Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

STARCOS 3.4 ID Tachograph version C2
NSCIB-CC-09-11192-CR2
STARCOS 3.7 ID ePA C2, STARCOS 3.7 ID eAT C2, STARCOS 3.7 ID ePass C2
BSI-DSZ-CC-1077-V2-2024
name STARCOS 3.4 ID Tachograph version C2 STARCOS 3.7 ID ePA C2, STARCOS 3.7 ID eAT C2, STARCOS 3.7 ID ePass C2
not_valid_before 2010-09-02 2024-06-12
not_valid_after 2025-09-02 2029-06-12
scheme NL DE
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/GDM_STA34_TACHO_ASE_Lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1077V2b_pdf.pdf
manufacturer G+D Mobile Security GmbH Giesecke+Devrient ePayments GmbH
manufacturer_web https://www.gi-de.com/de/de/mobile-security/ https://www.gi-de.com/de/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification_Report_NSCIB-CC-09-11192-CR2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1077V2a_pdf.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1077V2c_pdf.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0087V2b_pdf.pdf', 'pp_ids': frozenset({'MR.ED-PP_V2.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria PP Configuration Machine Readable Electronic Documents - Optionales Nachladen (O...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0090b_pdf.pdf', 'pp_ids': None})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2011, 1, 31), 'maintenance_title': 'Starcos 3.4 ID Tachograph version C3', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Maintenance_Report_NSCIB-CC-09-11192-MA1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/GDM_STA34_TACHO_ASE_C3_Lite.pdf'})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None 7efd5772e248fe0a3a78b7ae9d8b17a6c6ec77cd4e73acd6992da2e889c19da2
state/cert/txt_hash None 57ed53e812b422749fe1598e6e0c5d92642dfbab10ee348cd0a890d10559c368
state/report/pdf_hash 2e7dae23316d3e07bdbb88f15d49b6e7136329897eea3cde4bc36f18d321df12 6e4766ae1099a41424156e555e56e8a03d5bc160711cc399c9832bbc1f9ce786
state/report/txt_hash 013eb9393636ee12d38b03fa636e04b0e8deed90f5c9273d0d292311f8ed0d92 0a604f3263edd1d17ba6653fea9b0e6d7513905f57f5d930de29163a7e164f1b
state/st/pdf_hash 001355b73da7c8cfa55911987527833e77e4aae11031dc0bad0204be55f0a15f 2bbf1c83922098b4b284c5900771fed9b0cb071eea63a504cfbaa9f5a6a5782e
state/st/txt_hash c33d1c512336da13724cdbb31cc3e80c1085a9a47729309e984c081af4e6307c ffa94cb2127d0be576dd3935b57d734633ef49e70b9fc268336379cf07bd38a9
heuristics/cert_id NSCIB-CC-09-11192-CR2 BSI-DSZ-CC-1077-V2-2024
heuristics/cert_lab None BSI
heuristics/extracted_versions 3.4 3.7
heuristics/report_references/directly_referencing ANSSI-CC-2009/24 BSI-DSZ-CC-1077-2020, BSI-DSZ-CC-1110-V6-2023
heuristics/report_references/indirectly_referencing ANSSI-CC-2009/22, ANSSI-CC-2009/24, ANSSI-CC-2008/10, ANSSI-CC-2009/10 BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1077-2020, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-1110-V5-2022, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-1110-V6-2023, BSI-DSZ-CC-0891-V2-2016
heuristics/scheme_data None
  • cert_id: BSI-DSZ-CC-1077-V2-2024
  • product: STARCOS 3.7 ID ePA C2, STARCOS 3.7 ID eAT C2, STARCOS 3.7 ID ePass C2
  • vendor: Giesecke+Devrient ePayments GmbH
  • certification_date: 12.06.2024
  • category: Electronic ID documents
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-IC_mit_Anwendung/1077.html
  • enhanced:
    • product: STARCOS 3.7 ID ePA C2, STARCOS 3.7 ID eAT C2, STARCOS 3.7 ID ePass C2
    • applicant: Giesecke+Devrient ePayments GmbH Prinzregentenstr. 161 81677 München
    • evaluation_facility: SRC Security Research & Consulting GmbH
    • assurance_level: EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5
    • protection_profile: Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use (MR.ED-PP), Version 2.0.3, 18 July 2016, BSI-CC-PP-0087-V2-2016-MA-01, Common Criteria PP Configuration Machine Readable Electronic Documents - Optionales Nachladen (Optional Post-Emission Updates) [MR.ED-ON-PP], Version 0.9.2, 18 August 2016, BSI-CC-PP-0090-2016
    • certification_date: 12.06.2024
    • expiration_date: 11.06.2029
    • entries: frozendict({'id': 'BSI-DSZ-CC-1077-V2-2024 (Ausstellungsdatum / Certification Date 12.06.2024, gültig bis / valid until 11.06.2029)\nCertificate of Conformity to Regulation (EU) No. 910/2014 (eIDAS) based on BSI-DSZ-CC-1077-V2-2024\nZertifizierungsreport / Certification Report\nSicherheitsvorgaben / Security Target\nZertifikat / Certificate', 'description': 'certificate and integrated site certificates for development and production sites as well as on the update of the vulnerability analysis including penetration testing for the (crypto-) implementation.'}), frozendict({'id': 'BSI', 'description': 'Second Re-Assessment for update of the vulnerability analysis and valuation related to the certification procedure 1077.'}), frozendict({'id': 'BSI', 'description': 'Re-Assessment for update of the vulnerability analysis and valuation related to the certification procedure 1077.'}), frozendict({'id': 'BSI', 'description': 'Certificate'})
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1077V2c_pdf.pdf?__blob=publicationFile&v=2
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1077V2a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1077V2b_pdf.pdf?__blob=publicationFile&v=2
    • description: The Target of Evaluation (TOE) is the product STARCOS 3.7 ID ePA C1, STARCOS 3.7 ID eAT C1, STARCOS 3.7 ID ePass C1 provided by Giesecke+Devrient Mobile Security GmbH, based on the hardware platform Infineon Security Controller IFX_CCI_000005h from Infineon Technologies AG. It is an electronic Identity Card representing a smart card with contactless interface programmed according to the Technical Guideline BSI TR-03110 and the ICAO specifications. The smart card provides the following authentication mechanisms: Passive Authentication, Password Authenticated Connection Establishment (PACE), Chip Authentication version 1, 2 and 3, Terminal Authentication version 1 and 2. Additionally, the TOE meets the requirements of the Technical Guideline BSI TR-03116-2 as part of the qualification for the use within electronic ID card projects of the Federal Republic of Germany. Please note that in consistency to the claimed protection profile BSI-CC-PP-0087-V2-2016-MA-01 the security mechanisms Password Authenticated Connection Establishment (PACE) and Extended Access Control (EAC) are in focus of this evaluation process. The further security mechanism Basic Access Control (BAC) contained in the corresponding product is subject of a separate evaluation process (refer to BSI-DSZ-CC-1076-2020). The smart card contains at least one of the following applications that are all subject of the TOE’s evaluation: ePass ApplicationeID ApplicationeSign Application Three different major configurations of the TOE exist that only differ in the installed file system or applications respectively: Electronic DocumentResidence PermitPassport Furthermore, the TOE provides the so-called Update-in-Field mechanism. This secure update mechanism allows to install code-signed updates of the TOE Embedded Software (operating system part) by authorized staff during operational use. The TOE’s evaluation only covers the Update-in-Field mechanism itself, but does not cover any update packages. As stated in the certification report in chapter 12, the certificate comprises the usage as QSigCD according to article 30 of the Regulation (EU) No 910/2014.
  • subcategory: IC with applications
heuristics/st_references/directly_referencing None BSI-DSZ-CC-1110-V6-2023
heuristics/st_references/indirectly_referencing None BSI-DSZ-CC-1110-V6-2023
pdf_data/cert_filename None 1077V2c_pdf.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • DE:
      • BSI-DSZ-CC-1077-V2-2024: 1
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0087-V2-2016-MA-01: 1
      • BSI-CC-PP-0090-2016: 1
  • cc_security_level:
    • EAL:
      • EAL 4: 1
      • EAL 5: 1
      • EAL 2: 1
      • EAL 4 augmented: 1
  • cc_sar:
    • ALC:
      • ALC_DVS.2: 1
    • ATE:
      • ATE_DPT.2: 1
    • AVA:
      • AVA_VAN.5: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
    • GD:
      • Giesecke+Devrient: 1
  • eval_facility:
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
    • BSI:
      • BSI TR-03110: 1
  • device_model:
  • tee_name:
  • os_name:
    • STARCOS:
      • STARCOS 3: 3
  • cplc_data:
  • ic_data_group:
  • standard_id:
    • ISO:
      • ISO/IEC 15408: 2
      • ISO/IEC 18045: 2
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 232936
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Federal Office for Information Security
  • /Keywords: Common Criteria, Certification, Zertifizierung, STARCOS 3.7
  • /Subject: Common Criteria, Certification, Zertifizierung, STARCOS 3.7
  • /Title: Certificate BSI-DSZ-CC-1077-V2-2024
  • pdf_hyperlinks:
pdf_data/report_filename Certification_Report_NSCIB-CC-09-11192-CR2.pdf 1077V2a_pdf.pdf
pdf_data/report_frontpage
  • NL:
  • DE:
    • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
    • cert_id: BSI-DSZ-CC-1077-V2-2024
    • cert_item: STARCOS 3.7 ID ePA C2, STARCOS 3.7 ID eAT C2, STARCOS 3.7 ID ePass C2
    • developer: Giesecke+Devrient ePayments GmbH
    • cert_lab: BSI
    • ref_protection_profiles: Common Criteria Protection Profile Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use [MR.ED-PP], Version 2.0.3, 18 July 2016, BSI-CC-PP-0087-V2-2016-MA-01 Common Criteria PP Configuration Machine Readable Electronic Documents – Optionales Nachladen (Optional Post-Emission Updates) [MR.ED-ON-PP], Version 0.9.2, 18 August 2016, BSI-CC-PP-0090-2016
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 valid until: 11 June 2029 SOGIS Recognition Agreement
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 12
    • ECIES:
      • ECIES: 2
    • ECC:
      • ECC: 6
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-2009/24: 1
  • NL:
    • NSCIB-CC-09-11192-CR2: 16
    • NSCIB-CC-09-11192: 3
    • NSCIB-CC-09-11192-CR: 1
    • NSCIB-09-11192: 1
  • DE:
    • BSI-DSZ-CC-1077-V2-2024: 25
    • BSI-DSZ-CC-1077-2020: 2
    • BSI-DSZ-CC-1077-: 1
    • BSI-DSZ-CC-1077-2020-RA-01: 2
    • BSI-DSZ-CC-1110-V6-2023: 6
    • BSI-DSZ-CC-1077-2020-RA-02: 1
    • BSI-DSZ-CC-S-0260-2023: 1
    • BSI-DSZ-CC-S-0208-2022: 2
    • BSI-DSZ-CC-S-0253-2023: 2
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0002: 2
  • BSI-CC-PP-0087-V2-2016-MA-01: 3
  • BSI-CC-PP-0090-2016: 4
  • BSI-CC-PP-0059-2009-MA-02: 3
  • BSI-CC-PP-0056-V2-2012: 2
  • BSI-CC-PP-0086: 3
  • BSI-CC-PP-0068-V2-2011-MA-01: 2
  • BSI-CC-PP-0068-V2-: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_IMP.2: 3
    • ADV_FSP: 4
    • ADV_TDS: 2
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 3
    • ALC_CMC.5: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 2
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
  • ADV:
    • ADV_ARC: 1
  • ALC:
    • ALC_DVS.2: 5
    • ALC_FLR: 2
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_DPT.2: 4
  • AVA:
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sar/ADV
  • ADV_IMP.2: 3
  • ADV_FSP: 4
  • ADV_TDS: 2
  • ADV_ARC.1: 1
  • ADV_FSP.4: 1
  • ADV_TDS.3: 1
  • ADV_ARC: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 3
  • ALC_CMC.5: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 2
  • ALC_TAT.1: 1
  • ALC_DVS.2: 5
  • ALC_FLR: 2
  • ALC_CMC.4: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.1: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 3 5
pdf_data/report_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.2: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_DPT.2: 4
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT.2 1 4
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 3 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL4: 1
  • EAL7: 1
  • EAL 4+: 1
  • EAL5+: 1
  • EAL 4: 1
  • EAL 4 augmented: 1
  • EAL 4: 5
  • EAL 5: 4
  • EAL 2: 3
  • EAL 1: 1
  • EAL 5+: 2
  • EAL 6: 2
  • EAL 4 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 1 5
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 augmented 1 3
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_COP: 24
    • FCS_CKM: 23
    • FCS_RND: 1
  • FIA:
    • FIA_UAU: 7
  • FTP:
    • FTP_ITC: 5
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • being maintained is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • 7 ID eAT C2, STARCOS 3.7 ID ePass C2, Version 1.7, 26 April 2024, Giesecke+Devrient ePayments GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1077-V2-2024, Security Target Lite STARCOS 3.7 ID ePA C2: 1
    • eAT C2, STARCOS 3.7 ID ePass C2, Version 1.0, 3 May 2024, SRC Security Research & Consulting GmbH (confidential document) [15] Configuration List BSI-DSZ-CC-1077-V2-2024, Configuration List STARCOS 3.7 ID ePA C2, STARCOS: 1
    • 7 ID eAT C2, STARCOS 3.7 ID ePass C2, Version 0.9, 29 April 2024, Giesecke+Devrient ePayments GmbH (confidential document) [16] Guidance Documentation STARCOS 3.7 ID C2 – Main Document, Version 1.1, 05 December 2023: 1
    • H13, Revision 4.4, 30 November 2023, Infineon Technologies AG, BSI-DSZ-CC- 1110-V6-2023 (confidential document) Security Target Lite of the underlying hardware platform, Common Criteria Public Security Target: 1
    • procedure BSI-DSZ-CC-1110-V6-2023, Version 3, 01 December 2023, TÜV Informationstechnik GmbH (confidential document) [24] Technical Guideline BSI TR-03110: Advanced Security Mechanisms for Machine Readable Travel: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • OFB:
    • OFB: 2
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 23
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 1
pdf_data/report_keywords/device_model
  • ATMEL:
    • ATMEL AT90SC24036RCU: 3
    • ATMEL ATV4/ATV4: 1
pdf_data/report_keywords/ecc_curve
  • Brainpool:
    • brainpoolP512r1: 2
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 3
  • TUV:
    • TÜV Informationstechnik: 1
  • SRC:
    • SRC Security Research & Consulting: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/os_name/STARCOS/STARCOS 3 25 80
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • SPA: 3
    • DPA: 2
  • other:
    • JIL: 2
  • SCA:
    • side channel: 1
  • FI:
    • physical tampering: 1
    • malfunction: 1
    • fault injection: 1
  • other:
    • JIL: 6
pdf_data/report_keywords/side_channel_analysis/SCA
  • SPA: 3
  • DPA: 2
  • side channel: 1
pdf_data/report_keywords/side_channel_analysis/other/JIL 2 6
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS180-4: 1
    • FIPS180: 6
    • FIPS46-3: 3
    • FIPS197: 4
    • FIPS PUB 46-3: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 1
  • BSI:
    • AIS 34: 4
    • AIS 36: 5
    • AIS 37: 3
    • AIS 26: 4
    • AIS 25: 4
    • AIS 20: 3
    • AIS 31: 3
    • AIS 46: 3
    • AIS 35: 2
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 32: 1
    • AIS 38: 1
    • AIS20: 2
    • AIS31: 2
  • RFC:
    • RFC 5639: 15
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18031:2005: 1
  • ICAO:
    • ICAO: 19
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • 3DES: 3
  • constructions:
    • MAC:
      • CMAC: 5
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 8
    • BSI TR-03116-2: 2
    • BSI TR-02102-1: 1
    • BSI TR-03116: 3
    • BSI 7148: 1
pdf_data/report_keywords/vendor
  • GD:
    • Giesecke & Devrient: 5
    • G&D: 2
  • Infineon:
    • Infineon: 9
    • Infineon Technologies AG: 7
  • GD:
    • Giesecke+Devrient: 23
pdf_data/report_keywords/vendor/GD
  • Giesecke & Devrient: 5
  • G&D: 2
  • Giesecke+Devrient: 23
pdf_data/report_metadata
  • pdf_file_size_bytes: 195336
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 17
  • /CreationDate: D:20100903105626+02'00'
  • /Creator: pdfFactory Pro www.pdffactory.com
  • /Producer: pdfFactory Pro 3.22 (Windows XP Professional Dutch)
  • /Title: Certification Report NSCIB-CC-09-11192-CR2.pdf
  • pdf_hyperlinks: http://www.commoncriteriaportal.org, mailto:[email protected]
  • pdf_file_size_bytes: 739434
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 39
  • /Author: Federal Office for Information Security
  • /Keywords: "Common Criteria, Certification, Zertifizierung, STARCOS 3.7, MR.ED-PP, MR.ED-ON-PP"
  • /Subject: Common Criteria, Certification, Zertifizierung, STARCOS 3.7, MR.ED-PP, MR.ED-ON-PP
  • /Title: Certification Report BSI-DSZ-CC-1077-V2-2024
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
pdf_data/report_metadata//Title Certification Report NSCIB-CC-09-11192-CR2.pdf Certification Report BSI-DSZ-CC-1077-V2-2024
pdf_data/report_metadata/pdf_file_size_bytes 195336 739434
pdf_data/report_metadata/pdf_hyperlinks http://www.commoncriteriaportal.org, mailto:[email protected] https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
pdf_data/report_metadata/pdf_is_encrypted True False
pdf_data/report_metadata/pdf_number_of_pages 17 39
pdf_data/st_filename GDM_STA34_TACHO_ASE_Lite.pdf 1077V2b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 4
    • ECIES:
      • ECIES: 1
    • ECC:
      • ECC: 2
  • FF:
    • DH:
      • Diffie-Hellman: 5
      • DH: 4
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1110-V6-2023: 2
pdf_data/st_keywords/cc_claims
  • O:
    • O.CLON: 1
    • O.DEV_DIS_ES: 4
    • O.DEV: 1
    • O.SOFT_DLV: 3
    • O.INIT_ACS: 3
    • O.TAMPER_ES: 2
    • O.OPERATE: 1
    • O.FLAW: 1
    • O.MOD_MEMORY: 1
    • O.RND: 1
    • O.DLV_DATA: 1
    • O.DLV_PROTECT: 1
    • O.DLV_AUDIT: 1
    • O.DLV_RESP: 1
    • O.USE_DIAG: 1
    • O.TEST_OPERATE: 1
  • T:
    • T.RND: 1
    • T.DIS_TEST_ES: 1
    • T.T_TOOLS: 1
    • T.T_ES: 4
    • T.T_CMD: 4
    • T.MOD: 1
    • T.MOD_LOAD: 4
    • T.MOD_EXE: 4
    • T.MOD_SHARE: 4
    • T.CLON: 2
    • T.DIS_INFO: 2
    • T.DIS_DEL: 2
    • T.T: 2
    • T.MOD_DEL: 2
    • T.MOD_SOFT: 2
  • OT:
    • OT.TAMPER_ES: 13
    • OT.PERSONALIZATION: 1
  • O:
    • O.RND: 3
    • O.AES: 2
    • O.TDES: 1
    • O.MEM_ACCESS: 1
  • T:
    • T.RND: 3
  • A:
    • A.CGA: 2
    • A.SCA: 2
  • OE:
    • OE.HID_VAD: 2
pdf_data/st_keywords/cc_claims/O
  • O.CLON: 1
  • O.DEV_DIS_ES: 4
  • O.DEV: 1
  • O.SOFT_DLV: 3
  • O.INIT_ACS: 3
  • O.TAMPER_ES: 2
  • O.OPERATE: 1
  • O.FLAW: 1
  • O.MOD_MEMORY: 1
  • O.RND: 1
  • O.DLV_DATA: 1
  • O.DLV_PROTECT: 1
  • O.DLV_AUDIT: 1
  • O.DLV_RESP: 1
  • O.USE_DIAG: 1
  • O.TEST_OPERATE: 1
  • O.RND: 3
  • O.AES: 2
  • O.TDES: 1
  • O.MEM_ACCESS: 1
pdf_data/st_keywords/cc_claims/O/O.RND 1 3
pdf_data/st_keywords/cc_claims/T
  • T.RND: 1
  • T.DIS_TEST_ES: 1
  • T.T_TOOLS: 1
  • T.T_ES: 4
  • T.T_CMD: 4
  • T.MOD: 1
  • T.MOD_LOAD: 4
  • T.MOD_EXE: 4
  • T.MOD_SHARE: 4
  • T.CLON: 2
  • T.DIS_INFO: 2
  • T.DIS_DEL: 2
  • T.T: 2
  • T.MOD_DEL: 2
  • T.MOD_SOFT: 2
  • T.RND: 3
pdf_data/st_keywords/cc_claims/T/T.RND 1 3
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0002: 1
  • BSI-CC-PP-0087-V2-MA-01: 1
  • BSI-CC-PP-0056-V2-2012: 1
  • BSI-CC-PP-0086-2015: 1
  • BSI-CC-PP-0084-2014: 1
  • BSI-CC-PP-0087-V2-2016-MA-01: 1
  • BSI-CC-PP-0059-: 1
pdf_data/st_keywords/cc_sar
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 1
    • ADO_IGS: 1
    • ADO_DEL: 1
    • ADO_IGS.2: 2
  • ADV:
    • ADV_IMP.2: 12
    • ADV_SPM.1: 1
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 6
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
    • ALC_CMC.5: 2
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 3
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 11
    • AVA_VLA.4: 4
    • AVA_MSU.3: 1
  • ADV:
    • ADV_ARC.1: 3
    • ADV_TDS.3: 4
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
  • AGD:
    • AGD_PRE: 4
    • AGD_OPE: 1
    • AGD_PRE.1: 3
    • AGD_OPE.1: 2
  • ALC:
    • ALC_DVS.2: 8
    • ALC_DEL.1: 1
    • ALC_FLR.1: 1
  • ATE:
    • ATE_DPT.2: 9
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_DPT: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sar/ADV
  • ADV_IMP.2: 12
  • ADV_SPM.1: 1
  • ADV_ARC.1: 1
  • ADV_FSP.4: 1
  • ADV_TDS.3: 1
  • ADV_ARC.1: 3
  • ADV_TDS.3: 4
  • ADV_FSP.4: 2
  • ADV_IMP.1: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 1 3
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 1 2
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.3 1 4
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_PRE: 4
  • AGD_OPE: 1
  • AGD_PRE.1: 3
  • AGD_OPE.1: 2
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 1 2
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 1 3
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 6
  • ALC_LCD.1: 2
  • ALC_TAT.1: 2
  • ALC_CMC.5: 2
  • ALC_CMS.4: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 8
  • ALC_DEL.1: 1
  • ALC_FLR.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 6 8
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.2: 3
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_DPT.2: 9
  • ATE_FUN: 1
  • ATE_FUN.1: 1
  • ATE_DPT: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.2 3 9
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 11
  • AVA_VLA.4: 4
  • AVA_MSU.3: 1
  • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 11 8
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5+: 2
    • EAL4: 10
    • EAL 4: 4
    • EAL 4+: 1
    • EAL 5: 2
    • EAL5: 2
    • EAL4 augmented: 5
  • ITSEC:
    • ITSEC E3 high: 1
  • EAL:
    • EAL4: 14
    • EAL6+: 2
    • EAL 4: 2
    • EAL 6: 2
    • EAL6: 1
    • EAL4 augmented: 4
    • EAL6 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5+: 2
  • EAL4: 10
  • EAL 4: 4
  • EAL 4+: 1
  • EAL 5: 2
  • EAL5: 2
  • EAL4 augmented: 5
  • EAL4: 14
  • EAL6+: 2
  • EAL 4: 2
  • EAL 6: 2
  • EAL6: 1
  • EAL4 augmented: 4
  • EAL6 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL 4 4 2
pdf_data/st_keywords/cc_security_level/EAL/EAL4 10 14
pdf_data/st_keywords/cc_security_level/EAL/EAL4 augmented 5 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAA.1: 4
    • FAU_GEN.1: 3
    • FAU_SAA.1.1: 3
    • FAU_SAA.1.2: 1
    • FAU_DAU.1.1: 4
  • FCO:
    • FCO_NRO: 1
    • FCO_NRO.1: 3
    • FCO_NRO.1.1: 3
    • FCO_NRO.1.2: 1
    • FCO_NRO.1.3: 3
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 11
    • FCS_CKM.2: 5
    • FCS_COP.1: 10
    • FCS_CKM.4: 9
    • FCS_CKM.1.1: 3
    • FCS_CKM.2.1: 4
    • FCS_CKM.4.1: 5
    • FCS_COP: 1
    • FCS_COP.1.1: 8
    • FCS_RND.1: 3
  • FDP:
    • FDP_ITC.1.1: 5
    • FDP_ITC.1: 4
    • FDP_ITC.2: 1
    • FDP_ACC: 1
    • FDP_ACC.2: 5
    • FDP_ACC.1: 4
    • FDP_ACF.1.1: 6
    • FDP_ACC.2.1: 5
    • FDP_ACC.2.2: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 4
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 2
    • FDP_DAU.1: 4
    • FDP_DAU.1.2: 3
    • FDP_ETC: 1
    • FDP_ETC.1: 2
    • FDP_ETC.1.1: 4
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 4
    • FDP_IFC.1: 5
    • FDP_ETC.2.1: 4
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 3
    • FDP_ETC.2.4: 2
    • FDP_ITC: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 4
    • FDP_RIP: 1
    • FDP_RIP.1: 2
    • FDP_RIP.1.1: 4
    • FDP_SDI: 1
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 4
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_UID.1: 5
    • FIA_AFL: 3
    • FIA_AFL.1: 2
    • FIA_UAU.1: 3
    • FIA_AFL.1.1: 5
    • FIA_AFL.1.2: 3
    • FIA_ATD: 1
    • FIA_ATD.1: 3
    • FIA_ATD.1.1: 4
    • FIA_UAU: 1
    • FIA_UID: 2
    • FIA_UAU.1.1: 4
    • FIA_UAU.1.2: 1
    • FIA_UAU.3: 2
    • FIA_UAU.3.1: 4
    • FIA_UAU.3.2: 2
    • FIA_UAU.4: 2
    • FIA_UAU.4.1: 4
    • FIA_UID.1.1: 4
    • FIA_UID.1.2: 1
    • FIA_USB: 1
    • FIA_USB.1: 2
    • FIA_USB.1.1: 4
    • FIA_USB.1.2: 2
    • FIA_USB.1.3: 4
  • FMT:
    • FMT_MSA.3: 3
    • FMT_MOF: 1
    • FMT_MOF.1: 2
    • FMT_SMF.1: 4
    • FMT_SMR.1: 6
    • FMT_MOF.1.1: 4
    • FMT_MSA: 1
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 4
    • FMT_MSA.2: 6
    • FMT_MSA.2.1: 1
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 2
    • FMT_MTD: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 4
    • FMT_SMR: 1
    • FMT_SMR.1.1: 4
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 2
    • FPR_UNO.1.1: 4
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 4
    • FPT_PHP: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 4
    • FPT_TDC: 2
    • FPT_TDC.1: 1
    • FPT_TDC.1.1: 4
    • FPT_TDC.1.2: 2
    • FPT_TST: 2
    • FPT_TST.1.1: 4
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 3
    • FPT_TST.1: 3
  • FRU:
    • FRU_FLT.2: 3
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 3
    • FTP_ITC.1.1: 3
    • FTP_ITC.1.2: 3
    • FTP_ITC.1.3: 3
  • FAU:
    • FAU_SAS.1: 9
    • FAU_SAS: 14
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RND.1: 4
    • FCS_RND: 8
    • FCS_CKM: 106
    • FCS_CKM.2: 11
    • FCS_COP.1: 27
    • FCS_CKM.4: 30
    • FCS_CKM.1: 30
    • FCS_COP: 96
    • FCS_RNG: 9
  • FDP:
    • FDP_ACF: 47
    • FDP_ACF.1: 50
    • FDP_ITC.1: 19
    • FDP_ITC.2: 20
    • FDP_RIP.1: 10
    • FDP_ACC.1: 17
    • FDP_ACC: 35
    • FDP_RIP: 11
    • FDP_UCT: 5
    • FDP_IFC.1: 9
    • FDP_UCT.1: 2
    • FDP_UIT: 5
    • FDP_UIT.1: 3
    • FDP_SDI: 10
    • FDP_SDI.1: 3
    • FDP_SDI.2: 10
    • FDP_IFC: 5
    • FDP_IFF.1: 6
    • FDP_IFF: 6
    • FDP_MTD: 2
    • FDP_ITT.1: 1
    • FDP_SDC.1: 1
  • FIA:
    • FIA_UAU: 70
    • FIA_API.1: 7
    • FIA_API: 21
    • FIA_AFL: 21
    • FIA_UAU.4: 3
    • FIA_UAU.1: 15
    • FIA_AFL.1: 11
    • FIA_UID: 27
    • FIA_UID.1: 18
    • FIA_UAU.6: 4
    • FIA_UAU.5: 4
    • FIA_UAU.4.1: 1
  • FMT:
    • FMT_SMR.1: 43
    • FMT_LIM.1: 7
    • FMT_LIM.2: 7
    • FMT_LIM: 41
    • FMT_MTD.3: 3
    • FMT_MTD: 87
    • FMT_MSA.3: 12
    • FMT_MSA.1: 8
    • FMT_MSA: 17
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMF.1: 30
    • FMT_SMF: 37
    • FMT_MTD.1: 23
    • FMT_SMR: 39
    • FMT_MOF: 2
    • FMT_MOF.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.4: 1
    • FMT_FLS.1: 1
    • FMT_TST.1: 1
  • FPT:
    • FPT_EMS.1: 15
    • FPT_EMS: 31
    • FPT_TST: 17
    • FPT_FLS: 15
    • FPT_FLS.1: 7
    • FPT_TST.1: 7
    • FPT_PHP: 14
    • FPT_PHP.3: 4
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_PHP.1: 3
    • FPT_TST.2: 5
    • FPT_ITT.1: 1
  • FRU:
    • FRU_FLT.2: 6
  • FTP:
    • FTP_ITC: 23
    • FTP_ITC.1: 18
    • FTP_TRP.1: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAA.1: 4
  • FAU_GEN.1: 3
  • FAU_SAA.1.1: 3
  • FAU_SAA.1.2: 1
  • FAU_DAU.1.1: 4
  • FAU_SAS.1: 9
  • FAU_SAS: 14
  • FAU_SAS.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM: 1
  • FCS_CKM.1: 11
  • FCS_CKM.2: 5
  • FCS_COP.1: 10
  • FCS_CKM.4: 9
  • FCS_CKM.1.1: 3
  • FCS_CKM.2.1: 4
  • FCS_CKM.4.1: 5
  • FCS_COP: 1
  • FCS_COP.1.1: 8
  • FCS_RND.1: 3
  • FCS_RND.1: 4
  • FCS_RND: 8
  • FCS_CKM: 106
  • FCS_CKM.2: 11
  • FCS_COP.1: 27
  • FCS_CKM.4: 30
  • FCS_CKM.1: 30
  • FCS_COP: 96
  • FCS_RNG: 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 1 106
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 11 30
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 5 11
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 9 30
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 1 96
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 10 27
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1 3 4
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ITC.1.1: 5
  • FDP_ITC.1: 4
  • FDP_ITC.2: 1
  • FDP_ACC: 1
  • FDP_ACC.2: 5
  • FDP_ACC.1: 4
  • FDP_ACF.1.1: 6
  • FDP_ACC.2.1: 5
  • FDP_ACC.2.2: 1
  • FDP_ACF: 1
  • FDP_ACF.1: 4
  • FDP_ACF.1.2: 3
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 2
  • FDP_DAU.1: 4
  • FDP_DAU.1.2: 3
  • FDP_ETC: 1
  • FDP_ETC.1: 2
  • FDP_ETC.1.1: 4
  • FDP_ETC.1.2: 1
  • FDP_ETC.2: 4
  • FDP_IFC.1: 5
  • FDP_ETC.2.1: 4
  • FDP_ETC.2.2: 1
  • FDP_ETC.2.3: 3
  • FDP_ETC.2.4: 2
  • FDP_ITC: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 4
  • FDP_RIP: 1
  • FDP_RIP.1: 2
  • FDP_RIP.1.1: 4
  • FDP_SDI: 1
  • FDP_SDI.2: 2
  • FDP_SDI.2.1: 4
  • FDP_SDI.2.2: 2
  • FDP_ACF: 47
  • FDP_ACF.1: 50
  • FDP_ITC.1: 19
  • FDP_ITC.2: 20
  • FDP_RIP.1: 10
  • FDP_ACC.1: 17
  • FDP_ACC: 35
  • FDP_RIP: 11
  • FDP_UCT: 5
  • FDP_IFC.1: 9
  • FDP_UCT.1: 2
  • FDP_UIT: 5
  • FDP_UIT.1: 3
  • FDP_SDI: 10
  • FDP_SDI.1: 3
  • FDP_SDI.2: 10
  • FDP_IFC: 5
  • FDP_IFF.1: 6
  • FDP_IFF: 6
  • FDP_MTD: 2
  • FDP_ITT.1: 1
  • FDP_SDC.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 1 35
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 4 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 1 47
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 4 50
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 5 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 4 19
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 1 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 1 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 2 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI 1 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 2 10
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.1: 5
  • FIA_AFL: 3
  • FIA_AFL.1: 2
  • FIA_UAU.1: 3
  • FIA_AFL.1.1: 5
  • FIA_AFL.1.2: 3
  • FIA_ATD: 1
  • FIA_ATD.1: 3
  • FIA_ATD.1.1: 4
  • FIA_UAU: 1
  • FIA_UID: 2
  • FIA_UAU.1.1: 4
  • FIA_UAU.1.2: 1
  • FIA_UAU.3: 2
  • FIA_UAU.3.1: 4
  • FIA_UAU.3.2: 2
  • FIA_UAU.4: 2
  • FIA_UAU.4.1: 4
  • FIA_UID.1.1: 4
  • FIA_UID.1.2: 1
  • FIA_USB: 1
  • FIA_USB.1: 2
  • FIA_USB.1.1: 4
  • FIA_USB.1.2: 2
  • FIA_USB.1.3: 4
  • FIA_UAU: 70
  • FIA_API.1: 7
  • FIA_API: 21
  • FIA_AFL: 21
  • FIA_UAU.4: 3
  • FIA_UAU.1: 15
  • FIA_AFL.1: 11
  • FIA_UID: 27
  • FIA_UID.1: 18
  • FIA_UAU.6: 4
  • FIA_UAU.5: 4
  • FIA_UAU.4.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 3 21
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 2 11
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 1 70
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 3 15
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4 2 3
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4.1 4 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 2 27
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 5 18
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.3: 3
  • FMT_MOF: 1
  • FMT_MOF.1: 2
  • FMT_SMF.1: 4
  • FMT_SMR.1: 6
  • FMT_MOF.1.1: 4
  • FMT_MSA: 1
  • FMT_MSA.1: 5
  • FMT_MSA.1.1: 4
  • FMT_MSA.2: 6
  • FMT_MSA.2.1: 1
  • FMT_MSA.3.1: 4
  • FMT_MSA.3.2: 2
  • FMT_MTD: 1
  • FMT_MTD.1: 3
  • FMT_MTD.1.1: 4
  • FMT_SMR: 1
  • FMT_SMR.1.1: 4
  • FMT_SMR.1.2: 1
  • FMT_SMR.1: 43
  • FMT_LIM.1: 7
  • FMT_LIM.2: 7
  • FMT_LIM: 41
  • FMT_MTD.3: 3
  • FMT_MTD: 87
  • FMT_MSA.3: 12
  • FMT_MSA.1: 8
  • FMT_MSA: 17
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1: 30
  • FMT_SMF: 37
  • FMT_MTD.1: 23
  • FMT_SMR: 39
  • FMT_MOF: 2
  • FMT_MOF.1: 1
  • FMT_MSA.2: 1
  • FMT_MSA.4: 1
  • FMT_FLS.1: 1
  • FMT_TST.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 1 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 5 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 6 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 3 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 1 87
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 3 23
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 4 30
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR 1 39
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 6 43
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 4 1
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS: 1
  • FPT_FLS.1: 9
  • FPT_FLS.1.1: 4
  • FPT_PHP: 1
  • FPT_PHP.3: 10
  • FPT_PHP.3.1: 4
  • FPT_TDC: 2
  • FPT_TDC.1: 1
  • FPT_TDC.1.1: 4
  • FPT_TDC.1.2: 2
  • FPT_TST: 2
  • FPT_TST.1.1: 4
  • FPT_TST.1.2: 2
  • FPT_TST.1.3: 3
  • FPT_TST.1: 3
  • FPT_EMS.1: 15
  • FPT_EMS: 31
  • FPT_TST: 17
  • FPT_FLS: 15
  • FPT_FLS.1: 7
  • FPT_TST.1: 7
  • FPT_PHP: 14
  • FPT_PHP.3: 4
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_PHP.1: 3
  • FPT_TST.2: 5
  • FPT_ITT.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS 1 15
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 9 7
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP 1 14
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 10 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST 2 17
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 3 7
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 3 6
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC: 1
  • FTP_ITC.1: 3
  • FTP_ITC.1.1: 3
  • FTP_ITC.1.2: 3
  • FTP_ITC.1.3: 3
  • FTP_ITC: 23
  • FTP_ITC.1: 18
  • FTP_TRP.1: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 1 23
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 3 18
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • and supports this process by cryptographic means. In particular, the updated TOE software is out of scope of this ST. No assumption is made on the quality and security of the update. To make the point: 1
    • of the user data accessible using the different terminal types Other terminals than the above are out of scope of this ST. In particular, terminals using Basic Access Control (BAC) are functionally supported by: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CBC:
    • CBC: 4
  • OFB:
    • OFB: 1
pdf_data/st_keywords/cipher_mode/CBC/CBC 1 4
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 112
pdf_data/st_keywords/crypto_scheme/MAC/MAC 1 5
pdf_data/st_keywords/device_model
  • ATMEL:
    • ATMEL AT90SC24036RCU: 8
pdf_data/st_keywords/eval_facility
  • TSystems:
    • T-Systems International: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 3
  • SHA1:
    • SHA-1: 4
  • SHA2:
    • SHA-224: 1
    • SHA-256: 7
    • SHA-384: 4
    • SHA-512: 4
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 3 4
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG14: 1
    • EF.DG1: 1
    • EF.DG16: 1
    • EF.DG3: 2
    • EF.DG4: 2
    • EF.COM: 1
    • EF.SOD: 2
    • EF.ChipSecurity: 1
pdf_data/st_keywords/os_name/STARCOS/STARCOS 3 88 580
pdf_data/st_keywords/randomness/RNG/RND 2 6
pdf_data/st_keywords/randomness/RNG/RNG 1 8
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 2
    • side channel: 1
    • timing attacks: 1
  • FI:
    • physical tampering: 1
    • Malfunction: 2
  • other:
    • JIL: 6
  • SCA:
    • Leak-Inherent: 6
  • FI:
    • physical tampering: 7
    • Malfunction: 11
    • malfunction: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • Malfunction: 2
  • physical tampering: 7
  • Malfunction: 11
  • malfunction: 1
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 2 11
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 1 7
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 2
  • side channel: 1
  • timing attacks: 1
  • Leak-Inherent: 6
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 2 6
pdf_data/st_keywords/standard_id
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 3447: 1
  • ISO:
    • ISO/IEC 9798-3: 2
    • ISO/IEC 7816-8: 1
    • ISO/IEC 9796-2: 1
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • FIPS:
    • FIPS180-4: 9
    • FIPS 19795: 1
    • FIPS 197: 1
  • PKCS:
    • PKCS#3: 2
  • BSI:
    • AIS20: 2
    • AIS31: 3
    • AIS 20: 1
    • AIS 31: 1
  • RFC:
    • RFC3369: 2
  • ISO:
    • ISO/IEC 7816: 2
    • ISO/IEC 14443: 4
  • ICAO:
    • ICAO: 10
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/st_keywords/standard_id/CC
  • CCMB-2006-09-001: 2
  • CCMB-2007-09-002: 2
  • CCMB-2007-09-003: 2
  • CCMB-2007-09-004: 2
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 9798-3: 2
  • ISO/IEC 7816-8: 1
  • ISO/IEC 9796-2: 1
  • ISO/IEC 7816: 2
  • ISO/IEC 14443: 4
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#1: 1
  • PKCS#3: 2
pdf_data/st_keywords/standard_id/RFC
  • RFC 3447: 1
  • RFC3369: 2
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • 3DES: 1
      • 3-DES: 6
  • AES_competition:
    • AES:
      • AES: 25
  • DES:
    • DES:
      • DES: 4
    • 3DES:
      • 3DES: 6
      • Triple-DES: 4
      • TDES: 2
  • constructions:
    • MAC:
      • KMAC: 5
      • CMAC: 7
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3DES: 1
  • 3-DES: 6
  • 3DES: 6
  • Triple-DES: 4
  • TDES: 2
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 1 6
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 1 4
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 2
    • BSI TR-03116: 1
pdf_data/st_keywords/vendor
  • GD:
    • Giesecke & Devrient: 7
  • NXP:
    • NXP Semiconductors: 1
  • Infineon:
    • Infineon: 3
    • Infineon Technologies: 1
    • Infineon Technologies AG: 1
  • GD:
    • G+D: 2
    • Giesecke+Devrient: 6
pdf_data/st_keywords/vendor/GD
  • Giesecke & Devrient: 7
  • G+D: 2
  • Giesecke+Devrient: 6
pdf_data/st_metadata
  • pdf_file_size_bytes: 475709
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 70
  • /CreationDate: D:20100629134954+02'00'
  • /Subject: Security Target Lite STARCOS 3.4 ID Tachograph C2
  • /Author: CSRD22/stut
  • /Creator: Acrobat PDFMaker 7.0 für Word
  • /Keywords: Version 2.0 / Status 29.06.2010
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /ModDate: D:20100629134956+02'00'
  • /Company: GuD
  • /Comments: Open
  • /Title: Security Target Lite STARCOS 3.4 ID Tachograph C2
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1673991
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 182
  • /Author: uta
  • /Keywords: Version, 1.7/Status, 26.04.2024
  • /Subject: STARCOS 3.7 ID ePA C2, STARCOS 3.7 ID eAT C2, STARCOS 3.7 ID ePass C2
  • /Title: Security Target Lite
  • pdf_hyperlinks:
pdf_data/st_metadata//Author CSRD22/stut uta
pdf_data/st_metadata//Keywords Version 2.0 / Status 29.06.2010 Version, 1.7/Status, 26.04.2024
pdf_data/st_metadata//Subject Security Target Lite STARCOS 3.4 ID Tachograph C2 STARCOS 3.7 ID ePA C2, STARCOS 3.7 ID eAT C2, STARCOS 3.7 ID ePass C2
pdf_data/st_metadata//Title Security Target Lite STARCOS 3.4 ID Tachograph C2 Security Target Lite
pdf_data/st_metadata/pdf_file_size_bytes 475709 1673991
pdf_data/st_metadata/pdf_number_of_pages 70 182
dgst 8e597216ef8fc1a9 3f746e3371e342f6