Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung SCX-5835NX/SCX-6555NX/SCX-6545NX/CLX-8385NX/CLX-8540NX Control Software V2.00.03.00
KECS-CISS-0365-2012
STARCOS 3.5 ID GCC C3
BSI-DSZ-CC-0952-V2-2016
name Samsung SCX-5835NX/SCX-6555NX/SCX-6545NX/CLX-8385NX/CLX-8540NX Control Software V2.00.03.00 STARCOS 3.5 ID GCC C3
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme KR DE
not_valid_after 01.06.2019 16.12.2021
not_valid_before 25.01.2012 16.12.2016
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2012-01-25_KECS-CR-2012-09_Samsung%20SCX-5835NX.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CISS-0365-2012(ST).pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952V2b_pdf.pdf
manufacturer HP Inc. G+D Mobile Security GmbH
manufacturer_web https://www8.hp.com/hpnext/tags/hp-inc#.Vjdf803sn4g https://www.gi-de.com/de/de/mobile-security/
security_level EAL3+, ALC_FLR.2 EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5
dgst 9e05dbf65c1956a7 aaa5c2239e7c1d9e
heuristics/cert_id KECS-CISS-0365-2012 BSI-DSZ-CC-0952-V2-2016
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ASE_SPD.1, ATE_DPT.2, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 2.00.03.00 3.5
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0829-V2-2015
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0829-V2-2015, BSI-DSZ-CC-0640-2010
heuristics/scheme_data
  • category: Digital Multifunction Printer
  • cert_id: KECS-CISS-0365-2012
  • certification_date: 25.01.2012
  • enhanced:
    • assurance_level: EAL3+
    • cc_version: CC V3.1 R3
    • cert_id: KECS-CISS-0365-2012
    • cert_link: https://itscc.kr/file/download.do?file=KPR100000001186
    • certification_date: 25.01.2012
    • developer: Samsung Electronics Co., Ltd.
    • expiration_date: 01.06.2019
    • holder: HP Inc.
    • maintenance_update: [frozendict({'name': 'Samsung SCX-5835NX/SCX-6555NX/SCX-6545NX/CLX-8385NX/CLX-8540NX Control Software V2.00.03.00 Assurance maintenance1', 'certification_date': datetime.date(2013, 7, 5), 'cert_id': 'KECS-CISS-0365a-2012', 'maintenance_link': 'https://itscc.kr/file/download.do?file=KPR200000001197', 'target_link': 'https://itscc.kr/file/download.do?file=KPR200000001198'})]
    • product: Samsung SCX-5835NX/SCX-6555NX/SCX-6545NX/CLX-8385NX/CLX-8540NX Control Software V2.00.03.00
    • product_type: Digital Multifunction Printer
    • protection_profile: IEEE Std 2600.1-2009 (2600.1, Protection Profile for Hardcopy Devices, Operational Environment A, Version 1.0)
    • report_link: https://itscc.kr/file/download.do?file=KPR100000001185
    • target_link: https://itscc.kr/file/download.do?file=KPR100000001187
  • level: EAL3+
  • product: Samsung SCX-5835NX/SCX-6555NX/SCX-6545NX/CLX-8385NX/CLX-8540NX Control Software V2.00.03.00
  • product_link: https://itscc.kr/certprod/view.do?product_id=365&product_class=4
  • vendor: HP Inc.
heuristics/protection_profiles 32475ccb695b1644 0e62a9ea5e7ca3a7
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0061b_pdf.pdf
pdf_data/report_filename 2012-01-25_KECS-CR-2012-09_Samsung SCX-5835NX.pdf 0952V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 The IT Product identified in this certificate has been evaluated at an approved evaluation facility using the Common Methodology for IT Security Evaluation (CEM), Version 3.1 extended by Scheme Interpretations, by advice of the Certification Body for components beyond EAL 5 and CC Supporting Documents as listed in the Certification Report for conformance to the Common Criteria for IT Security Evaluation (CC), Version 3.1. CC and CEM are also published as ISO/IEC 15408 and ISO/IEC 18045. (*) This certificate applies only to the specific version and release of the product in its evaluated configuration and in conjunction with the complete Certification Report and Notification. For details on the validity see Certification Report part A chapter 4 (**
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0952-V2-2016
    • cert_item: STARCOS 3.5 ID GCC C3
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15 December 2009, BSI-CC-PP-0061-2009 (**) and in accordance with BSI Technische Richtlinie BSI-TR-03116-2, 2016
pdf_data/report_keywords/cc_cert_id
  • KR:
    • KECS-CISS-0365-2012: 1
  • DE:
    • BSI-DSZ-CC-0829-V2-2015: 4
    • BSI-DSZ-CC-0829-V2-2015-MA-01: 1
    • BSI-DSZ-CC-0952-2014: 4
    • BSI-DSZ-CC-0952-V2-2016: 21
    • BSI-DSZ-CC-S-0053-2016: 2
    • BSI-DSZ-CC-S-0057-2015: 2
    • BSI-DSZ-CC-S-0062-2016: 2
    • BSI-DSZ-CC-S-0070-2016: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 3
    • BSI-CC-PP-0061-2009: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 1
    • EAL3 augmented: 1
    • EAL3+: 5
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 13
    • EAL 4 augmented: 3
    • EAL 5: 8
    • EAL 5+: 1
    • EAL 6: 4
    • EAL 7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.3: 3
    • ADV_TDS.2: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.3: 2
    • ALC_CMS.3: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 3
    • ALC_FLR.2: 4
    • ALC_LCD.1: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.2: 5
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 6
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 15
  • GD:
    • G&D: 1
    • Giesecke & Devrient: 17
  • Infineon:
    • Infineon: 4
    • Infineon Technologies: 1
pdf_data/report_keywords/eval_facility
  • KOSYAS:
    • KOSYAS: 4
  • SRC:
    • SRC Security Research & Consulting: 3
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 4
  • PACE:
    • PACE: 3
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Fault Injection: 1
    • fault injection: 1
    • physical tampering: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 22: 1
    • BSI 7148: 1
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 27
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 1
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 4
    • AIS 38: 1
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 15408: 6
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 6
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C3, SRC Security Research & Consulting GmbH (confidential document) 10 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
    • M7820 A11, Version 5, 16.07.2015, TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [11] STARCOS 3.5 ID GCC C2 Configuration 1, Application Specification, Version 1.0, 14.03.2013: 1
    • Version 1.10, 06.12.2016, STARCOS 3.5 ID GCC C3 Security Target, Giesecke & Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15: 1
    • Version 1.2, 06.12.2016, Konfigurationsliste von STARCOS 3.5 ID GCC C3, Giesecke & Devrient GmbH (confidential document) [30] BSI-CC-PP-0059-2009-MA-02, Common Criteria Protection Profile: EN 419211-2:2013 - Protection: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /Author: 김하원
  • /CreationDate: D:20121023175538+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20121023175538+09'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 인증보고서
  • pdf_file_size_bytes: 920304
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
pdf_data/st_filename KECS-CISS-0365-2012(ST).pdf 0952V2b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10340-2009: 2
  • DE:
    • BSI-DSZ-CC-0829-V2-2015-MA-01: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0084-2014: 1
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0061: 2
    • BSI-PP-0055: 1
    • BSI-PP-0056: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL3: 9
    • EAL3 augmented: 6
    • EAL3+: 1
  • EAL:
    • EAL 4: 2
    • EAL 5: 2
    • EAL4: 13
    • EAL4 augmented: 3
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 13
    • ADV_FSP.1: 3
    • ADV_FSP.2: 3
    • ADV_FSP.3: 14
    • ADV_TDS.1: 3
    • ADV_TDS.2: 15
  • AGD:
    • AGD_OPE.1: 13
    • AGD_PRE.1: 9
  • ALC:
    • ALC_CMC.3: 14
    • ALC_CMS.1: 1
    • ALC_CMS.3: 7
    • ALC_DEL.1: 6
    • ALC_DVS.1: 7
    • ALC_FLR.2: 23
    • ALC_LCD.1: 8
  • APE:
    • APE_ECD: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SPD: 1
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 13
    • ASE_INT.1: 15
    • ASE_OBJ.2: 12
    • ASE_REQ.1: 2
    • ASE_REQ.2: 14
    • ASE_SPD.1: 9
    • ASE_TSS.1: 6
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 6
    • ATE_DPT.1: 6
    • ATE_FUN.1: 12
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
  • ADV:
    • ADV_ARC.1: 4
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_ECD: 1
  • ATE:
    • ATE_DPT.1: 2
    • ATE_DPT.2: 9
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 4
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 18
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 41
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 34
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 47
    • FDP_IFC.1.1: 5
    • FDP_IFF: 1
    • FDP_IFF.1: 38
    • FDP_IFF.1.1: 5
    • FDP_IFF.1.2: 5
    • FDP_IFF.1.3: 5
    • FDP_IFF.1.4: 5
    • FDP_IFF.1.5: 5
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 8
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 12
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 18
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 2
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 24
    • FMT_MSA.1.1: 5
    • FMT_MSA.3: 32
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 25
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 12
    • FPT_FDI_EXP.1.1: 2
    • FPT_ITC.1: 1
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 11
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TST.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 5
    • FAU_SAS.1: 18
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 52
    • FCS_CKM.1: 16
    • FCS_CKM.2: 4
    • FCS_CKM.4: 20
    • FCS_COP: 55
    • FCS_COP.1: 11
    • FCS_RND: 7
    • FCS_RND.1: 12
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 4
  • FDP:
    • FDP_ACC: 16
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF: 23
    • FDP_ACF.1: 21
    • FDP_IFC.1: 5
    • FDP_ITC.1: 7
    • FDP_ITC.2: 8
    • FDP_ITT.1: 1
    • FDP_RIP: 4
    • FDP_RIP.1: 13
    • FDP_SDI: 14
    • FDP_SDI.1: 3
    • FDP_SDI.2: 4
  • FIA:
    • FIA_AFL: 33
    • FIA_AFL.1: 6
    • FIA_API: 20
    • FIA_API.1: 4
    • FIA_API.1.1: 3
    • FIA_SOS.2: 1
    • FIA_UAU: 45
    • FIA_UAU.1: 8
    • FIA_UAU.4: 6
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 13
    • FIA_UAU.6: 7
    • FIA_UIA: 1
    • FIA_UID: 25
    • FIA_UID.1: 9
  • FMT:
    • FMT_LIM: 14
    • FMT_LIM.1: 16
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 15
    • FMT_LIM.2.1: 2
    • FMT_MOF: 3
    • FMT_MSA: 15
    • FMT_MSA.1: 4
    • FMT_MSA.3: 6
    • FMT_MTD: 86
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 9
    • FMT_SMF: 5
    • FMT_SMF.1: 37
    • FMT_SMR: 5
    • FMT_SMR.1: 29
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP: 6
    • FPT_PHP.1: 5
    • FPT_PHP.3: 14
    • FPT_TST: 2
    • FPT_TST.1: 15
    • FPT_TST.1.3: 1
    • FPT_TST.2: 3
  • FRU:
    • FRU_FLT.2: 4
  • FTP:
    • FTP_ITC: 23
    • FTP_ITC.1: 6
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 4
    • A.ADMIN: 8
    • A.AUTH_SERVE: 1
    • A.AUTH_SERVER: 3
    • A.EXT_SERVER: 4
    • A.IPSEC_EXT: 4
    • A.NETWORK: 4
    • A.SSL_CERT: 4
    • A.SSL_CLIENT: 3
    • A.USER: 4
  • D:
    • D.CONF: 6
    • D.DOC: 18
    • D.FUN: 2
    • D.FUNC: 5
    • D.PROT: 4
  • O:
    • O.AUDIT: 6
    • O.AUDIT_ACCESS: 6
    • O.AUDIT_STORAG: 1
    • O.AUDIT_STORAGE: 5
    • O.CONF: 12
    • O.DATA: 14
    • O.DOC: 13
    • O.FAX_DATA: 3
    • O.FUNC: 6
    • O.INFO: 6
    • O.INTERFACE: 6
    • O.PROT: 6
    • O.SOFTWARE: 6
    • O.TIME_STAMP: 4
    • O.TIME_STAMP_RELIABLE: 1
    • O.USER: 12
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 4
    • OE.AUTH_SERVER: 4
    • OE.EXT_SERVER: 4
    • OE.INTERFACE: 4
    • OE.IPSEC_EXT: 4
    • OE.NETWORK: 4
    • OE.PHYSICAL: 4
    • OE.SSL_CERT: 4
    • OE.SSL_CLIENT: 3
    • OE.USER: 14
  • R:
    • R.SECURE: 1
  • T:
    • T.CONF: 8
    • T.DOC: 8
    • T.FUNC: 4
    • T.PROT: 4
  • A:
    • A.CGA: 2
    • A.SCA: 2
  • O:
    • O.MEM_ACCESS: 1
    • O.RND: 3
  • OE:
    • OE.CGA_SSCD: 3
    • OE.CGA_TC_SVD: 2
    • OE.HID_TC_VAD: 1
    • OE.HID_VAD: 2
    • OE.SCA_TC_DTBS: 1
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 111
  • GD:
    • Giesecke & Devrient: 7
  • Infineon:
    • Infineon: 3
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 1
  • AES_competition:
    • AES:
      • AES: 19
  • DES:
    • 3DES:
      • Triple-DES: 6
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 8
      • KMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 2
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 7
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 8
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-2: 1
      • SHA-224: 2
      • SHA-256: 5
      • SHA-384: 3
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 21
  • KA:
    • Key Agreement: 3
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • TLS:
    • SSL:
      • SSL: 11
  • PACE:
    • PACE: 94
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 6
    • RNG: 8
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • Malfunction: 14
    • Physical Tampering: 4
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 7
  • SCA:
    • DPA: 2
    • Leak-Inherent: 6
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 148
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS PUB 197: 1
  • PKCS:
    • PKCS #3: 1
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
    • AIS20: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 197: 1
    • FIPS PUB 180-2: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#3: 3
  • RFC:
    • RFC 5639: 5
    • RFC3369: 2
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • for accessing the box. - Store print & Confidential print Confidential print is used for printing confidential documents. U.USER needs to enter a password to print it. Store print also only allows the U.USER who stored: 1
  • OutOfScope:
    • out of scope: 1
    • to the plastic Identity Card is achieved by physical and organisational security measures being out of scope of the current ST. The TOE shall comprise at least a) the circuitry of the contactless chip incl: 1
pdf_data/st_metadata
  • /Author: eij
  • /CreationDate: D:20161216094745+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: Common Criteria, Certification, Zertifizierung, Giesecke & Devrient GmbH, G&D, StarCOS, nPA, Personalausweis, eID, electronic identity, eGovernment, eIDAS, QES, qualified electronic signature, travel document, passport
  • /ModDate: D:20161216094745+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: STARCOS 3.5 ID GCC C3
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 2002351
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 133
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different