Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Oracle Linux 9.3
653-EWA
Giesecke+Devrient Sm@rtCafé® Expert 8.0 C2
NSCIB-CC-2300006-01-CR
name Oracle Linux 9.3 Giesecke+Devrient Sm@rtCafé® Expert 8.0 C2
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA NL
not_valid_after 14.02.2030 24.05.2028
not_valid_before 14.02.2025 24.05.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/653-EWA%20CT%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01.1-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/653-EWA%20CR%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/653-EWA%20ST%20v1.5.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01-ST.pdf
manufacturer Oracle Corporation G+D Mobile Security GmbH
manufacturer_web https://www.oracle.com https://www.gi-de.com/de/de/mobile-security/
security_level {} EAL6+, ALC_FLR.1
dgst be8e046b00e33ce3 e9c4587f626324cd
heuristics/cert_id 653-EWA NSCIB-CC-2300006-01-CR
heuristics/cert_lab []
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_REQ.2, ADV_INT.3, ASE_INT.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 9.3 8.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/scheme_data
  • certification_date: 14.02.2025
  • level: PP_OS_V4.3, PKG_TLS_V1.1, PKG_SSH_V1.0
  • product: Oracle Linux 9.3
  • vendor: Oracle Corporation
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/protection_profiles c40ae795865a0dba, ed9c9d74c3710878, 3d6ad6fde534f6c6 7f886b64878b68c1
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf
pdf_data/cert_filename 653-EWA CT v1.0.pdf NSCIB-CC-2300006-01.1-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 653-EWA: 1
  • NL:
    • CC-22-0289065: 1
    • NSCIB-2300006-01: 1
    • NSCIB-CC-23-2300006-01: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-V2-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.3: 1
pdf_data/cert_keywords/vendor
  • GD:
    • Giesecke+Devrient: 1
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 18045:2008: 1
pdf_data/cert_metadata
  • /Author: Clark, Cory P.
  • /CreationDate: D:20250218135452-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: 03c3dcc6-6bfd-4194-a625-fb83b8d0389e
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2023-05-16T11:46:20Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250218135452-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 185393
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Denise Cater
  • /CreationDate: D:20230813222000+01'00'
  • /Creator: Microsoft® Word 2021
  • /ModDate: D:20230813222000+01'00'
  • /Producer: Microsoft® Word 2021
  • /Title: NSCIB Certificate
  • pdf_file_size_bytes: 94099
  • pdf_hyperlinks: https://www.tuv-nederland.nl/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 653-EWA CR v1.0.pdf NSCIB-CC-2300006-01-CR.pdf
pdf_data/report_frontpage
  • NL:
  • CA:
  • NL:
    • cert_id: NSCIB-CC-2300006-01-CR
    • cert_item: Sm@rtCafé® Expert 8.0 C2
    • cert_lab: SGS Brightsight B.V.
    • developer: Giesecke+Devrient Mobile Security GmbH
  • CA:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-V3-2022: 2
  • NL:
    • NSCIB-2300006-01: 1
    • NSCIB-CC-2300006-01-CR: 13
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL4: 1
    • EAL5+: 1
    • EAL6: 2
    • EAL6 augmented: 2
    • EAL6+: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_FLR.1: 3
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 3
pdf_data/report_keywords/vendor
  • GD:
    • G&D: 4
    • Giesecke+Devrient: 4
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • BrightSight:
    • Brightsight: 3
  • SGS:
    • SGS: 3
    • SGS Brightsight: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CBC-MAC: 3
      • CMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
    • EdDSA:
      • EdDSA: 1
  • RSA:
    • RSA-CRT: 2
    • RSA-PSS: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 3
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • side-channel: 1
  • other:
    • JIL: 2
    • JIL-AAPS: 2
    • JIL-AM: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. The user of the OS is not willfully negligent or hostile, and uses the software in: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: Clark, Cory P.
  • /CreationDate: D:20250218133709-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: f4235719-a1a3-4fb4-8b18-a47ac84bac11
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2022-07-20T10:41:47Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250218133709-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 336111
  • pdf_hyperlinks: https://www.cisa.gov/known-exploited-vulnerabilities-catalog, mailto:[email protected], https://linux.oracle.com/security/, https://nvd.nist.gov/vuln/search
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename 653-EWA ST v1.5.pdf NSCIB-CC-2300006-01-ST.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-V3-2022: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0099-V2-2020: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4+: 1
    • EAL 6: 3
    • EAL 6 augmented: 2
    • EAL 6+: 1
    • EAL6: 4
    • EAL6 augmented: 2
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
    • ALC_TSU_EXT.1: 8
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC: 5
    • ADV_ARC.1: 5
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 3
    • ADV_FSP.5: 9
    • ADV_IMP.1: 6
    • ADV_IMP.2: 2
    • ADV_INT.3: 1
    • ADV_SPM.1: 3
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 1
    • ADV_TDS.5: 6
  • AGD:
    • AGD_OPE.1: 7
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.5: 3
    • ALC_CMS.1: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 4
    • ALC_FLR.1: 6
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 3
    • ASE_INT.2: 2
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
    • ATE_FUN.2: 1
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 1
  • FCS:
    • FCS_CKM.1: 4
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 9
    • FCS_CKM_EXT.4.1: 3
    • FCS_CKM_EXT.4.2: 2
    • FCS_COP: 27
    • FCS_COP.1: 4
    • FCS_DTLS_EXT.1: 1
    • FCS_RBG_EXT.1: 8
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SSHC_EXT.1: 10
    • FCS_SSHC_EXT.1.1: 2
    • FCS_SSHS_EXT.1: 8
    • FCS_SSHS_EXT.1.1: 2
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSH_EXT.1: 10
    • FCS_SSH_EXT.1.1: 2
    • FCS_SSH_EXT.1.2: 4
    • FCS_SSH_EXT.1.3: 3
    • FCS_SSH_EXT.1.4: 3
    • FCS_SSH_EXT.1.5: 3
    • FCS_SSH_EXT.1.6: 3
    • FCS_SSH_EXT.1.7: 3
    • FCS_SSH_EXT.1.8: 3
    • FCS_STO_EXT.1: 10
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 11
    • FCS_TLSC_EXT.1.1: 3
    • FCS_TLSC_EXT.1.2: 3
    • FCS_TLSC_EXT.1.3: 3
    • FCS_TLSC_EXT.5: 7
    • FCS_TLSC_EXT.5.1: 3
    • FCS_TLSS_EXT: 5
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLS_EXT.1: 3
  • FDP:
    • FDP_ACF_EXT.1: 8
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT.1: 7
    • FDP_IFC_EXT.1.1: 2
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 7
    • FMT_MOF_EXT.1.1: 2
    • FMT_SMF_EXT.1: 7
    • FMT_SMF_EXT.1.1: 4
  • FPT:
    • FPT_ACF_EXT.1: 7
    • FPT_ACF_EXT.1.1: 2
    • FPT_ACF_EXT.1.2: 2
    • FPT_ASLR_EXT.1: 7
    • FPT_ASLR_EXT.1.1: 2
    • FPT_SBOP_EXT.1: 7
    • FPT_SBOP_EXT.1.1: 2
    • FPT_TST_EXT.1: 8
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT.1: 8
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.2: 7
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
  • FTP:
    • FTP_ITC_EXT.1: 7
    • FTP_ITC_EXT.1.1: 2
    • FTP_TRP: 1
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP.1: 21
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 3
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 7
    • FCS_CKM.1: 36
    • FCS_CKM.2: 4
    • FCS_CKM.4: 29
    • FCS_CKM.4.1: 1
    • FCS_COP: 8
    • FCS_COP.1: 118
    • FCS_RNG: 5
    • FCS_RNG.1: 13
    • FCS_RNG.1.1: 5
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 30
    • FDP_ACC.1: 11
    • FDP_ACC.2: 5
    • FDP_ACF: 29
    • FDP_ACF.1: 13
    • FDP_IFC: 31
    • FDP_IFC.1: 13
    • FDP_IFC.2: 2
    • FDP_IFF: 23
    • FDP_IFF.1: 17
    • FDP_ITC: 12
    • FDP_ITC.1: 8
    • FDP_ITC.2: 20
    • FDP_ITT.1: 1
    • FDP_RIP: 139
    • FDP_RIP.1: 11
    • FDP_ROL: 16
    • FDP_ROL.1: 5
    • FDP_SDC.1: 2
    • FDP_SDI: 15
    • FDP_SDI.2: 4
    • FDP_UIT: 9
    • FDP_UIT.1: 2
  • FIA:
    • FIA_API.1: 1
    • FIA_ATD: 10
    • FIA_ATD.1: 2
    • FIA_UID: 16
    • FIA_UID.1: 9
    • FIA_UID.2: 1
    • FIA_USB: 9
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 4
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA: 101
    • FMT_MSA.1: 10
    • FMT_MSA.2: 2
    • FMT_MSA.3: 17
    • FMT_MTD: 22
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_SMF: 22
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR: 35
    • FMT_SMR.1: 32
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 10
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 39
    • FPT_FLS.1: 21
    • FPT_FLS.1.1: 2
    • FPT_ITT.1: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 3
    • FPT_RCV: 13
    • FPT_RCV.3: 10
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 2
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.PLATFORM: 3
    • A.PROPER_ADMIN: 3
    • A.PROPER_USER: 3
  • O:
    • O.ACCOUNTABILITY: 3
    • O.INTEGRITY: 5
    • O.MANAGEMENT: 5
    • O.PROTECTED_COMMS: 5
    • O.PROTECTED_STORAGE: 3
  • OE:
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 2
    • T.LOCAL_ATTACK: 2
    • T.NETWORK_ATTACK: 6
    • T.NETWORK_EAVESDROP: 4
  • A:
    • A.CAP_FILE: 6
    • A.DELETION: 7
    • A.VERIFICATION: 6
  • D:
    • D.APP_CODE: 1
    • D.APP_I_DATA: 2
    • D.CRYPTO: 2
    • D.PIN: 1
    • D.SEC_DATA: 1
  • O:
    • O.AES: 1
    • O.ALARM: 22
    • O.APPLET: 16
    • O.ARRAY_VIEWS_CONFID: 11
    • O.ARRAY_VIEWS_INTEG: 9
    • O.CARD-: 6
    • O.CARD-MANAGEMENT: 27
    • O.CIPHER: 15
    • O.CODE_CAP: 1
    • O.CODE_CAP_: 1
    • O.CODE_CAP_FILE: 12
    • O.DELETION: 17
    • O.FIREWALL: 43
    • O.GLOBAL_ARRAYS: 1
    • O.GLOBAL_ARRAYS_CONFID: 19
    • O.GLOBAL_ARRAYS_INTEG: 9
    • O.INSTALL: 16
    • O.JAVAOBJEC: 1
    • O.JAVAOBJECT: 46
    • O.KEY-: 8
    • O.KEY-MNGT: 15
    • O.LOAD: 19
    • O.NATIVE: 14
    • O.OBJ-DELETION: 9
    • O.OPERATE: 36
    • O.PIN-: 5
    • O.PIN-MNGT: 18
    • O.PINMNGT: 1
    • O.REALLOCATION: 18
    • O.RESOURCES: 23
    • O.RND: 4
    • O.RNG: 11
    • O.SCP: 64
    • O.SID: 33
    • O.TDES: 2
    • O.TRANSACTION: 19
  • OE:
    • OE.CAP_FILE: 9
    • OE.CARD-MANAGEMENT: 6
    • OE.CODE-: 5
    • OE.CODE-EVIDENCE: 15
    • OE.SCP: 13
    • OE.VERIFICATION: 38
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 4
    • OP.ARRAY_LENGTH: 4
    • OP.ARRAY_T_ALOAD: 2
    • OP.ARRAY_T_ASTORE: 3
    • OP.ARRAY_T_LOAD: 1
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_CAP_FILE: 3
    • OP.DELETE_CAP_FILE_APPLET: 3
    • OP.INSTANCE_FIELD: 3
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 6
    • OP.PUT: 5
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.VERIFICATION: 7
  • R:
    • R.JAVA: 14
  • T:
    • T.CONFID-: 8
    • T.CONFID-APPLI-: 1
    • T.CONFID-APPLI-DATA: 17
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 4
    • T.EXE-CODE: 6
    • T.EXECODE: 1
    • T.INSTALL: 5
    • T.INTEG-: 10
    • T.INTEG-APPLI-: 4
    • T.INTEG-APPLI-CODE: 5
    • T.INTEG-APPLI-DATA: 13
    • T.INTEG-JCS-: 2
    • T.INTEG-JCS-CODE: 4
    • T.INTEG-JCS-DATA: 3
    • T.INTEG-JCSCODE: 1
    • T.INTEGAPPLI-CODE: 2
    • T.INTEGAPPLI-DATA: 1
    • T.INTEGJCS-DATA: 6
    • T.NATIVE: 5
    • T.OBJ-DELETION: 2
    • T.OBJDELETION: 1
    • T.PHYSICAL: 3
    • T.RESOURCES: 7
    • T.SECURE_DELETION: 8
    • T.SID: 16
pdf_data/st_keywords/vendor
  • GD:
    • G&D: 10
    • G+D: 6
    • Giesecke+Devrient: 8
  • Infineon:
    • Infineon: 1
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
      • AES-: 1
  • constructions:
    • MAC:
      • HMAC: 8
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 29
    • RC:
      • RC2: 1
  • DES:
    • 3DES:
      • 3-DES: 7
      • 3DES: 3
      • TDEA: 1
      • TDES: 3
      • Triple-DES: 4
    • DES:
      • DES: 14
  • constructions:
    • MAC:
      • CBC-MAC: 10
      • CMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
  • ECC:
    • ECC:
      • ECC: 9
    • ECDH:
      • ECDH: 9
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • Diffie-Hellman: 2
  • RSA:
    • RSA-CRT: 12
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 10
      • SHA-384: 8
      • SHA-512: 9
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 3
      • SHA-256: 4
      • SHA-384: 4
      • SHA-512: 4
    • SHA3:
      • SHA-3: 1
      • SHA-3-224: 3
      • SHA-3-256: 3
      • SHA-3-384: 2
      • SHA-3-512: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 10
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSH: 73
    • SSHv2: 1
  • TLS:
    • DTLS:
      • DTLS: 2
    • TLS:
      • TLS: 50
      • TLS 1.1: 1
      • TLS 1.2: 3
      • TLS v1.2: 5
  • VPN:
    • VPN: 11
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 6
  • RNG:
    • RBG: 5
  • RNG:
    • RND: 4
    • RNG: 17
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 4
  • GCM:
    • GCM: 4
  • CBC:
    • CBC: 6
  • CFB:
    • CFB: 5
  • CTR:
    • CTR: 5
  • ECB:
    • ECB: 9
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-384: 14
    • P-521: 10
    • secp384r1: 4
    • secp521r1: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 16
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • physical tampering: 5
  • SCA:
    • Leak-Inherent: 2
    • physical probing: 1
  • other:
    • JIL: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 186-5: 12
  • NIST:
    • NIST SP 800-38A: 9
    • NIST SP 800-38D: 3
    • NIST SP 800-57: 4
    • SP 800-186: 1
  • RFC:
    • RFC 3526: 1
    • RFC 4251: 4
    • RFC 4252: 8
    • RFC 4253: 13
    • RFC 4256: 1
    • RFC 4344: 5
    • RFC 5246: 9
    • RFC 5280: 5
    • RFC 5288: 7
    • RFC 5289: 14
    • RFC 5647: 6
    • RFC 5656: 40
    • RFC 5759: 1
    • RFC 6066: 1
    • RFC 6125: 3
    • RFC 6187: 12
    • RFC 6668: 8
    • RFC 6960: 1
    • RFC 6961: 1
    • RFC 8268: 5
    • RFC 8332: 24
    • RFC 8603: 2
    • RFC 8709: 6
    • RFC 8731: 2
  • X509:
    • X.509: 16
  • BSI:
    • AIS 20: 1
    • AIS 31: 2
    • AIS20: 7
    • AIS31: 5
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 186-4: 7
    • FIPS 197: 10
    • FIPS PUB 202: 4
    • FIPS180-4: 3
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS1: 12
    • PKCS3: 1
    • PKCS5: 3
  • RFC:
    • RFC 4056: 1
    • RFC 5639: 1
    • RFC5639: 5
  • SCP:
    • SCP02: 4
    • SCP03: 3
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 5
    • javacard.framework.applet: 1
    • javacard.security: 7
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
  • OutOfScope:
    • 3 [AIS20],[AIS31]12 that implements13 : 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10: 1
    • 384, 521}r1[SEC2], brainpoolP{224, 256, 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Giesecke+Devrient MS Security Target Sm@rtCafé® Expert 8.0 C2/Version 4.0/Status 10.05: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 5
    • with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Giesecke+Devrient MS Security Target Sm@rtCafé® Expert 8.0 C2/Version 4.0/Status 10.05: 1
pdf_data/st_metadata
  • /Author: G+D MS / stut
  • /CreationDate: D:20230510174501+02'00'
  • /Creator: Microsoft® Word für Microsoft 365
  • /Keywords: Version 4.0/Status 10.05.2023
  • /ModDate: D:20230510174501+02'00'
  • /Producer: Microsoft® Word für Microsoft 365
  • /Subject: Sm@rtCafé® Expert 8.0 C2
  • /Title: Giesecke+Devrient MS Security Target
  • pdf_file_size_bytes: 1811883
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 134
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different