Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

TPM 2.0 Hardware version FB5C85D, Firmware version 1.3.0.1
ANSSI-CC-2016/15
ZEMO VML-GK2, V.3.1.0 FW-Version 3.1.0, HW-Version 2.0.0
BSI-DSZ-CC-0623-V2-2018
name TPM 2.0 Hardware version FB5C85D, Firmware version 1.3.0.1 ZEMO VML-GK2, V.3.1.0 FW-Version 3.1.0, HW-Version 2.0.0
category Trusted Computing ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_before 2016-07-22 2018-06-28
not_valid_after 2016-07-22 2023-06-28
scheme FR DE
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2016_15en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V2b_pdf.pdf
manufacturer Nuvoton Technology ZEMO GmbH
manufacturer_web None https://zemo.de
security_level ALC_FLR.1, AVA_VAN.4, EAL4+, ALC_DVS.2 ALC_TAT.1, AVA_VAN.5, ADV_IMP.1, ADV_TDS.3, EAL3+, ADV_FSP.4
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-15.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V2a_pdf.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0623V2c_pdf.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PC Client Specific Trusted Platform Module (Family 2.0, Level 0, Revision 1.16, Version 1.0)...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/TCG_PP_PC_client_specific_TPM_SecV2_v10.pdf', 'pp_ids': None}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT&...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0052b_pdf.pdf', 'pp_ids': None})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2017, 2, 13), 'maintenance_title': 'ANSSI-CC-2016/15-M02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_15_M02.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 11, 14), 'maintenance_title': 'ANSSI-CC-2016/15-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_15_M01.pdf', 'maintenance_st_link': None})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None 4a3678441b2f22730cb9cba6377a58c2d030a333d21d764a282d3943ebc36bb1
state/cert/txt_hash None 43a7deaeb8a72848561d3093baa42ac716edabf8b9494ed5d2c1ac8c1581eecf
state/report/pdf_hash c96314dd0710bc9b2a6923fa0df18aba4f0bbfb149e854aae39a7d7df004651d b6a20fdb363fb4d53985da7690334cd55f2ace0d4100fb59d817bf8de79b29db
state/report/txt_hash 632491f176b15a08a3ae73ebe37bc636298bc8dd38b453a538f76c9ef2ea419f ffef3a44dc8aba01fc48136edb22253e4a98978382bf744d9b6af603bfe8f400
state/st/pdf_hash 07ddc15f4927a9831eccd075fbde1929b4bca043ddd881287359466bfa5143ba 1c1f1dfcb476742441e058ce3f64f3395ae6be31a6ea70656f0d0d48202c41ce
state/st/txt_hash 70aec6450854804728c5dd3aa9820c1652a5c9a9b9634e0201f73d906c2e7a69 0c3fec560cbc5b2d27c3d2e9cbe5a6b4f3192f54c4c2f573c61b1cb3684213ba
heuristics/cert_id ANSSI-CC-2016/15 BSI-DSZ-CC-0623-V2-2018
heuristics/cert_lab SERMA BSI
heuristics/extracted_sars AVA_VAN.4, ALC_DVS.2, ALC_FLR.1 ATE_COV.2, ATE_DPT.1, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.3, ALC_TAT.1, ADV_TDS.3, ATE_IND.2, ALC_DEL.1, AVA_VAN.5, ADV_IMP.1, ALC_DVS.1, ADV_FSP.4, ALC_CMC.3, ATE_FUN.1
heuristics/extracted_versions 2.0, 1.3.0.1 2.0.0, 3.1.0
heuristics/report_references/directly_referenced_by ANSSI-CC-2017/55 None
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2017/55 None
heuristics/scheme_data
  • product: TPM 2.0 - Hardware version FB5C85D, Firmware version 1.3.0.1
  • url: https://cyber.gouv.fr/produits-certifies/tpm-20-hardware-version-fb5c85d-firmware-version-1301
  • description: Le produit certifié est « TPM 2.0, Hardware version FB5C85D, » développé par NUVOTON TECHNOLOGY ISRAEL LTD. Ce produit est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM(Trusted Platform Module).  
  • sponsor: Nuvoton Technology Israel Ltd.
  • developer: Nuvoton Technology Israel Ltd.
  • cert_id: 2016/15
  • level: EAL4+
  • enhanced:
    • cert_id: 2016/15
    • certification_date: 22/07/2016
    • category: Micro-circuits
    • cc_version: Critères Communs version 3.1r4
    • developer: Nuvoton Technology Israel Ltd.
    • sponsor: Nuvoton Technology Israel Ltd.
    • evaluation_facility: Serma Safety & Security
    • level: EAL4+
    • protection_profile: ANSSI-CC-PP-2015/07
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_DVS.2, ALC_FLR.1, AVA_VAN.4
    • target_link: https://cyber.gouv.fr/sites/default/files/2016/07/cible_lite_2016_15-m02.pdf
    • report_link: https://cyber.gouv.fr/sites/default/files/2016/07/anssi-cc-2016-15.pdf
None
pdf_data/cert_filename None 0623V2c_pdf.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • DE:
      • BSI-DSZ-CC-0623-V2-2018: 1
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0052-2015: 1
  • cc_security_level:
    • EAL:
      • EAL 3: 1
      • EAL 4: 1
      • EAL 2: 1
      • EAL 3 augmented: 1
  • cc_sar:
    • ADV:
      • ADV_FSP.4: 1
      • ADV_IMP.1: 1
      • ADV_TDS.3: 1
    • ALC:
      • ALC_TAT.1: 1
    • AVA:
      • AVA_VAN.5: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
    • ISO:
      • ISO/IEC 15408: 2
      • ISO/IEC 18045: 2
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 900741
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20180702105442+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal, MobCT"
  • /ModDate: D:20180710144522+02'00'
  • /Producer: LibreOffice 5.2
  • /Subject: ZEMO VML-GK2, FW-Version 3.1.0, HW-Version 2.0.0, ZEMO GmbH
  • /Title: Certification Report BSI-DSZ-CC-0623-V2-2018
  • pdf_hyperlinks:
pdf_data/report_filename ANSSI-CC-2016-15.pdf 0623V2a_pdf.pdf
pdf_data/report_frontpage
  • FR:
    • match_rules: Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
    • cert_id: ANSSI-CC-2016/15
    • cert_item: TPM 2.0
    • cert_item_version: Hardware version FB5C85D, Firmware version 1.3.0.1
    • ref_protection_profiles: ANSSI-CC-PP-2015/07] PC Client Specific Trusted Platform Module, Family 2.0, Level 0, Revision v1.16, Version 1.0
    • cc_version: Critères Communs version 3.1 révision 4
    • cc_security_level: EAL 4 augmenté ALC_DVS.2, ALC_FLR.1, AVA_VAN.4
    • developer: Nuvoton Technology Israel Ltd. 8 Hasadnaot St, POB 3007, Herzlia B. 46130, Israël Commanditaire Nuvoton Technology Israel Ltd. 8 Hasadnaot St, POB 3007, Herzlia B. 46130, Israël
    • cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
  • DE:
    • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
    • cert_id: BSI-DSZ-CC-0623-V2-2018
    • cert_item: ZEMO VML-GK2, FW-Version 3.1.0, HW-Version 2.0.0
    • developer: ZEMO GmbH
    • cert_lab: BSI
    • ref_protection_profiles: Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System (MobCT), Version 1.4, BSI-CC-PP-0052-2015, 19 January 2015
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, and AVA_VAN.5
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2016/15: 16
  • DE:
    • BSI-DSZ-CC-0623-V2-2018: 14
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2015/07: 5
  • BSI:
    • BSI-CC-PP-0052-2015: 3
    • BSI-CC-PP- 0052-2015: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 2
    • ALC_FLR.1: 2
    • ALC_FLR: 2
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.4: 4
    • AVA_VAN: 2
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ADV:
    • ADV_FSP.4: 4
    • ADV_IMP.1: 4
    • ADV_TDS.3: 4
  • ALC:
    • ALC_TAT.1: 4
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sar/ADV
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_FSP.4: 4
  • ADV_IMP.1: 4
  • ADV_TDS.3: 4
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_FLR.1: 2
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_LCD: 1
  • ALC_TAT: 1
  • ALC_TAT.1: 4
  • ALC_FLR: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 2 1
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN.4: 4
  • AVA_VAN: 2
  • AVA_VAN.5: 5
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL2: 2
    • EAL7: 1
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 1
    • EAL 7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL 3: 4
    • EAL 4: 4
    • EAL 2: 3
    • EAL 1: 1
    • EAL3+: 2
    • EAL 5+: 1
    • EAL 6: 1
    • EAL 3 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 4: 2
  • EAL2: 2
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 5: 1
  • EAL 7: 1
  • EAL 3: 4
  • EAL 4: 4
  • EAL 2: 3
  • EAL 1: 1
  • EAL3+: 2
  • EAL 5+: 1
  • EAL 6: 1
  • EAL 3 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 1 4
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 2 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • Report, Version 1.0 10.06.2018, Evaluation Technical Report – Summary, datenschutz cert GmbH, (confidential document) [8] Common Criteria Protection Profile Mobile Card Terminal for the German Healthcare System: 1
    • 19 January 2015 [9] Configuration list for the TOE, 18.04.2018, Konfigurationsliste (confidential document) [10] Guidance documentation for the TOE, Version 1.1.4, 18.04.2018, Bedienungsanleitung: 1
pdf_data/report_keywords/cipher_mode
  • GCM:
    • GCM: 2
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Safety & Security: 2
pdf_data/report_keywords/hash_function/SHA
  • SHA1:
    • SHA1: 1
    • SHA-1: 1
  • SHA2:
    • SHA-256: 1
  • SHA2:
    • SHA-256: 5
pdf_data/report_keywords/hash_function/SHA/SHA2/SHA-256 1 5
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 180-4: 2
    • FIPS PUB 180-4: 1
    • FIPS 197: 1
  • NIST:
    • NIST SP 800-38D: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS #1: 1
  • BSI:
    • AIS 32: 1
    • AIS 34: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
  • X509:
    • X.509: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 5
    • HPC:
      • HPC: 1
pdf_data/report_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 2
  • AES:
    • AES: 5
  • HPC:
    • HPC: 1
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 2 5
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
    • BSI 7148: 1
pdf_data/report_metadata//Author Bundesamt für Sicherheit in der Informationstechnik
pdf_data/report_metadata//CreationDate D:20180705154336+02'00'
pdf_data/report_metadata//Creator PDFCreator Version 1.2.1 Writer
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Mobile Card Terminal, MobCT"
pdf_data/report_metadata//ModDate D:20180710142720+02'00'
pdf_data/report_metadata//Producer GPL Ghostscript 9.02 LibreOffice 5.2
pdf_data/report_metadata//Subject ZEMO VML-GK2, FW-Version 3.1.0, HW-Version 2.0.0, ZEMO GmbH
pdf_data/report_metadata//Title ANSSI-CC-2016-15 Certification Report BSI-DSZ-CC-0623-V2-2018
pdf_data/report_metadata/pdf_file_size_bytes 571547 1240729
pdf_data/report_metadata/pdf_hyperlinks https://www.bsi.bund.de/zertifizierung, https://zemo.de/vmlgk-downloads/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
pdf_data/report_metadata/pdf_number_of_pages 15 26
pdf_data/st_filename ANSSI_cible2016_15en.pdf 0623V2b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 1
    • RSA 1024: 1
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
    • ECC:
      • ECC: 21
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0623: 2
pdf_data/st_keywords/cc_claims
  • O:
    • O.C: 5
    • O.DAC: 1
    • O.ECDAA: 2
  • R:
    • R.O: 5
  • OE:
    • OE.ECDAA: 2
  • OSP:
    • OSP.ECDAA: 2
  • O:
    • O.PIN: 6
    • O.RESIDUAL: 6
    • O.SELFTESTS: 5
    • O.PROTECTION: 8
    • O.AUTH_STATE: 8
    • O.MANAGEMENT: 8
    • O.LOG_CARDS: 3
    • O.LOG_DATA: 5
    • O.TRANSFER: 3
    • O.DMS_CONNECT: 1
    • O.TIME: 5
    • O.SEALING: 3
    • O.DMS_CONNECTION: 4
  • T:
    • T.MAN_HW: 3
    • T.DATA: 3
    • T.ACCESS: 3
    • T.AUTH_STATE: 3
    • T.ADMIN_PIN: 3
    • T.FIRMWARE: 3
  • A:
    • A.MEDIC: 3
    • A.ADMIN: 3
    • A.CARDS: 4
    • A.DMS: 3
    • A.PHYSICAL: 3
    • A.ENVIRONMENT: 3
  • OE:
    • OE.MEDIC: 9
    • OE.ADMIN: 9
    • OE.CARDS: 7
    • OE.DMS: 4
    • OE.PHYSICAL: 5
    • OE.ENVIRONMENT: 6
    • OE.DEVELOPER: 1
  • OSP:
    • OSP.LOG_DATA: 3
    • OSP.TRANSFER: 3
    • OSP.DMS_CONNE: 1
    • OSP.TIME: 3
    • OSP.SEALING: 3
    • OSP.SELFTESTS: 3
    • OSP.EMERGENCY_: 1
    • OSP.LOG_CARD: 1
    • OSP.DMS_CONN: 1
    • OSP.EMERGENC: 1
    • OSP.LOG_CARDS: 1
    • OSP.DMS_CONNECTION: 1
    • OSP.EMERGENCY_DATA: 1
pdf_data/st_keywords/cc_claims/O
  • O.C: 5
  • O.DAC: 1
  • O.ECDAA: 2
  • O.PIN: 6
  • O.RESIDUAL: 6
  • O.SELFTESTS: 5
  • O.PROTECTION: 8
  • O.AUTH_STATE: 8
  • O.MANAGEMENT: 8
  • O.LOG_CARDS: 3
  • O.LOG_DATA: 5
  • O.TRANSFER: 3
  • O.DMS_CONNECT: 1
  • O.TIME: 5
  • O.SEALING: 3
  • O.DMS_CONNECTION: 4
pdf_data/st_keywords/cc_claims/OE
  • OE.ECDAA: 2
  • OE.MEDIC: 9
  • OE.ADMIN: 9
  • OE.CARDS: 7
  • OE.DMS: 4
  • OE.PHYSICAL: 5
  • OE.ENVIRONMENT: 6
  • OE.DEVELOPER: 1
pdf_data/st_keywords/cc_claims/OSP
  • OSP.ECDAA: 2
  • OSP.LOG_DATA: 3
  • OSP.TRANSFER: 3
  • OSP.DMS_CONNE: 1
  • OSP.TIME: 3
  • OSP.SEALING: 3
  • OSP.SELFTESTS: 3
  • OSP.EMERGENCY_: 1
  • OSP.LOG_CARD: 1
  • OSP.DMS_CONN: 1
  • OSP.EMERGENC: 1
  • OSP.LOG_CARDS: 1
  • OSP.DMS_CONNECTION: 1
  • OSP.EMERGENCY_DATA: 1
pdf_data/st_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2015/07: 1
  • BSI:
    • BSI-CC-PP-0052: 2
    • BSI-CC-PP-0032: 1
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 3
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.4: 3
  • ADV:
    • ADV_FSP.4: 5
    • ADV_IMP.1: 5
    • ADV_TDS.3: 5
    • ADV_ARC.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_TAT.1: 5
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 3
  • ALC_DVS.2: 3
  • ALC_TAT.1: 5
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.4: 3
  • AVA_VAN.5: 8
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 4: 1
  • EAL4: 2
  • EAL 4 augmented: 1
  • EAL4 augmented: 1
  • EAL3+: 2
  • EAL 3: 4
  • EAL 3 augmented: 3
pdf_data/st_keywords/cc_sfr
  • FCO:
    • FCO_NRO: 4
    • FCO_NRO.1: 6
  • FCS:
    • FCS_RNG.1: 2
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_CKM: 8
    • FCS_CKM.2: 4
    • FCS_COP.1: 12
    • FCS_CKM.4: 14
    • FCS_CKM.1: 13
    • FCS_CKM.4.1: 1
    • FCS_COP: 16
    • FCS_RNG.2: 1
  • FDP:
    • FDP_ACC.1: 34
    • FDP_IFC.1: 19
    • FDP_RIP.1: 2
    • FDP_RIP.1.1: 1
    • FDP_ITC.1: 12
    • FDP_ITC.2: 14
    • FDP_ACC: 14
    • FDP_ACF.1: 35
    • FDP_ACC.2: 2
    • FDP_ACF: 17
    • FDP_UIT: 8
    • FDP_UIT.1: 4
    • FDP_SDI.1: 2
    • FDP_SDI.1.1: 1
    • FDP_ETC: 4
    • FDP_ETC.2: 4
    • FDP_ITC: 4
    • FDP_UCT: 6
    • FDP_UCT.1: 2
    • FDP_ETC.1: 2
  • FIA:
    • FIA_UID.1: 6
    • FIA_SOS.2: 2
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_AFL: 4
    • FIA_UAU.1: 4
    • FIA_AFL.1: 4
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 2
    • FIA_UAU.6.1: 1
    • FIA_USB.1: 2
    • FIA_ATD.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 4
    • FMT_MSA.1: 15
    • FMT_MSA.2.1: 1
    • FMT_MSA: 34
    • FMT_MSA.4: 3
    • FMT_MTD: 4
    • FMT_MTD.1: 2
    • FMT_MSA.3: 22
    • FMT_MOF: 2
    • FMT_MOF.1: 1
  • FPT:
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
    • FPT_TST.1: 4
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_FLS: 6
    • FPT_FLS.1: 2
    • FPT_PHP.3: 2
    • FPT_PHP.3.1: 1
    • FPT_TDC.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
    • FTP_ITC: 2
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FCS:
    • FCS_COP.1: 6
    • FCS_CKM.1: 23
    • FCS_CKM.4: 22
    • FCS_COP: 31
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4.1: 1
  • FDP:
    • FDP_SVR: 2
    • FDP_ACF.1: 26
    • FDP_ACF.1.2: 5
    • FDP_ACF.1.4: 6
    • FDP_IFC: 35
    • FDP_IFF: 37
    • FDP_SVR.1.1: 5
    • FDP_SVR.1: 12
    • FDP_SVR.1.2: 3
    • FDP_SVR.1.3: 3
    • FDP_ACC.1: 30
    • FDP_ITC.1: 21
    • FDP_RIP: 15
    • FDP_SDI.2: 9
    • FDP_ITC.2: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.3: 1
    • FDP_IFC.1: 10
    • FDP_IFF.1: 19
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 2
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_SDI.1: 1
  • FIA:
    • FIA_AFL.1.1: 2
    • FIA_UID.1: 19
    • FIA_UAU.1: 15
    • FIA_AFL.1: 10
    • FIA_SOS.1: 8
    • FIA_UAU.5: 11
    • FIA_UAU.7: 10
    • FIA_AFL.1.2: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.7.1: 2
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 12
    • FMT_MSA.3: 24
    • FMT_MTD.1: 11
    • FMT_MTD.3: 8
    • FMT_SMF.1: 14
    • FMT_SMR.1: 20
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_MTD.3.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_PHP.1: 7
    • FPT_STM.1: 12
    • FPT_TST.1: 7
    • FPT_STM.1.1: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.4: 10
    • FTA_SSL.3.1: 2
    • FTA_SSL.4.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG.1: 2
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_CKM: 8
  • FCS_CKM.2: 4
  • FCS_COP.1: 12
  • FCS_CKM.4: 14
  • FCS_CKM.1: 13
  • FCS_CKM.4.1: 1
  • FCS_COP: 16
  • FCS_RNG.2: 1
  • FCS_COP.1: 6
  • FCS_CKM.1: 23
  • FCS_CKM.4: 22
  • FCS_COP: 31
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 2
  • FCS_CKM.4.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 13 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 4 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 14 22
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 16 31
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 12 6
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 34
  • FDP_IFC.1: 19
  • FDP_RIP.1: 2
  • FDP_RIP.1.1: 1
  • FDP_ITC.1: 12
  • FDP_ITC.2: 14
  • FDP_ACC: 14
  • FDP_ACF.1: 35
  • FDP_ACC.2: 2
  • FDP_ACF: 17
  • FDP_UIT: 8
  • FDP_UIT.1: 4
  • FDP_SDI.1: 2
  • FDP_SDI.1.1: 1
  • FDP_ETC: 4
  • FDP_ETC.2: 4
  • FDP_ITC: 4
  • FDP_UCT: 6
  • FDP_UCT.1: 2
  • FDP_ETC.1: 2
  • FDP_SVR: 2
  • FDP_ACF.1: 26
  • FDP_ACF.1.2: 5
  • FDP_ACF.1.4: 6
  • FDP_IFC: 35
  • FDP_IFF: 37
  • FDP_SVR.1.1: 5
  • FDP_SVR.1: 12
  • FDP_SVR.1.2: 3
  • FDP_SVR.1.3: 3
  • FDP_ACC.1: 30
  • FDP_ITC.1: 21
  • FDP_RIP: 15
  • FDP_SDI.2: 9
  • FDP_ITC.2: 9
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.3: 1
  • FDP_IFC.1: 10
  • FDP_IFF.1: 19
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_RIP.1: 2
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_SDI.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 34 30
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 35 26
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 19 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 12 21
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 14 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 2 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.1: 6
  • FIA_SOS.2: 2
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_AFL: 4
  • FIA_UAU.1: 4
  • FIA_AFL.1: 4
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.5: 2
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 2
  • FIA_UAU.6.1: 1
  • FIA_USB.1: 2
  • FIA_ATD.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1.1: 2
  • FIA_UID.1: 19
  • FIA_UAU.1: 15
  • FIA_AFL.1: 10
  • FIA_SOS.1: 8
  • FIA_UAU.5: 11
  • FIA_UAU.7: 10
  • FIA_AFL.1.2: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.7.1: 2
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 4 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 4 15
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5 2 11
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 6 19
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMR.1: 20
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1: 12
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 4
  • FMT_MSA.1: 15
  • FMT_MSA.2.1: 1
  • FMT_MSA: 34
  • FMT_MSA.4: 3
  • FMT_MTD: 4
  • FMT_MTD.1: 2
  • FMT_MSA.3: 22
  • FMT_MOF: 2
  • FMT_MOF.1: 1
  • FMT_MSA.1: 12
  • FMT_MSA.3: 24
  • FMT_MTD.1: 11
  • FMT_MTD.3: 8
  • FMT_SMF.1: 14
  • FMT_SMR.1: 20
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_MTD.3.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 15 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 22 24
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 2 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 12 14
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 2
  • FPT_STM.1.1: 1
  • FPT_TST.1: 4
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_FLS: 6
  • FPT_FLS.1: 2
  • FPT_PHP.3: 2
  • FPT_PHP.3.1: 1
  • FPT_TDC.1: 1
  • FPT_PHP.1: 7
  • FPT_STM.1: 12
  • FPT_TST.1: 7
  • FPT_STM.1.1: 1
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 2 12
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 4 7
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 5
  • FTP_TRP.1: 5
  • FTP_ITC: 2
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_ITC.1: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 5 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • done by an authorised card that is out of scope of this ST: 1
    • the TOE • Signature generation for emergency data1 on the eHC (done by an authorised card that is out of scope of this ST) 1.4.6 Physical Protection of the TOE The TOE cannot counter physical attacks concerning: 1
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 2
  • CFB:
    • CFB: 2
  • OFB:
    • OFB: 2
  • GCM:
    • GCM: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 6
    • SHA1: 1
  • SHA2:
    • SHA-256: 8
  • SHA2:
    • SHA256: 1
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 8
  • SHA256: 1
pdf_data/st_keywords/javacard_packages
  • com:
    • com.tw: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 18
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
  • FI:
    • Physical Tampering: 2
    • physical tampering: 2
    • malfunction: 2
    • Malfunction: 2
  • FI:
    • physical tampering: 6
pdf_data/st_keywords/side_channel_analysis/FI
  • Physical Tampering: 2
  • physical tampering: 2
  • malfunction: 2
  • Malfunction: 2
  • physical tampering: 6
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 2 6
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS140-2: 2
    • FIPS 186-3: 7
    • FIPS 140-2: 3
    • FIPS 180-4: 1
    • FIPS 198-1: 2
    • FIPS 180: 1
    • FIPS PUB 180-2: 1
    • FIPS180-4: 1
    • FIPS186-4: 1
    • FIPS PUB 186-4: 1
    • FIPS198-1: 1
    • FIPS 197: 2
    • FIPS 180-1: 1
  • NIST:
    • NIST SP 800-90A: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS #1: 2
  • BSI:
    • AIS31: 1
  • RFC:
    • RFC 3447: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 14888-3: 1
    • ISO/IEC 9797-2: 1
    • ISO/IEC 18033-3: 1
    • ISO/IEC 15946-1: 1
    • ISO/IEC 10116:2006: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • X509:
    • X.509: 9
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
      • AES-: 1
  • constructions:
    • MAC:
      • HMAC: 27
  • AES_competition:
    • AES:
      • AES: 5
    • HPC:
      • HPC: 13
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 9
    • AES-: 1
  • AES:
    • AES: 5
  • HPC:
    • HPC: 13
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES
  • AES: 9
  • AES-: 1
  • AES: 5
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 9 5
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 1498848
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 87
  • /Title: Developer Document
  • /Author: Karsten Grans
  • /Subject: Security Target
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20160712145056+03'00'
  • /ModDate: D:20160712145056+03'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks: http://www.nuvoton.com.tw/, http://www.nuvoton.com/, mailto:[email protected], https://www.trustedcomputinggroup.org/home, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States, http://www.rsa.com/
  • pdf_file_size_bytes: 2621577
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 76
  • /Title: ZEMO VML-GK2 ORS.1/OPB.1 Security Target
  • /Subject: ZEMO VML-GK2 CC 3.1-Evaluierung
  • /Creator: Writer
  • /Producer: LibreOffice 5.4
  • /CreationDate: D:20180604110207+02'00'
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20160712145056+03'00' D:20180604110207+02'00'
pdf_data/st_metadata//Creator Microsoft® Word 2010 Writer
pdf_data/st_metadata//Producer Microsoft® Word 2010 LibreOffice 5.4
pdf_data/st_metadata//Subject Security Target ZEMO VML-GK2 CC 3.1-Evaluierung
pdf_data/st_metadata//Title Developer Document ZEMO VML-GK2 ORS.1/OPB.1 Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1498848 2621577
pdf_data/st_metadata/pdf_hyperlinks http://www.nuvoton.com.tw/, http://www.nuvoton.com/, mailto:[email protected], https://www.trustedcomputinggroup.org/home, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States, http://www.rsa.com/
pdf_data/st_metadata/pdf_number_of_pages 87 76
dgst b3ff38274b146d8f 05e617901b9f2ac8