Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ALE Omniswitch 6250, 6350, and 6450 with the AOS 6.7.1.79.R04 firmware and ALE Omniswitch 6860, 6865, 6900, 9900, and 10K with the AOS 8.3.1.348.R01 firmware (NDcPP)
CSEC2016007
Giesecke+Devrient Sm@rtCafé® Expert 8.0 C2
NSCIB-CC-2300006-01-CR
name ALE Omniswitch 6250, 6350, and 6450 with the AOS 6.7.1.79.R04 firmware and ALE Omniswitch 6860, 6865, 6900, 9900, and 10K with the AOS 8.3.1.348.R01 firmware (NDcPP) Giesecke+Devrient Sm@rtCafé® Expert 8.0 C2
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme SE NL
status archived active
not_valid_after 27.06.2023 24.05.2028
not_valid_before 27.06.2018 24.05.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20ale%20omni%20ndcpp.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01.1-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cert%20report%20ale%20omni.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st%20v1.1%20ale%20omni.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01-ST.pdf
manufacturer ALE USA Inc G+D Mobile Security GmbH
manufacturer_web https://www.al-enterprise.com/ https://www.gi-de.com/de/de/mobile-security/
security_level ASE_SPD.1, EAL1 EAL6+, ALC_FLR.1
dgst c46f8b27266ef8a4 e9c4587f626324cd
heuristics/cert_id CSEC2016007 NSCIB-CC-2300006-01-CR
heuristics/cert_lab []
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_REQ.2, ADV_INT.3, ASE_INT.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 6.7.1.79, 8.3.1.348 8.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/scheme_data
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/protection_profiles c7cf611c6bb1e4b0 7f886b64878b68c1
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf
pdf_data/cert_filename CCRA ale omni ndcpp.pdf NSCIB-CC-2300006-01.1-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-22-0289065: 1
    • NSCIB-2300006-01: 1
    • NSCIB-CC-23-2300006-01: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-V2-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
  • EAL:
    • EAL2: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ASE:
    • ASE_SPD.1: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.3: 1
pdf_data/cert_keywords/vendor
  • GD:
    • Giesecke+Devrient: 1
pdf_data/cert_keywords/eval_facility
  • atsec:
    • atsec: 1
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 18045:2008: 1
pdf_data/cert_metadata
  • /CreationDate: D:20180627150532+02'00'
  • /ModDate: D:20180629071422+02'00'
  • pdf_file_size_bytes: 281798
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Denise Cater
  • /CreationDate: D:20230813222000+01'00'
  • /Creator: Microsoft® Word 2021
  • /ModDate: D:20230813222000+01'00'
  • /Producer: Microsoft® Word 2021
  • /Title: NSCIB Certificate
  • pdf_file_size_bytes: 94099
  • pdf_hyperlinks: https://www.tuv-nederland.nl/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename cert report ale omni.pdf NSCIB-CC-2300006-01-CR.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-2300006-01-CR
    • cert_item: Sm@rtCafé® Expert 8.0 C2
    • cert_lab: SGS Brightsight B.V.
    • developer: Giesecke+Devrient Mobile Security GmbH
pdf_data/report_keywords/cc_cert_id
  • SE:
    • CSEC2016007: 1
  • DE:
    • BSI-DSZ-CC-1107-V3-2022: 2
  • NL:
    • NSCIB-2300006-01: 1
    • NSCIB-CC-2300006-01-CR: 13
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 1 augmented: 1
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL4: 1
    • EAL5+: 1
    • EAL6: 2
    • EAL6 augmented: 2
    • EAL6+: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_FLR.1: 3
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/report_keywords/vendor
  • GD:
    • G&D: 4
    • Giesecke+Devrient: 4
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 5
  • BrightSight:
    • Brightsight: 3
  • SGS:
    • SGS: 3
    • SGS Brightsight: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CBC-MAC: 3
      • CMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
    • EdDSA:
      • EdDSA: 1
  • RSA:
    • RSA-CRT: 2
    • RSA-PSS: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSH: 3
    • SSHv2: 2
  • TLS:
    • TLS:
      • TLS: 2
      • TLS v1.1: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 3
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • side-channel: 1
  • other:
    • JIL: 2
    • JIL-AAPS: 2
    • JIL-AM: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • X509:
    • X.509: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 2
pdf_data/report_metadata
  • /Author: Mats Engquist
  • /CreationDate: D:20180628152233+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20180629071529+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: nnnn
  • /Title: Certification Report - ALE Omniswitch
  • pdf_file_size_bytes: 583538
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
pdf_data/st_filename st v1.1 ale omni.pdf NSCIB-CC-2300006-01-ST.pdf
pdf_data/st_keywords/cc_cert_id
  • SE:
    • CSEC 2016007: 1
  • DE:
    • BSI-DSZ-CC-1107-V3-2022: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0099-V2-2020: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4+: 1
    • EAL 6: 3
    • EAL 6 augmented: 2
    • EAL 6+: 1
    • EAL6: 4
    • EAL6 augmented: 2
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 5
    • ADV_ARC.1: 5
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 3
    • ADV_FSP.5: 9
    • ADV_IMP.1: 6
    • ADV_IMP.2: 2
    • ADV_INT.3: 1
    • ADV_SPM.1: 3
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 1
    • ADV_TDS.5: 6
  • AGD:
    • AGD_OPE.1: 7
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.5: 3
    • ALC_CMS.1: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 4
    • ALC_FLR.1: 6
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 3
    • ASE_INT.2: 2
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
    • ATE_FUN.2: 1
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM.1: 34
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 15
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 18
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 94
    • FCS_COP.1.1: 8
    • FCS_RBG_EXT.1: 10
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT: 20
    • FCS_SSHC_EXT.1: 10
    • FCS_SSHS_EXT: 18
    • FCS_SSHS_EXT.1: 10
    • FCS_TLSC_EXT: 10
    • FCS_TLSC_EXT.2: 9
  • FDP:
    • FDP_ITC.1: 11
    • FDP_ITC.2: 11
  • FIA:
    • FIA_PMG_EXT.1: 6
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 6
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 9
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF.1: 23
    • FMT_MOF.1.1: 3
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 1
    • FMT_SMR.2: 10
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 6
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT.1: 6
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 6
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 6
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 6
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 1
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP.1: 21
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 3
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 7
    • FCS_CKM.1: 36
    • FCS_CKM.2: 4
    • FCS_CKM.4: 29
    • FCS_CKM.4.1: 1
    • FCS_COP: 8
    • FCS_COP.1: 118
    • FCS_RNG: 5
    • FCS_RNG.1: 13
    • FCS_RNG.1.1: 5
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 30
    • FDP_ACC.1: 11
    • FDP_ACC.2: 5
    • FDP_ACF: 29
    • FDP_ACF.1: 13
    • FDP_IFC: 31
    • FDP_IFC.1: 13
    • FDP_IFC.2: 2
    • FDP_IFF: 23
    • FDP_IFF.1: 17
    • FDP_ITC: 12
    • FDP_ITC.1: 8
    • FDP_ITC.2: 20
    • FDP_ITT.1: 1
    • FDP_RIP: 139
    • FDP_RIP.1: 11
    • FDP_ROL: 16
    • FDP_ROL.1: 5
    • FDP_SDC.1: 2
    • FDP_SDI: 15
    • FDP_SDI.2: 4
    • FDP_UIT: 9
    • FDP_UIT.1: 2
  • FIA:
    • FIA_API.1: 1
    • FIA_ATD: 10
    • FIA_ATD.1: 2
    • FIA_UID: 16
    • FIA_UID.1: 9
    • FIA_UID.2: 1
    • FIA_USB: 9
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 4
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA: 101
    • FMT_MSA.1: 10
    • FMT_MSA.2: 2
    • FMT_MSA.3: 17
    • FMT_MTD: 22
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_SMF: 22
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR: 35
    • FMT_SMR.1: 32
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 10
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 39
    • FPT_FLS.1: 21
    • FPT_FLS.1.1: 2
    • FPT_ITT.1: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 3
    • FPT_RCV: 13
    • FPT_RCV.3: 10
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 2
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 3
    • A.LIMITED_FUNCTIONALITY: 3
    • A.NO_THRU_TRAFFIC_PROTECTION: 3
    • A.PHYSICAL_PROTECTION: 3
    • A.REGULAR_UPDATES: 3
    • A.TRUSTED_ADMINISTRATOR: 3
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 2
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.NO_THRU_TRAFFIC_PROTECTION: 2
    • OE.PHYSICAL: 2
    • OE.TRUSTED_ADMIN: 2
    • OE.UPDATES: 2
  • T:
    • T.PASSWORD_CRACKING: 2
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 2
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 2
    • T.UPDATE_COMPROMISE: 2
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 2
    • T.WEAK_CRYPTOGRAPHY: 2
  • A:
    • A.CAP_FILE: 6
    • A.DELETION: 7
    • A.VERIFICATION: 6
  • D:
    • D.APP_CODE: 1
    • D.APP_I_DATA: 2
    • D.CRYPTO: 2
    • D.PIN: 1
    • D.SEC_DATA: 1
  • O:
    • O.AES: 1
    • O.ALARM: 22
    • O.APPLET: 16
    • O.ARRAY_VIEWS_CONFID: 11
    • O.ARRAY_VIEWS_INTEG: 9
    • O.CARD-: 6
    • O.CARD-MANAGEMENT: 27
    • O.CIPHER: 15
    • O.CODE_CAP: 1
    • O.CODE_CAP_: 1
    • O.CODE_CAP_FILE: 12
    • O.DELETION: 17
    • O.FIREWALL: 43
    • O.GLOBAL_ARRAYS: 1
    • O.GLOBAL_ARRAYS_CONFID: 19
    • O.GLOBAL_ARRAYS_INTEG: 9
    • O.INSTALL: 16
    • O.JAVAOBJEC: 1
    • O.JAVAOBJECT: 46
    • O.KEY-: 8
    • O.KEY-MNGT: 15
    • O.LOAD: 19
    • O.NATIVE: 14
    • O.OBJ-DELETION: 9
    • O.OPERATE: 36
    • O.PIN-: 5
    • O.PIN-MNGT: 18
    • O.PINMNGT: 1
    • O.REALLOCATION: 18
    • O.RESOURCES: 23
    • O.RND: 4
    • O.RNG: 11
    • O.SCP: 64
    • O.SID: 33
    • O.TDES: 2
    • O.TRANSACTION: 19
  • OE:
    • OE.CAP_FILE: 9
    • OE.CARD-MANAGEMENT: 6
    • OE.CODE-: 5
    • OE.CODE-EVIDENCE: 15
    • OE.SCP: 13
    • OE.VERIFICATION: 38
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 4
    • OP.ARRAY_LENGTH: 4
    • OP.ARRAY_T_ALOAD: 2
    • OP.ARRAY_T_ASTORE: 3
    • OP.ARRAY_T_LOAD: 1
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_CAP_FILE: 3
    • OP.DELETE_CAP_FILE_APPLET: 3
    • OP.INSTANCE_FIELD: 3
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 6
    • OP.PUT: 5
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.VERIFICATION: 7
  • R:
    • R.JAVA: 14
  • T:
    • T.CONFID-: 8
    • T.CONFID-APPLI-: 1
    • T.CONFID-APPLI-DATA: 17
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 4
    • T.EXE-CODE: 6
    • T.EXECODE: 1
    • T.INSTALL: 5
    • T.INTEG-: 10
    • T.INTEG-APPLI-: 4
    • T.INTEG-APPLI-CODE: 5
    • T.INTEG-APPLI-DATA: 13
    • T.INTEG-JCS-: 2
    • T.INTEG-JCS-CODE: 4
    • T.INTEG-JCS-DATA: 3
    • T.INTEG-JCSCODE: 1
    • T.INTEGAPPLI-CODE: 2
    • T.INTEGAPPLI-DATA: 1
    • T.INTEGJCS-DATA: 6
    • T.NATIVE: 5
    • T.OBJ-DELETION: 2
    • T.OBJDELETION: 1
    • T.PHYSICAL: 3
    • T.RESOURCES: 7
    • T.SECURE_DELETION: 8
    • T.SID: 16
pdf_data/st_keywords/vendor
  • GD:
    • G&D: 10
    • G+D: 6
    • Giesecke+Devrient: 8
  • Infineon:
    • Infineon: 1
    • Infineon Technologies AG: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 89
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 23
  • constructions:
    • MAC:
      • HMAC: 6
      • HMAC-SHA-256: 4
      • HMAC-SHA-384: 3
      • HMAC-SHA-512: 3
  • AES_competition:
    • AES:
      • AES: 29
    • RC:
      • RC2: 1
  • DES:
    • 3DES:
      • 3-DES: 7
      • 3DES: 3
      • TDEA: 1
      • TDES: 3
      • Triple-DES: 4
    • DES:
      • DES: 14
  • constructions:
    • MAC:
      • CBC-MAC: 10
      • CMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 1
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 13
  • FF:
    • DH:
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 1
  • ECC:
    • ECC:
      • ECC: 9
    • ECDH:
      • ECDH: 9
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • Diffie-Hellman: 2
  • RSA:
    • RSA-CRT: 12
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 17
    • SHA2:
      • SHA-2: 5
      • SHA-256: 17
      • SHA-384: 9
      • SHA-512: 9
      • SHA256: 2
      • SHA384: 1
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 3
      • SHA-256: 4
      • SHA-384: 4
      • SHA-512: 4
    • SHA3:
      • SHA-3: 1
      • SHA-3-224: 3
      • SHA-3-256: 3
      • SHA-3-384: 2
      • SHA-3-512: 3
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 16
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 10
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 77
    • SSHv2: 59
  • TLS:
    • SSL:
      • SSL: 2
      • SSLv1.0: 2
      • SSLv2.0: 2
      • SSLv3.0: 2
    • TLS:
      • TLS: 59
      • TLS 1.1: 2
      • TLS 1.2: 2
      • TLSv1.0: 2
      • TLSv1.1: 30
      • TLSv1.2: 30
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 12
  • RNG:
    • RBG: 1
  • RNG:
    • RND: 4
    • RNG: 17
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
  • GCM:
    • GCM: 5
  • CBC:
    • CBC: 6
  • CFB:
    • CFB: 5
  • CTR:
    • CTR: 5
  • ECB:
    • ECB: 9
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-224: 2
    • P-256: 18
    • P-384: 16
    • P-521: 16
    • secp256r1: 2
    • secp384r1: 2
    • secp521r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 3
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 35
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • physical tampering: 5
  • SCA:
    • Leak-Inherent: 2
    • physical probing: 1
  • other:
    • JIL: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 2
    • FIPS PUB 186-4: 6
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 2
  • PKCS:
    • PKCS #1: 2
  • RFC:
    • RFC2560: 3
    • RFC2986: 3
    • RFC3268: 7
    • RFC4251: 4
    • RFC4252: 6
    • RFC4253: 6
    • RFC4254: 2
    • RFC4346: 3
    • RFC4492: 6
    • RFC5246: 9
    • RFC5280: 4
    • RFC5289: 7
    • RFC5656: 2
    • RFC5759: 3
    • RFC6125: 3
    • RFC6668: 2
  • X509:
    • X.509: 20
  • BSI:
    • AIS 20: 1
    • AIS 31: 2
    • AIS20: 7
    • AIS31: 5
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 186-4: 7
    • FIPS 197: 10
    • FIPS PUB 202: 4
    • FIPS180-4: 3
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS1: 12
    • PKCS3: 1
    • PKCS5: 3
  • RFC:
    • RFC 4056: 1
    • RFC 5639: 1
    • RFC5639: 5
  • SCP:
    • SCP02: 4
    • SCP03: 3
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 5
    • javacard.framework.applet: 1
    • javacard.security: 7
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 3 [AIS20],[AIS31]12 that implements13 : 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10: 1
    • 384, 521}r1[SEC2], brainpoolP{224, 256, 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Giesecke+Devrient MS Security Target Sm@rtCafé® Expert 8.0 C2/Version 4.0/Status 10.05: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 5
    • with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Giesecke+Devrient MS Security Target Sm@rtCafé® Expert 8.0 C2/Version 4.0/Status 10.05: 1
pdf_data/st_metadata
  • /Author: G+D MS / stut
  • /CreationDate: D:20230510174501+02'00'
  • /Creator: Microsoft® Word für Microsoft 365
  • /Keywords: Version 4.0/Status 10.05.2023
  • /ModDate: D:20230510174501+02'00'
  • /Producer: Microsoft® Word für Microsoft 365
  • /Subject: Sm@rtCafé® Expert 8.0 C2
  • /Title: Giesecke+Devrient MS Security Target
  • pdf_file_size_bytes: 1811883
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 134
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different