Configuration. Light Configuration. XLight_T1 Configuration. XLight_NB Configuration. The details about the features of each configuration are described in [ST LITE], chapter 2.4 (TOE Description).
- evaluation_facility: Applus Laboratories
- level: EAL5 + ALC_DVS.2 + AVA_VAN.5
- manufacturer: THALES
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1215
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1242
- type: Product
- manufacturer: THALES
- product: MultiApp Essential v1.1 Platform with Full, Light, XLight_T1 and XLight_NB configurations
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/697-multiapp-essential-v1-1-platform-with-full-light-xlight-t1-and-xlight-nb-configurations
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
ANSSI-CC-2018/51 |
BSI-DSZ-CC-0813-2012 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
ANSSI-CC-2018/51 |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0813-2012 |
| heuristics/protection_profiles |
9399bd94f9925b16 |
a33327d40f253f46 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
| pdf_data/cert_filename |
2020-33 CCRA.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 746775
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
| pdf_data/report_filename |
2020-33 INF-3550.pdf |
0922a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0922-2014
- cert_item: STARCOS 3.5 ID SAC+EAC+AA C1R
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0813: 1
- BSI-DSZ-CC-0813-2012: 3
- BSI-DSZ-CC-0819-2012: 3
- BSI-DSZ-CC-0922: 1
- BSI-DSZ-CC-0922-2014: 22
- BSI-DSZ-CC-S-0010-2012: 1
- BSI-DSZ-CC-S-0012-2012: 1
- BSI-DSZ-CC-S-0015-2012: 1
- BSI-DSZ-CC-S-0023-2013: 1
- BSI-DSZ-CC-S-0028-2014: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 3
- BSI-CC-PP-0056-V2-2012-MA02: 1
- BSI-CC-PP-0068-V2-2011: 3
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL5: 3
- ITSEC:
|
- EAL:
- EAL 4: 3
- EAL 5: 6
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL5: 7
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 3
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FCO:
- FCS:
- FCS_CKM: 10
- FCS_CKM.1: 4
- FCS_CKM.4: 1
- FCS_COP: 6
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 3
- FDP_ACF: 3
- FDP_IFC: 2
- FDP_IFF: 2
- FDP_ITC: 1
- FDP_RIP: 8
- FDP_ROL: 1
- FDP_SDI.2: 1
- FDP_UIT: 1
- FIA:
- FIA_ATD: 1
- FIA_UAU: 1
- FIA_UID: 2
- FIA_USB: 1
- FMT:
- FMT_MSA: 11
- FMT_MTD: 2
- FMT_SMF: 3
- FMT_SMR: 4
- FPR:
- FPT:
- FPT_FLS: 4
- FPT_ITT: 1
- FPT_PHP: 1
- FPT_RCV: 2
- FPT_TDC.1: 1
- FPT_TST: 1
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
- Gemalto:
- Microsoft:
- Thales:
|
- GD:
- G&D: 1
- Giesecke & Devrient: 12
- Infineon:
- Infineon: 1
- Infineon Technologies: 2
- Infineon Technologies AG: 1
|
| pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- fault injection: 2
- physical tampering: 1
- SCA:
- other:
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 31: 1
- AIS 32: 1
- AIS 34: 2
- AIS 35: 3
- AIS 36: 2
- AIS 38: 1
- AIS36: 1
- FIPS:
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
|
| pdf_data/report_keywords/javacard_version |
- JavaCard:
- Java Card 3.0.4: 4
- JavaCard 3.0.4: 1
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- These applications could be removed based on customer needs and they are out of scope of the evaluation: 1
- out of scope: 1
- v1.1 & Server v1.1. (These applications could be removed based on customer needs and they are out of scope of the evaluation). Additionally, other applets – not determined at the moment of the present: 1
|
- ConfidentialDocument:
- STARCOS 3.5 ID SAC+EAC+AA C1R Security Target, Giesecke & Devrient GmbH, Version 2.6, 03.03.2014 (confidential document) [7] Security Target BSI-DSZ-CC-0922-2014, STARCOS 3.5 ID SAC+EAC+AA C1R Security Target Lite: 1
- Version 1.1, Date: 20.05.2014, Evaluation Facility: SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile Electronic Passport using Standard Inspection Procedure with PACE: 1
- to AIS36, M7820 A11, BSI-DSZ-CC-0813, Version 2, 18 March 2013, TÜV Informationstechnik GmbH (confidential document) 24 / 38 BSI-DSZ-CC-0922-2014 Certification Report C Excerpts from the Criteria CC Part 1: 1
|
| pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20140807104823+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, MRTD, EAC, PACE, SAC, G&D, Starcos, Giesecke & Devrient"
- /ModDate: D:20140807105707+02'00'
- /Producer: LibreOffice 3.6
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0922-2014
- pdf_file_size_bytes: 1029942
- pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
| pdf_data/st_filename |
2020-33 ST_lite.pdf |
0922b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0056-V2-2012: 1
- BSI-CC-PP-0055-2009: 1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2: 1
- BSI-CC-PP-0068-V2-2011: 2
- BSI-PP-0002-2001: 1
- BSI-PP-0035-2007: 1
- BSI-PP-0056-V2: 1
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+: 2
- EAL5: 6
- EAL5 augmented: 2
- EAL5+: 1
|
- EAL:
- EAL 5: 2
- EAL5: 3
- EAL5 augmented: 2
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 7
- ADV_FSP: 1
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 5
- ADV_IMP: 1
- ADV_IMP.1: 7
- ADV_INT.2: 1
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 7
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 7
- AGD_PRE: 2
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 7
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- ALC:
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 5
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 13
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM: 68
- FCS_CKM.1: 20
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM.2.1: 1
- FCS_CKM.3: 1
- FCS_CKM.3.1: 1
- FCS_CKM.4: 46
- FCS_CKM.4.1: 1
- FCS_COP: 32
- FCS_COP.1: 7
- FCS_COP.1.1: 1
- FCS_RND: 8
- FCS_RND.1: 10
- FCS_RND.1.1: 2
- FCS_RNG: 1
- FDP:
- FDP_ACC: 36
- FDP_ACC.1: 14
- FDP_ACC.2: 6
- FDP_ACF: 30
- FDP_ACF.1: 17
- FDP_IFC: 22
- FDP_IFC.1: 13
- FDP_IFC.2: 2
- FDP_IFF: 12
- FDP_IFF.1: 12
- FDP_ITC: 11
- FDP_ITC.1: 18
- FDP_ITC.2: 23
- FDP_ITT.1: 1
- FDP_RIP: 69
- FDP_RIP.1: 10
- FDP_ROL: 12
- FDP_ROL.1: 2
- FDP_SDC.1: 1
- FDP_SDI: 3
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 6
- FDP_UIT.1: 3
- FIA:
- FIA_API.1: 1
- FIA_ATD: 6
- FIA_ATD.1: 2
- FIA_SOS.2: 1
- FIA_UAU: 6
- FIA_UAU.1: 3
- FIA_UID: 12
- FIA_UID.1: 10
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 2
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA: 83
- FMT_MSA.1: 12
- FMT_MSA.2: 1
- FMT_MSA.3: 16
- FMT_MTD: 16
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_SMF: 30
- FMT_SMF.1: 13
- FMT_SMR: 39
- FMT_SMR.1: 25
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 8
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 42
- FPT_FLS.1: 8
- FPT_ITT: 5
- FPT_ITT.1: 2
- FPT_PHP: 6
- FPT_PHP.3: 2
- FPT_RCV: 13
- FPT_RCV.3: 4
- FPT_RCV.4: 1
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 5
- FPT_TST.1: 3
- FRU:
- FTP:
- FTP_ITC: 8
- FTP_ITC.1: 5
- FTP_TRP.1: 3
|
- FAU:
- FAU_SAS: 1
- FAU_SAS.1: 9
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 31
- FCS_CKM.1: 9
- FCS_CKM.2: 5
- FCS_CKM.4: 21
- FCS_CKM.4.1: 1
- FCS_COP: 47
- FCS_COP.1: 5
- FCS_RND: 1
- FCS_RND.1: 7
- FCS_RND.1.1: 1
- FCS_RNG.1: 4
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 5
- FDP_ACF: 5
- FDP_ACF.1: 10
- FDP_IFC.1: 3
- FDP_ITC.1: 7
- FDP_ITC.2: 7
- FDP_ITT.1: 1
- FDP_RIP.1: 3
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 3
- FDP_UCT.1: 1
- FDP_UIT: 3
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 2
- FIA_API: 9
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_UAU: 23
- FIA_UAU.1: 2
- FIA_UAU.4: 1
- FIA_UAU.5: 2
- FIA_UAU.6: 2
- FIA_UID: 4
- FIA_UID.1: 4
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 13
- FMT_LIM.1.1: 1
- FMT_LIM.2: 11
- FMT_LIM.2.1: 2
- FMT_MSA.1: 2
- FMT_MSA.3: 3
- FMT_MTD: 34
- FMT_MTD.1: 10
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR: 12
- FMT_SMR.1: 2
- FPT:
- FPT_EMS: 1
- FPT_EMS.1: 7
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 4
- FRU:
- FTP:
- FTP_ITC: 6
- FTP_ITC.1: 6
- FTP_TRP.1: 2
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 5
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 16
- O.APPLET: 28
- O.CARD-MANAGEMENT: 3
- O.CARD_MANAGEMENT: 18
- O.CIPHER: 11
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 9
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CONFID: 10
- O.GLOBAL_ARRAYS_INTEG: 5
- O.INSTALL: 12
- O.JAVAOBJECT: 57
- O.KEY-MNGT: 6
- O.KEY_MNGT: 5
- O.LOAD: 7
- O.NATIVE: 12
- O.OBJ-DELETION: 4
- O.OPERATE: 15
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.RESOURCES: 10
- O.RND: 14
- O.SCP: 35
- O.SID: 14
- O.TRANSACTION: 6
- OE:
- OE.APPLET: 4
- OE.CARD-MANAGEMENT: 1
- OE.CODE-EVIDENCE: 10
- OE.SCP: 3
- OE.VERIFICATION: 26
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.RND: 4
- OSP.VERIFICATION: 4
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
|
| pdf_data/st_keywords/vendor |
- Gemalto:
- Microsoft:
- Thales:
|
- GD:
- Infineon:
- Infineon: 4
- Infineon Technologies AG: 1
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 4
- SHA-384: 4
- SHA-512: 3
- SHA224: 1
|
- JH:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 3
- SHA-256: 2
- SHA-384: 2
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP224r1: 1
- brainpoolP256r1: 2
- brainpoolP320r1: 2
- brainpoolP384r1: 2
- brainpoolP512r1: 2
- NIST:
- secp256r1: 2
- secp384r1: 2
- secp521r1: 2
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- fault induction: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 3
- physical probing: 2
|
- FI:
- Malfunction: 10
- malfunction: 1
- physical tampering: 4
- SCA:
- Leak-Inherent: 6
- physical probing: 2
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 2
- EF.DG1: 5
- EF.DG14: 1
- EF.DG15: 3
- EF.DG16: 4
- EF.DG2: 3
- EF.DG3: 9
- EF.DG4: 9
- EF.DG5: 2
- EF.SOD: 4
|
| pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS PUB 180-4: 1
- FIPS180-4: 1
- FIPS197: 3
- ISO:
- PKCS:
- SCP:
- SCP01: 4
- SCP02: 3
- SCP03: 3
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS20: 2
- AIS31: 1
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 9796-2: 2
- PKCS:
|
| pdf_data/st_keywords/javacard_version |
- GlobalPlatform:
- JavaCard:
- Java Card 3.0.4: 4
- JavaCard 3.0.4: 1
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- Client v1.1 & Server v1.1 (These applications could be removed based on customer needs and they are out of scope of the evaluation). Additionally, other applets – not determined at the moment of the present: 1
- These applications could be removed based on customer needs and they are out of scope of the evaluation: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 2
|
|
| pdf_data/st_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 1421244
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 100
|
- /Author: stut
- /Classification: Public
- /Company: Giesecke & Devrient Group
- /CreationDate: D:20140428170202+02'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Date: 28.04.2014
- /Keywords: Version 2.7/28.04.2014
- /ModDate: D:20140807113844+02'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140428150104
- /State: Final
- /Styles: supported
- /Subject: STARCOS 3.5 ID SAC+EAC+AA C1R
- /TOE_HW: SLE78CLX360P, SLE78CLX800P, SLE78CLX1280P
- /TOE_Name: STARCOS 3.5 ID SAC+EAC+AA C1R
- /TemplAuthor: Joern Treger
- /TemplVersion: 1.0
- /Title: Security Target Lite
- /Version: 2.7
- pdf_file_size_bytes: 642762
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 63
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |