Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8
JISEC-CC-CRP-C0475
SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4)
2021-44-INF-4142
name Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8 SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4)
category Databases ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP ES
status archived active
not_valid_after 01.07.2020 15.09.2028
not_valid_before 16.06.2015 15.09.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-44_Certificado.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-44%20INF-4142.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-44%20ST_LITE.pdf
manufacturer Microsoft Corporation HID Global
manufacturer_web https://www.microsoft.com https://www.hidglobal.com/
security_level EAL2+, ALC_FLR.2 EAL5+, ALC_DVS.2, AVA_VAN.5
dgst c225189611bed8f2 bc4d951be8b140b2
heuristics/cert_id JISEC-CC-CRP-C0475 2021-44-INF-4142
heuristics/extracted_sars ALC_CMS.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 12.0.2000.8 4
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0891-V6-2021
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V6-2021, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0891-V2-2016
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0475
  • certification_date: 01.06.2015
  • claim: EAL2+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0475_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2014. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functionality This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE. - The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users. - The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
    • evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
    • product: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)
    • product_type: Database Management System (DBMS)
    • protection_profile: U.S. Government Protection Profile for Database Management Systems, Version 1.3
    • report_link: https://www.ipa.go.jp/en/security/c0475_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0475_est.pdf
    • toe_version: 12.0.2000.8
    • vendor: Microsoft Corporation
  • expiration_date: 01.07.2020
  • supplier: Microsoft Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0475_it3480.html
  • toe_overseas_name: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8
  • category: Smart Cards and similiar devices
  • certification_date: 15.09.2023
  • enhanced:
    • category: Smart Cards and similiar devices
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1828
    • certification_date: 15.09.2023
    • description: The TOE is an electronic document representing a contactless/contact smart card programmed according to the “Password Authenticated Connection Establishment” mechanism described in the ICAO Doc 9303 8th edition 2021 Part 11, which means amongst others according to the Logical Data Structure (LDS) defined in, and additionally providing the Extended Access Control according to the ICAO Doc 9303-11 and BSI TR-03110. The communication between terminal and chip shall be protected by PACE using Standard Inspection Procedure with PACE (PACE PP), BSI-CC-PP-0068-V2. The TOE is composed of: the circuitry of the dual interface e-Document’s chip M7892 G12, the IC Dedicated Software with the parts IC Dedicated Test Software and IC Dedicated Support Software, smart card operating system SOMA-c007 version 4, an ICAO application LDS1 compliant with ICAO Doc 9303- and Doc 9303-11 providing the Extended Access Control, the associated guidance documentation.
    • evaluation_facility: Applus Laboratories
    • level: EAL5 + ALC_DVS.2 + AVA_VAN.5
    • manufacturer: Hid Global
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1829
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1827
    • type: Product
  • manufacturer: Hid Global
  • product: SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4)
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/992-soma-c007-machine-readable-electronic-document-eac-pace-aa-version-4-soma-c007-4
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0891-V6-2021
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0891-V6-2021
heuristics/protection_profiles 61018742063aaca9 a33327d40f253f46, b380aabf93b29692
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_dbms_v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf
pdf_data/cert_filename 2021-44_Certificado.pdf
pdf_data/cert_keywords/cc_cert_id
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ICAO:
    • ICAO: 1
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20230904141112+02'00'
  • /ModDate: D:20230904141112+02'00'
  • /Producer: GPL Ghostscript 9.27
  • pdf_file_size_bytes: 509376
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0475_erpt.pdf 2021-44 INF-4142.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0475-01: 1
    • Certification No. C0475: 1
  • DE:
    • BSI-DSZ-CC-0891-V6-2021: 1
  • ES:
    • 2021-44-INF-4142- v1: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012: 2
    • BSI-CC-PP-0068-V2: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
    • EAL2+: 2
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL5: 8
    • EAL5+: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DVS.2: 9
    • ALC_FLR: 3
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 9
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_EVIL: 1
    • A.NO_GENERAL_: 1
    • A.PHYSICAL: 1
  • T:
    • T.ACCIDENTIAL_ADMIN_ERROR: 1
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_: 1
    • T.UNIDENTIFIED_: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 20
    • Microsoft Corporation: 7
  • Infineon:
    • Infineon: 1
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
  • Applus:
    • Applus Laboratories: 7
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • Triple-DES: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 10
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • ICAO:
    • ICAO: 20
pdf_data/report_metadata
  • /CreationDate: D:20150724094408+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20150724094442+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 233021
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 31
  • /Author: 9308
  • /CreationDate: D:20230918155842+02'00'
  • /Creator: Microsoft® Word LTSC
  • /ModDate: D:20230918155842+02'00'
  • /Producer: Microsoft® Word LTSC
  • pdf_file_size_bytes: 393202
  • pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename c0475_est.pdf 2021-44 ST_LITE.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0891-V6-2021: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012: 2
    • BSI-CC-PP-0068-V2-2011-MA-01: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
    • EAL2: 2
    • EAL2 augmented: 2
    • EAL2+: 51
  • EAL:
    • EAL 5: 1
    • EAL5: 5
    • EAL5+: 3
    • EAL6: 2
    • EAL6 augmented: 1
    • EAL6+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 1
  • AGD:
    • AGD_ADD: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 4
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 4
    • ADV_FSP: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_IMP: 1
    • ADV_IMP.1: 3
    • ADV_INT.2: 2
    • ADV_TDS: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 3
    • AGD_PRE: 1
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 2
    • ALC_CMS: 1
    • ALC_CMS.5: 2
    • ALC_DEL: 1
    • ALC_DEL.1: 3
    • ALC_DVS: 1
    • ALC_DVS.2: 6
    • ALC_FLR.1: 1
    • ALC_LCD: 1
    • ALC_LCD.1: 2
    • ALC_TAT: 1
    • ALC_TAT.2: 2
  • APE:
    • APE_SRE: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.3: 2
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 10
    • FAU_GEN.1: 3
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SEL: 8
    • FAU_SEL.1: 2
    • FAU_STG: 3
    • FAU_STG.1: 2
    • FAU_STG.3: 1
    • FAU_STG.4: 1
    • FAU_STG_EXP: 2
    • FAU_STG_EXP.5: 15
    • FAU_STG_EXP.5.1: 2
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF: 8
    • FDP_ACF.1: 6
    • FDP_IFC.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 16
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTA:
    • FTA_MCS.1: 6
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TAH.1: 8
    • FTA_TAH.1.1: 1
    • FTA_TAH.1.2: 1
    • FTA_TAH.1.3: 1
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 7
    • FAU_SAS.1: 14
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 61
    • FCS_CKM.1: 24
    • FCS_CKM.2: 9
    • FCS_CKM.4: 56
    • FCS_CKM.4.1: 1
    • FCS_COP: 91
    • FCS_COP.1: 16
    • FCS_RND: 7
    • FCS_RND.1: 20
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 9
    • FDP_ACF: 21
    • FDP_ACF.1: 16
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 4
    • FDP_ITC: 1
    • FDP_ITC.1: 16
    • FDP_ITC.2: 16
    • FDP_RIP.1: 14
    • FDP_RIP.1.1: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 3
    • FDP_UIT: 10
    • FDP_UIT.1: 4
  • FIA:
    • FIA_ACC.1.1: 1
    • FIA_AFL: 32
    • FIA_AFL.1: 9
    • FIA_API: 36
    • FIA_API.1: 7
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 105
    • FIA_UAU.1: 13
    • FIA_UAU.4: 6
    • FIA_UAU.4.1: 2
    • FIA_UAU.5: 10
    • FIA_UAU.6: 6
    • FIA_UID: 23
    • FIA_UID.1: 8
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 25
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 22
    • FMT_LIM.2.1: 4
    • FMT_MSA.1: 2
    • FMT_MSA.3: 4
    • FMT_MTD: 91
    • FMT_MTD.1: 18
    • FMT_MTD.3: 13
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 49
    • FMT_SMF.1.1: 1
    • FMT_SMR: 30
    • FMT_SMR.1: 21
  • FPT:
    • FPT_EMS: 7
    • FPT_EMS.1: 16
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 5
    • FPT_FLS: 1
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_ITC: 1
    • FPT_PHP.3: 13
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 12
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC: 25
    • FTP_ITC.1: 11
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_EVIL: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 3
  • O:
    • O.ACCESS_HISTORY: 5
    • O.ADMIN_GUIDANCE: 1
    • O.ADMIN_ROLE: 4
    • O.AUDIT_: 1
    • O.AUDIT_GENERATION: 4
    • O.CONFIGURATION_IDENTIFICATION: 1
    • O.DOCUMENTED_DESIGN: 1
    • O.INTERNAL_TOE_DOMAINS: 1
    • O.MANAGE: 6
    • O.MEDIATE: 5
    • O.PARTIAL_FUNCTIONAL_TEST: 1
    • O.PARTIAL_SELF_PROTECTION: 1
    • O.RESIDUAL_INFORM: 1
    • O.RESIDUAL_INFORMAT: 2
    • O.RESIDUAL_INFORMATION: 3
    • O.TOE_ACCESS: 7
    • O.VULNERABILITY_ANALYSIS: 1
  • OE:
    • OE.NO_EVIL: 4
    • OE.NO_GENERAL_: 2
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 4
  • T:
    • T.ACCIDENTIAL_ADMIN_ERROR: 1
    • T.MASQUERADE: 3
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 3
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNIDENTIFIED_ACTIONS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 11
    • Microsoft Corporation: 2
  • Infineon:
    • Infineon: 13
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 32
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 1
      • Triple-DES: 38
    • DES:
      • DES: 7
  • constructions:
    • MAC:
      • CMAC: 6
      • KMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 20
    • ECDSA:
      • ECDSA: 10
  • FF:
    • DH:
      • DH: 12
      • Diffie-Hellman: 22
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-2: 3
      • SHA-224: 1
      • SHA-256: 12
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 21
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 228
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 8
  • ECB:
    • ECB: 1
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP320r1: 3
    • brainpoolP320t1: 3
pdf_data/st_keywords/crypto_library
  • Generic:
    • Crypto Library v2.02.010: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 4
    • Physical Tampering: 3
    • Physical tampering: 2
    • fault injection: 2
    • malfunction: 6
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • SPA: 2
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 5
    • BSI TR-03111: 4
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 3
  • IBM:
    • SSC: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 1
    • EF.CardAccess: 1
    • EF.DG1: 13
    • EF.DG13: 1
    • EF.DG14: 11
    • EF.DG15: 7
    • EF.DG16: 10
    • EF.DG2: 5
    • EF.DG3: 13
    • EF.DG4: 12
    • EF.DG5: 3
    • EF.SOD: 6
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 31: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 1
    • FIPS 197: 1
    • FIPS 19747: 1
    • FIPS 46-3: 6
    • FIPS PUB 180-4: 2
    • FIPS PUB 186-4: 1
    • FIPS PUB 197: 1
  • ICAO:
    • ICAO: 65
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 7816-2: 3
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9796-: 1
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-67: 3
    • SP 800-38A: 1
  • PKCS:
    • PKCS #3: 2
    • PKCS#1: 3
    • PKCS#3: 11
  • RFC:
    • RFC 2631: 1
    • RFC2119: 1
    • RFC3369: 1
pdf_data/st_metadata
  • /Author: Giovanni LICCARDO, Roberta SODANO
  • /CreationDate: D:20230512120431+02'00'
  • /Creator: Microsoft® Word per Microsoft 365
  • /ModDate: D:20230512120431+02'00'
  • /Producer: Microsoft® Word per Microsoft 365
  • /Subject: SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA
  • /Title: Security Target SOMA-c007 Machine Readable Electronic Document - ICAO Application - EAC-PACE-AA
  • pdf_file_size_bytes: 2080137
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 176
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different