Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cellcrypt Mobile for Secret Client Version 1.0
CCEVS-VR-VID-10535-2014
STARCOS 3.5 ID GCC C2R
BSI-DSZ-CC-0952-2014
name Cellcrypt Mobile for Secret Client Version 1.0 STARCOS 3.5 ID GCC C2R
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US DE
not_valid_after 14.04.2016 18.11.2019
not_valid_before 14.04.2014 17.11.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10535-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10535-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952b_pdf.pdf
manufacturer Cellcrypt, Inc. G+D Mobile Security GmbH
manufacturer_web https://www.cellcrypt.com https://www.gi-de.com/de/de/mobile-security/
security_level {} EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5
dgst d5bea3cca35460ab 27e724cd297034a1
heuristics/cert_id CCEVS-VR-VID-10535-2014 BSI-DSZ-CC-0952-2014
heuristics/cert_lab US BSI
heuristics/extracted_sars ALC_CMS.2, ASE_TSS.1, ADV_FSP.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ALC_CMC.2, ATE_IND.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ASE_SPD.1, ATE_DPT.2, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 1.0 3.5
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0952-V2-2016
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0813-2012
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0952-V2-2016
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0813-2012
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0813-2012
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012
heuristics/protection_profiles 5c9f07187a15daeb 0e62a9ea5e7ca3a7
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_mobility_voip_v0.6-1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0061b_pdf.pdf
pdf_data/report_filename st_vid10535-vr.pdf 0952a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10535-2014
    • cert_item: Cellcrypt Mobile for Secret Client Version 1.0
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 SOGIS Recognition Agreement
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0952-2014
    • cert_item: STARCOS 3.5 ID GCC C2R
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 16 December 2009, BSI-CC-PP-0061-2009 and in accordance with BSI Technische Richtlinie BSI-TR-03116-2, 2013
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10535-2014: 1
  • DE:
    • BSI-DSZ-CC-0751-2013: 4
    • BSI-DSZ-CC-0813-2012: 4
    • BSI-DSZ-CC-0952-2014: 20
    • BSI-DSZ-CC-S-0017-2014: 2
    • BSI-DSZ-CC-S-0023-2013: 2
    • BSI-DSZ-CC-S-0029-2014: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0061-2009: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 14
    • EAL 4 augmented: 3
    • EAL 5: 8
    • EAL 6: 3
    • EAL 7: 4
    • EAL5+: 1
    • EAL6: 1
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 6
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM_EXT: 1
    • FCS_COP.1: 8
    • FCS_RBG_EXT: 2
    • FCS_SRTP_EXT: 2
    • FCS_TLS_EXT: 2
  • FIA:
    • FIA_SIPC_EXT: 1
  • FPT:
    • FPT_TUD_EXT.1: 1
  • FTP:
    • FTP_ITC.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.AUTHORIZED_USER: 1
    • A.AVAILABILITY: 1
    • A.OPER_ENV: 1
    • A.TRUSTED_ADMIN: 1
  • OE:
    • OE.AUTHORIZED_USER: 1
    • OE.AVAILABILITY: 1
    • OE.OPER_ENV: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.VERIFIABLE_UPDATES: 1
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 1
  • Samsung:
    • Samsung: 2
  • GD:
    • G&D: 2
    • Giesecke & Devrient: 19
  • Infineon:
    • Infineon: 3
    • Infineon Technologies: 1
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 3
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 4
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 8
      • TLS 1.2: 4
  • VPN:
    • VPN: 5
  • PACE:
    • PACE: 3
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 1
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 1
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 13
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
    • physical tampering: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7138: 1
    • BSI 7148: 1
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 26
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS 140-2: 3
  • NIST:
    • NIST SP 800-90: 1
  • RFC:
    • RFC 3711: 1
    • RFC 4566: 1
    • RFC 4568: 1
    • RFC 5246: 2
    • RFC 6460: 1
  • X509:
    • X.509: 1
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 1
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 4
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C2R, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7820 A11, Version 3, 02.04: 1
    • TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [11] STARCOS 3.5 ID GCC C2 Configuration 1, Application Specification, Version 1.0, 14.03.2013: 1
    • Version 1.1, 05.11.2014, Konfigurationsliste von STARCOS 3.5 ID GCC C2R, Giesecke & Devrient GmbH (confidential document) 21 / 34 Certification Report BSI-DSZ-CC-0952-2014 This page is intentionally left blank. 22 / 34: 1
    • Version 2.7, 05.08.2013, STARCOS 3.5 ID GCC C2R Security Target, Giesecke & Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15: 1
pdf_data/report_metadata
  • /Author: Kirill Sinitski
  • /Company: Entrust, Inc.
  • /CreationDate: D:20140422101342-04'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /ModDate: D:20140422101347-04'00'
  • /Producer: Adobe PDF Library 10.0
  • /SourceModified: D:20140422141332
  • pdf_file_size_bytes: 287391
  • pdf_hyperlinks: http://tools.ietf.org/html/rfc3711, http://tools.ietf.org/html/rfc4568
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20141203132656+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Giesecke & Devrient, G&D, STARCOS, nPA, Personalausweis, Identity Card, ID Card"
  • /ModDate: D:20141203133150+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0952-2014
  • pdf_file_size_bytes: 1238020
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
pdf_data/st_filename st_vid10535-st.pdf 0952b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0813-2012: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0035: 1
    • BSI-CC-PP-0059-2009-MA-01: 2
    • BSI-CC-PP-0061: 3
    • BSI-PP-0055: 1
    • BSI-PP-0056: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 5: 2
    • EAL4: 13
    • EAL4 augmented: 3
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 2
    • ALC_CMC.2: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 5
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
  • ADV:
    • ADV_ARC.1: 4
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_ECD: 2
  • ATE:
    • ATE_DPT.1: 2
    • ATE_DPT.2: 9
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 8
    • FCS_CKM_EXT: 2
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP: 2
    • FCS_COP.1: 17
    • FCS_COP.1.1: 4
    • FCS_DTLS_EXT.1: 3
    • FCS_RBG_EXT: 4
    • FCS_RBG_EXT.1: 4
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SIP_EXT.1: 2
    • FCS_SRPT_EXT.1.1: 1
    • FCS_SRTP_EXT: 4
    • FCS_SRTP_EXT.1: 4
    • FCS_SRTP_EXT.1.1: 1
    • FCS_SRTP_EXT.1.2: 1
    • FCS_SRTP_EXT.1.3: 1
    • FCS_SRTP_EXT.1.4: 1
    • FCS_TLS_EXT: 5
    • FCS_TLS_EXT.1: 4
    • FCS_TLS_EXT.1.1: 2
  • FIA:
    • FIA_SIPC_EXT: 3
    • FIA_SIPC_EXT.1: 2
    • FIA_SIPC_EXT.1.1: 2
    • FIA_SIPC_EXT.1.2: 3
    • FIA_SIPC_EXT.1.3: 2
    • FIA_SIPC_EXT.1.4: 2
    • FIA_UAU.5: 1
  • FPT:
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 2
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 4
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 4
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 5
    • FAU_SAS.1: 17
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 52
    • FCS_CKM.1: 16
    • FCS_CKM.2: 4
    • FCS_CKM.4: 20
    • FCS_COP: 56
    • FCS_COP.1: 11
    • FCS_RND: 7
    • FCS_RND.1: 12
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 3
  • FDP:
    • FDP_ACC: 16
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF: 23
    • FDP_ACF.1: 21
    • FDP_IFC.1: 5
    • FDP_ITC.1: 7
    • FDP_ITC.2: 8
    • FDP_ITT.1: 1
    • FDP_RIP: 4
    • FDP_RIP.1: 13
    • FDP_SDI: 14
    • FDP_SDI.1: 3
    • FDP_SDI.2: 7
  • FIA:
    • FIA_AFL: 32
    • FIA_AFL.1: 8
    • FIA_API: 20
    • FIA_API.1: 4
    • FIA_API.1.1: 3
    • FIA_SOS.2: 1
    • FIA_UAU: 45
    • FIA_UAU.1: 10
    • FIA_UAU.4: 6
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 15
    • FIA_UAU.6: 8
    • FIA_UIA: 1
    • FIA_UID: 25
    • FIA_UID.1: 11
  • FMT:
    • FMT_LIM: 13
    • FMT_LIM.1: 16
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 15
    • FMT_LIM.2.1: 2
    • FMT_MOF: 2
    • FMT_MOF.1: 1
    • FMT_MSA: 14
    • FMT_MSA.1: 5
    • FMT_MSA.2: 1
    • FMT_MSA.3: 8
    • FMT_MSA.4: 1
    • FMT_MTD: 86
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 2
    • FMT_MTD.3: 9
    • FMT_MTD.3.1: 1
    • FMT_SMF: 5
    • FMT_SMF.1: 38
    • FMT_SMR: 4
    • FMT_SMR.1: 31
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP: 6
    • FPT_PHP.1: 5
    • FPT_PHP.3: 14
    • FPT_TST: 2
    • FPT_TST.1: 15
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT.2: 3
  • FTP:
    • FTP_ITC: 23
    • FTP_ITC.1: 6
pdf_data/st_keywords/cc_claims
  • A:
    • A.AUTHORIZED_USER: 3
    • A.AVAILABILITY: 3
    • A.OPER_ENV: 2
    • A.TRUSTED_ADMIN: 3
  • O:
    • O.PROTECTED_COMMUNICATIONS: 3
    • O.TRUSTED_UPDATES: 3
    • O.VERIFIABLE_UPDATES: 1
  • OE:
    • OE.AUTHORIZED_USER: 3
    • OE.AVAILABILITY: 3
    • OE.OPER_ENV: 4
    • OE.TRUSTED_ADMIN: 4
    • OE.VERIFIABLE_U: 1
    • OE.VERIFIABLE_UPDATES: 1
  • T:
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNAUTHORIZED_UPDATE: 3
  • A:
    • A.CGA: 2
    • A.SCA: 2
  • O:
    • O.MEM_ACCESS: 1
    • O.RND: 3
  • OE:
    • OE.CGA_SSCD: 3
    • OE.CGA_TC_SVD: 2
    • OE.HID_TC_VAD: 1
    • OE.HID_VAD: 2
    • OE.SCA_TC_DTBS: 1
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • Qualcomm:
    • Qualcomm: 1
  • Samsung:
    • Samsung: 1
  • GD:
    • Giesecke & Devrient: 7
  • Infineon:
    • Infineon: 3
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
  • constructions:
    • MAC:
      • HMAC: 3
  • AES_competition:
    • AES:
      • AES: 20
  • DES:
    • 3DES:
      • Triple-DES: 6
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 9
      • KMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 4
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 7
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 8
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-2: 2
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • DTLS:
      • DTLS: 3
    • TLS:
      • TLS: 26
      • TLS 1.2: 4
  • VPN:
    • VPN: 11
  • PACE:
    • PACE: 95
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 2
  • RNG:
    • RBG: 4
    • RNG: 1
  • RNG:
    • RND: 6
    • RNG: 1
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 1
  • CBC:
    • CBC: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_DSS_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_DSS_WITH_AES_256_GCM_SHA38: 1
    • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDH_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_3DES_EDE_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 25
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 14
    • Physical Tampering: 4
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 7
  • SCA:
    • DPA: 2
    • Leak-Inherent: 6
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/tee_name
  • other:
    • TEE: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 147
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS 140-2: 3
    • FIPS PUB 186-3: 2
    • FIPS PUB 197: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-90: 2
  • RFC:
    • RFC 3261: 4
    • RFC 3550: 1
    • RFC 3711: 4
    • RFC 4566: 3
    • RFC 4568: 5
    • RFC 5246: 3
    • RFC 5280: 1
    • RFC 5759: 1
    • RFC 5764: 1
    • RFC 6460: 2
    • RFC2560: 1
  • X509:
    • X.509: 4
  • BSI:
    • AIS 31: 1
    • AIS20: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-4: 2
    • FIPS 197: 4
    • FIPS PUB 180-2: 2
    • FIPS PUB 180-4: 1
    • FIPS180-2: 1
  • ICAO:
    • ICAO: 7
    • ICAO-SAC: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#3: 3
  • RFC:
    • RFC 5639: 7
    • RFC3369: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • to the plastic Identity Card is achieved by physical and organisational security measures being out of scope of the current ST. The TOE shall comprise at least a) the circuitry of the contactless chip incl: 1
pdf_data/st_metadata
  • /AAPL:Keywords: ['']
  • /Author: Richard Chen
  • /CreationDate: D:20140422135444Z
  • /Creator: Word
  • /Keywords:
  • /ModDate: D:20140422102706-04'00'
  • /Producer: Mac OS X 10.9.2 Quartz PDFContext
  • /Subject:
  • /Title: ST v3.2
  • pdf_file_size_bytes: 800293
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 37
  • /Author: stut
  • /CreationDate: D:20141103145118+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: Version 2.9 Status 03.11.2014
  • /ModDate: D:20141103145118+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: STARCOS 3.5 ID GCC C2R
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 2021253
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 132
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_garbage True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different