name |
Xerox VersaLink B615X / B605X / B615XL / B605XL with Disk OverwriteController ROM Ver. 1.90.3 |
CardOS DI V5.3 EAC/PACE Version 1.0 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
active |
archived |
not_valid_after |
05.03.2028 |
23.06.2021 |
not_valid_before |
05.03.2023 |
23.06.2016 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0778_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0778_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0967a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0778_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0967b_pdf.pdf |
manufacturer |
Xerox Corporation |
Atos IT Solutions and Services GmbH |
manufacturer_web |
https://www.xerox.com |
https://www.de.atos.net |
security_level |
{} |
EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5 |
dgst |
d65d0c0398c8b7f9 |
85a1d2f13e1c4fe8 |
heuristics/cert_id |
JISEC-CC-CRP-C0778-01-2023 |
BSI-DSZ-CC-0967-2016 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
cpe:2.3:h:xerox:versalink_b615:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ALC_FLR.1, ASE_SPD.1, ATE_DPT.2, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_TAT.3, ATE_FUN.2, AGD_OPE.1, ADV_FUN.1, AGD_PRE.1, ATE_IND.3, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
1.90.3 |
1.0, 5.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0968-2016 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0968-2016 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0967-2016, BSI-DSZ-CC-0968-2016 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0967-2016, BSI-DSZ-CC-0968-2016, BSI-DSZ-CC-0782-2012 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0778
- certification_date: 01.03.2023
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0778
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000pyd-att/c0778_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device that has the functions such as copy, scan, print, fax. The TOE provides the security functionality required by the protection profile for Multifunction Device, “Protection Profile for Hardcopy Devices 1.0”. TOE security functionality The TOE provides the following security functions: Identification and Authentication Access Control Data Encryption Trusted Communications Security Management Security Auditing Trusted Operation PSTN Fax-Network Separation Overwrite Hard Disk
- evaluation_facility: Information Technology Security Center, Evaluation Department
- product: Xerox VersaLink B615X / B605X / B615XL / B605XL with Disk Overwrite
- product_type: Multifunction Device
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000pyd-att/c0778_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000pyd-att/c0778_est.pdf
- toe_version: Controller ROM Ver. 1.90.3
- vendor: Xerox Corporation
- expiration_date:
- supplier: Xerox Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0778_it2821.html
- toe_overseas_name: Xerox VersaLink B615X / B605X / B615XL / B605XL with Disk OverwriteController ROM Ver. 1.90.3
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
a33327d40f253f46 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
pdf_data/cert_filename |
c0778_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0778-01-2023: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230317115648+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20230317115905+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 87197
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0778_erpt.pdf |
0967a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2, AVA_VAN.5 SOGIS Recognition Agreement
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0967-2016
- cert_item: CardOS DI V5.3 EAC/PACE Version 1.0
- cert_lab: BSI
- developer: Atos IT Solutions and Services GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Machine Readable Travel Document with "ICAO Application" Extended Access Control with PACE, Version 1.3.2, 5 December 2012, BSI-CC-PP-0056-V2-2012-MA-02
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0778-01-2023: 1
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 7
- BSI-DSZ-CC-0967-2016: 21
- BSI-DSZ-CC-0968-2016: 1
- BSI-DSZ-CC-S-0056-2015: 2
- BSI-DSZ-CC-S-0057-2015: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 5
- BSI-CC-PP-0068-V2-2011: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 7
- EAL 2: 7
- EAL 3: 4
- EAL 4: 10
- EAL 4 augmented: 3
- EAL 5: 9
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- EAL5: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 2
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 2
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 3
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 2
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 2
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_RBG_EXT.1: 1
- FCS_TLS_EXT.1.1: 1
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- TUV:
- TÜV Informationstechnik: 3
- TÜViT: 1
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 1
- AIS 36: 3
- AIS 38: 1
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report Summary (ETR Summary) CardOS DI V5.3 EAC/PACE Version 1.0, TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile Machine Readable Travel Document with "ICAO Application" Extended Access: 1
- Version 1.0' and 'CardOS DI V5.3 EAC/PACE Version 1.0 (BAC)', Atos IT Solutions and Services GmbH (confidential document) [11] Guidance documentation for the TOE, Version 05/2014, CardOS V5.3 Chipcard Operating System: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20230413100050+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /ModDate: D:20230413100139+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /SourceModified: D:20230331013825
- /Title:
- pdf_file_size_bytes: 385268
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 32
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20160706085250+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Atos IT Solutions and Services GmbH, CardOS DI V5.3, EAC, PACE, MRTD, Reisepass"
- /ModDate: D:20160706085825+02'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0967-2016
- pdf_file_size_bytes: 1242671
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
c0778_est.pdf |
0967b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 4
- BSI-DSZ-CC-967: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0055-110: 1
- BSI-CC-PP- 0068-V2-2011: 3
- BSI-CC-PP-0035-2007: 4
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0055-: 2
- BSI-CC-PP-0055-110: 10
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0056-V2-2012-: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 4
- BSI-CC-PP-0068-: 2
- BSI-CC-PP-0068-V2: 1
- BSI-CC-PP-0068-V2-: 2
- BSI-CC-PP-0068-V2-2011: 39
- BSI-CC-PP-0071: 1
- BSI-CC-PP-0071-2012: 2
- BSI-PP- 0056-V2-2012-132: 1
- BSI-PP-0035: 5
- BSI-PP-0056-: 1
- BSI-PP-0056-V2-: 2
- BSI-PP-0056-V2-2012-132: 29
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 10
- EAL4 augmented: 2
- EAL6: 2
- EAL6 augmented: 2
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 1
- ADV_FUN.1: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 2
- ALC:
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR.1: 1
- APE:
- ASE:
- ASE_CCL: 8
- ASE_ECD: 9
- ASE_INT: 11
- ASE_OBJ: 13
- ASE_REQ: 50
- ASE_SPD: 18
- ASE_TSS: 20
- ATE:
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 5
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 13
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 31
- FCS_CKM.1.1: 2
- FCS_CKM.4: 7
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 24
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 87
- FCS_COP.1.1: 8
- FCS_KDF_EXT.1: 5
- FCS_KYC_EXT: 1
- FCS_KYC_EXT.1: 8
- FCS_KYC_EXT.1.1: 3
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 13
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 5
- FCS_SNI_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 1
- FCS_TLS_EXT.1: 16
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 1
- FDP_DSK_EXT.1: 7
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_FXS_EXT: 1
- FDP_FXS_EXT.1: 7
- FDP_FXS_EXT.1.1: 2
- FDP_RIP.1: 4
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_PMG: 3
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 1
- FPT_KYP_EXT.1: 7
- FPT_KYP_EXT.1.1: 2
- FPT_SKP_EXT: 1
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 10
- FTP_TRP.1.1: 4
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN: 2
- FAU_SAS: 8
- FAU_SAS.1: 14
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 227
- FCS_CKM.1: 24
- FCS_CKM.2: 16
- FCS_CKM.4: 64
- FCS_CKM.4.1: 1
- FCS_COP: 165
- FCS_COP.1: 24
- FCS_RND: 8
- FCS_RND.1: 26
- FCS_RND.1.1: 2
- FCS_RNG: 2
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 12
- FDP_ACC.1: 7
- FDP_ACF: 17
- FDP_ACF.1: 29
- FDP_IFC.1: 3
- FDP_ITC.1: 18
- FDP_ITC.2: 16
- FDP_ITT.1: 1
- FDP_RIP: 1
- FDP_RIP.1: 15
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 8
- FDP_UCT.1: 1
- FDP_UIT: 8
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 10
- FIA_AFL.1: 2
- FIA_API: 31
- FIA_API.1: 8
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 83
- FIA_UAU.1: 4
- FIA_UAU.4: 2
- FIA_UAU.5: 16
- FIA_UAU.6: 2
- FIA_UID: 18
- FIA_UID.1: 7
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 24
- FMT_LIM.1.1: 3
- FMT_LIM.2: 20
- FMT_LIM.2.1: 4
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 87
- FMT_MTD.1: 10
- FMT_MTD.3: 11
- FMT_MTD.3.1: 1
- FMT_SMF.1: 35
- FMT_SMF.1.1: 1
- FMT_SMR: 26
- FMT_SMR.1: 16
- FPT:
- FPT_EMS: 8
- FPT_EMS.1: 22
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 4
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_TST.1: 14
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 6
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 6
- O.ADMIN_ROLES: 4
- O.AUDIT: 9
- O.COMMS: 1
- O.COMMS_PROTECTION: 11
- O.FAX_NET_SEPARATION: 1
- O.IMAGE_OVERWRITE: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 2
- O.STORAGE_ENCRYPTION: 6
- O.TSF_SELF_TEST: 1
- O.UPDATE: 1
- O.UPDATE_VERIFICATION: 1
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAININ: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROT: 1
- OE.PHYSICAL_PROTE: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_A: 1
- T.UNAUTHORIZED_U: 1
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 14
- Infineon Technologies AG: 2
- NXP:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 10
- TDES: 31
- Triple-DES: 10
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 10
- Diffie-Hellman: 19
- DSA:
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 4
- SHA-512: 3
- SHA256: 6
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 14
- SHA-224: 7
- SHA-256: 8
- SHA-384: 7
- SHA-512: 6
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 3
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 58
- TLS 1.0: 2
- TLS 1.1: 2
- TLS 1.2: 3
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 10
- P-384: 6
- P-521: 6
|
- Brainpool:
- brainpoolP224r1: 1
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- Curve P-224: 1
- Curve P-256: 1
- Curve P-384: 1
- P-224: 3
- P-256: 3
- P-384: 3
- secp224r1: 1
- secp256r1: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 6
- Physical Tampering: 6
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- SCA:
- DPA: 3
- Leak-Inherent: 2
- SPA: 2
- physical probing: 5
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 3
- EF.DG1: 11
- EF.DG13: 1
- EF.DG14: 6
- EF.DG15: 5
- EF.DG16: 9
- EF.DG2: 5
- EF.DG3: 15
- EF.DG4: 15
- EF.DG5: 3
- EF.SOD: 10
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 7
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 18031:2011: 3
- ISO/IEC 18033-3: 1
- ISO/IEC 19772: 4
- ISO/IEC18031:2011: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38B: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-90A: 2
- RFC:
- RFC 2246: 2
- RFC 2818: 3
- RFC 4346: 2
- RFC 5246: 2
- X509:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ICAO:
- ISO:
- ISO/IEC 11770-3: 1
- ISO/IEC 14443: 6
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 9796-2: 2
- PKCS:
- RFC:
- RFC 2631: 1
- RFC 5639: 1
- RFC3369: 1
- RFC3447: 7
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Atos IT Solutions and Services GmbH
- /CreationDate: D:20160421104334+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, CardOS, ASE, EAC, PACE, AA
- /ModDate: D:20160421114844+02'00'
- /Producer: LibreOffice 5.1
- /Subject: Security Target
- /Title: Security Target 'CardOS DI V5.3 EAC/PACE Version 1.0', Rev. 2.01, Edition 04/2016
- pdf_file_size_bytes: 610951
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 129
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |