name |
secunet eID PKI Suite Certified CA Kernel, Version 2.0.3 |
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 |
category |
Network and Network-Related Devices and Systems |
Data Protection |
scheme |
DE |
DE |
status |
active |
archived |
not_valid_after |
14.01.2026 |
08.11.2019 |
not_valid_before |
15.01.2021 |
07.11.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1144c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1144a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1144b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf |
manufacturer |
Secunet Security Networks AG |
Kanguru Solutions |
manufacturer_web |
https://www.secunet.com/en/ |
https://www.kanguru.com |
security_level |
ALC_FLR.2, EAL4 |
ALC_FLR.1, EAL2+ |
dgst |
9c9a36e25c55c410 |
eda06ca3c208ebd0 |
heuristics/cert_id |
BSI-DSZ-CC-1144-2021 |
BSI-DSZ-CC-0772-2014 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_PRE.1, ALC_CMS.4, ALC_TAT.1, ALC_DVS.1, AGD_OPE.1, ADV_IMP.1, ATE_DPT.1, ALC_LCD.1, ALC_FLR.2, AVA_VAN.5 |
ALC_CMC.2, APE_REQ.2, ASE_INT.1, APE_INT.1, ATE_FUN.1, ATE_DPT.4, ADV_SPM.1, ATE_COV.1, ADV_TDS.1, ALC_FLR.1, ASE_TSS.1, ADV_IMP.2, APE_SPD.1, APE_ECD.1, ADV_FSP.2, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ATE_IND.2, ADV_INT.3, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ADV_ARC.1, ALC_CMS.2, ALC_LCD.2, ALC_DEL.1, APE_OBJ.2, AGD_OPE.1, APE_CCL.1, ASE_ECD.1, ALC_TAT.3, AVA_VAN.2 |
heuristics/extracted_versions |
2.0.3 |
5.0.2.6, 1.2.1.8, 02.03.10, 2.0.0.0, 3.2.0.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0960-2015 |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0960-2015 |
{} |
heuristics/scheme_data |
- category: Network and Network related Devices and Systems
- cert_id: BSI-DSZ-CC-1144-2021
- certification_date: 15.01.2021
- enhanced:
- applicant: secunet Security Networks AG Weidenauer Straße 223-225 57076 Siegen
- assurance_level: EAL4,ALC_FLR.2
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1144c_pdf.pdf?__blob=publicationFile&v=4
- certification_date: 15.01.2021
- description: The Target of evaluation is the product secunet eID PKI Suite Certified CA Kernel provided by secunet Security Networks AG. The TOE type is "Certificate Issuing and Management Component". The TOE is a CA (Certification Authority) Kernel that provides request, issuance, revocation, and overall management of certificates and certificate status information. The secunet eID PKI Suite Certified CA Kernel supports Extended Access Control Certification Authorities (EAC CAs,) according the Technical Guideline BSI TR-03110 and International Civil Aviation Organization CAs (ICAO CAs), which are X.509 CAs according to ITU-T X.509. For cryptographic operations the secunet CA Kernel relies on a FIPS-2 Level 3 validated Hardware Security Module (HSM). The CA-Server administrator integrates the secunet eID PKI Suite Certified CA Kernel into a TOE functional environment. He is defined as the TOE end-user.
- evaluation_facility: SRC Security Research & Consulting GmbH
- expiration_date: 14.01.2026
- product: secunet eID PKI Suite Certified CA Kernel, Version 2.0.3
- protection_profile: Certificate Issuing and Management Components Protection Profile Version 1.5, 11 August, 2011, Communications Security Establishment Canada, Document number: 383-6-3-CR
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1144a_pdf.pdf?__blob=publicationFile&v=7
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1144b_pdf.pdf?__blob=publicationFile&v=4
- product: secunet eID PKI Suite Certified CA Kernel, Version 2.0.3
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1144.html
- vendor: secunet Security Networks AG
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
1144c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210120142647+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, secunet, PKI Suite, CA Kernel"
- /ModDate: D:20210202150216+01'00'
- /Producer: LibreOffice 6.3
- /Subject: secunet eID PKI Suite Certified CA Kernel
- /Title: Certificate BSI-DSZ-CC-1144-2021
- pdf_file_size_bytes: 242421
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
1144a_pdf.pdf |
0772a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1144-2021
- cert_item: secunet eID PKI Suite Certified CA Kernel, Version 2.0.3
- cert_lab: BSI
- developer: secunet Security Networks AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Certificate Issuing and Management Components Protection Profile Version 1.5, 11 August, 2011, Communications Security Establishment Canada, Document number: 383-6-3-CR
|
- DE:
- cert_id: BSI-DSZ-CC-0772-2014
- cert_item: Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
- cert_lab: BSI
- developer: Kanguru Solutions
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- CA:
- DE:
- BSI-DSZ-CC-0960-2015: 3
- BSI-DSZ-CC-1144-2021: 16
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 6
- EAL 4 augmented: 3
|
- EAL:
- EAL 1: 7
- EAL 2: 8
- EAL 2 augmented: 3
- EAL 3: 4
- EAL 4: 7
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- EAL2: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMS.4: 1
- ALC_FLR: 3
- ALC_FLR.2: 4
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 1
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 2
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM.1: 1
- FCS_COP.1: 1
- FCS_RNG.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FIA:
- FIA_SOS.1: 1
- FIA_UAU.2: 4
- FIA_UAU.6: 1
- FIA_UID.2: 4
- FMT:
- FMT_MTD: 2
- FMT_SMF: 2
- FMT_SMF.1: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- SRC:
- SRC Security Research & Consulting: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-03110: 1
|
- BSI:
- BSI 7125: 2
- BSI 7138: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- FIPS:
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- X509:
|
- BSI:
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 17065: 2
- ISO/IEC 18045: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 08.01.2021, Evaluation Technical Report (ETR) - Summary, SRC Security Research & Consulting GmbH, (confidential document) [8] Certificate Issuing and Management Components Protection Profile Version 1.5, 11 August, 2011: 1
- Konfigurationsliste ALC_CMS.4, cms_secunet+eID+PKI+Suite_V.1.3.6.pdf, secunet Security Networks AG (confidential document) and Configuration list for the TOE, 06.11.2020, Liste aller source code-Dateien, dateiliste.txt: 1
- Security Networks AG (confidential document) [10] Guidance documentation for the TOE, Version 3.4.6, 18.12.2020, Handbuch (AGD_PRE.1 und: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
- ConfidentialDocument:
- KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison: 1
- Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210120142647+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, secunet, PKI Suite, CA Kernel"
- /ModDate: D:20210201124346+01'00'
- /Producer: LibreOffice 6.3
- /Subject: secunet eID PKI Suite Certified CA Kernel
- /Title: Certification Report BSI-DSZ-CC-1144-2021
- pdf_file_size_bytes: 435936
- pdf_hyperlinks: https://www.bsi.bund.de/, https://www.sogis.eu/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20141121083051+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
- /ModDate: D:20141121113713+01'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0772-2014
- pdf_file_size_bytes: 1643286
- pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
pdf_data/st_filename |
1144b_pdf.pdf |
0772b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0025: 13
- BSI-PP-0025: 6
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 5
- EAL 4 augmented: 2
- EAL4: 1
- EAL4 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP.1: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_SPM.1: 2
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SEL.1: 8
- FAU_SEL.1.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FCO:
- FCO_NRO_CIMC.3: 13
- FCO_NRO_CIMC.3.1: 1
- FCO_NRO_CIMC.3.2: 1
- FCO_NRO_CIMC.3.3: 4
- FCO_NRO_CIMC.4: 6
- FCO_NRO_CIMC.4.1: 1
- FCO_NRO_CIMC.4.2: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 3
- FCS_CKM_CIMC.5: 7
- FCS_CKM_CIMC.5.1: 1
- FCS_SOF_CIMC.1: 1
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 5
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_ACF_CIMC.2: 1
- FDP_ACF_CIMC.3: 1
- FDP_CIMC_CER.1: 7
- FDP_CIMC_CER.1.1: 2
- FDP_CIMC_CER.1.2: 2
- FDP_CIMC_CER.1.3: 2
- FDP_CIMC_CER.1.4: 1
- FDP_CIMC_CRL.1: 7
- FDP_CIMC_CRL.1.1: 1
- FDP_CIMC_CSE.1: 6
- FDP_CIMC_CSE.1.1: 1
- FDP_CIMC_OCSP.1: 2
- FDP_ETC_CIMC.5: 3
- FDP_IFC.1: 1
- FDP_ITT.1: 2
- FDP_SDI_CIMC.3: 5
- FDP_SDI_CIMC.3.1: 2
- FDP_SDI_CIMC.3.2: 2
- FDP_UCT.1: 2
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 16
- FMT_MOF.1.1: 1
- FMT_MOF_CIMC.3: 7
- FMT_MOF_CIMC.3.1: 2
- FMT_MOF_CIMC.3.2: 3
- FMT_MOF_CIMC.3.3: 3
- FMT_MOF_CIMC.3.4: 2
- FMT_MOF_CIMC.5: 8
- FMT_MOF_CIMC.5.1: 2
- FMT_MOF_CIMC.5.2: 3
- FMT_MOF_CIMC.5.3: 3
- FMT_MOF_CIMC.6: 3
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 2
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_MTD_CIMC.4: 1
- FMT_MTD_CIMC.5: 1
- FMT_MTD_CIMC.7: 3
- FMT_SMF.1: 6
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_CIMC_TSP.1: 7
- FPT_CIMC_TSP.1.1: 1
- FPT_CIMC_TSP.1.2: 1
- FPT_CIMC_TSP.1.3: 1
- FPT_CIMC_TSP.1.4: 1
- FPT_ITC.1: 2
- FPT_ITT.1: 2
- FPT_STM.1: 3
|
- FAU:
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FCS_RNG: 2
- FCS_RNG.1: 15
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UID.1: 2
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 1
- FMT_MTD: 12
- FMT_MTD.1: 3
- FMT_MTD.1.1: 2
- FMT_SMF: 20
- FMT_SMF.1: 6
- FMT_SMF.1.1: 2
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_RCV.4: 8
- FPT_RCV.4.1: 2
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 5
- SHA-256: 6
- SHA-384: 5
- SHA-512: 6
- SHA3:
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- ANSSI:
- Brainpool:
- brainpoolP224r1: 1
- brainpoolP224t1: 1
- brainpoolP256r1: 1
- brainpoolP256t1: 1
- brainpoolP320r1: 1
- brainpoolP320t1: 1
- brainpoolP384r1: 1
- brainpoolP384t1: 1
- brainpoolP512r1: 1
- brainpoolP512t1: 1
- NIST:
- B-163: 1
- B-233: 1
- B-283: 1
- B-409: 1
- B-571: 1
- Curve P-256: 1
- K-163: 1
- K-283: 1
- K-409: 1
- K-571: 1
- P-192: 2
- P-224: 4
- P-256: 3
- P-384: 4
- P-521: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 140-2: 9
- FIPS 186-2: 4
- FIPS PUB 140-2: 1
- FIPS140-2: 1
- ICAO:
- NIST:
- PKCS:
- RFC:
- RFC 5280: 3
- RFC2104: 5
- RFC4210: 1
- RFC4211: 1
- RFC5280: 4
- RFC6960: 3
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 11 1.5.4.3 Out of scope : 1
- 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5: 1
- Out of scope: 2
- from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●: 1
|
pdf_data/st_metadata |
- /Author: secunet Security Networks AG
- /CreationDate: D:20210108101730Z00'00'
- /Creator: Word
- /Keywords: Public Key Infrastructure, PKI, Certificate Issuing and Management Component
- /ModDate: D:20210108111900+01'00'
- /Producer: macOS Version 10.15.7 (Build 19H2) Quartz PDFContext
- /Subject: Common Criteria certification of secunet eID PKI Suite Certified CA Kernel (in short: Certified CA Kernel)
- /Title: secunet eID PKI Suite Certified CA Kernel Security Target
- pdf_file_size_bytes: 1688822
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |