name |
Thinklogical TLX320 Matrix Switch |
Digital Tachograph DTCO 1381, Release 4.0e |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
NO |
DE |
status |
archived |
active |
not_valid_after |
22.09.2021 |
14.12.2025 |
not_valid_before |
22.09.2016 |
14.12.2020 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1158c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160922%20Sertit-076%20CR%20v1.0%20Certification%20Report%20TLX320.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1158a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ThinklogicalSecurityTarget_1_3_TLX320.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1158b_pdf.pdf |
manufacturer |
Thinklogical |
Continental Automotive GmbH |
manufacturer_web |
https://www.thinklogical.com/ |
https://www.continental-corporation.com |
security_level |
EAL4 |
EAL4+, ATE_DPT.2, AVA_VAN.5 |
dgst |
a67b05a18bbe6cfc |
0490e7a083af0bd6 |
heuristics/cert_id |
SERTIT-076 |
BSI-DSZ-CC-1158-2020 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
AGD_PRE.1, ALC_DVS.1, ALC_TAT.1, ATE_DPT.2, ALC_CMS.4, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ADV_FSP.4, ALC_LCD.1, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ALC_CMC.4, ADV_IMP.1 |
heuristics/extracted_versions |
- |
4.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1158-V2-2023 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1069-2018 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-1158-V3-2025 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0632-2011, BSI-DSZ-CC-0269-2006, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-0559-2012, BSI-DSZ-CC-0791-2012, BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0376-2006, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-1015-2017, BSI-DSZ-CC-0936-2015, BSI-DSZ-CC-0878-2013, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0395-2007, BSI-DSZ-CC-0827-V6-2017 |
heuristics/scheme_data |
- category: Other Devices and Systems
- certification_date: 22.09.2016
- developer: Thinklogical
- enhanced:
- category: Other Devices and Systems
- cert_id: SERTIT-076
- certification_date: 22.09.2016
- description: The TOE provides remote connections from a set of shared computers to a set of shared peripherals. The switching capability of the TOE is used to connect ports on a particular computer to a particular peripheral set. The corresponding electronic signal from a computer port is transformed into an optical signal by the Velocity extender, transmitted through an optical fiber, switched by the TOE to another optical fiber, and then transformed back to an electronic form by the Velocity extender. The resulting signal is used by the shared peripherals. The TOE provides a capability to dynamically change the switching configuration to connect a particular computer to a particular peripheral set. The TOE enforces secure separation of information flows corresponding to different switched connections. The corresponding Data Separation Security Policy is the main security feature of the TOE.
- developer: Thinklogical
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135040-1607952626/SERTIT/Sertifikater/2016/76/20160922%20Sertit-076%20C%20v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135043-1607952629/SERTIT/Sertifikater/2016/76/ThinklogicalSecurityTarget_1_3_TLX320.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135046-1607952632/SERTIT/Sertifikater/2016/76/20160922%20Sertit-076%20CR%20v1.0%20Certification%20Report%20TLX320.pdf'})]})
- evaluation_facility: Norconsult AS
- level: EAL 4
- mutual_recognition: CCRA, SOG-IS
- product: TLX320 Matrix Switch Chassis (TLX-MSC-000320 Rev A), TLX48 / TLX320 Matrix Switch Data Input and Output Card, 16 Ports, SFP+, Multi-Mode (TLX-MSD-M00016 Rev A), Single Mode (TLX-MSDS00016 Rev A), Velocity Matrix Switch 320 Data Input Retimer Card, 16 Ports, SFP+, Multi-Mode (VXM-D00T16 Rev A), Single Mode (VXM-D0ST16 Rev A)
- product: Thinklogical TLX320 Matrix Switch
- url: https://sertit.no/certified-products/product-archive/thinklogical-tlx320-matrix-switch
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
40651f75a5887085 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0094b_pdf.pdf |
pdf_data/cert_filename |
|
1158c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20201222074117+01'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Digital Tachograph DTCO 1381, Release 4.0e, Continental Automotive GmbH
- /ModDate: D:20201222111856+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria Certification
- /Title: Certificate BSI-DSZ-CC-1158-2020
- pdf_file_size_bytes: 260402
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
20160922 Sertit-076 CR v1.0 Certification Report TLX320.pdf |
1158a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ATE_DPT.2 and AVA_VAN.5
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1158-2020
- cert_item: Digital Tachograph DTCO 1381, Release 4.0e
- cert_lab: BSI
- developer: Continental Automotive GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP-0094-2017
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0827-V8-2020: 1
- BSI-DSZ-CC-1069-2018: 3
- BSI-DSZ-CC-1158-2020: 14
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 19
- EAL1: 1
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
- EAL4: 1
- EAL4+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_ETC.1: 1
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 1
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.EMISSIO: 1
- A.MANAGE: 1
- A.NOEVIL: 1
- A.PHYSICAL: 1
- A.SCENARIO: 1
- O:
- OE:
- OE.EMISSIO: 1
- OE.MANAGE: 1
- OE.NOEVIL: 1
- OE.PHYSICAL: 1
- OE.SCENARIO: 1
- T:
- T.ATTACK: 1
- T.INSTALL: 1
- T.RESIDUAL: 1
- T.STATE: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies: 1
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 2
- AIS 36: 3
- AIS 37: 2
- AIS 38: 1
- AIS 40: 2
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 1.0, 2020-12-01, Digital Tachograph, DTCO 1381, Release 4.0e, Deutsche Telekom Security GmbH, (confidential document) [8] Protection Profile for Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- zu DTCO 1381 Release 4.0e (Excelsheet), Version 1.20, 23.11.2020, Continental Automotive GmbH (confidential document) [12] Digitaler Tachograph – DTCO® 4.0 / 4.0e Leitfaden für die Kontrollorgane, BA00.1381.40 202: 1
|
pdf_data/report_metadata |
- /AAPL:Keywords: ['ugradert']
- /Author: Rage, Arne Høye
- /CreationDate: D:20160922162516Z00'00'
- /Creator: Microsoft Word
- /Keywords: ugradert
- /ModDate: D:20160922162516Z00'00'
- /Producer: Mac OS X 10.11.6 Quartz PDFContext
- /Title: tittel
- pdf_file_size_bytes: 875983
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210112100622+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, "
- /ModDate: D:20210112130147+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria, BSI-DSZ-CC-1158-2020
- /Title: Single Evaluation Report CC
- pdf_file_size_bytes: 623290
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
pdf_data/st_filename |
ThinklogicalSecurityTarget_1_3_TLX320.pdf |
1158b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 3
- EAL 4 augmented: 1
- EAL4: 11
- EAL4 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.4: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_LCD.1: 2
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ATE:
- ATE_DPT.1: 1
- ATE_DPT.2: 7
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC.1: 7
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 7
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FMT:
|
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 2
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 3
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FCO:
- FCO_NRO.1: 7
- FCO_NRO.1.1: 1
- FCO_NRO.1.2: 1
- FCO_NRO.1.3: 1
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 46
- FCS_CKM.1.1: 2
- FCS_CKM.2: 18
- FCS_CKM.2.1: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 27
- FCS_CKM.4.1: 2
- FCS_COP: 5
- FCS_COP.1: 35
- FCS_COP.1.1: 7
- FCS_RNG: 8
- FCS_RNG.1: 28
- FCS_RNG.1.1: 8
- FCS_RNG.1.2: 8
- FDP:
- FDP_ACC: 11
- FDP_ACC.1: 76
- FDP_ACC.1.1: 6
- FDP_ACF: 11
- FDP_ACF.1: 58
- FDP_ACF.1.1: 12
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 7
- FDP_ACF.1.4: 6
- FDP_ETC: 2
- FDP_ETC.2: 10
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 8
- FDP_ITC: 7
- FDP_ITC.1: 25
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 35
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 2
- FDP_ITT: 1
- FDP_ITT.1: 2
- FDP_ITT.1.1: 1
- FDP_MSA.3: 2
- FDP_RIP: 2
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FDP_SDI: 3
- FDP_SDI.2: 12
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 27
- FIA_AFL.1.1: 6
- FIA_AFL.1.2: 7
- FIA_ATD: 2
- FIA_ATD.1: 17
- FIA_ATD.1.1: 3
- FIA_SOS.2: 1
- FIA_UAU: 7
- FIA_UAU.1: 26
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 3
- FIA_UAU.2: 12
- FIA_UAU.2.1: 2
- FIA_UAU.3: 8
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UID: 4
- FIA_UID.1: 14
- FIA_UID.2: 15
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 25
- FMT_MOF.1.1: 5
- FMT_MSA: 9
- FMT_MSA.1: 17
- FMT_MSA.1.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 51
- FMT_MSA.3.1: 6
- FMT_MSA.3.2: 6
- FMT_MTD: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF: 9
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR: 14
- FMT_SMR.1: 33
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS: 2
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_ITC.1: 3
- FPT_PHP: 3
- FPT_PHP.1: 1
- FPT_PHP.2: 5
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 2
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_STM: 3
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_TDC: 2
- FPT_TDC.1: 21
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 2
- FPT_TST: 2
- FPT_TST.1: 6
- FPT_TST.1.1: 2
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 17
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 4
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.EMISSION: 2
- A.MANAGE: 2
- A.NOEVIL: 2
- A.PHYSICAL: 2
- A.SCENARIO: 2
- O:
- O.CONF: 7
- O.CONNECT: 3
- O.CRYPTOGRAPHY: 1
- OE:
- OE.EMISSION: 2
- OE.INSTAL: 1
- OE.MANAGE: 4
- OE.NOEVIL: 2
- OE.PHYSICAL: 2
- OE.SCENARIO: 2
- T:
- T.ATTACK: 3
- T.COMINT: 1
- T.INSTALL: 3
- T.RESIDUAL: 3
- T.STATE: 3
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-256: 9
- SHA-384: 10
- SHA-512: 10
- SHA256: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 3
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- NIST P-256: 5
- NIST P-384: 5
- NIST P-521: 5
- P-256: 5
- P-384: 5
- P-521: 5
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Physical tampering: 1
- malfunction: 1
- physical tampering: 7
- SCA:
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS PUB 197: 1
- FIPS PUB 46-3: 2
- ISO:
- NIST:
- RFC:
- RFC 5480: 1
- RFC 5639: 1
- RFC 5869: 1
- RFC3447: 5
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 10-3 RSA Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable VU non-volatile memory Card.PK (conditional, possibly multiple) Card: 1
- 10-6) ECC Generated by MSCA ; obtained by VU in MSCA-_Card certificate during mutual authentication Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) VUEGF.PK Public: 1
- 10-6. ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable VU non-volatile memory EUR.PK (previous) The previous public key of ERCA: 1
- 10-6. ECC Generated by MSCA ; obtained by VU in MSCA_VU-EGF certificate during coupling to an EGF Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) Table 10-4: 1
- C as part of the EUR.Link.C; obtained by VU du-ring mutual authentication towards such card or EGF Out of scope for this ST Not applicable VU general nonvo- latile memory (con- ditional; only if the VU has: 1
- MACs for the data integrity control of user data records AES Generated by the VU manufacturer Out of scope of this ST Made unavailable when the VU has reached end of life VU non-volatile memory Table 10-5: 1
- Out of scope: 18
- by card or card manufac-turer; obtained by VU in card certi-ficate during mu- tual authentication Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) DTCO 1381: 1
- by card or card manufacturer; obtained by VU in card certificate during mutual authentication Out of scope for this ST Not applicable VU non-volatile memory MS.PK (conditional, possibly multiple) Public key: 1
- for upgrade file To ensure confidentiality of the upgrade file AES Generated by the VU manufacturer Out of scope of this ST Made unavailable when the VU has reached end of life Not permanently stored CBC-MAC: 1
- foreign) MSCA; obtained by VU in MS certificate presented by a card during mutual authentication Out of scope for this ST Not applicable VU non-volatile memory Table 10-1 First-generation asymmetric keys: 1
- issued under the previous ECC Generated by ERCA; inserted in VU by manufacturer at the end Out of scope for this ST Not applicable VU non-volatile memory (conditional; only present if existing at DTCO: 1
- key generations). However, a VU will retrieve only one of these keys during the pairing process. Out of scope for this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only: 1
- obtained by VU in EGF certificate during mutual authentication as part of the coupling process Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA _Card.PK: 1
- of the underlying elliptic curve and the CBC- MAC key itself AES Generated by the VU manufacturer Out of scope of this ST Made unavailable when the VU has reached end of life VU non-volatile memory Kvu: 1
- received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope for this ST Made unavailable when the VU has reached end of life VU non-volatile memory 37 Note: 1
- received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope for this ST Made unavailable when the VU has reached end of life VU non-volatile memory TK: 1
- the VU AES Generated by ERCA; inserted by VU manufacturer at the end of the manufacturing phase. Out of scope for this ST Made unavailable when the VU has reached end of life VU non-volatile Memory DTCO 1381: 1
- under Km) at the end of the manufac- turing phase; obtained and decrypted by VU during pairing Out of scope for this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only: 1
|
pdf_data/st_metadata |
- /Author: MICHELE ROBERTS
- /CreationDate: D:20160922164335+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20160922164335+00'00'
- /Title:
- pdf_file_size_bytes: 487151
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
- /Author: Norbert Köhn
- /CreationDate: D:20201215121041+01'00'
- /Creator: Acrobat PDFMaker 20 for Word
- /Keywords: VU; Security Target; ST; DTCO; DTCO1381; Smart Tachograph; VDO
- /ModDate: D:20201215122510+01'00'
- /Producer: Adobe PDF Library 20.1.58
- /Subject: Security Target for smart tachograph vehicle unit (VU) in the sense of Annex IC of regulation 799/2019 (EU)
- /Title: Digital Tachograph DTCO 1381 Security Target
- pdf_file_size_bytes: 1558840
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 111
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |