name |
STARCOS 3.5 ID GCC C1 |
Microcontrôleurs sécurisés ST33F1M/1M0/896/768/640/512, SC33F1M0/896/768/640/512/384,SM33F1M/1M0/896/768/640/512, SE33F1M/1M0/896/768/640/512, SL33F1M/1M0/896/768/640/512, SP33F1M incluant le logiciel dédié révision D ou E, optionnellement la bibliothèque cryptographique NesLib v3.0 ou v3.2, la librairie MIFARE DESFireTM EV1 v1.1 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
17.12.2010 |
14.06.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0682a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-45fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0682b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-45en.pdf |
manufacturer |
G+D Mobile Security GmbH |
STMicroelectronics |
manufacturer_web |
https://www.gi-de.com/de/de/mobile-security/ |
https://www.st.com/ |
security_level |
EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
a64327c573cc5f89 |
2fca522ef1ac99ba |
heuristics/cert_id |
BSI-DSZ-CC-0682-2010 |
ANSSI-CC-2013/45 |
heuristics/cert_lab |
BSI |
THALÈS |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ASE_SPD.1, ATE_DPT.2, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
AGD_PRE.1, ATE_COV.2, ALC_TAT.2, ALC_CMS.5, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ATE_DPT.3, ATE_IND.2, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ADV_ARC.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, ALC_CMC.4, ADV_IMP.1 |
heuristics/extracted_versions |
3.5 |
1.1, 3.2, 3.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-0800-2012 |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0645-2010 |
ANSSI-CC-2013/13 |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-0800-2012 |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0645-2010 |
ANSSI-CC-2010/49, ANSSI-CC-2013/13, ANSSI-CC-2011/07, ANSSI-CC-2010/50, ANSSI-CC-2012/79 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
0e62a9ea5e7ca3a7 |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0061b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0682a_pdf.pdf |
ANSSI-CC_2013-45fr.pdf |
pdf_data/report_frontpage |
- FR:
- DE:
- cert_id: BSI-DSZ-CC-0682-2010
- cert_item: STARCOS 3.5 ID GCC C1
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
- FR:
- cc_security_level: EAL5 Augmenté ALC_DVS.2 et AVA_VAN.5
- cc_version: CC version 3.1 révision 3
- cert_id: ANSSI-CC-2013/45
- cert_item: Microcontrôleurs sécurisés ST33F1M/1M0/896/768/640/512, SC33F1M0/896/768/640/512/384,SM33F1M/1M0/896/768/640/512, SE33F1M/1M0/896/768/640/512, SL33F1M/1M0/896/768/640/512, SP33F1M incluant le logiciel dédié révision D ou E, optionnellement la bibliothèque cryptographique NesLib v3.0 ou v3.2, la librairie MIFARE DESFireTM EV1 v1.1
- cert_item_version: Version : maskset K8C0A, revision externe F, revision interne J
- cert_lab: Thalès (TCS-CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France
- developer: STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI_PP_0035-2007], version v1.0 Security IC Platform Protection Profile
- DE:
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0645-2010: 3
- BSI-DSZ-CC-0682-2010: 21
- BSI-DSZ-CC-S-0002-: 1
- BSI-DSZ-CC-S-0004-2010: 1
|
- FR:
- ANSSI-CC-2013/13: 3
- ANSSI-CC-2013/45: 23
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0061-2009: 1
- BSI-CC-PP-0061-2009: 3
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 9
- EAL 4 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 8
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 2
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- SRC:
- SRC Security Research & Consulting: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
- Neslib:
- NesLib 3.0: 1
- NesLib 3.2: 1
- NesLib v3.0: 27
- NesLib v3.2: 1
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- fault injection: 1
- physical tampering: 1
- SCA:
- other:
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 21: 1
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 3
- AIS 36: 2
- AIS 38: 1
- FIPS:
- FIPS 180-2: 2
- FIPS 197: 1
- ICAO:
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C1, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product NXP P5Cx128V0A/P5Cx145V0A: 1
- GCC C1, Giesecke & Devrient GmbH (confidential document) [12] STARCOS 3.5 ID GCC C1 Guidance for Inlay Production, Version 1.0, 16.08.2010, Giesecke &: 1
- Secure Smart Card Controller, Version 1.1, 15.07.2010, T-Systems GEI GmbH (confidential document) [11] Configuration list for the TOE, Version 0.5, 14.12.2010, Konfigurationsliste von STARCOS 3.5: 1
- Version 2.5, 14.12.2010, STARCOS 3.5 ID GCC C1 Security Target, Giesecke & Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20101229083457+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, nPA, elektronischer Personalausweis, neuer Personalausweis, eID, electronic Identity Card, ID_Card, ID Card"
- /ModDate: D:20101229083826+01'00'
- /Producer: OpenOffice.org 3.1
- /Subject: STARCOS 3.5 ID GCC C1
- /Title: Certification Report BSI-DSZ-CC-0682-2010
- pdf_file_size_bytes: 956429
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /CreationDate: D:20130618113438+02'00'
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate: D:20130619102651+02'00'
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title:
- pdf_file_size_bytes: 195813
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
pdf_data/st_filename |
0682b_pdf.pdf |
ANSSI-CC-cible_2013-45en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0035: 1
- BSI-CC-PP-0059: 1
- BSI-CC-PP-0061: 1
- BSI-PP-0055: 1
- BSI-PP-0056: 2
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 2
- EAL 5: 2
- EAL4: 13
- EAL4 augmented: 3
- EAL5+: 1
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 2
- EAL4: 1
- EAL5: 17
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 8
- APE:
- ASE:
- ATE:
- ATE_DPT.1: 2
- ATE_DPT.2: 8
- ATE_FUN.1: 1
- AVA:
|
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ATE:
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 17
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 46
- FCS_CKM.1: 14
- FCS_CKM.2: 3
- FCS_CKM.4: 18
- FCS_COP: 44
- FCS_COP.1: 11
- FCS_RND: 7
- FCS_RND.1: 14
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 17
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF: 21
- FDP_ACF.1: 20
- FDP_IFC.1: 5
- FDP_ITC.1: 6
- FDP_ITC.2: 8
- FDP_ITT.1: 1
- FDP_RIP: 4
- FDP_RIP.1: 12
- FDP_SDI: 8
- FDP_SDI.1: 2
- FDP_SDI.2: 4
- FIA:
- FIA_AFL: 29
- FIA_AFL.1: 9
- FIA_API: 18
- FIA_API.1: 6
- FIA_API.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU: 42
- FIA_UAU.1: 10
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 13
- FIA_UAU.6: 6
- FIA_UIA: 1
- FIA_UID: 24
- FIA_UID.1: 11
- FMT:
- FMT_LIM: 13
- FMT_LIM.1: 16
- FMT_LIM.1.1: 2
- FMT_LIM.2: 14
- FMT_LIM.2.1: 1
- FMT_MOF: 2
- FMT_MOF.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 6
- FMT_MSA.2: 1
- FMT_MSA.3: 8
- FMT_MSA.4: 1
- FMT_MTD: 76
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 34
- FMT_SMR: 5
- FMT_SMR.1: 28
- FPT:
- FPT_FLS: 4
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP: 6
- FPT_PHP.1: 5
- FPT_PHP.3: 13
- FPT_SEP.1: 1
- FPT_TST: 4
- FPT_TST.1: 10
- FPT_TST.1.3: 1
- FRU:
- FTP:
|
- FAU:
- FCS:
- FCS_CKM.1: 26
- FCS_CKM.4: 14
- FCS_COP.1: 38
- FCS_RNG: 1
- FCS_RNG.1: 7
- FDP:
- FDP_ACC.1: 31
- FDP_ACC.2: 12
- FDP_ACF.1: 35
- FDP_CKM.2: 1
- FDP_IFC.1: 15
- FDP_ITC.1: 15
- FDP_ITC.2: 15
- FDP_ITT.1: 7
- FDP_ROL.1: 9
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FIA:
- FIA_UAU.2: 9
- FIA_UAU.5: 10
- FIA_UID.1: 2
- FIA_UID.2: 11
- FMT:
- FMT_ITC.1: 1
- FMT_LIM: 1
- FMT_LIM.1: 18
- FMT_LIM.2: 17
- FMT_MSA.1: 32
- FMT_MSA.2: 1
- FMT_MSA.3: 33
- FMT_MTD.1: 10
- FMT_SMF.1: 27
- FMT_SMR.1: 18
- FPR:
- FPT:
- FPT_FLS.1: 9
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FPT_RPL.1: 10
- FPT_TDC.1: 10
- FPT_TRP.1: 6
- FPT_TST.1: 9
- FRU:
- FRU_FLT.2: 9
- FRU_RSA.2: 9
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 6
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.HW: 1
- O.HW_AES: 2
- O.MEM_ACCESS: 1
- O.MF_FW: 1
- O.RND: 3
- O.SFR_ACCESS: 1
- OE:
- OE.CGA: 1
- OE.CGA_Q: 1
- OE.CGA_SSCD: 3
- OE.CGA_TC_SV: 1
- OE.CGA_TC_SVD: 1
- OE.DTBS_: 1
- OE.HID_TC_VAD: 1
- OE.HID_V: 1
- OE.HID_VAD: 1
- OE.ID_C: 1
- OE.SSCD_P: 1
- OE.SVD: 1
- OE.SVD_A: 1
- OT:
- OT.D: 1
- OT.P: 3
- OT.SCD_SVD_C: 1
- T:
- T.M: 1
- T.RND: 3
- T.SCD_: 1
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Philips:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 2
- SHA-256: 2
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 5
- SHA-256: 5
- SHA-384: 5
- SHA-512: 3
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- Neslib:
- NESLIB 3.0: 1
- NesLib 3.0: 1
- NesLib 3.2: 1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 13
- Physical Tampering: 3
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- physical tampering: 5
- SCA:
- DPA: 2
- Leak-Inherent: 5
- SPA: 1
- physical probing: 2
- timing attacks: 2
- other:
|
- FI:
- Malfunction: 9
- malfunction: 4
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 8
- Physical Probing: 4
- SPA: 1
- physical probing: 3
- side channel: 6
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- AIS 20: 1
- AIS 31: 2
- AIS20: 2
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS 180-2: 1
- FIPS 197: 1
- FIPS PUB 180-2: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
- BSI:
- CC:
- CCMB-2012-09-001: 3
- CCMB-2012-09-002: 38
- CCMB-2012-09-003: 2
- FIPS:
- FIPS PUB 140-2: 7
- FIPS PUB 180-1: 4
- FIPS PUB 180-2: 3
- FIPS PUB 186: 2
- FIPS PUB 197: 4
- FIPS PUB 46-3: 3
- ISO:
- ISO/IEC 10116: 5
- ISO/IEC 10118-: 2
- ISO/IEC 14888: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 4
- ISO/IEC 9797: 1
- ISO/IEC 9797-1: 3
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 37 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and DESFire, when they are embedded. 38 The TOE optionally: 1
- ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and DESFire, when they are embedded: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: stut
- /Classification: Public
- /Company:
- /CreationDate: D:20101215105645+01'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Date: 14.12.2010
- /Keywords: Version 2.5 Status 14.12.2010
- /ModDate: D:20101215105729+01'00'
- /Producer: Acrobat Distiller 9.3.3 (Windows)
- /SourceModified: D:20101215095631
- /State: Draft
- /Styles: supported
- /Subject: STARCOS 3.5 ID GCC C1
- /TemplAuthor: Joern Treger
- /TemplVersion: 1.0
- /Title: Security Target Lite
- /Version: 2.5
- pdf_file_size_bytes: 853753
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 128
|
- /CreationDate: D:20130207104124Z
- /Creator: FrameMaker 7.2
- /ModDate: D:20130619102648+02'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title:
- pdf_file_size_bytes: 1284956
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 87
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |