Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
MAWIS-Security Rev. 4.0
BSI-DSZ-CC-0496-V2-2025
Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use with BAC option
BSI-DSZ-CC-1091-2018
name MAWIS-Security Rev. 4.0 Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use with BAC option
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
status active archived
not_valid_after 23.01.2030 18.12.2023
not_valid_before 24.01.2025 18.12.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1091c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1091a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0496V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1091b_pdf.pdf
manufacturer MOBA Mobile Automation AG cv cryptovision GmbH
manufacturer_web https://www.moba.de/ https://www.cryptovision.com
security_level ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+ EAL4+, ALC_DVS.2
dgst c8c9125bad005bbe 3d1b01ce576f605d
heuristics/cert_id BSI-DSZ-CC-0496-V2-2025 BSI-DSZ-CC-1091-2018
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ASE_OBJ.2, AGD_OPE.1, ASE_ECD.1, ASE_REQ.2 ALC_COMP.1, ALC_CMS.5, ALC_CMC.4, ALC_DEL.1, ALC_DVS.2, ADV_ARC.1, ALC_LCD.1, ALC_TAT.2
heuristics/extracted_versions 4.0 3.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0951-2015, BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-1090-2018
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0951-2015, BSI-DSZ-CC-1090-2018, BSI-DSZ-CC-0868-2014
heuristics/scheme_data
  • category: Other products
  • cert_id: BSI-DSZ-CC-0496-V2-2025
  • certification_date: 24.01.2025
  • enhanced:
    • applicant: MOBA Mobile Automation AG Kapellenstraße 15 65555 Limburg
    • assurance_level: EAL1,ASE_SPD.1,ASE_REQ.2,ASE_OBJ.2
    • certification_date: 24.01.2025
    • description: The TOE is the Waste Bin Identification Systems (WBIS) MAWIS-Security Rev 4.0. The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-0496-V2-2025', 'description': 'The TOE is evaluated and certified conform to the „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste Bin Identification Systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip, which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal. The TOE with its security functionality ensures validity, integrity and completeness of the protected data during storage in the vehicle and Transmission between physically separated parts of the TOE.'}), frozendict({'id': 'BSI-DSZ-CC-0496-2017'})]
    • evaluation_facility: Deutsches Forschungszentrum für Künstliche Intelligenz GmbH
    • expiration_date: 23.01.2030
    • product: MAWIS-Security Rev. 4.0
    • protection_profile: Protection Profile Waste Bin Identification Systems (WBIS-PP), Version 1.04, 27 May 2004, BSI-PP-0010-2004
  • product: MAWIS-Security Rev. 4.0
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/0496.html
  • vendor: MOBA Mobile Automation AG
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0951-2015, BSI-DSZ-CC-1028-2017
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0951-2015, BSI-DSZ-CC-1028-2017
heuristics/protection_profiles f1e8c937d15e713a 60455fc9564e2545
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/WBIS-PPv1-04.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf
pdf_data/cert_filename 0496V2c_pdf.pdf 1091c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0496-V2-2025: 1
  • DE:
    • BSI-DSZ-CC-1091-2018: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0010-2004: 1
  • BSI:
    • BSI-CC-PP-0055-2009: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ASE:
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
  • ALC:
    • ALC_DVS.2: 1
pdf_data/cert_keywords/vendor
  • GD:
    • G+D: 1
pdf_data/cert_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
  • ICAO:
    • ICAO: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025"
  • /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Waste Bin Identification System, Müllbehälter-Identifikationssystem, MAWIS-Security Rev. 4.0, BSI-DSZ-CC-0496-V2-2025
  • /Title: Zertifikat BSI-DSZ-CC-0496-V2-2025
  • pdf_file_size_bytes: 386689
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20190109132905+01'00'
  • /Creator: Writer
  • /Keywords: Common Criteria, Certification, Zertifizierung, Security IC with MRTD BAC Application, Veridos GmbH, cv cryptovision GmbH
  • /ModDate: D:20190109133015+01'00'
  • /Producer: LibreOffice 5.2
  • /Subject: Common Criteria Certification
  • /Title: Certificate BSI-DSZ-CC-1091-2018
  • pdf_file_size_bytes: 408715
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 0496V2a_pdf.pdf 1091a_pdf.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0496-V2-2025
    • cert_item: MAWIS-Security Rev. 4.0
    • cert_lab: BSI
    • developer: MOBA Mobile Automation AG
    • match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1091-2018
    • cert_item: Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use with BAC option
    • cert_lab: BSI
    • developer: cv cryptovision GmbH sponsored by Veridos GmbH - Identity Solutions by G+D BDR
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Machine Readable Travel Document with "ICAO Application" Basic Access Control, Version 1.10, 25 March 2009, BSI-CC-PP-0055-2009
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0496-V2-2025: 10
  • DE:
    • BSI-DSZ-CC-0951-2015: 1
    • BSI-DSZ-CC-0951-2015-RA-01: 3
    • BSI-DSZ-CC-1028-: 1
    • BSI-DSZ-CC-1028-2017: 3
    • BSI-DSZ-CC-1028-2017-MA-01: 4
    • BSI-DSZ-CC-1090-2018: 3
    • BSI-DSZ-CC-1091: 2
    • BSI-DSZ-CC-1091-2018: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0010-2004: 1
    • BSI-PP-0010-: 1
    • BSI-PP-0010-2004: 1
  • BSI:
    • BSI-CC-PP-0055-2009: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
    • EAL 2: 1
    • EAL 4: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL 5: 4
    • EAL5+: 1
    • EAL6: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ASE:
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 4
    • ASE_SPD.1: 4
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_PRE: 3
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_COMP.1: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 2
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP: 3
    • FCS_COP.1: 10
    • FCS_RND.1: 1
    • FCS_RNG.1: 1
  • FIA:
    • FIA_UAU.4: 3
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.APPLET: 1
    • OE.CODE_EVIDENCE: 1
    • OE.VERIFICATION: 1
pdf_data/report_keywords/vendor
  • GD:
    • G+D: 11
    • Giesecke+Devrient: 4
  • Infineon:
    • Infineon: 3
    • Infineon Technologies AG: 2
pdf_data/report_keywords/eval_facility
  • DFKI:
    • DFKI: 3
  • TUV:
    • TÜV Informationstechnik: 6
    • TÜViT: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
  • DES:
    • 3DES:
      • TDES: 1
    • DES:
      • DES: 8
  • constructions:
    • MAC:
      • CMAC: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 2
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 5
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 1
  • PGP:
    • PGP: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 4
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
  • BSI:
    • BSI 7148: 1
    • BSI TR-03110: 9
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • BSI:
    • AIS 1: 2
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 2
    • AIS 26: 3
    • AIS 32: 1
    • AIS 34: 2
    • AIS 36: 5
    • AIS 37: 1
    • AIS 38: 1
    • AIS20: 2
  • FIPS:
    • FIPS180-4: 2
    • FIPS197: 4
    • FIPS46-3: 3
  • ICAO:
    • ICAO: 13
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • List for the TOE BSI-DSZ-CC-1091, 06 December 2018, 1091_MRTD_conflist-SCE.XLSX, cryptovision GmbH (confidential document) [10] Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card Applet Suite providing: 1
    • Technical Report BSI-DSZ-CC-1091, Version 1, 11 December 2018, TÜV Informationstechnik GmbH (confidential document) [8] [PP_BAC] Common Criteria Protection Profile Machine Readable Travel Document with "ICAO: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
pdf_data/st_filename 0496V2b_pdf.pdf 1091b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0951-2015: 2
    • BSI-DSZ-CC-0951-2015-RA-01: 3
    • BSI-DSZ-CC-1028-2017: 1
    • BSI-DSZ-CC-1028-2017-MA-01: 3
    • BSI-DSZ-CC-1091: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0010-2004: 2
  • BSI:
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP0055: 3
    • BSI-PP-0055: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1+: 1
    • EAL1: 9
    • EAL1 augmented: 2
  • EAL:
    • EAL 4+: 1
    • EAL 5+: 2
    • EAL4: 9
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.1: 1
  • ASE:
    • ASE_ECD.1: 2
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 5
    • ASE_REQ.1: 1
    • ASE_REQ.2: 5
    • ASE_SPD.1: 6
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 2
  • AGD:
    • AGD_PRE: 5
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 6
  • ASE:
    • ASE_TSS: 2
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_DAU: 2
    • FDP_DAU.1: 8
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ITT: 4
    • FDP_ITT.1: 1
    • FDP_ITT.5: 20
    • FDP_ITT.5.1: 2
    • FDP_SDI: 2
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 1
  • FPT:
    • FPT_FLS.1: 2
  • FRU:
    • FRU_FLT: 2
    • FRU_FLT.1: 8
    • FRU_FLT.1.1: 1
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN: 1
    • FAU_SAS: 7
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 32
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 3
    • FCS_CKM.3: 1
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 4
    • FCS_COP: 49
    • FCS_COP.1: 42
    • FCS_LIM: 1
    • FCS_RND: 7
    • FCS_RND.1: 15
    • FCS_RND.1.1: 3
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 18
    • FDP_ACC.1.1: 3
    • FDP_ACF: 5
    • FDP_ACF.1: 11
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 4
    • FDP_IFC: 2
    • FDP_IFC.1: 4
    • FDP_IFF: 2
    • FDP_ITC: 3
    • FDP_ITC.1: 10
    • FDP_ITC.2: 10
    • FDP_RIP: 8
    • FDP_ROL: 1
    • FDP_SDI.2: 1
    • FDP_UCT: 2
    • FDP_UCT.1: 11
    • FDP_UCT.1.1: 3
    • FDP_UIT: 4
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 3
    • FDP_UIT.1.2: 2
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 15
    • FIA_UAU.4.1: 2
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 4
    • FIA_UAU.5.2: 6
    • FIA_UAU.6: 12
    • FIA_UAU.6.1: 2
    • FIA_UID: 3
    • FIA_UID.1: 12
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 1
    • FIA_USB: 1
  • FMT:
    • FMT_LIM: 12
    • FMT_LIM.1: 25
    • FMT_LIM.1.1: 6
    • FMT_LIM.2: 22
    • FMT_LIM.2.1: 7
    • FMT_MSA: 9
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 27
    • FMT_MTD.1: 14
    • FMT_SMF: 3
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 2
    • FMT_SMR: 6
    • FMT_SMR.1: 22
    • FMT_SMR.1.1: 4
    • FMT_SMR.1.2: 4
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_FLS: 4
    • FPT_FLS.1: 15
    • FPT_FLS.1.1: 3
    • FPT_PHP.3: 15
    • FPT_PHP.3.1: 2
    • FPT_RCV: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_TDC.1: 1
    • FPT_TST.1: 12
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.APPLET: 1
    • A.VERIFICATION: 1
  • O:
    • O.ALARM: 1
    • O.CARD-MANAGEMENT: 1
    • O.CIPHER: 1
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.INSTALL: 1
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.SCP: 1
    • O.SID: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
    • OE.MRTD_: 1
    • OE.VERIFICATION: 1
  • OT:
    • OT.SCP: 2
  • T:
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.DELETION: 1
    • T.EXE-CODE: 2
    • T.INSTALL: 1
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 2
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 1
    • T.SECURE_DELETION: 1
    • T.SID: 2
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 1
  • GD:
    • G&D: 1
    • Giesecke & Devrient: 1
    • Giesecke+Devrient: 1
  • Infineon:
    • Infineon: 5
    • Infineon Technologies AG: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 19
      • AES-: 1
  • DES:
    • 3DES:
      • TDES: 2
      • Triple-DES: 14
    • DES:
      • DES: 6
    • Lucifer:
      • Lucifer: 1
  • constructions:
    • MAC:
      • CMAC: 5
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • JH:
    • JH: 1
  • MD:
    • MD5:
      • MD5: 1
  • RIPEMD:
    • RIPEMD-160: 1
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-2: 2
      • SHA-224: 1
      • SHA-256: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
  • MAC:
    • MAC: 9
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 4
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 9
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 8
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 5
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 2006: 1
    • BSI TR-03110: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 12
    • EF.DG1: 32
    • EF.DG13: 3
    • EF.DG14: 3
    • EF.DG15: 1
    • EF.DG16: 32
    • EF.DG2: 9
    • EF.DG3: 9
    • EF.DG4: 8
    • EF.DG5: 8
    • EF.SOD: 13
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • ISO:
    • ISO/IEC 18000-63: 2
  • BSI:
    • AIS 20: 3
    • AIS20: 4
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-4: 1
    • FIPS 180-48: 1
    • FIPS 197: 4
    • FIPS 46-3: 4
    • FIPS PUB 186-4: 1
    • FIPS PUB 46-3: 1
    • FIPS180-2: 1
    • FIPS180-4: 1
    • FIPS186-3: 1
    • FIPS197: 2
    • FIPS46-3: 2
  • ICAO:
    • ICAO: 18
  • ISO:
    • ISO/IEC 11770: 2
    • ISO/IEC 15946: 2
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS#15: 1
    • PKCS#3: 1
    • PKCS1: 1
  • RFC:
    • RFC 5639: 1
    • RFC3369: 1
    • RFC4493: 1
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • No contradiction to this ST. FDP_RIP.1/TRANSIENT No correspondence. Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FDP_RIP.1/bArray No correspondence. Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FMT_MSA.2/FIREWALL-JCVM No correspondence Out of scope (internal Java Card Fire- wall: 1
    • No contradiction to this ST. FMT_SMR.1/Installer No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FPT_RCV.3/Installer No correspondence Out of scope (internal Java Card func- tionality: 1
    • 15 of 76 Platform SFR Correspondence in this ST References/Remarks FCS_CKM.3 No correspondence Out of scope (managed within Java Card OS). No contradiction to this ST. FCS_CKM.4 FCS_CKM.4 The requirements: 1
    • 18 of 76 Platform SFR Correspondence in this ST References/Remarks FDP_IFF.1/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM No correspondence: 1
    • 19 of 76 Platform Objective Correspondence in this ST References/Remarks O.NATIVE No correspondence Out of scope. No contradiction to this ST. O.OPERATE No correspondence Out of scope. No contradiction to this ST: 1
    • 76 Platform SFR Correspondence in this ST References/Remarks FPT_FLS.1/Installer No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_RCV.3/Installer No: 1
    • ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
    • DRG.4) that can be used directly. FDP_RIP.1/ABORT No correspondence. Out of scope (internal Java Card func- tionality: 1
    • FCS_CKM.1 (FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Der- ivation Algorithm. There are no con-: 1
    • FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Der- ivation Algorithm: 1
    • No correspondence Out of scope. No contradiction to this ST. O.CARD-MANAGEMENT No correspondence Out of scope. No contradiction to this ST. OT.SCP.IC OT.Prot_Phys-Tamper The objectives are related. No con-: 1
    • O.ALARM No correspondence Out of scope. No contradiction to this ST. O.CIPHER No correspondence Indirectly relevant for the correct: 1
    • O.REALLOCATION No correspondence Out of scope. No contradiction to this ST. O.RESOURCES No correspondence Out of scope. No contradiction to this: 1
    • O.TRANSACTION No correspondence Out of scope. No contradiction to this ST. O.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
    • Out of scope: 84
    • Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 2
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. ADELG Security Functional: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/KEYS No correspondence: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/TRANSIENT No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/bArray No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ROL.1/FIREWALL No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. Veridos Suite v3.0 -: 1
    • Platform Threat Correspondence in this ST References/Remarks T.CONFID-APPLI-DATA No correspondence Out of scope. No contradiction to this ST. T.CONFID-JCS-CODE No correspondence Out of scope. No contradiction to: 1
    • SID.2 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.1 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.2 No correspondence Out of scope. No contradiction to this: 1
    • ST. O.DELETION No correspondence Out of scope. No contradiction to this ST. O.LOAD No correspondence Out of scope. No contradiction to this ST. O: 1
    • ST. T.INSTALL No correspondence Out of scope. No contradiction to this ST. T.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
    • ST. T.INTEG-JCS-DATA No correspondence Out of scope. No contradiction to this ST. T.SID.1 No correspondence Out of scope. No contradiction to this ST: 1
    • T.DELETION No correspondence Out of scope. No contradiction to this ST. T.SECURE_DELETION No correspondence Out of scope. No contradiction to: 1
    • T.INTEG-APPLI-DATA T.Forgery No contradiction to this ST. T.INTEG-APPLI-DATA.LOAD No correspondence Out of scope. No contradiction to this ST. T.INTEG-JCS-CODE No correspondence Out of scope. No contradiction to: 1
    • T.Information_Leakage No contradiction to this ST. T.INTEG-APPLI-CODE No correspondence Out of scope. No contradiction to this ST. T.INTEG-APPLI-CODE.LOAD No correspondence Out of scope. No: 1
    • T.NATIVE No correspondence Out of scope. No contradiction to this ST. T.RESOURCES No correspondence Out of scope. No contradiction to this: 1
    • The objectives are related. No con- tradiction to this ST. O.SCP.SUPPORT No correspondence Out of scope. No contradiction to this ST. Table 4: Assessment of the platform objectives. 2.3.4 Assessment of: 1
    • a defined quality met- ric (DRG.4) that can be used directly. FDP_RIP.1/ABORT No correspondence. Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/APDU No correspondence: 1
    • chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall: 1
    • chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID No correspondence. Out of scope (internal Java Card func- tionality: 1
    • complement Java Card OS mechanisms. No contradiction to this ST. FPT_TDC.1 No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_TST.1 FPT_TST.1 Self-testing: 1
    • initial start-up. Aid Management (chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID No correspondence. Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UID.2/AID No correspondence: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCRE No correspondence Out of scope (internal Java Card Fire- wall: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCVM No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.2/FIREWALL-JCVM No: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of scope (internal Java Card Fire- wall: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_SMR.1 No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. Application Programming Interface: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2/CM No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/ADEL No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FIA_UID.1/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1/AID No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1/AID No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.1/JCRE No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/ADEL No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3/JCRE No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3/JCRE No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. INSTG Security Functional: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ADEL No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM No correspondence Out of scope (internal Java Virtual Machine: 1
    • internal Java Virtual Machine). No contradiction to this ST. FDP_RIP.1/OBJECTS No correspondence. Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCRE No correspondence Out: 1
    • manager (ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/ADEL No correspondence: 1
    • no corresponding objectives for the TOE of this ST. No contradictions. O.KEY-MNGT No correspondence Out of scope. No contradiction to this ST. O.PIN-MNGT No correspondence Out of scope. No contradiction to this: 1
    • objectives for the TOE and are covered by SFRs in the platform ST. FTP_ITC.1/CMGR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SCPG Security Functional: 1
    • objectives. Platform Objective Correspondence in this ST References/Remarks O.SID No correspondence Out of scope. No contradiction to this ST. O.FIREWALL No correspondence Out of scope. No contradiction to this: 1
    • of the TOE. No contradic- tion to this ST. FDP_IFC.1/JCVM No correspondence Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM No correspondence Out: 1
    • of the TOE. No contradic- tion to this ST. FMT_MSA.3/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 1
    • of the TOE. No contradic- tion to this ST. FMT_MSA.3/JCVM No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of: 1
    • platform ST) Firewall Policy (chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for Veridos Suite v3.0 - cryptovision: 1
    • that owns the deleted objects by invoking a specific API method. FDP_RIP.1/ODEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ODEL FPT_FLS.1 The: 1
    • the User Guidance of the TOE. No contradic- tion to this ST. FDP_ACF.1/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 1
    • to this ST. FCS_CKM.2 No correspondence Out of scope (managed within Java Card OS). No contradiction to this ST. Veridos Suite v3.0 - cryptovision: 1
    • verified, or that has been modified after bytecode verification. FCO_NRO.2/CM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2/CM No correspondence: 1
    • which addresses security aspects outside the runtime. FDP_ITC.2/Installer No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/Installer No: 1
pdf_data/st_metadata
  • /Author: Holz, Stephan
  • /Subject: Sicherheitsvorgaben nach WBIS-PP
  • /Title: MAWIS-Security, Rev. 4.0
  • pdf_file_size_bytes: 1129671
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
  • /Author: bdrisch
  • /CreationDate: D:20181206120214+01'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: SSCD, ePasslet Suite, electronic Signature
  • /ModDate: D:20181206120214+01'00'
  • /Producer: Microsoft® Word 2013
  • /Title: Security Target ePasslet/ePKI-SSCD
  • pdf_file_size_bytes: 1948229
  • pdf_hyperlinks: file:///C:/Dokumente%20und%20Einstellungen/tzeggel/Desktop/glossar.htm%23aes
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 76
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different