| name |
Connected eSE 5.3.4 v1.2 Platform (Revision 1.0) (ANSSI-CC-2025/04) |
Stationäres eHealth-Kartenterminal ORGA 6141 online Version 3.9.2:1.2.0 / 3.9.2:2.0.0 |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
FR |
DE |
| status |
active |
active |
| not_valid_after |
12.02.2030 |
16.10.2030 |
| not_valid_before |
12.02.2025 |
16.10.2025 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2025_04fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V6c_pdf.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_04fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V6a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-ANSSI-CC-2025_04en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V6b_pdf.pdf |
| manufacturer |
THALES DIS FRANCE SA |
Worldlline Healthcare GmbH |
| manufacturer_web |
https://www.thalesgroup.com/en/europe/france |
https://de.worldline.com |
| security_level |
EAL4+, ALC_FLR.1, ALC_DVS.2, AVA_VAN.5 |
ALC_TAT.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AVA_VAN.4, EAL3+ |
| dgst |
d0c4cec3c348cb26 |
c9f1e8cb1664943f |
| heuristics/cert_id |
ANSSI-CC-2025/04 |
BSI-DSZ-CC-0519-V6-2025 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ALC_DEL.1, ATE_FUN.1, ALC_CMS.4, AVA_VAN.5, ASE_INT.1, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, ASE_CCL.1, ADV_ARC.1, ATE_COV.2, ALC_FLR.1, ASE_SPD.1, ALC_CMC.4, ALC_TAT.1, ATE_DPT.1, ASE_ECD.1, AGD_PRE.1, ASE_TSS.1, ADV_IMP.1, ALC_DVS.2, ASE_REQ.2, ALC_LCD.1, ASE_OBJ.2 |
ALC_DEL.1, ATE_FUN.1, ASE_INT.1, ADV_FSP.4, AVA_VAN.4, ADV_TDS.3, AGD_OPE.1, ASE_CCL.1, ADV_ARC.1, ATE_COV.2, ASE_SPD.1, ATE_IND.2, ALC_TAT.1, ATE_DPT.1, ASE_ECD.1, ALC_CMS.3, AGD_PRE.1, ALC_DVS.1, ASE_TSS.1, ADV_IMP.1, ASE_REQ.2, ALC_CMC.3, ALC_LCD.1, ASE_OBJ.2 |
| heuristics/extracted_versions |
1.2, 1.0, 5.3.4 |
1.2.0, 2.0.0, 3.9.2 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0519-V5-2024 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0519-V3-2021, BSI-DSZ-CC-0519-V5-2024, BSI-DSZ-CC-0519-V4-2022 |
| heuristics/scheme_data |
|
- category: eHealth
- cert_id: BSI-DSZ-CC-0519-V6-2025
- certification_date: 16.10.2025
- enhanced:
- applicant: Worldlline Healthcare GmbH Konrad-Zuse-Ring 1 24220 Flintbek
- assurance_level: EAL3+,AVA_VAN.4,ALC_TAT.1,ADV_TDS.3,ADV_IMP.1,ADV_FSP.4
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0519V6c_pdf.pdf?__blob=publicationFile&v=3
- certification_date: 16.10.2025
- description: The Target of Evaluation (TOE) is a smart card terminal ORGA 6141 online Version 3.7.2:1.2.0. It fulfils the IT security requirements to be used with the German electronic Health Card (eHC) and the German Health Professional Card (HPC) based on the regulations of the German healthcare system.
- entries: [frozendict({'id': 'BSI', 'description': 'Management'}), frozendict({'id': 'BSI-DSZ-CC-0519-V6-2025 (16.10.2025)', 'description': 'Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target Zertifikat / Certificate'}), frozendict({'id': 'BSI', 'description': 'online'}), frozendict({'id': 'BSI-DSZ-CC-0519-V5-2024 (24.09.2024)', 'description': 'Management'}), frozendict({'id': 'BSI-DSZ-CC-0519-V4-2022-MA-01 (04.04.2023) Maintenancereport / Maintenance Report Sicherheitsvorgaben / Security Target Folgende Änderungen waren im Fokus dieser Re-Evalauierung: Updates von Open-Sopurce-Komponenten, Fehlerbehebung im TOE und die Erweiterung des Produkts um die Remote Management Schnittstelle als zweite Adiminstrationsschnittstelle, die eingabe der SMC-B PIN über diese Remote Management Schnittstelle sowie die VPN Authentifizierung via PSK und EAP-TLS. Following changes on the evaluated product have been in the focus of this re-evaluation: Update of open-source components, Bug fixing for the TOE, Product expansion, Remote Management Interface as second administration interface, SMC-B PIN entry via the Remote Management Interface and VPN authentication method PSK and EAP-TLS.', 'description': 'Firmware'}), frozendict({'id': 'BSI', 'description': 'Management'}), frozendict({'id': 'BSI', 'description': 'online'}), frozendict({'id': 'BSI', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI', 'description': 'The certified product itself did not change compared to 0519-V2-2018.'}), frozendict({'id': 'BSI', 'description': 'online'}), frozendict({'id': 'BSI', 'description': 'The certified product itself did not change compared to 0519-V2-2018.'}), frozendict({'id': 'BSI', 'description': 'Certificate'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 15.10.2030
- product: ORGA 6141 online V3.9.2:1.2.0/3.9.2:2.0.0
- protection_profile: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0519V6a_pdf.pdf?__blob=publicationFile&v=3
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0519V6b_pdf.pdf?__blob=publicationFile&v=3
- product: ORGA 6141 online V3.9.2:1.2.0/3.9.2:2.0.0
- subcategory: Card reader
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/0519.html
- vendor: Worldlline Healthcare GmbH
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0519 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0519 |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
Certificat-ANSSI-CC-2025_04fr.pdf |
0519V6c_pdf.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0519-V6-2025: 1
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 3: 1
- EAL 3 augmented: 1
- EAL 4: 1
|
| pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_DVS.2: 1
- ALC_FLR.1: 1
- AVA:
|
- ADV:
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- ALC:
- AVA:
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
- Serma:
- Serma Safety & Security: 2
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
ANSSI-CC-2025_04fr.pdf |
0519V6a_pdf.pdf |
| pdf_data/report_frontpage |
|
- FR:
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1 and AVA_VAN.4 valid until: 15 October 2030
- cc_version: PP conformant
- cert_id: BSI-DSZ-CC-0519-V6-2025
- cert_item: Stationäres eHealth Kartenterminal ORGA 6141 online Version 3.9.2:1.2.0 / 3.9.2:2.0.0
- cert_lab: BSI
- developer: Worldline Healthcare GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT), BSI-CC-PP-0032-V3- 2023, 15.12.2022
|
| pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0519-V5-2024: 2
- BSI-DSZ-CC-0519-V6-2025: 12
- NL:
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0032-V3-: 1
- BSI-CC-PP-0032-V3-2023: 3
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 3: 4
- EAL 3 augmented: 3
- EAL 4: 4
- EAL3+: 1
|
| pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 2
- AVA:
|
- ADV:
- ADV_FSP.4: 4
- ADV_IMP.1: 4
- ADV_TDS.3: 4
- ALC:
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM.1.1: 10
- FCS_COP: 2
- FCS_COP.1: 1
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 1
- AES-128: 2
- AES-256: 2
- HPC:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
- NIST:
- secp256r1: 1
- secp384r1: 1
- secp512r1: 1
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_12: 1
- TLS_DHE_RSA_WITH_AES_128: 3
- TLS_DHE_RSA_WITH_AES_25: 1
- TLS_DHE_RSA_WITH_AES_256: 2
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
- BSI:
- AIS 1: 1
- AIS 32: 1
- AIS 38: 1
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- RFC3526: 1
- RFC4492: 3
- RFC5246: 8
- RFC5289: 4
- RFC5639: 1
- RFC7027: 1
- RFC7251: 1
- RFC8422: 1
- X509:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 15.12.2022 [8] SVN List (Configlist SW), 2025-07-24, Worldline Healthcare GmbH (confidential document) [9] Datensatz PDXpert (Configlist HW), Version 3.9.0, 2024-07-09, Worldline Healthcare GmbH: 1
- 6] Evaluation Technical Report (ETR Summary), Version 1, 2025-10-08, TÜV Informationstechnik GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT), BSI-: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
| pdf_data/report_metadata |
|
- /Author: Federal Office for Information Security
- /Keywords: Common Criteria, Certification, Zertifizierung, eHealth, Kartenterminal, Worldline
- /Subject: Common Criteria, Certification, Zertifizierung, eHealth, Kartenterminal, Worldline
- /Title: Certification Report BSI-DSZ-CC-0519-V6-2025
- pdf_file_size_bytes: 365567
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/dok/Zertifizierung-Gesamtlisten, https://www.bsi.bund.de/AIS, https://www.sogis.eu/, http://www.commoncriteriaportal.org/cc/
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
| pdf_data/st_filename |
Cible-ANSSI-CC-2025_04en.pdf |
0519V6b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
- NL:
- CC-1: 2
- CC-2: 3
- CC-3: 3
- NSCIB-CC-2300182-01: 1
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0099-V2-2020: 1
|
- BSI:
- BSI-CC-PP-0032: 1
- BSI-CC-PP-0032-: 1
- BSI-CC-PP-0032-V3-2023: 1
- BSI-CC-PP-0046: 1
- BSI-CC-PP-0082: 1
- BSI-CC-PP-0098: 1
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 2
- EAL6+: 1
|
- EAL:
- EAL 3: 2
- EAL 3 augmented: 2
- EAL3: 1
- EAL3 augmented: 1
- EAL3+: 2
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 4
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 5
- AGD:
- AGD_OPE.1: 9
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 4
- ALC_FLR.1: 4
- ALC_FLR.2: 1
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 4
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 1
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 5
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 5
- ADV_IMP.1: 6
- ADV_TDS.3: 4
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 15
- FAU_ARP.1.1: 2
- FAU_GEN: 1
- FAU_SAA.1: 3
- FAU_SAR: 2
- FAU_SAS: 1
- FAU_SAS.1: 1
- FCO:
- FCO_NRO: 28
- FCO_NRO.2: 9
- FCO_NRR: 5
- FCO_NRR.1: 3
- FCS:
- FCS_CKM: 72
- FCS_CKM.1: 31
- FCS_CKM.2: 9
- FCS_CKM.4: 65
- FCS_CKM.4.1: 1
- FCS_CKM.5: 7
- FCS_CKM.5.1: 1
- FCS_COP: 160
- FCS_COP.1: 31
- FCS_RNG: 1
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 66
- FDP_ACC.1: 27
- FDP_ACC.2: 5
- FDP_ACF: 58
- FDP_ACF.1: 38
- FDP_IFC: 67
- FDP_IFC.1: 23
- FDP_IFC.2: 6
- FDP_IFF: 53
- FDP_IFF.1: 27
- FDP_ITC: 32
- FDP_ITC.1: 23
- FDP_ITC.2: 33
- FDP_ITT.1: 1
- FDP_RIP: 127
- FDP_RIP.1: 9
- FDP_ROL: 32
- FDP_ROL.1: 11
- FDP_SDC.1: 1
- FDP_SDI: 25
- FDP_SDI.2: 10
- FDP_SDI.2.2: 1
- FDP_UCT: 6
- FDP_UCT.1: 1
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 11
- FIA_AFL.1: 8
- FIA_API.1: 1
- FIA_ATD: 13
- FIA_ATD.1: 3
- FIA_UAU: 27
- FIA_UAU.1: 4
- FIA_UAU.4: 1
- FIA_UID: 34
- FIA_UID.1: 14
- FIA_UID.2: 1
- FIA_USB: 7
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 6
- FMT_MSA: 189
- FMT_MSA.1: 19
- FMT_MSA.2: 2
- FMT_MSA.3: 30
- FMT_MTD: 38
- FMT_MTD.1: 5
- FMT_MTD.3: 2
- FMT_SMF: 78
- FMT_SMF.1: 28
- FMT_SMF.1.1: 1
- FMT_SMR: 82
- FMT_SMR.1: 43
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 12
- FPR_UNO.1: 14
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 58
- FPT_FLS.1: 7
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_RCV: 24
- FPT_RCV.3: 10
- FPT_RCV.4: 1
- FPT_STM: 3
- FPT_STM.1: 5
- FPT_TDC: 9
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FTP:
- FTP_ITC: 34
- FTP_ITC.1: 13
- FTP_TRP: 10
- FTP_TRP.1: 11
|
- FCS:
- FCS_CKM: 23
- FCS_CKM.1: 14
- FCS_CKM.2: 4
- FCS_CKM.4: 36
- FCS_CKM.4.1: 1
- FCS_COP: 54
- FCS_COP.1: 10
- FDP:
- FDP_ACC: 31
- FDP_ACC.1: 12
- FDP_ACF: 26
- FDP_ACF.1: 15
- FDP_IFC: 24
- FDP_IFC.1: 12
- FDP_IFF: 24
- FDP_IFF.1: 17
- FDP_ITC.1: 15
- FDP_ITC.2: 12
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL: 18
- FIA_AFL.1: 5
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 10
- FIA_SOS.1.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA: 45
- FMT_MSA.1: 8
- FMT_MSA.2: 10
- FMT_MSA.2.1: 1
- FMT_MSA.3: 15
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_PHP.1: 10
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 14
- FPT_PHP.3.1: 1
- FPT_TST.1: 12
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTP:
- FTP_ITC: 8
- FTP_ITC.1: 4
- FTP_TRP: 9
- FTP_TRP.1: 3
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.APPS-PROVIDER: 3
- A.CAP_FILE: 4
- A.CONTROLLING-: 1
- A.CONTROLLING-AUTHORITY: 2
- A.ISSUER: 3
- A.KEY-ESCROW: 3
- A.KEYS-PROT: 3
- A.OS-UPDATE-: 1
- A.OS-UPDATE-EVIDENCE: 2
- A.PERSONALISER: 3
- A.PRODUCTION: 4
- A.SCP-SUPP: 3
- A.SECURE_ACODE_: 1
- A.SECURE_ACODE_MANAGEMENT: 2
- A.VERIFICA: 1
- A.VERIFICATION: 2
- A.VERIFICATION-: 1
- A.VERIFICATION-AUTHORITY: 2
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 5
- D.APP_I_DATA: 9
- D.APP_KEYS: 9
- D.APSD_DAP_KEYS: 1
- D.APSD_KEYS: 3
- D.CASD_DAP_KEYS: 1
- D.CASD_KEYS: 1
- D.CCCM_KEYS: 1
- D.CLFDB-DK: 1
- D.CONFIRMATION-: 1
- D.CONFIRMATION-DATA: 1
- D.CRYPTO: 4
- D.CTL_PRO: 5
- D.CTL_REGISTRY: 5
- D.CVM_MGMT_STATE: 3
- D.CVM_PIN: 3
- D.DAP_BLOCK: 1
- D.ELF_AID: 3
- D.ELF_APP_INS: 3
- D.ELF_RG_DATA: 1
- D.ELF_SESSION_ST: 2
- D.GP_CODE: 1
- D.GP_REGISTRY: 6
- D.GS-PARAMETERS: 1
- D.ISD_KEYS: 3
- D.JCS_CODE: 6
- D.JCS_DATA: 10
- D.NEW_ELF: 3
- D.OLD_ELF: 3
- D.OS: 1
- D.OS-: 3
- D.OS-UPDATE-CODE-: 1
- D.OS-UPDATE-CODE-ID: 1
- D.OS-UPDATE_ADDITIONALCODE: 3
- D.OS-UPDATE_DEC-: 1
- D.OS-UPDATE_DEC-KEY: 1
- D.OS-UPDATE_SGNVER-KEY: 1
- D.PIN: 6
- D.RECEIPT-: 1
- D.RECEIPT-GENERATION-KEY: 1
- D.SEC_DATA: 8
- D.TOE_IDENTIFIER: 1
- D.TOKEN-: 1
- D.TOKEN-VERIFICATION-KEY: 1
- O:
- O.ALARM: 16
- O.APPLET: 16
- O.APPLI-AUTH: 5
- O.ARRAY_VIEWS_: 1
- O.ARRAY_VIEWS_CONFID: 4
- O.ARRAY_VIEWS_I: 1
- O.ARRAY_VIEWS_INTEG: 4
- O.CARD-: 11
- O.CARD-MANAGEMENT: 22
- O.CCCM: 9
- O.CIPHER: 9
- O.CLFDB-DECIPHER: 5
- O.CODE_: 1
- O.CODE_CAP_FILE: 12
- O.CODE_PKG: 1
- O.COMM-: 1
- O.COMM-AUTH: 10
- O.COMM-CONFIDENTIALITY: 7
- O.COMM-INTEGRITY: 10
- O.CONFID-OS-: 1
- O.CONFID-OS-UPDATE: 6
- O.CRS_COUNTERS: 5
- O.CRS_PRIVILEGES: 5
- O.CRT-MNGT: 5
- O.CTL_REGISTRY: 5
- O.CTL_SC: 5
- O.CVM-BLOCK: 9
- O.CVM-MGMT: 9
- O.DELETION: 5
- O.DOMAIN-RIGHTS: 9
- O.ELF_APP_DATA: 7
- O.ELF_AUTHORISED: 5
- O.ELF_DATA_PRO: 5
- O.ELF_DELE_IRR: 5
- O.ELF_INTEGRITY: 5
- O.ELF_SESSION: 7
- O.FIREWALL: 19
- O.GLOBAL-CVM: 5
- O.GLOBAL_ARRAY: 2
- O.GLOBAL_ARRAYS_CONFID: 6
- O.GLOBAL_ARRAYS_INTEG: 6
- O.INSTALL: 11
- O.JAVAO: 1
- O.JAVAOB: 4
- O.JAVAOBJE: 1
- O.JAVAOBJECT: 42
- O.KEY-MNGT: 9
- O.LC-MANAGEMENT: 6
- O.LOAD: 11
- O.MTC-CTR-: 1
- O.MTC-CTR-MNGT: 4
- O.NATIVE: 11
- O.NO-KEY-REUSE: 5
- O.OBJ-DELETION: 5
- O.OPERATE: 23
- O.PIN-: 1
- O.PIN-MNGT: 7
- O.PRIVILEGES-: 1
- O.PRIVILEGES-MANAGEMENT: 4
- O.REALLOCATION: 7
- O.RECEIPT: 5
- O.RESOURCES: 7
- O.RND: 1
- O.RNG: 8
- O.SCP: 45
- O.SECURE_AC_ACTIV: 1
- O.SECURE_AC_ACTIVATION: 6
- O.SECURE_LOAD_AC: 1
- O.SECURE_LOAD_ACODE: 10
- O.SECURITY-: 2
- O.SECURITY-DOMAINS: 3
- O.SENSITIVE_ARR: 1
- O.SENSITIVE_ARRAYS_INTEG: 4
- O.SENSITIVE_RES: 1
- O.SENSITIVE_RESULTS_INTEG: 4
- O.SID: 15
- O.TOE-: 1
- O.TOE_IDENTIFICATI: 1
- O.TOE_IDENTIFICATION: 6
- O.TOKEN: 5
- O.TRANSACTION: 7
- OE:
- OE.ADMIN: 3
- OE.AID-MANAGEMENT: 3
- OE.AP-KEYS: 3
- OE.APPLICATIONS: 3
- OE.APPS-PROVIDER: 3
- OE.CA-KEYS: 3
- OE.CAP_FILE: 6
- OE.CLFDB-ENC-PR: 3
- OE.CODE-: 5
- OE.CODE-EVIDENCE: 12
- OE.CONTROLLING-: 1
- OE.CONTROLLING-AUTHORITY: 2
- OE.DAP_BLOCK_GEN: 3
- OE.ISD-KEYS: 3
- OE.ISSUER: 3
- OE.KEY-CHANGE: 3
- OE.KEY-ESCROW: 3
- OE.KEY-GENERATION: 3
- OE.KEYS-PROT: 3
- OE.LOADING: 3
- OE.OS-UPDATE-: 1
- OE.OS-UPDATE-ENCRYPTION: 4
- OE.OS-UPDATE-EVIDENCE: 3
- OE.PERSONALISER: 3
- OE.PRODUCTION: 4
- OE.RECEIPT-VER: 3
- OE.SCP: 3
- OE.SCP-SUPP: 3
- OE.SECURE_ACODE_MANA: 1
- OE.SECURE_ACODE_MANAGEMENT: 2
- OE.SERVERS: 3
- OE.TOKEN-GEN: 3
- OE.VERIFICATION: 35
- OE.VERIFICATION-: 1
- OE.VERIFICATION-AUTHORITY: 2
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 4
- OP.ARRAY_LENGTH: 4
- OP.ARRAY_T_ALOAD: 3
- OP.ARRAY_T_ASTORE: 3
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_CAP_FILE: 3
- OP.DELETE_CAP_FILE_APPLET: 3
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.PUT: 5
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.ADDITIONAL_CODE_EN: 1
- OSP.ADDITIONAL_CODE_ENCRYPTION: 2
- OSP.ADDITIONAL_CODE_SIG: 1
- OSP.ADDITIONAL_CODE_SIGNING: 2
- OSP.AID-MANAGEMENT: 3
- OSP.APPLICATIONS: 3
- OSP.APSD-KEYS: 3
- OSP.ATOMIC_ACTIVATION: 3
- OSP.CASD-KEYS: 3
- OSP.CCCM: 3
- OSP.CLFDB-ENC-PR: 3
- OSP.DAP_BLOCK_GEN: 3
- OSP.ELF_DELE_OP: 3
- OSP.ISD-KEYS: 3
- OSP.KEY-CHANGE: 3
- OSP.KEY-GENERATION: 3
- OSP.LOADING: 3
- OSP.RECEIPT-VER: 3
- OSP.SECURITY-DOMAINS: 3
- OSP.SERVERS: 3
- OSP.TOE_IDENTIFICATION: 3
- OSP.TOKEN-GEN: 3
- OSP.VERIFICATION: 3
- R:
- T:
- T.BRUTE-FORCE-CVM: 3
- T.BRUTE-FORCE-SCP: 3
- T.CLFDB-DISC: 3
- T.COM-EXPLOIT: 4
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-: 2
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 2
- T.CONFID-OS-UPDATE-: 1
- T.CONFID-OS-UPDATE-LOAD: 2
- T.COUNTERS-FREEZE: 3
- T.CRS-BYPASS: 3
- T.CTL-AUTH-FORGE: 3
- T.CTL-REGISTRY-: 1
- T.CTL-REGISTRY-OVERWRITE: 2
- T.CVM-IMPERSONATE: 3
- T.CVM-UPDATE: 3
- T.DELETION: 4
- T.ELF-DATA-ACCESS: 3
- T.ELF-DATA-INTEGRITY: 3
- T.ELF-ILL-COMMAND: 3
- T.ELF-RES-DATA: 3
- T.ELF-SESSION: 3
- T.ELF-UNAUTHORISED: 3
- T.ELF-VERSION: 3
- T.EXE-CODE: 7
- T.FAKE-SGNVER-KEY: 3
- T.INSTALL: 4
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 5
- T.INTEG-JCS-: 1
- T.INTEG-JCS-CODE: 2
- T.INTEG-JCS-DATA: 3
- T.INTEG-OS-UPDATE-: 1
- T.INTEG-OS-UPDATE-LOAD: 2
- T.LIFE-CYCLE: 4
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 9
- T.RECEIPT: 3
- T.RESOURCES: 3
- T.RND: 1
- T.SID: 8
- T.TOKEN: 3
- T.UNAUTHORISED-: 1
- T.UNAUTHORISED-CARD-MGMT: 4
- T.UNAUTHORISED-TOE-: 1
- T.UNAUTHORISED-TOE-CODE-: 1
- T.UNAUTHORISED-TOE-CODE-UPDATE: 1
- T.WRONG-UPDATE-: 1
- T.WRONG-UPDATE-STATE: 2
|
- A:
- A.ADMIN: 3
- A.CONNECTOR: 3
- A.ENV: 6
- A.PUSH_SERV: 1
- A.PUSH_SERVER: 3
- A.SAC: 6
- A.SM: 5
- O:
- O.-: 1
- O.AC-: 1
- O.ACCESS_-: 2
- O.ACCESS_CONTROL: 7
- O.MANAGEMENT: 8
- O.PIN_ENTRY: 6
- O.PROTEC-: 1
- O.PROTECTION: 7
- O.SECURE_CHANNEL: 4
- O.STATE: 8
- OE:
- OE.AD-: 1
- OE.ADMIN: 5
- OE.CONNECTOR: 7
- OE.ENV: 14
- OE.PUSH_SERVER: 2
- OE.SAC: 10
- OE.SM: 4
- OSP:
- T:
- T.COM: 3
- T.DATA: 3
- T.F-CON-: 1
- T.F-CONNECTOR: 2
- T.F-SAC: 7
- T.PIN: 6
|
| pdf_data/st_keywords/vendor |
- STMicroelectronics:
- Thales:
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- CMAC: 4
- HMAC: 15
- KMAC: 3
|
- AES_competition:
- AES:
- AES: 7
- AES128: 1
- AES256: 1
- HPC:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 5
- SHA-384: 5
- SHA-512: 4
- SHA224: 3
- SHA256: 4
- SHA384: 4
- SHA512: 4
- SHA3:
- SHA3-224: 1
- SHA3-256: 1
- SHA3-384: 1
- SHA3-512: 1
|
|
| pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 8
- Key agreement: 5
- KEX:
- MAC:
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 2
- NIST:
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_PSK_WITH_AES_128_CBC_S: 1
- TLS_PSK_WITH_NULL_SHA: 1
- TLS_PSK_WITH_NULL_SHA256: 1
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 5
- malfunction: 4
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 3
- Physical Probing: 2
- physical probing: 3
- side channel: 1
- other:
|
|
| pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI 7500: 1
- BSI TR-03120: 2
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 180: 1
- FIPS 180-4: 5
- FIPS 197: 4
- FIPS 197126: 1
- FIPS 198: 2
- FIPS 202: 4
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 2
- FIPS PUB 186-4184: 1
- FIPS PUB 197: 3
- FIPS PUB 46-3: 2
- FIPS PUB 81: 2
- ICAO:
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 14888-2: 2
- ISO/IEC 18032: 4
- ISO/IEC 18032:2020: 1
- ISO/IEC 18033-3: 2
- ISO/IEC 3309206: 2
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-1: 7
- ISO/IEC 9797-2: 2
- PKCS:
- PKCS #1: 1
- PKCS#1: 9
- PKCS#5: 1
- PKCS#5157: 1
- PKCS#5161: 1
- RFC:
- RFC 5246: 2
- RFC 5758: 2
- RFC 5869: 2
- RFC2104: 2
- RFC2409: 1
- RFC2409174: 1
- RFC3610165: 1
- SCP:
- SCP02: 16
- SCP03: 13
- SCP10: 2
- SCP11: 13
- SCP22: 2
- SCP80: 12
- SCP81: 11
- X509:
|
- ISO:
- PKCS:
- RFC:
- RFC3268: 3
- RFC5246: 1
- RFC5289: 3
- RFC7251: 2
- X509:
|
| pdf_data/st_keywords/javacard_version |
- GlobalPlatform:
- JavaCard:
|
|
| pdf_data/st_keywords/javacard_api_const |
- ALG:
- AES:
- ALG_AES_BLOCK_128_CBC_NOPAD: 2
- ALG_AES_BLOCK_128_ECB_NOPAD: 2
- ALG_AES_CBC_ISO9797_M1: 2
- ALG_AES_CBC_ISO9797_M2: 2
- ALG_AES_CBC_PKCS5: 2
- ALG_AES_CCM: 2
- ALG_AES_CMAC_128: 4
- ALG_AES_CTR: 2
- ALG_AES_ECB_ISO9797_M1: 2
- ALG_AES_ECB_ISO9797_M2: 2
- ALG_AES_ECB_PKCS5: 2
- ALG_AES_GCM: 2
- ALG_AES_MAC_128_NOPAD: 2
- ALG_AES_MAC_192_NOPAD: 1
- ALG_AES_MAC_256_NOPAD: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 2
- ALG_DES_CBC_ISO9797_M2: 2
- ALG_DES_CBC_NOPAD: 2
- ALG_DES_CBC_PKCS5: 2
- ALG_DES_ECB_ISO9797_M1: 2
- ALG_DES_ECB_ISO9797_M2: 2
- ALG_DES_ECB_NOPAD: 2
- ALG_DES_ECB_PKCS5: 2
- ALG_DES_MAC4_ISO9797_1_M1_ALG3: 2
- ALG_DES_MAC4_ISO9797_1_M2_ALG3: 2
- ALG_DES_MAC4_ISO9797_M1: 2
- ALG_DES_MAC4_ISO9797_M2: 2
- ALG_DES_MAC4_NOPAD: 2
- ALG_DES_MAC4_PKCS5: 2
- ALG_DES_MAC8_ISO9797_1_M1_ALG3: 2
- ALG_DES_MAC8_ISO9797_1_M2_ALG3: 2
- ALG_DES_MAC8_ISO9797_M1: 2
- ALG_DES_MAC8_ISO9797_M2: 2
- ALG_DES_MAC8_NOPAD: 2
- ALG_DES_MAC8_PKCS5: 2
- EC:
- ALG_EC_FP: 6
- ALG_EC_SVDP_DHC_KDF: 2
- ALG_EC_SVDP_DHC_PLAIN: 1
- ALG_EC_SVDP_DH_KDF: 2
- ALG_EC_SVDP_DH_PLAIN: 1
- ALG_EC_SVDP_DH_PLAIN_XY: 2
- ECDSA:
- ALG_ECDSA_SHA: 2
- ALG_ECDSA_SHA_224: 2
- ALG_ECDSA_SHA_256: 2
- ALG_ECDSA_SHA_384: 2
- ALG_ECDSA_SHA_512: 2
- HMAC:
- ALG_HMAC_SHA1: 8
- ALG_HMAC_SHA_256: 8
- ALG_HMAC_SHA_384: 2
- ALG_HMAC_SHA_512: 2
- ISO3309:
- ALG_ISO3309_CRC16: 2
- ALG_ISO3309_CRC32: 2
- RSA:
- ALG_RSA_NOPAD: 2
- ALG_RSA_PKCS1: 1
- ALG_RSA_PKCS1_OAEP: 2
- ALG_RSA_SHA_224_PKCS1: 2
- ALG_RSA_SHA_224_PKCS1_PSS: 2
- ALG_RSA_SHA_256_PKCS1: 2
- ALG_RSA_SHA_256_PKCS1_PSS: 2
- ALG_RSA_SHA_384_PKCS1: 2
- ALG_RSA_SHA_384_PKCS1_PSS: 2
- ALG_RSA_SHA_512_PKCS1: 2
- ALG_RSA_SHA_512_PKCS1_PSS: 2
- ALG_RSA_SHA_ISO9796: 2
- ALG_RSA_SHA_ISO9796_MR: 2
- ALG_RSA_SHA_PKCS1: 2
- ALG_RSA_SHA_PKCS1_PSS: 2
- ALG_RSA_SHA_RFC2409: 2
- SHA:
- ALG_SHA_224: 4
- ALG_SHA_256: 6
- ALG_SHA_384: 4
- ALG_SHA_512: 4
- SHA3:
- ALG_SHA3_224: 4
- ALG_SHA3_256: 4
- ALG_SHA3_384: 4
- ALG_SHA3_512: 4
- curves:
- BRAINPOOLP192R1: 1
- BRAINPOOLP224R1: 1
- BRAINPOOLP256R1: 2
- BRAINPOOLP256T1: 1
- BRAINPOOLP320R1: 2
- BRAINPOOLP320T1: 1
- BRAINPOOLP384R1: 2
- BRAINPOOLP384T1: 1
- BRAINPOOLP512R1: 2
- BRAINPOOLP512T1: 1
- SECP192R1: 1
- SECP256R1: 2
- SECP384R1: 1
- SECP521R1: 2
- misc:
- CIPHER_AES_CCM: 2
- CIPHER_AES_GCM: 2
- LENGTH_AES_128: 2
- LENGTH_EC_FP_160: 3
- LENGTH_EC_FP_192: 2
- LENGTH_EC_FP_224: 3
- LENGTH_EC_FP_256: 2
- LENGTH_EC_FP_384: 3
- LENGTH_EC_FP_521: 2
- LENGTH_HMAC_SHA_1_BLOCK_64: 1
- LENGTH_HMAC_SHA_256_BLOCK_64: 1
- LENGTH_HMAC_SHA_384_BLOCK_128: 1
- LENGTH_HMAC_SHA_384_BLOCK_64: 1
- LENGTH_HMAC_SHA_512_BLOCK_128: 1
- LENGTH_HMAC_SHA_512_BLOCK_64: 1
- LENGTH_RSA_1024: 1
- LENGTH_RSA_1536: 1
- LENGTH_RSA_2048: 1
- LENGTH_SHA: 8
- LENGTH_SHA3_224: 2
- LENGTH_SHA3_384: 2
- LENGTH_SHA_224: 2
- LENGTH_SHA_384: 2
- PAD_PKCS1_OAEP: 1
- PAD_PKCS1_OAEP_SHA256: 1
- PAD_PKCS1_OAEP_SHA3_256: 1
- PAD_PKCS1_OAEP_SHA3_512: 1
- PAD_PKCS1_OAEP_SHA512: 1
- SIG_CIPHER_AES_CMAC128: 2
- SIG_CIPHER_AES_MAC128: 2
- SIG_CIPHER_DES_MAC4: 2
- SIG_CIPHER_DES_MAC8: 2
- SIG_CIPHER_ECDSA: 2
- SIG_CIPHER_ECDSA_PLAIN: 2
- SIG_CIPHER_HMAC: 2
- SIG_CIPHER_RSA: 2
- TYPE_ACCESS: 5
- TYPE_EC_FP_PRIVATE: 6
- TYPE_EC_FP_PRIVATE_TRANSIENT_RESET: 1
- TYPE_HMAC: 6
- TYPE_HMAC_TRANSIENT_RESET: 1
|
|
| pdf_data/st_keywords/javacard_packages |
- javacard:
- javacard.framework: 5
- javacard.security: 8
- javacardx:
- javacardx.crypto: 1
- javacardx.framework.time: 1
- javacardx.security: 3
- javacardx.security.cert: 1
- javacardx.security.util: 2
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- GemActivate). The platform implements the following modes, but they are out of scope of the TOE: ▪ mEAC v1: 1
- of software patches (GemActivate). The platform implements the following modes, but they are out of scope of the TOE: ▪ mEAC v1. ▪ Integrated mapping (DH and ECDH). ▪ Generic mapping (DH) ▪ PACE and mEAC: 1
- out of scope: 3
- protection of the confidentiality and integrity of user data, and for entity authentication. CSP is out of scope of the TOE. CSP provides service, including: Connected eSE 5.3.4 v1.2 Platform Security Target: 1
- v1.2 Platform Security Target Lite © Copyright Thales DIS France SAS - 2024 Page: 62 / 171 point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
|
|
| pdf_data/st_metadata |
- /CreationDate: D:20241031112531+01'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20241031112531+01'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 2293709
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 171
|
- /Keywords: ORGA 6141, online;Security, Target;Sicherheitsvorgaben
- /Subject: Security Target ORGA 6141 online
- /Title: Common-Criteria 3.1-Document
- pdf_file_size_bytes: 1835805
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 66
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |