name |
AhnLab MDS, MDS with MTA, and MDS Manager v2.1 |
STARCOS 3.5 ID GCC C2 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
DE |
status |
archived |
archived |
not_valid_after |
29.10.2024 |
01.09.2019 |
not_valid_before |
29.10.2019 |
17.05.2013 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-481%20CT%20no%20sig%20Eng.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-481%20CR%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0751a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-481%20AhnLab%20MDS%20Security%20Target_1.4.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0751b_pdf.pdf |
manufacturer |
AhnLab, Inc. |
G+D Mobile Security GmbH |
manufacturer_web |
https://www.ahnlab.com/ |
https://www.gi-de.com/de/de/mobile-security/ |
security_level |
{} |
EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5 |
dgst |
90969e38fd9b581f |
666b8267adc5735d |
heuristics/cert_id |
383-4-481 |
BSI-DSZ-CC-0751-2013 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ASE_SPD.1, ATE_DPT.2, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
2.1 |
3.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0952-2014 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0813-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0952-V2-2016 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0813-2012 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/protection_profiles |
{} |
0e62a9ea5e7ca3a7 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0061b_pdf.pdf |
pdf_data/cert_filename |
383-4-481 CT no sig Eng.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20190122115136-04'00'
- /Creator: Adobe Illustrator CC 22.0 (Windows)
- /ModDate: D:20191104105116-05'00'
- /Producer: Adobe PDF library 15.00
- /Title: cyber-centre-product-evaluation-certificate-e-bg
- pdf_file_size_bytes: 1640406
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
383-4-481 CR v1.0.pdf |
0751a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0751-2013
- cert_item: STARCOS 3.5 ID GCC C2
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0751-2013: 21
- BSI-DSZ-CC-0813-2012: 4
- BSI-DSZ-CC-S-0007-2011: 1
- BSI-DSZ-CC-S-0008-2011: 1
- BSI-DSZ-CC-S-0009-2012: 1
- BSI-DSZ-CC-S-0010-2012: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 2
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 8
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 2
- Giesecke & Devrient: 15
- Infineon:
- Infineon: 3
- Infineon Technologies: 1
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- physical tampering: 1
- SCA:
- other:
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 3
- AIS 36: 2
- FIPS:
- FIPS 180-2: 2
- FIPS 197: 1
- FIPS PUB 180-2: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C2, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7820 A11, Version 1, 01.06: 1
- TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [11] STARCOS 3.5 ID GCC C2 Configuration 1, Application Specification, Version 1.0, 14.03.2013: 1
- Version 0.5, 29.04.2013, Konfigurationsliste von STARCOS 3.5 ID GCC C2, Giesecke & Devrient GmbH (confidential document) 22 / 36 BSI-DSZ-CC-0751-2013 Certification Report C Excerpts from the Criteria CC Part 1: 1
- Version 2.3, 19.03.2013, STARCOS 3.5 ID GCC C2 Security Target, Giesecke & Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 16: 1
|
pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20130617144322+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, nPA, G&D, Giesecke & Devrient GmbH, Personalausweis, eID, Identity Card"
- /ModDate: D:20130618081618+02'00'
- /Producer: LibreOffice 3.6
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0751-2013
- pdf_file_size_bytes: 954609
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
383-4-481 AhnLab MDS Security Target_1.4.pdf |
0751b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035: 1
- BSI-CC-PP-0059: 1
- BSI-CC-PP-0061: 2
- BSI-PP-0055: 1
- BSI-PP-0056: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 5: 2
- EAL4: 13
- EAL4 augmented: 3
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- APE:
- ASE:
- ATE:
- ATE_DPT.1: 2
- ATE_DPT.2: 9
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 21
- FAU_GEN.1: 8
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_GEN_EXT: 1
- FAU_GEN_EXT.1: 9
- FAU_GEN_EXT.1.1: 1
- FAU_STG: 1
- FAU_STG.1: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 10
- FAU_STG_EXT.1.1: 4
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 4
- FAU_STG_EXT.2: 5
- FAU_STG_EXT.2.1: 1
- FAU_STG_EXT.3: 7
- FAU_STG_EXT.3.1: 1
- FAU_STG_EXT.4: 5
- FAU_STG_EXT.4.1: 1
- FCO:
- FCO_CPC_EXT: 1
- FCO_CPC_EXT.1: 10
- FCO_CPC_EXT.1.1: 3
- FCO_CPC_EXT.1.2: 3
- FCO_CPC_EXT.1.3: 2
- FCS:
- FCS_CKM: 6
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.2: 22
- FCS_CKM.2.1: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 74
- FCS_COP.1: 7
- FCS_DTLS_EXT.1.1: 1
- FCS_DTLS_EXT.2.1: 1
- FCS_NTP_EXT: 1
- FCS_NTP_EXT.1: 6
- FCS_NTP_EXT.1.1: 1
- FCS_NTP_EXT.1.2: 1
- FCS_NTP_EXT.1.3: 1
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 22
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 4
- FCS_SSHC_EXT: 1
- FCS_SSHC_EXT.1: 10
- FCS_SSHC_EXT.1.1: 2
- FCS_SSHC_EXT.1.2: 2
- FCS_SSHC_EXT.1.3: 2
- FCS_SSHC_EXT.1.4: 2
- FCS_SSHC_EXT.1.5: 4
- FCS_SSHC_EXT.1.6: 2
- FCS_SSHC_EXT.1.7: 2
- FCS_SSHC_EXT.1.8: 2
- FCS_SSHC_EXT.1.9: 2
- FCS_SSHS_EXT: 1
- FCS_SSHS_EXT.1: 10
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 3
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSC: 2
- FCS_TLSC_EXT: 2
- FCS_TLSC_EXT.1: 7
- FCS_TLSC_EXT.1.1: 4
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2: 5
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.2.2: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSC_EXT.2.4: 1
- FCS_TLSC_EXT.2.5: 1
- FCS_TLSS_EXT: 3
- FCS_TLSS_EXT.1: 11
- FCS_TLSS_EXT.1.1: 5
- FCS_TLSS_EXT.1.2: 2
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.2: 5
- FCS_TLSS_EXT.2.1: 2
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FCS_TLSS_EXT.2.4: 2
- FCS_TLSS_EXT.2.5: 1
- FCS_TLSS_EXT.2.6: 1
- FCS_TLS_EXT.1.1: 2
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 10
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 12
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT: 3
- FIA_UIA_EXT.1: 11
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FMT:
- FMT_MOF: 13
- FMT_MOF.1: 2
- FMT_MTD: 10
- FMT_MTD.1: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.2: 7
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 10
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_ITT: 7
- FPT_ITT.1: 8
- FPT_PTD: 1
- FPT_SKP_EXT: 1
- FPT_SKP_EXT.1: 10
- FPT_SKP_EXT.1.1: 2
- FPT_STM: 2
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 10
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 3
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 10
- FPT_TST_EXT.1.1: 3
- FPT_TST_EXT.2: 7
- FPT_TST_EXT.2.1: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 4
- FPT_TUD_EXT.1.2: 3
- FPT_TUD_EXT.1.3: 8
- FPT_TUD_EXT.2: 7
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 2
- FTA_SSL_EXT.1: 11
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 8
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 7
- FTP_ITC.1: 16
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 8
- FTP_TRP.1: 2
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 17
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 50
- FCS_CKM.1: 16
- FCS_CKM.2: 4
- FCS_CKM.4: 20
- FCS_COP: 52
- FCS_COP.1: 10
- FCS_RND: 7
- FCS_RND.1: 11
- FCS_RND.1.1: 2
- FCS_RNG.1: 3
- FDP:
- FDP_ACC: 16
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF: 23
- FDP_ACF.1: 21
- FDP_IFC.1: 5
- FDP_ITC.1: 7
- FDP_ITC.2: 8
- FDP_ITT.1: 1
- FDP_RIP: 4
- FDP_RIP.1: 13
- FDP_SDI: 14
- FDP_SDI.1: 3
- FDP_SDI.2: 7
- FIA:
- FIA_AFL: 32
- FIA_AFL.1: 8
- FIA_API: 20
- FIA_API.1: 4
- FIA_API.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU: 44
- FIA_UAU.1: 10
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 14
- FIA_UAU.6: 8
- FIA_UIA: 1
- FIA_UID: 24
- FIA_UID.1: 11
- FMT:
- FMT_LIM: 13
- FMT_LIM.1: 16
- FMT_LIM.1.1: 2
- FMT_LIM.2: 15
- FMT_LIM.2.1: 2
- FMT_MOF: 2
- FMT_MOF.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 5
- FMT_MSA.2: 1
- FMT_MSA.3: 8
- FMT_MSA.4: 1
- FMT_MTD: 86
- FMT_MTD.1: 12
- FMT_MTD.1.1: 2
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF: 5
- FMT_SMF.1: 38
- FMT_SMR: 4
- FMT_SMR.1: 31
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP: 6
- FPT_PHP.1: 5
- FPT_PHP.3: 14
- FPT_TST: 2
- FPT_TST.1: 15
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_: 1
- A.COMPONENTS_RUNNING: 2
- A.LIMITED_: 1
- A.NO_THRU_: 1
- A.PHYSICAL_: 1
- A.REGULAR_: 1
- A.RESIDUAL_: 1
- A.TRUSTED_: 1
- OE:
- OE.ADMIN_CREDEN: 1
- OE.NO_GENERAL_: 1
- OE.NO_THRU_: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFO: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_: 1
- T.PASSWORD_CRACKING: 3
- T.SECURITY_: 2
- T.SECURITY_FUNCTIONAL: 2
- T.UNAUTHORIZED_: 1
- T.UNAUTHORIZED_ADMINIS: 1
- T.UNDETECTED_: 1
- T.UNDETECTED_ACTIVITY: 2
- T.UNTRUSTED_: 1
- T.UNTRUSTED_COMMUNI: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
- T.UPDATE_: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_: 2
- T.WEAK_AUTHENTICATIO: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- O:
- OE:
- OE.CGA_SSCD: 3
- OE.CGA_TC_SVD: 2
- OE.HID_TC_VAD: 1
- OE.HID_VAD: 2
- OE.SCA_TC_DTBS: 1
- T:
|
pdf_data/st_keywords/vendor |
|
- GD:
- Infineon:
- Infineon: 3
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 19
- AES-: 2
- AES-128: 2
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 5
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 12
- DHE: 2
- Diffie-Hellman: 16
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 6
- SHA-384: 1
- SHA-512: 1
- SHA2: 1
- SHA256: 3
- SHA384: 1
- SHA512: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 2
- SHA-256: 3
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 5
- IKEv1: 12
- IKEv2: 12
- IPsec:
- SSH:
- TLS:
- DTLS:
- DTLS: 73
- DTLS 1.0: 9
- DTLS 1.2: 9
- DTLS v1.0: 4
- DTLS v1.2: 4
- SSL:
- SSL: 7
- SSL 2.0: 3
- SSL 3.0: 3
- TLS:
- TLS: 82
- TLS 1.0: 3
- TLS 1.1: 6
- TLS 1.2: 7
- TLS v1.0: 2
- TLS1.1: 1
- TLS1.2: 1
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-384: 2
- curve P-384: 2
- secp256r1: 8
- secp384r1: 8
- secp521r1: 8
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 14
- Physical Tampering: 4
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- physical tampering: 7
- SCA:
- DPA: 2
- Leak-Inherent: 6
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- ISO:
- ISO/IEC 18031:2011: 5
- ISO/IEC 9796-2: 1
- NIST:
- PKCS:
- RFC:
- RFC 1305: 1
- RFC 2818: 8
- RFC 2986: 2
- RFC 3526: 1
- RFC 3602: 2
- RFC 4106: 1
- RFC 4109: 1
- RFC 4251: 2
- RFC 4253: 8
- RFC 4301: 2
- RFC 4303: 1
- RFC 4304: 1
- RFC 4346: 4
- RFC 4347: 9
- RFC 4868: 2
- RFC 4945: 1
- RFC 5246: 9
- RFC 5280: 7
- RFC 5282: 1
- RFC 5647: 2
- RFC 5759: 1
- RFC 5905: 1
- RFC 5996: 2
- RFC 6125: 8
- RFC 6347: 9
- RFC 6960: 1
- RFC 8017: 1
- X509:
|
- BSI:
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS 180-2: 1
- FIPS 197: 1
- FIPS PUB 180-2: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. RFC 5647 only applies to the RFC compliant: 2
- out of scope: 2
|
- OutOfScope:
- out of scope: 1
- to the plastic Identity Card is achieved by physical and organisational security measures being out of scope of the current ST. The TOE shall comprise at least a) the circuitry of the contactless chip incl: 1
|
pdf_data/st_metadata |
- /Author: Lachlan Turner
- /CreationDate: D:20191021164206+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20191021164206+00'00'
- /Subject: MDS, MDS with MTA, and MDS Manager v2.1
- /Title: AhnLab
- pdf_file_size_bytes: 1061933
- pdf_hyperlinks: https://www.lightshipsec.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 94
|
- /Author: stut
- /Classification: Public
- /Company:
- /CreationDate: D:20130429154943+02'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Date: 29.04.2013
- /Keywords: Version 2.4 Status 29.04.2013
- /ModDate: D:20130429154954+02'00'
- /Producer: Acrobat Distiller 9.5.0 (Windows)
- /State: Final
- /Styles: supported
- /Subject: STARCOS 3.5 ID GCC C2
- /TemplAuthor: Joern Treger
- /TemplVersion: 1.0
- /Title: Security Target Lite
- /Version: 2.4
- pdf_file_size_bytes: 666940
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 127
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |