name |
Renesas HD65256D1 Version 02 |
STARCOS 3.7 COS HBA-SMC |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
DE |
status |
archived |
active |
not_valid_after |
01.09.2019 |
18.06.2026 |
not_valid_before |
24.03.2010 |
18.06.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V4c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0529a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V4a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0529b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0976V4b_pdf.pdf |
manufacturer |
Renesas Technology Corporation |
G+D Mobile Security GmbH |
manufacturer_web |
https://am.renesas.com/ |
https://www.gi-de.com/de/de/mobile-security/ |
security_level |
AVA_MSU.3, ADV_IMP.2, EAL4+, ALC_DVS.2, AVA_VLA.4 |
AVA_VAN.5, ALC_DVS.2, EAL4+, ATE_DPT.2 |
dgst |
ac37e8c6afcb4efc |
e86ac89b4f665c58 |
heuristics/cert_id |
BSI-DSZ-CC-0529-2010 |
BSI-DSZ-CC-0976-V4-2021 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_SPM.1, ALC_TAT.1, ADV_IMP.2, ALC_LCD.1, AVA_VLA.4, AVA_MSU.3, ALC_DVS.2 |
ADV_ARC.1, AGD_OPE.1, ATE_COV.2, AGD_PRE.1, ALC_DEL.1, ADV_TDS.3, ASE_SPD.1, ALC_LCD.1, ASE_OBJ.2, ASE_REQ.2, AVA_VAN.5, ATE_FUN.1, ASE_TSS.1, ALC_CMS.4, ATE_IND.2, ALC_CMC.4, ASE_CCL.1, ALC_FLR.1, ALC_DVS.2, ATE_DPT.2, ASE_ECD.1, ADV_IMP.1, ASE_INT.1, ALC_TAT.1, ADV_FSP.4 |
heuristics/extracted_versions |
02 |
3.7 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0434-2007, BSI-DSZ-CC-0489-2008 |
BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0976-V3-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0350-2007, BSI-DSZ-CC-0489-2008, BSI-DSZ-CC-0353-2006, BSI-DSZ-CC-0434-2007, BSI-DSZ-CC-0329-2006 |
BSI-DSZ-CC-0976-V2-2018, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0879-2014, BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-0916-2015, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0976-V3-2019, BSI-DSZ-CC-0976-2015, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1068-V3-2022, BSI-DSZ-CC-1067-V5-2024, BSI-DSZ-CC-1067-V3-2022, BSI-DSZ-CC-1067-V4-2023, BSI-DSZ-CC-1068-V5-2024, BSI-DSZ-CC-1068-V4-2023 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V3-2020 |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1068-V3-2022, BSI-DSZ-CC-1067-V5-2024, BSI-DSZ-CC-1067-V3-2022, BSI-DSZ-CC-1067-V4-2023, BSI-DSZ-CC-1068-V5-2024, BSI-DSZ-CC-1068-V4-2023 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V3-2020 |
heuristics/protection_profiles |
{} |
55ed365edb2c317f |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0082b_pdf.pdf |
pdf_data/cert_filename |
|
0976V4c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0976-V4-2021: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210629121438+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, G2 COS, eHealth, STARCOS 3.7 COS HBA-SMC, Giesecke+Devrient Mobile Security GmbH"
- /ModDate: D:20210629121708+02'00'
- /Producer: LibreOffice 6.3
- /Subject: STARCOS 3.7 COS HBA-SMC from G+D Mobile Security GmbH, Giesecke+Devrient Mobile Security GmbH
- /Title: Certificate BSI-DSZ-CC-0976-V4-2021
- pdf_file_size_bytes: 241574
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
0529a_pdf.pdf |
0976V4a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0529-2010
- cert_item: Renesas HD65256D1 Version 02
- cert_lab: BSI
- developer: Renesas Technology Corp. sponsored by Renesas Technology Europe Ltd
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0976-V4-2021
- cert_item: STARCOS 3.7 COS HBA-SMC
- cert_lab: BSI
- developer: Giesecke+Devrient Mobile Security GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Card Operating System Generation 2 (PP COS G2), Version 2.1, 10 July 2019, BSI-CC-PP-0082-V4- 2019
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0434-2007: 4
- BSI-DSZ-CC-0489-2008: 1
- BSI-DSZ-CC-0529: 2
- BSI-DSZ-CC-0529-2010: 18
|
- DE:
- BSI-DSZ-CC-0976-V3-2019: 3
- BSI-DSZ-CC-0976-V4-2021: 26
- BSI-DSZ-CC-1110-: 2
- BSI-DSZ-CC-1110-V3-2020: 7
- BSI-DSZ-CC-S-0128-: 1
- BSI-DSZ-CC-S-0128-2019: 1
- BSI-DSZ-CC-S-0132-2019: 1
- BSI-DSZ-CC-S-0144-2020: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0082-V4-: 1
- BSI-CC-PP-0082-V4-2019: 3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 9
- EAL 4 augmented: 3
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
- EAL6: 1
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM: 4
- FCS_COP: 29
- FCS_RNG: 3
- FCS_RNG.1: 1
- FIA:
- FPT:
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon Technologies AG: 1
- Philips:
|
- GD:
- G+D: 2
- Giesecke & Devrient: 3
- Giesecke+Devrient: 29
- Infineon:
- Infineon: 11
- Infineon Technologies AG: 7
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- DPA: 1
- SPA: 1
- side channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
- BSI TR-02102: 1
|
- BSI:
- BSI 7148: 1
- BSI TR-03116-1: 1
- BSI TR-03143: 5
- BSI TR-03144: 10
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 25: 3
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 38: 1
- AIS31: 1
- AIS37: 1
- ISO:
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 6
- AIS 23: 1
- AIS 25: 4
- AIS 26: 4
- AIS 31: 5
- AIS 32: 1
- AIS 34: 4
- AIS 35: 2
- AIS 36: 5
- AIS 37: 2
- AIS 38: 1
- AIS 46: 2
- FIPS:
- FIPS 180-4: 9
- FIPS 197: 12
- FIPS PUB 180-4: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18031:2005: 1
- ISO/IEC 18045: 4
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 02 (HD65256D1), Brightsight (confidential document) [8] Configuration list for the TOE, Version 0.6.6, 22 July 2009, Document Version for the Common: 1
- 5.0, 14 July 2009, HD65256D1 Version 02 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Evaluation Technical Report, Version 3.0, 8 February 2010, Evaluation Technical Report AE56D1: 1
- confidential document) [9] Security Target BSI-DSZ-CC-0529, Version 2.0, 14 July 2009, HD65256D1 Version 02 Smartcard: 1
|
- ConfidentialDocument:
- 1.1, 19 May 2021, Giesecke+Devrient Mobile Security GmbH (confidential document) [11] Guidance Documentation STARCOS 3.7 COS HBA-SMC – Main Document, Version 1.6, 23 March 2021: 1
- Target STARCOS 3.7 COS HBA-SMC, Version 2.0, 22 April 2021, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically • AIS 1, Version 14, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- design step H13, Version 3.3, 22 April 2020, Infineon Technologies AG, BSI-DSZ-CC-1110-V3-2020 (confidential document) Security Target Lite of the underlying hardware platform, Security Target IFX_CCI_000003h: 1
- for STARCOS 3.7 COS HBA-SMC, Version 2.9, 2 June 2021, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0976-V4-2021, Configuration List STARCOS 3.7 COS HBA-SMC: 1
- procedure BSI-DSZ-CC-1110-V3-2020, Version 1, 23 April 2020, TÜV Informationstechnik GmbH (confidential document) [21] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20100413092737+02'00'
- /Creator: Writer
- /Keywords: "Certification, Common Criteria, Renesas HD65256D1 Version 02, Renesas Technology Europe Ltd, Renesas Technology Corp."
- /ModDate: D:20100422145117+02'00'
- /Producer: OpenOffice.org 3.1
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0529-2010
- pdf_file_size_bytes: 370401
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210629114835+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, G2 COS, eHealth, STARCOS 3.7 COS HBA-SMC, Giesecke+Devrient Mobile Security GmbH"
- /ModDate: D:20210629121138+02'00'
- /Producer: LibreOffice 6.3
- /Subject: STARCOS 3.7 COS HBA-SMC from G+D Mobile Security GmbH, Giesecke+Devrient Mobile Security GmbH
- /Title: Certification Report BSI-DSZ-CC-0976-V4-2021
- pdf_file_size_bytes: 936127
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/, https://www.bsi.bund.de/zertifizierungsreporte, http://www.commoncriteriaportal.org/, https://www.sogis.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
pdf_data/st_filename |
0529b_pdf.pdf |
0976V4b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1110-V3-2020: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0002: 4
- BSI-PP-0002: 82
|
- BSI:
- BSI-CC-PP- 0082-V4: 2
- BSI-CC-PP- 0084-2014: 6
- BSI-CC-PP-0035-2007: 1
- BSI-CC-PP-0082-V3: 1
- BSI-CC-PP-0082-V4: 27
- BSI-CC-PP-0084-: 4
- BSI-CC-PP-0084-2007: 1
- BSI-CC-PP-0084-2014: 57
- BSI-PP-0084-: 2
- BSI-PP-0084-2014: 8
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 6
- EAL4 augmented: 2
|
- EAL:
- EAL 4: 2
- EAL 6: 2
- EAL4: 14
- EAL4 augmented: 4
- EAL6: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_SCP: 1
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- ADV_SPM.1: 4
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_LCD: 1
- ALC_TAT: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 6
- AVA_VLA: 1
- AVA_VLA.4: 1
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 9
- ADV_FSP: 2
- ADV_FSP.4: 6
- ADV_IMP: 2
- ADV_IMP.1: 6
- ADV_TDS.3: 3
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 6
- AGD_PRE: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC: 2
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_DEL: 2
- ALC_DEL.1: 1
- ALC_DVS: 2
- ALC_DVS.2: 12
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 11
- ATE_FUN.1: 6
- ATE_IND.2: 5
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_SAS.1: 9
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 2
- FCS_RND: 1
- FCS_RND.1: 9
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 2
- FDP_ACF.1: 16
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 17
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 12
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 10
- FDP_ITT.1.1: 1
- FDP_SDI.1: 1
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 10
- FMT_LIM.1.1: 1
- FMT_LIM.2: 10
- FMT_LIM.2.1: 1
- FMT_MSA.1: 2
- FMT_MSA.2: 14
- FMT_MSA.2.1: 1
- FMT_MSA.3: 6
- FMT_SMR.1: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 30
- FPT_FLS.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_SEP.1: 11
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 15
|
- FAU:
- FCS:
- FCS_CKM: 83
- FCS_CKM.1: 39
- FCS_CKM.2: 9
- FCS_CKM.4: 64
- FCS_CKM.4.1: 1
- FCS_COP: 189
- FCS_COP.1: 27
- FCS_COP.1.1: 1
- FCS_RNG: 34
- FCS_RNG.1: 20
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 123
- FDP_ACC.1: 44
- FDP_ACF: 110
- FDP_ACF.1: 41
- FDP_IFC: 7
- FDP_IFC.1: 16
- FDP_ITC.1: 35
- FDP_ITC.2: 35
- FDP_ITT: 7
- FDP_ITT.1: 3
- FDP_RIP: 9
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FDP_SDC: 8
- FDP_SDC.1: 3
- FDP_SDI: 7
- FDP_SDI.1: 1
- FDP_SDI.2: 11
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 7
- FDP_UCT.1: 1
- FDP_UIT: 8
- FDP_UIT.1: 2
- FIA:
- FIA_ACC: 1
- FIA_ACF: 1
- FIA_AFL: 22
- FIA_AFL.1: 4
- FIA_API: 10
- FIA_API.1: 16
- FIA_API.1.1: 1
- FIA_ATD: 10
- FIA_ATD.1: 20
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU: 50
- FIA_UAU.1: 20
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 12
- FIA_UAU.4.1: 1
- FIA_UAU.5: 17
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 12
- FIA_UAU.6.1: 1
- FIA_UID: 14
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 32
- FIA_USB.1: 30
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 2
- FMT:
- FMT_LIM: 15
- FMT_LIM.1: 3
- FMT_LIM.2: 2
- FMT_MSA: 68
- FMT_MSA.1: 8
- FMT_MSA.3: 39
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 38
- FMT_MTD.1: 4
- FMT_SMF.1: 51
- FMT_SMF.1.1: 1
- FMT_SMR: 9
- FMT_SMR.1: 41
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SRM: 1
- FPT:
- FPT_EMS: 10
- FPT_EMS.1: 15
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS: 7
- FPT_FLS.1: 16
- FPT_FLS.1.1: 1
- FPT_ITE: 11
- FPT_ITE.1: 11
- FPT_ITE.1.1: 1
- FPT_ITE.1.2: 1
- FPT_ITE.2: 13
- FPT_ITE.2.1: 5
- FPT_ITE.2.2: 1
- FPT_ITT: 7
- FPT_ITT.1: 3
- FPT_PHP: 7
- FPT_PHP.3: 4
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 22
- FTP_ITC.1: 12
- FTP_ITE: 1
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.AES: 7
- O.PACE_CHIP: 2
- O.RND: 8
- T:
|
pdf_data/st_keywords/vendor |
|
- GD:
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 2
- NXP:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 11
- SHA-384: 6
- SHA-512: 4
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 4
- brainpoolP384r1: 4
- brainpoolP512r1: 4
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 2
- Malfunction: 15
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 16
- Physical Probing: 2
- Physical probing: 1
- physical probing: 4
|
- FI:
- DFA: 1
- Malfunction: 17
- malfunction: 1
- physical tampering: 3
- SCA:
- DPA: 1
- Leak-Inherent: 15
- Physical Probing: 2
- SPA: 1
- side channel: 1
- other:
- Bleichenbacher attack: 1
- JIL: 3
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03111: 3
- BSI TR-03143: 2
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- CCMB-2017-05-001: 1
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 4
- FIPS PUB 180-4: 1
- FIPS PUB 197: 1
- ISO:
- NIST:
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- is also a part of TOE. But in the case of the package includes another chip, another chip is out of scope of the TOE. The package type is listed in section 2.1.1. 1.3 ST Overview This document is the ST: 1
- out of scope: 1
|
- OutOfScope:
- and cryptographic key sizes 2048 bits and 3072 bits modulus length for RSA private key operation is out of scope for the TOE. 371 The TOE shall meet the requirement “Cryptographic operation – CB ECC (FCS_COP.1/CB: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Renesas Electronics Corporation
- /CreationDate: D:20090714085001+09'00'
- /Creator: クセロPDF v1.14 Rev0495
- /Keywords: HD65256D1, Common Criteria Certification, Security Controller, Security Target, EAL4+
- /ModDate: D:20100422104451+01'00'
- /Producer: Xelo PDF Library
- /Subject: Common Criteria Certification BSI-DSZ-CC-0529-2010
- /Title: HD65256D1 Version 02 Smartcard Security Target -Public Version-
- pdf_file_size_bytes: 953247
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 62
|
- /Author: Giesecke+Devrient Mobile Security GmbH
- /CreationDate: D:20210617104602+02'00'
- /Creator: Microsoft® Word für Microsoft 365
- /Keywords: Version 1.0/18.05.2021
- /ModDate: D:20210617104602+02'00'
- /Producer: Microsoft® Word für Microsoft 365
- /Subject: Security Target STARCOS 3.7 COS HBA-SMC
- /Title: G+D MS Security Target to BSI-PP-0082-V4
- pdf_file_size_bytes: 2539468
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 166
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |