name |
secunet SBC Container Version 4.2.10-16 |
Plateforme Java Card MultiApp V5.0.A version 5.0.A |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
FR |
status |
active |
active |
not_valid_after |
18.05.2027 |
08.04.2027 |
not_valid_before |
19.05.2022 |
08.04.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V2c_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2022_10.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V2a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_10fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1089V2b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_10en.pdf |
manufacturer |
Secunet Security Networks AG |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.secunet.com/en/ |
https://www.thalesgroup.com/en/europe/france |
security_level |
ASE_TSS.2, ALC_FLR.2, EAL4+, AVA_VAN.5 |
EAL6+, ALC_FLR.1 |
dgst |
9dd3c132e09f099f |
217b91b3b8ce1ef5 |
heuristics/cert_id |
BSI-DSZ-CC-1089-V2-2022 |
ANSSI-CC-2022/10 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_TSS.2, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
4.2.10 |
5.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1089-V3-2024 |
ANSSI-CC-2022/22, ANSSI-CC-2022/11, ANSSI-CC-2022/52, ANSSI-CC-2022/13, ANSSI-CC-2022/12 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1089-2020 |
ANSSI-CC-2021/42, BSI-DSZ-CC-1107-V2-2021 |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1089-V3-2024 |
ANSSI-CC-2022/22, ANSSI-CC-2022/12, ANSSI-CC-2022/55, ANSSI-CC-2022/11, ANSSI-CC-2022/54, ANSSI-CC-2022/57, ANSSI-CC-2022/56, ANSSI-CC-2022/52, ANSSI-CC-2022/13 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1089-2020 |
ANSSI-CC-2021/42, BSI-DSZ-CC-1107-2020, BSI-DSZ-CC-1107-V2-2021 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-V2-2021 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-V2-2021 |
heuristics/protection_profiles |
{} |
94167fd161e87d71 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf |
pdf_data/cert_filename |
1089V2c_pdf.pdf |
certificat-anssi-cc-2022_10.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1089-2020: 8
- BSI-DSZ-CC-1089-V2-2022: 67
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2+: 1
- EAL 4: 17
- EAL 4 augmented: 9
- EAL 5: 14
- EAL 5+: 8
- EAL 6: 8
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- SRC:
- SRC Security Research & Consulting: 8
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- BSI:
- AIS 32: 8
- AIS 34: 15
- AIS 38: 8
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
- ConfidentialDocument:
- 03, Frafos GmbH (confidential document) [9] Secunet SBC Container Handbook 4.2, Version 2.2, 26.04.2022 7 specifically • AIS 32, Version 7: 8
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- secunet SBC Container, Version 1.8, Date 25.04.2022, SRC Security Research & Consulting GmbH (confidential document) [8] Configuration list for the TOE, “Reference List”, Version 2.03, 26.04.2022, file name: 8
|
|
pdf_data/cert_metadata |
|
- /Author: ANSSI
- /CreationDate: D:20220425145856+02'00'
- /Creator: Microsoft® Word 2019
- /Keywords: version 3.1, révision 5
- /ModDate: D:20220425145856+02'00'
- /Producer: Microsoft® Word 2019
- /Title: ANSSI-CC-2022/10
- pdf_file_size_bytes: 304678
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
1089V2a_pdf.pdf |
anssi-cc-2022_10fr.pdf |
pdf_data/report_frontpage |
- FR:
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ASE_TSS.2, ALC_FLR.2 and AVA_VAN.5
- cc_version: Product specific Security Target Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1089-V2-2022
- cert_item: secunet SBC Container Version 4.2.10-16
- cert_lab: BSI
- developer: secunet
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1089-2020: 2
- BSI-DSZ-CC-1089-V2-2022: 13
|
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- FR:
- ANSSI-CC-2021/42: 2
- ANSSI-CC-2022/10: 19
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-V2-2020: 2
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 2
- EAL 5+: 1
- EAL 6: 1
|
- EAL:
- EAL 6: 1
- EAL2: 2
- EAL6+: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 5
- Infineon Technologies AG: 1
- Thales:
|
pdf_data/report_keywords/eval_facility |
- SRC:
- SRC Security Research & Consulting: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 32: 1
- AIS 34: 2
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 03, Frafos GmbH (confidential document) [9] Secunet SBC Container Handbook 4.2, Version 2.2, 26.04.2022 7 specifically • AIS 32, Version 7: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- secunet SBC Container, Version 1.8, Date 25.04.2022, SRC Security Research & Consulting GmbH (confidential document) [8] Configuration list for the TOE, “Reference List”, Version 2.03, 26.04.2022, file name: 1
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
1089V2b_pdf.pdf |
anssi-cible-cc-2022_10en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0099-V2-2020: 1
- BSI-PP-0055-: 1
- BSI-PP-0056-V2-MA-2012: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 11
- EAL4 augmented: 1
|
- EAL:
- EAL 6+: 1
- EAL6: 31
- EAL6 augmented: 1
- EAL6+: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 8
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 5
- ADV_IMP.1: 6
- ADV_IMP.2: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 8
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 7
- ADV_TDS.5: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 7
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 4
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 6
- ATE_FUN.2: 1
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FDP:
- FDP_ACC.1: 2
- FDP_IFC.1: 12
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 4
- FIA_SOS.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF: 13
- FMT_SMF.1: 6
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 2
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
|
- FAU:
- FAU_ARP.1: 15
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FAU_SAS.1: 2
- FCO:
- FCS:
- FCS_CKM: 60
- FCS_CKM.1: 29
- FCS_CKM.1.1: 3
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.3: 5
- FCS_CKM.3.1: 1
- FCS_CKM.4: 28
- FCS_CKM.4.1: 2
- FCS_CMK.4: 2
- FCS_COP: 66
- FCS_COP.1: 31
- FCS_COP.1.1: 5
- FCS_RNG: 25
- FCS_RNG.1: 14
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC: 54
- FDP_ACC.1: 23
- FDP_ACC.2: 6
- FDP_ACF: 48
- FDP_ACF.1: 30
- FDP_IFC: 24
- FDP_IFC.1: 14
- FDP_IFC.2: 2
- FDP_IFF: 16
- FDP_IFF.1: 14
- FDP_ITC: 11
- FDP_ITC.1: 12
- FDP_ITC.2: 17
- FDP_ITT.1: 2
- FDP_RIP: 98
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_ROL: 13
- FDP_ROL.1: 5
- FDP_SDC.1: 2
- FDP_SDI: 8
- FDP_SDI.2: 4
- FDP_UCT.1: 2
- FDP_UIT: 6
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 23
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 1
- FIA_API.1: 2
- FIA_ATD: 16
- FIA_ATD.1: 4
- FIA_UAU: 70
- FIA_UAU.1: 6
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 3
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 54
- FIA_UID.1: 21
- FIA_UID.1.1: 3
- FIA_UID.1.2: 3
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 38
- FMT_LIM.1: 17
- FMT_LIM.1.1: 3
- FMT_LIM.2: 16
- FMT_LIM.2.1: 3
- FMT_MSA: 113
- FMT_MSA.1: 15
- FMT_MSA.2: 2
- FMT_MSA.3: 24
- FMT_MTD: 57
- FMT_MTD.1: 13
- FMT_MTD.3: 1
- FMT_SMF: 85
- FMT_SMF.1: 31
- FMT_SMF.1.1: 2
- FMT_SMR: 98
- FMT_SMR.1: 42
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 8
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 14
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 56
- FPT_FLS.1: 17
- FPT_FLS.1.1: 2
- FPT_ITT: 6
- FPT_ITT.1: 2
- FPT_PHP: 7
- FPT_PHP.3: 17
- FPT_PHP.3.1: 1
- FPT_RCV: 12
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 9
- FPT_TST.1: 15
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FTP:
- FTP_ITC: 17
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 10
- FTP_TRP.1: 10
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.CAP_FILE: 3
- A.DELETION: 3
- A.OS-UPDATE-EVIDENCE: 3
- A.SECURE_ACODE_MANAGEMENT: 3
- A.VERIFICATION: 3
- D:
- D.AAS_ID: 1
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 5
- D.APP_KEYS: 1
- D.CRYPTO: 5
- D.JCS_CODE: 6
- D.JCS_DATA: 8
- D.OS-: 1
- D.OS-UPDATE-CODE-ID: 3
- D.OS-UPDATE_ADDITIONALCODE: 5
- D.OS-UPDATE_DEC-KEY: 2
- D.OS-UPDATE_SGNVER-KEY: 2
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.AES: 1
- O.ALARM: 15
- O.APPLET: 28
- O.ARRAY_VIEWS_CONFID: 7
- O.ARRAY_VIEWS_INTEG: 3
- O.CARD-MANAGEMENT: 5
- O.CARD_MANAGEMENT: 18
- O.CIPHER: 10
- O.CODE_CAP_FILE: 23
- O.CONFID-OS-UPDATE: 4
- O.DELETION: 4
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CONFID: 9
- O.GLOBAL_ARRAYS_INTEG: 5
- O.INSTALL: 8
- O.JAVAOBJECT: 68
- O.KEY-MNGT: 6
- O.LOAD: 11
- O.NATIVE: 12
- O.OBJ-DELETION: 4
- O.OBJ_DELETION: 4
- O.OPERATE: 15
- O.PIN-MNGT: 6
- O.PIN_MNGT: 4
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 2
- O.RNG: 11
- O.SCP: 37
- O.SECURE_AC_ACTIVATION: 10
- O.SECURE_LOAD_ACODE: 14
- O.SID: 13
- O.TDES: 1
- O.TOE_IDENTIFICATION: 7
- O.TRANSACTION: 6
- OE:
- OE.CAP_FILE: 5
- OE.CARD-: 1
- OE.CARD-MANAGEMENT: 2
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 10
- OE.NATIVE: 1
- OE.OS-UPDATE-ENCRYPTION: 5
- OE.OS-UPDATE-EVIDENCE: 2
- OE.SCP: 8
- OE.SECURE_ACODE_MANAGEMENT: 2
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 7
- OP.ARRAY_LENGTH: 3
- OP.ARRAY_T_ALOAD: 3
- OP.ARRAY_T_ASTORE: 3
- OP.CREATE: 11
- OP.DELETE_APPLET: 6
- OP.DELETE_CAP_FILE: 4
- OP.DELETE_CAP_FILE_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 8
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.ADDITIONAL_CODE_ENCRYPTION: 3
- OSP.ADDITIONAL_CODE_SIGNING: 3
- OSP.ATOMIC_ACTIVATION: 6
- OSP.RNG: 3
- OSP.TOE_IDENTIFICATION: 6
- OSP.VERIFICATION: 3
- OT:
- R:
- T:
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 3
- T.CONFID-OS-UPDATE_LOAD: 3
- T.CONFID_INTEG_SERVICE_DEPLOYEMENT: 3
- T.DELETION: 3
- T.EXE-CODE: 6
- T.FAKE-SGNVER-KEY: 3
- T.INSTALL: 3
- T.INTEG-APPLI-CODE: 6
- T.INTEG-APPLI-DATA: 6
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 3
- T.INTEG-OS-UPDATE_LOAD: 3
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 3
- T.RESOURCES: 3
- T.SID: 6
- T.UNAUTHORIZED_TOE_CODE_UPDATE: 3
- T.WRONG-UPDATE-STATE: 3
- T.WRONG_SERVICE_DEPLOYEMENT_STATE: 3
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Infineon:
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDEA: 1
- TDES: 14
- Triple-DES: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 1
- SHA-512: 2
- SHA2: 1
- SHA224: 1
- SHA3:
- SHA3: 2
- SHA3-384: 1
- SHA3-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 6
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 5
- Physical Tampering: 3
- fault induction: 2
- malfunction: 8
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 2
- SPA: 1
- physical probing: 6
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.DG1: 6
- EF.DG16: 6
- EF.DG3: 1
- EF.DG4: 1
- EF.SOD: 1
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 1
- FIPS180-2: 1
- FIPS197: 5
- ICAO:
- NIST:
- PKCS:
- SCP:
- SCP01: 4
- SCP02: 4
- SCP03: 9
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes MultiApp V5.0.A JCS platform Security Target ST Ref: 1
- Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start MultiApp V5.0.A JCS: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 4
- the scope because done before the JCVM entering (selection of the applet) Note: The Array View is out of scope of this modelisation ADV_SPM.1.2D For each policy covered by the formal security policy model, the: 1
|
pdf_data/st_metadata |
- /Author: Hendrik Dettmer
- /CreationDate: D:20220426181400Z00'00'
- /Creator: Word
- /ModDate: D:20220426181400Z00'00'
- /Producer: macOS Version 12.3.1 (Build 21E258) Quartz PDFContext
- /Title: ST_secunet_SBC_V2_v1.1
- pdf_file_size_bytes: 683051
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 43
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
True |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |