Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Google Pixel Devices on Android 14
CCEVS-VR-VID-11419-2024
NXP eDoc Suite v3.0 - cryptovision ePasslet Suite - Java Card applet configuration providing Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use with BAC option
BSI-DSZ-CC-1023-2018
name Google Pixel Devices on Android 14 NXP eDoc Suite v3.0 - cryptovision ePasslet Suite - Java Card applet configuration providing Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use with BAC option
category Mobility ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US DE
status active archived
not_valid_after 27.03.2026 18.05.2023
not_valid_before 27.03.2024 18.05.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11419-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1023c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11419-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1023a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11419-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1023b_pdf.pdf
manufacturer Google LLC NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.google.com https://www.nxp.com
security_level {} EAL4+, ALC_DVS.2
dgst d822fb20999bc557 e4001ed7d2f56e9d
heuristics/cert_id CCEVS-VR-VID-11419-2024 BSI-DSZ-CC-1023-2018
heuristics/cert_lab US BSI
heuristics/cpe_matches cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2023-40096, CVE-2024-0039, CVE-2015-9030, CVE-2015-9050, CVE-2015-8998, CVE-2024-31316, CVE-2015-9028, CVE-2024-0037, CVE-2015-9043, CVE-2019-20606, CVE-2014-9979, CVE-2014-9972, CVE-2016-10332, CVE-2024-34741, CVE-2024-0045, CVE-2016-10386, CVE-2024-0038, CVE-2015-9023, CVE-2023-21352, CVE-2016-10391, CVE-2016-5853, CVE-2024-31332, CVE-2023-40079, CVE-2016-5859, CVE-2017-7372, CVE-2023-40095, CVE-2017-8241, CVE-2024-31324, CVE-2016-10380, CVE-2017-8253, CVE-2015-9073, CVE-2017-8268, CVE-2015-9001, CVE-2024-34738, CVE-2017-8234, CVE-2015-8595, CVE-2015-8592, CVE-2024-23713, CVE-2016-10341, CVE-2024-23704, CVE-2015-9062, CVE-2024-43084, CVE-2015-9029, CVE-2024-0036, CVE-2011-0419, CVE-2024-31323, CVE-2015-8596, CVE-2024-0018, CVE-2024-0049, CVE-2014-9965, CVE-2014-9973, CVE-2014-9974, CVE-2024-0040, CVE-2017-7364, CVE-2024-34739, CVE-2016-10381, CVE-2016-10387, CVE-2015-9051, CVE-2016-10383, CVE-2023-21355, CVE-2023-40080, CVE-2023-40084, CVE-2024-31314, CVE-2015-8996, CVE-2017-9678, CVE-2014-9963, CVE-2023-40078, CVE-2015-9027, CVE-2015-9068, CVE-2023-45776, CVE-2015-9069, CVE-2023-21360, CVE-2016-10339, CVE-2023-40111, CVE-2024-0048, CVE-2024-0022, CVE-2015-9066, CVE-2016-10384, CVE-2015-9046, CVE-2017-0843, CVE-2023-40076, CVE-2017-7367, CVE-2024-34727, CVE-2015-9036, CVE-2023-40073, CVE-2016-5867, CVE-2017-8263, CVE-2024-31331, CVE-2017-7366, CVE-2014-9968, CVE-2016-10392, CVE-2024-31317, CVE-2017-7371, CVE-2024-31322, CVE-2023-21357, CVE-2014-9937, CVE-2023-40094, CVE-2014-9935, CVE-2023-40081, CVE-2015-9065, CVE-2014-9411, CVE-2017-8267, CVE-2024-43081, CVE-2015-8999, CVE-2024-23712, CVE-2017-8240, CVE-2016-5872, CVE-2023-40082, CVE-2023-21350, CVE-2016-10338, CVE-2016-10340, CVE-2016-10239, CVE-2015-0576, CVE-2017-0862, CVE-2024-34737, CVE-2008-7298, CVE-2017-8243, CVE-2024-40661, CVE-2024-0032, CVE-2024-31339, CVE-2017-8255, CVE-2024-34740, CVE-2015-9072, CVE-2017-8237, CVE-2015-9000, CVE-2024-0019, CVE-2016-5862, CVE-2023-40114, CVE-2017-7373, CVE-2024-0017, CVE-2023-40110, CVE-2024-0047, CVE-2014-9962, CVE-2015-9031, CVE-2024-0050, CVE-2023-40090, CVE-2014-9978, CVE-2017-8233, CVE-2015-9070, CVE-2024-31326, CVE-2014-9936, CVE-2024-0053, CVE-2014-9981, CVE-2024-31325, CVE-2017-7365, CVE-2024-0052, CVE-2015-9048, CVE-2014-9964, CVE-2017-8266, CVE-2024-0046, CVE-2015-9060, CVE-2017-8239, CVE-2024-0030, CVE-2015-9054, CVE-2015-9035, CVE-2015-8593, CVE-2024-40656, CVE-2023-45781, CVE-2016-5858, CVE-2023-21373, CVE-2024-31318, CVE-2016-10342, CVE-2016-10334, CVE-2024-23708, CVE-2015-9037, CVE-2023-45777, CVE-2023-21361, CVE-2024-43089, CVE-2024-43086, CVE-2014-9977, CVE-2015-9041, CVE-2023-21351, CVE-2024-23705, CVE-2016-5861, CVE-2016-10335, CVE-2015-9052, CVE-2024-0020, CVE-2024-40652, CVE-2024-40659, CVE-2017-8256, CVE-2017-9685, CVE-2023-21364, CVE-2024-34721, CVE-2015-0574, CVE-2014-9961, CVE-2024-0023, CVE-2016-5863, CVE-2016-5347, CVE-2024-0016, CVE-2014-9976, CVE-2017-8261, CVE-2024-43088, CVE-2016-10346, CVE-2015-9032, CVE-2016-5871, CVE-2024-31315, CVE-2024-0044, CVE-2016-10389, CVE-2024-34719, CVE-2014-9969, CVE-2023-21366, CVE-2023-21374, CVE-2017-6421, CVE-2016-10343, CVE-2024-40662, CVE-2016-10390, CVE-2024-40654, CVE-2016-10344, CVE-2015-9020, CVE-2023-45774, CVE-2017-8235, CVE-2023-21353, CVE-2024-0041, CVE-2021-39810, CVE-2016-10347, CVE-2016-10333, CVE-2024-43093, CVE-2024-0014, CVE-2024-0051, CVE-2015-9055, CVE-2024-43090, CVE-2023-21354, CVE-2015-8594, CVE-2015-1529, CVE-2015-9038, CVE-2015-9045, CVE-2023-21359, CVE-2023-40077, CVE-2024-34720, CVE-2017-8272, CVE-2024-0024, CVE-2023-40091, CVE-2016-10385, CVE-2017-8260, CVE-2024-31313, CVE-2017-7370, CVE-2024-0026, CVE-2024-34743, CVE-2017-9682, CVE-2024-34731, CVE-2016-5855, CVE-2024-0031, CVE-2016-5864, CVE-2015-9022, CVE-2023-40109, CVE-2024-31327, CVE-2024-40655, CVE-2024-0027, CVE-2017-0865, CVE-2024-0025, CVE-2015-9040, CVE-2017-7369, CVE-2014-9975, CVE-2024-40657, CVE-2024-43087, CVE-2015-8997, CVE-2023-40093, CVE-2023-40075, CVE-2016-10382, CVE-2015-9042, CVE-2014-9966, CVE-2015-9067, CVE-2015-9025, CVE-2015-9061, CVE-2024-23717, CVE-2017-8238, CVE-2015-9024, CVE-2024-0021, CVE-2024-23709, CVE-2024-31319, CVE-2017-9679, CVE-2023-40107, CVE-2017-8270, CVE-2023-40100, CVE-2015-9044, CVE-2015-8995, CVE-2015-9047, CVE-2015-9049, CVE-2023-40105, CVE-2024-23707, CVE-2024-34722, CVE-2024-40660, CVE-2016-5854, CVE-2017-0864, CVE-2023-40092, CVE-2017-8257, CVE-2024-31310, CVE-2017-8236, CVE-2015-0575, CVE-2023-40106, CVE-2024-34723, CVE-2017-8262, CVE-2024-34734, CVE-2024-43083, CVE-2023-40098, CVE-2015-9064, CVE-2017-9680, CVE-2024-43085, CVE-2015-9063, CVE-2014-9971, CVE-2024-0035, CVE-2024-43091, CVE-2015-9053, CVE-2023-40087, CVE-2023-21358, CVE-2014-9980, CVE-2017-8254, CVE-2023-40088, CVE-2016-10337, CVE-2015-9033, CVE-2024-23706, CVE-2023-21356, CVE-2023-40115, CVE-2017-9684, CVE-2024-23710, CVE-2015-9034, CVE-2023-45773, CVE-2023-45775, CVE-2015-9021, CVE-2017-8242, CVE-2014-9960, CVE-2024-0033, CVE-2024-0043, CVE-2024-40658, CVE-2023-40089, CVE-2024-31312, CVE-2024-31311, CVE-2017-8265, CVE-2020-13843, CVE-2016-5860, CVE-2016-10388, CVE-2015-9003, CVE-2017-0863, CVE-2024-34736, CVE-2014-9967, CVE-2015-9002, CVE-2015-9071, CVE-2023-40103, CVE-2017-7368, CVE-2016-10336, CVE-2015-9026, CVE-2023-40083, CVE-2024-40650, CVE-2015-9039, CVE-2024-34742, CVE-2024-43080 {}
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ALC_TAT.1, ALC_CMS.4, ALC_COMP.1, ALC_DEL.1, ALC_DVS.2, ADV_ARC.1, ALC_LCD.1, ALC_CMC.4
heuristics/extracted_versions 14 3.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-0973-V2-2016
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016
heuristics/scheme_data
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016
heuristics/protection_profiles 29ba341b00e9bd10, c40ae795865a0dba, 51729b94f0ac139f, 36b1d4890baaa7f4, 83014eb399a802f3, 593b939921a117e0 60455fc9564e2545
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_WLANC_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_mdm_agent_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD-BIO-v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf
pdf_data/cert_filename st_vid11419-ci.pdf 1023c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11419-2024: 1
  • DE:
    • BSI-DSZ-CC-1023-2018: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055-2009: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 4 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
pdf_data/cert_keywords/vendor
  • NXP:
    • NXP: 1
    • NXP Semiconductors: 1
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
pdf_data/cert_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/cert_keywords/standard_id
  • ICAO:
    • ICAO: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20240329114002-04'00'
  • /ModDate: D:20240329114002-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 189538
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20180523092821+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, TR-03110, BAC, MRED, MRTD, PP-0055"
  • /ModDate: D:20180523113916+02'00'
  • /Producer: LibreOffice 5.2
  • /Subject: NXP eDoc Suite - cryptovision ePasslet Suite - Java Card applet configuration providing Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use with BAC option
  • /Title: Certification Report BSI-DSZ-CC-1023-2018
  • pdf_file_size_bytes: 356019
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11419-vr.pdf 1023a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID11419-2024
    • cert_item: Google Pixel Devices on Android 14
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1023-2018
    • cert_item: NXP eDoc Suite v3.0 - cryptovision ePasslet Suite - Java Card applet configuration providing Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use with BAC option
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Machine Readable Travel Document with "ICAO Application" Basic Access Control, Version 1.10, 25 March 2009, BSI-CC-PP-0055-2009
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11419-2024: 1
  • DE:
    • BSI-DSZ-CC-0973-V2-2016: 2
    • BSI-DSZ-CC-1022-2018: 3
    • BSI-DSZ-CC-1023: 1
    • BSI-DSZ-CC-1023-2018: 18
  • NL:
    • CC-98209-CR2: 1
    • NSCIB-CC-67206-CR2: 2
    • NSCIB-CC-98209-CR2: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055-: 1
    • BSI-CC-PP-0055-2009: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL 5+: 1
    • EAL 6: 1
    • EAL5+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_COMP.1: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP: 2
    • FCS_COP.1.1: 1
    • FCS_RND.1: 1
  • FIA:
    • FIA_UAU.4: 2
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.APPLET: 1
    • OE.APPS-PROVIDE: 1
    • OE.CODE-EVIDENCE: 1
    • OE.KEY-CHANGE: 1
    • OE.PROCESS_SEC_IC: 1
    • OE.SECURITY-DOMAINS: 1
    • OE.USE_DIAG: 1
    • OE.USE_KEYS: 1
    • OE.VERIFICATION: 1
    • OE.VERIFICATION-AUTHORITY: 1
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 3
  • NXP:
    • NXP: 34
    • NXP Semiconductors: 4
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
  • BrightSight:
    • Brightsight: 2
  • TUV:
    • TÜV Informationstechnik: 4
    • TÜViT: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 10
  • DES:
    • 3DES:
      • TDES: 2
    • DES:
      • DES: 5
  • constructions:
    • MAC:
      • CMAC: 3
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 4
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 8
  • PACE:
    • PACE: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 6
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-03110: 12
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 2
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 3: 8
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 26: 1
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 2
    • AIS 46: 1
    • AIS20: 1
    • AIS35: 1
    • AIS36: 1
  • FIPS:
    • FIPS180-4: 1
    • FIPS197: 3
    • FIPS46-3: 3
  • ICAO:
    • ICAO: 9
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Composition NXP JCOP 3 SECID P60 CS (OSB) – EAL5+, version 3.0, 04 December 2017, Brightsight B.V. (confidential document) [16] Certification Report Crypto Library V3.1.x on P6022y VB, Certificate number CC-17- 67206: 1
    • Report for Composite Evaluation P6022y VB, version 1, 25 August 2016, TÜV Informationstechnik GmbH (confidential document) [20] Guidance Document for the platform: JCOP 3 SECID P60 CS User Guidance and Administration: 1
    • SAC) Functional Specification ADV_FSP. Version 3.0.5, 29 September 2017, cv cryptovision GmbH (confidential document) 23 / 28 Certification Report BSI-DSZ-CC-1023-2018 C. Excerpts from the Criteria For the meaning: 1
    • V3.1.x on P6022y VB EAL6+/5+, Reference 17-RPT-421, version 3.0, 24 October 2017, Brightsight B.V. (confidential document) [18] Certification report BSI-DSZ-CC-0973-V2-2016 for NXP Secure Smart Card Controller P6022y VB: 1
    • based on BSI TR-03110 for Official Use with BAC option, Security Target Lite, cv cryptovision GmbH (confidential document) [10] Configuration list for the TOE, Revision 13027, 22 Februar 2018, File 2018-02-: 1
    • based on BSI TR-03110 for Official Use with BAC option, Security Target, cv cryptovision GmbH (confidential document) [7] Evaluation Technical Report BSI-DSZ-CC-1023, Version 2, 16 March 2018, ETR Summary – NXP eDoc: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • for Official Use with BAC option, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [8] Machine Readable Travel Document with "ICAO Application" Basic Access Control, Version 1.10: 1
    • xlsx, cv cryptovision GmbH (confidential document) [11] Guidance Document for the TOE: NXP eDoc Suite v3.0 – cryptovision ePasslet Suite – Java Card: 1
pdf_data/report_metadata
  • /Author: comptont
  • /CreationDate: D:20240328080104-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240328080104-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 332468
  • pdf_hyperlinks: http://www.kb.cert.org/vuls/, https://web.nvd.nist.gov/view/vuln/search
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename st_vid11419-st.pdf 1023b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0973-2016: 1
    • BSI-DSZ-CC-0973-V2-2016: 1
    • BSI-DSZ-CC-1023: 1
  • NL:
    • NSCIB-CC-15-67206-CR: 2
    • NSCIB-CC-98209-CR2: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055-2009: 1
    • BSI-CC-PP-0056-: 1
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP0055: 3
    • BSI-PP-0002-2001: 1
    • BSI-PP-0056: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4+: 1
    • EAL 5+: 2
    • EAL4: 8
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 4
    • ALC_CMS: 1
    • ALC_CMS.1: 5
    • ALC_TSU_EXT: 1
    • ALC_TSU_EXT.1: 8
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
  • ADV:
    • ADV_ARC.1: 2
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ALT_EXT.2: 3
    • FAU_ALT_EXT.2.1: 1
    • FAU_ALT_EXT.2.2: 1
    • FAU_GEN: 3
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 3
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL.1: 2
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 2
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 9
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM_EXT.1: 3
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 11
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.3: 11
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 5
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 2
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 3
    • FCS_CKM_EXT.6.1: 1
    • FCS_CKM_EXT.8: 4
    • FCS_CKM_EXT.8.1: 1
    • FCS_COP: 66
    • FCS_COP.1: 7
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_SRV_EXT.1: 3
    • FCS_SRV_EXT.1.1: 1
    • FCS_SRV_EXT.2: 2
    • FCS_SRV_EXT.2.1: 1
    • FCS_STC_EXT.1.2: 1
    • FCS_STG_EXT: 1
    • FCS_STG_EXT.1: 5
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 6
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 2
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_STG_EXT.4: 2
    • FCS_STG_EXT.4.1: 1
    • FCS_TLSC_EXT: 7
    • FCS_TLSC_EXT.1: 9
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 3
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.4: 2
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLSC_EXT.5: 2
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLS_EXT.1: 2
    • FCS_TLS_EXT.1.1: 1
    • FCS_WPA_EXT.1: 3
    • FCS_WPA_EXT.1.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF_EXT.1: 3
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 2
    • FDP_ACF_EXT.2: 2
    • FDP_ACF_EXT.2.1: 1
    • FDP_DAR_EXT.1: 3
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 4
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT.1: 3
    • FDP_IFC_EXT.1.1: 1
    • FDP_STG_EXT.1: 2
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 4
    • FDP_UPC_EXT.1: 5
  • FIA:
    • FIA_AFL_EXT.1: 2
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT.1: 3
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 3
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 3
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 3
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.4.2: 1
    • FIA_BLT_EXT.6: 2
    • FIA_BLT_EXT.6.1: 1
    • FIA_BLT_EXT.7: 3
    • FIA_BLT_EXT.7.1: 1
    • FIA_BMG_EXT: 1
    • FIA_ENR_EXT.2: 3
    • FIA_ENR_EXT.2.1: 1
    • FIA_MBE_EXT.1: 2
    • FIA_MBE_EXT.1.1: 1
    • FIA_MBE_EXT.2: 2
    • FIA_MBE_EXT.2.1: 1
    • FIA_MBV_EXT: 4
    • FIA_MBV_EXT.1: 7
    • FIA_MBV_EXT.2: 2
    • FIA_MBV_EXT.2.1: 1
    • FIA_PAE_EXT.1: 3
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT.1: 3
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 2
    • FIA_UAU.7: 1
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.1: 3
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 3
    • FIA_UAU_EXT.2.1: 3
    • FIA_UAU_EXT.2.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 4
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_POL_EXT.2: 3
    • FMT_POL_EXT.2.1: 1
    • FMT_POL_EXT.2.2: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 1
    • FMT_SMF_EXT: 2
    • FMT_SMF_EXT.1: 2
    • FMT_SMF_EXT.2: 2
    • FMT_SMF_EXT.2.1: 1
    • FMT_SMF_EXT.3: 2
    • FMT_SMF_EXT.3.1: 1
    • FMT_SMF_EXT.4: 3
    • FMT_SMF_EXT.4.1: 1
    • FMT_SMF_EXT.4.2: 1
    • FMT_UNR_EXT.1: 2
    • FMT_UNR_EXT.1.1: 2
  • FPT:
    • FPT_AEX_EXT.1: 3
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 2
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 3
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 2
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_AEX_EXT.5: 2
    • FPT_AEX_EXT.5.1: 1
    • FPT_AEX_EXT.5.2: 1
    • FPT_BBD_EXT.1: 2
    • FPT_BBD_EXT.1.1: 1
    • FPT_BDP_EXT.1: 2
    • FPT_BDP_EXT.1.1: 1
    • FPT_BDP_EXT.1.2: 1
    • FPT_JTA_EXT.1: 2
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT.1: 4
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 3
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 3
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT.1: 2
    • FPT_NOT_EXT.1.1: 1
    • FPT_PBT_EXT.1: 2
    • FPT_PBT_EXT.1.1: 1
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 8
    • FPT_TST_EXT.1: 3
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 2
    • FPT_TST_EXT.3: 2
    • FPT_TUD_EXT.1: 3
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 2
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.3: 2
    • FPT_TUD_EXT.3.1: 1
    • FPT_TUD_EXT.5: 1
    • FPT_TUD_EXT.6: 2
    • FPT_TUD_EXT.6.1: 1
  • FTA:
    • FTA_SSL_EXT.1: 3
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB.1: 1
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT.1: 3
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_BLT_EXT: 6
    • FTP_BLT_EXT.1: 3
    • FTP_BLT_EXT.1.1: 1
    • FTP_BLT_EXT.1.2: 1
    • FTP_BLT_EXT.2: 2
    • FTP_BLT_EXT.2.1: 1
    • FTP_BLT_EXT.3: 2
    • FTP_ITC: 2
    • FTP_ITC.1: 3
    • FTP_ITC_EXT.1: 5
    • FTP_ITC_EXT.1.1: 3
    • FTP_ITC_EXT.1.2: 2
    • FTP_ITC_EXT.1.3: 2
    • FTP_TRP.1: 1
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN: 1
    • FAU_SAS: 7
    • FAU_SAS.1: 14
    • FAU_SAS.1.1: 2
  • FCO:
    • FCO_NRO.2: 1
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 28
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 3
    • FCS_CKM.3: 1
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 4
    • FCS_COP: 49
    • FCS_COP.1: 25
    • FCS_COP.1.1: 18
    • FCS_LIM: 1
    • FCS_RND: 7
    • FCS_RND.1: 15
    • FCS_RND.1.1: 3
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 21
    • FDP_ACC.1.1: 3
    • FDP_ACC.2: 3
    • FDP_ACF: 3
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 4
    • FDP_IFC.1: 5
    • FDP_IFC.2: 1
    • FDP_IFF.1: 2
    • FDP_ITC: 2
    • FDP_ITC.1: 10
    • FDP_ITC.2: 11
    • FDP_RIP.1: 8
    • FDP_ROL.1: 2
    • FDP_SDI.2: 1
    • FDP_UCT: 2
    • FDP_UCT.1: 11
    • FDP_UCT.1.1: 3
    • FDP_UIT: 3
    • FDP_UIT.1: 10
    • FDP_UIT.1.1: 3
    • FDP_UIT.1.2: 2
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 12
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 16
    • FIA_UAU.4.1: 2
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 4
    • FIA_UAU.5.2: 6
    • FIA_UAU.6: 12
    • FIA_UAU.6.1: 2
    • FIA_UID: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 1
    • FIA_UID.2: 1
    • FIA_USB.1: 1
  • FMT:
    • FMT_LIM: 12
    • FMT_LIM.1: 25
    • FMT_LIM.1.1: 6
    • FMT_LIM.2: 22
    • FMT_LIM.2.1: 7
    • FMT_MSA.1: 9
    • FMT_MSA.2: 1
    • FMT_MSA.3: 11
    • FMT_MTD: 25
    • FMT_MTD.1: 15
    • FMT_MTD.3: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 28
    • FMT_SMF.1.1: 2
    • FMT_SMR: 3
    • FMT_SMR.1: 26
    • FMT_SMR.1.1: 4
    • FMT_SMR.1.2: 4
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 19
    • FPT_FLS.1.1: 3
    • FPT_PHP.3: 15
    • FPT_PHP.3.1: 2
    • FPT_RCV.3: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_TDC.1: 1
    • FPT_TST.1: 11
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC.1: 6
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.CONFIG: 1
    • OE.DATA_PROPER_ADMIN: 1
    • OE.DATA_PROPER_USER: 2
    • OE.IT_ENTERPRISE: 1
    • OE.MOBILE_DEVICE_PLATFORM: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.WIRELESS_NETWORK: 1
  • A:
    • A.APPLET: 1
    • A.APPS-PROVIDER: 1
    • A.PPROCESS-SEC-IC: 3
    • A.USE_DIAG: 1
    • A.USE_KEYS: 1
    • A.VERIFICATION: 1
    • A.VERIFICATION-AUTHORITY: 1
  • OE:
    • OE.APPLET: 1
    • OE.APPS-PROVIDER: 1
    • OE.CODE-EVIDENCE: 1
    • OE.KEY-CHANGE: 1
    • OE.MRTD_: 2
    • OE.PROCESS_SEC_IC: 2
    • OE.SECURITY-DOMAINS: 1
    • OE.USE_DIAG: 1
    • OE.USE_KEYS: 1
    • OE.VERIFICATION: 1
    • OE.VERIFICATION-AUTHORITY: 1
  • OT:
    • OT.ALARM: 1
    • OT.APPLI-AUTH: 1
    • OT.CARD-MANAGEMENT: 1
    • OT.CIPHER: 1
    • OT.COMM_AUTH: 1
    • OT.COMM_CONFIDENTIALITY: 1
    • OT.COMM_INTEGRITY: 1
    • OT.CONFIG-LIMIT: 1
    • OT.DOMAIN-RIGHTS: 1
    • OT.EXT-MEM: 1
    • OT.FIREWALL: 1
    • OT.GLOBAL_ARRAYS_CONFID: 1
    • OT.GLOBAL_ARRAYS_INTEG: 1
    • OT.IDENTIFICATION: 1
    • OT.KEY-MNGT: 1
    • OT.NATIVE: 1
    • OT.OBJ-DELETION: 1
    • OT.OPERATE: 1
    • OT.PIN-MNGT: 1
    • OT.REALLOCATION: 1
    • OT.RESOURCES: 1
    • OT.RND: 1
    • OT.SCP: 3
    • OT.SEC_BOX_FW: 1
    • OT.SID: 1
    • OT.TRANSACTION: 1
  • T:
    • T.COM_EXPLOIT: 1
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.CONFIG: 1
    • T.EXE-CODE: 2
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 2
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.LIFE_CYCLE: 1
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.OS_OPERATE: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 1
    • T.RND: 1
    • T.SID: 2
    • T.UNAUTHORIZED_CARD_MNGT: 1
pdf_data/st_keywords/vendor
  • Qualcomm:
    • Qualcomm: 7
  • NXP:
    • NXP: 30
    • NXP Semiconductors: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 34
      • AES-128: 1
      • AES-256: 17
  • constructions:
    • MAC:
      • HMAC: 7
      • HMAC-SHA-256: 4
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 23
      • AES-: 1
  • DES:
    • 3DES:
      • 3DES: 2
      • TDES: 2
      • Triple-DES: 15
      • TripleDES: 2
    • DES:
      • DES: 6
    • Lucifer:
      • Lucifer: 1
  • constructions:
    • MAC:
      • CMAC: 5
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 6
    • ECDH:
      • ECDH: 6
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 22
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 13
      • SHA-384: 4
      • SHA-512: 2
      • SHA256: 1
  • scrypt:
    • scrypt: 3
  • MD:
    • MD5:
      • MD5: 1
  • RIPEMD:
    • RIPEMD-160: 1
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-224: 1
      • SHA-256: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
  • MAC:
    • MAC: 9
  • KEX:
    • Key exchange: 1
  • MAC:
    • MAC: 9
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • TLS:
    • TLS:
      • TLS: 74
      • TLS 1.1: 1
      • TLS 1.2: 2
  • VPN:
    • VPN: 21
  • PACE:
    • PACE: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 19
  • RNG:
    • RBG: 10
  • RNG:
    • RND: 3
    • RNG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 8
  • CCM:
    • CCM: 3
  • GCM:
    • GCM: 11
  • XTS:
    • XTS: 7
  • CBC:
    • CBC: 7
  • CCM:
    • CCM: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 8
    • P-384: 8
    • P-521: 4
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 24
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 8
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 5
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 3
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 2
  • other:
    • TEE: 36
    • Trusty: 3
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 3: 10
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 12
    • EF.DG1: 32
    • EF.DG13: 3
    • EF.DG14: 3
    • EF.DG15: 1
    • EF.DG16: 32
    • EF.DG2: 9
    • EF.DG3: 9
    • EF.DG4: 8
    • EF.DG5: 8
    • EF.SOD: 13
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 15
    • FIPS 186-4: 18
    • FIPS 197: 16
    • FIPS 198-1: 15
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 800-108: 10
    • SP 800-38A: 4
    • SP 800-38C: 1
    • SP 800-38D: 3
    • SP 800-38E: 4
    • SP 800-56A: 1
    • SP 800-90A: 6
  • RFC:
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 4346: 1
    • RFC 5216: 1
    • RFC 5246: 3
    • RFC 5280: 4
    • RFC 5288: 3
    • RFC 5289: 8
    • RFC 5746: 1
    • RFC 6125: 1
    • RFC 6960: 1
  • X509:
    • X.509: 13
  • BSI:
    • AIS 20: 3
    • AIS20: 5
    • AIS31: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-4: 1
    • FIPS 180-412: 1
    • FIPS 197: 4
    • FIPS 46-3: 5
    • FIPS PUB 46-3: 1
    • FIPS180-2: 1
    • FIPS180-4: 1
    • FIPS197: 2
    • FIPS46-3: 2
  • ICAO:
    • ICAO: 14
  • ISO:
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#15: 1
  • RFC:
    • RFC3369: 1
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • No contradiction to this ST. FDP_ACF.1[EXT-MEM] No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FDP_ROL.1[FIREWALL] No correspondence. Out of scope (internal Java Card Fire- wall: 1
    • No contradiction to this ST. FIA_UID.1[CONFIG-SERVICE] No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FMT_MSA.1[CONFIG-SERVICE] No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FMT_MSA.1[SecureBox] No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FMT_MSA.2[FIREWALL-JCVM] No correspondence Out of scope (internal Java Card Fire- wall: 1
    • No contradiction to this ST. FMT_MSA.3[EXT-MEM] No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FMT_SMF.1[CONFIG-SERVICE] No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FPT_FLS.1[Installer] No correspondence Out of scope (internal Java Card func- tionality: 1
    • 19 of 81 Platform SFR Correspondence in this ST References/Remarks FIA_UAU.4[SC] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1[SC] No correspondence: 1
    • 7.1.1.2 in platform ST) FCS_CKM.1 No correspondence Out of scope. The TOE uses the spe- cific Document Basic Access Key Der- ivation Algorithm. FCS_CKM.2 No: 1
    • 81 Platform SFR Correspondence in this ST References/Remarks FMT_SMF.1[SecureBox] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. Configuration Security: 1
    • ADEL) policy on security aspects outside the runtime. FDP_ACC.2[ADEL] No correspondence Out of scope (internal Java Card func- tionality: 1
    • Functional Requirements (chapter 7.1.8.1 in platform ST) FDP_ACC.2[SecureBox] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1[SecureBox] No: 1
    • MIFARE functionality or a banking application in ROM; please note that this functionality is out of scope of the TOE’s security functionality claimed by this security target. The correctness of the chip: 1
    • No correspondence Out of scope. No contradiction to this ST. Table 6: Threats of the platform ST. 2.3.5 Assessment of Platform: 1
    • OT.ALARM No correspondence Out of scope. No contradiction to this ST. OT.CIPHER No correspondence Indirectly relevant for the correct: 1
    • OT.CARD-MANAGEMENT No correspondence Out of scope. No contradiction to this ST. OT.SCP.IC OT.Prot_Phys-Tamper The objectives are related. No con-: 1
    • OT.GLOBAL_ARRAYS_CONFID No correspondence Out of scope. No contradiction to this ST. OT.GLOBAL_ARRAYS_INTEG No correspondence Out of scope. No: 1
    • OT.TRANSACTION No correspondence Out of scope. No contradiction to this ST. OT.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
    • Out of scope: 121
    • Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 2
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. ADELG Security Functional: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1[ADEL] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1[KEYS] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1[TRANSIENT] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1[bArray] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ROL.1[FIREWALL] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UAU.1[CONFIG-SERVICE] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UID.1[CONFIG-SERVICE] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1[ADEL] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1[CONFIG-SERVICE] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1[EXT-MEM] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1[SecureBox] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3[ADEL] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3[CONFIG-SERVICE] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3[EXT-MEM] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3[SecureBox] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1[ADEL] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1[CONFIG-SERVICE] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1[EXT-MEM] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1[ADEL] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1[CONFIG-SERVICE] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1[ADEL] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_RCV.3[Installer] No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. Further Functional Requirements: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. INSTG Security Functional: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. NXP eDoc Suite v3.0 -: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. RMIG Security Functional: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. Table 4: Assessment of the: 1
    • Out of scope (managed within JCOP). No contradiction to this ST. FCS_CKM.3 No correspondence Out of scope (managed within JCOP). No contradiction to this ST. FCS_CKM.4 FCS_CKM.4 The Java Card platform: 1
    • Platform Objective Correspondence in this ST References/Remarks OT.REALLOCATION No correspondence Out of scope. No contradiction to this ST. OT.RESOURCES No correspondence Out of scope. No contradiction to this: 1
    • Platform Threat Correspondence in this ST References/Remarks T.CONFID-APPLI-DATA No correspondence Out of scope. No contradiction to this ST. T.CONFID-JCS-CODE No correspondence Out of scope. No contradiction to: 1
    • REFINED] T.Forgery No contradiction to this ST. T.INTEG-APPLI-DATA.LOAD No correspondence Out of scope. No contradiction to this ST. T.INTEG-JCS-CODE No correspondence Out of scope. No contradiction to: 1
    • Requirements (chapter 7.1.9 in platform ST) FDP_ACC.1[CONFIG-SERVICE] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1[CONFIG-SERVICE] No: 1
    • SID.2 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.1 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.2 No correspondence Out of scope. No contradiction to this: 1
    • ST. OT.APPLI-AUTH No correspondence Out of scope. No contradiction to this ST. OT.DOMAIN-RIGHTS No correspondence Out of scope. No contradiction to: 1
    • ST. OT.COMM_AUTH No correspondence Out of scope. No contradiction to this ST. OT.COMM_INTEGRITY No correspondence Out of scope. No contradiction to: 1
    • ST. OT.COMM_CONFIDENTIALITY No correspondence Out of scope. No contradiction to this ST. OT.EXT-MEM No correspondence Out of scope. No contradiction to this: 1
    • ST. OT.CONFIG-LIMIT No correspondence Out of scope. No contradiction to this ST. Table 5: Assessment of the platform objectives. NXP eDoc Suite v3.0: 1
    • ST. T.INTEG-JCS-DATA No correspondence Out of scope. No contradiction to this ST. T.SID.1 No correspondence Out of scope. No contradiction to this ST: 1
    • ST. T.LIFE_CYCLE No correspondence Out of scope. No contradiction to this ST. T.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
    • T.Information_Leakage No contradiction to this ST. T.INTEG-APPLI-CODE No correspondence Out of scope. No contradiction to this ST. T.INTEG-APPLI-CODE.LOAD No correspondence Out of scope. No: 1
    • T.NATIVE No correspondence Out of scope. No contradiction to this ST. T.RESOURCES No correspondence Out of scope. No contradiction to this: 1
    • T.UNAUTHORIZED_CARD_MNGT No correspondence Out of scope. No contradiction to this ST. T.COM_EXPLOIT No correspondence Out of scope. No contradiction to: 1
    • The objectives are related. No con- tradiction to this ST. OT.SCP.SUPPORT No correspondence Out of scope. No contradiction to this ST. OT.SEC_BOX_FW No correspondence Out of scope. No contradiction to: 1
    • but no corresponding objectives for the TOE of this ST. No contradictions. OT.SID No correspondence Out of scope. No contradiction to this ST. OT.FIREWALL No correspondence Out of scope. No contradiction to this: 1
    • chapter 7.1.1.1 in platform ST) FDP_ACC.2[FIREWALL] No correspondence Out of scope (internal Java Card Fire- wall: 1
    • chapter 7.1.1.2 in platform ST) FCS_CKM.1 No correspondence Out of scope. The TOE uses the spe- cific Document Basic Access Key Der- ivation Algorithm: 1
    • chapter 7.1.1.4 in platform ST) FIA_ATD.1[AID] No correspondence. Out of scope (internal Java Card func- tionality: 1
    • chapter 7.1.8.1 in platform ST) FDP_ACC.2[SecureBox] No correspondence Out of scope (internal Java Card func- tionality: 1
    • chapter 7.1.9 in platform ST) FDP_ACC.1[CONFIG-SERVICE] No correspondence Out of scope (internal Java Card func- tionality: 1
    • corresponding objectives for the TOE of this ST. No contradictions. OT.KEY-MNGT No correspondence Out of scope. No contradiction to this ST. OT.PIN-MNGT No correspondence Out of scope. No contradiction to this: 1
    • group includes requirements for managing the external memory. FDP_ACC.1[EXT-MEM] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1[EXT-MEM] No: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1[JCRE] No correspondence Out of scope (internal Java Card Fire- wall: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1[JCVM] No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.2[FIREWALL-JCVM] No: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of scope (internal Java Card Fire- wall: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_SMR.1 No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. Application Programming Interface: 1
    • internal Java Card func- tionality). No contradiction to this ST. FCO_NRO.2[SC] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2[SC] No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_ACC.1[SD] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1[SD] No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1[SD] No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2[SC] No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_IFF.1[SC] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1[SC] No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_ITC.2[CCM] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1[CCM] No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1[ADEL] No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1[APDU] No correspondence. Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1[KEYS] No correspondence. Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_ROL.1[CCM] No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FIA_UAU.1[SC] No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FIA_UID.1[SC] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UAU.1[SC] No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1[AID] No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1[AID] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. NXP eDoc Suite v3.0 -: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1[SC] No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1[SD] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3[SD] No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3[ADEL] No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3[SC] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1[SC] No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3[SD] No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3[JCRE] No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1[SC] No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1[SD] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1[SD] No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1[ADEL] No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1[SD] No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1[CCM] No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1[SC] No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1[JCVM] No correspondence Out of scope (internal Java Virtual Machine: 1
    • internal Java Virtual Machine). No contradiction to this ST. FDP_RIP.1[OBJECTS] No correspondence. Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1[JCRE] No correspondence Out: 1
    • managed within JCOP). No contradiction to this ST. FCS_CKM.3 No correspondence Out of scope (managed within JCOP: 1
    • manager (ADEL) policy on security aspects outside the runtime. FDP_ACC.2[ADEL] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1[ADEL] No: 1
    • numbers with a defined quality metric that can be used directly. FIA_AFL.1[PIN] No correspondence Out of scope (PINs are not used within a BAC passport). No contradic- tion to this ST. FPT_EMSEC.1 FPT_EMSEC.1: 1
    • of 81 Platform SFR Correspondence in this ST References/Remarks FDP_RIP.1[ABORT] No correspondence. Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1[APDU] No: 1
    • of 81 Platform SFR Correspondence in this ST References/Remarks FMT_MSA.3[JCVM] No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of: 1
    • of 81 Platform SFR Correspondence in this ST References/Remarks FMT_MTD.1[JCRE] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3[JCRE] No: 1
    • of 81 Platform Threat Correspondence in this ST References/Remarks T.OS_OPERATE No correspondence Out of scope. No contradiction to this ST. T.RND No correspondence Out of scope. No contradiction to this ST. T: 1
    • of the TOE. No contradic- tion to this ST. FDP_ACF.1[FIREWALL] No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 1
    • of the TOE. No contradic- tion to this ST. FDP_IFC.1[JCVM] No correspondence Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1[JCVM] No correspondence Out: 1
    • of the TOE. No contradic- tion to this ST. FMT_MSA.3[FIREWALL] No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 1
    • out of scope: 1
    • platform ST) FIA_ATD.1[AID] No correspondence. Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UID.2[AID] No correspondence: 1
    • platform ST) Firewall Policy (chapter 7.1.1.1 in platform ST) FDP_ACC.2[FIREWALL] No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 1
    • that owns the deleted objects by invoking a specific API method. FDP_RIP.1[ODEL] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1[ODEL] FPT_FLS.1 The: 1
    • to this ST. OT.NATIVE No correspondence Out of scope. No contradiction to this ST. OT.OPERATE No correspondence Out of scope. No contradiction to this: 1
    • verified, or that has been modified after bytecode verification. FDP_UIT.1[CCM] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ROL.1[CCM] No correspondence: 1
    • vio- lations complement JCOP mecha- nisms. No contradiction to this ST. FPT_TDC.1 No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. Aid Management (chapter 7.1.1.4: 1
    • which addresses security aspects outside the runtime. FMT_SMR.1[Installer] No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1[Installer] No: 1
pdf_data/st_metadata
  • /Author: bdrisch
  • /CreationDate: D:20180222105939+01'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: Security Target, ePasslet Suite, ICAO LDS, BAC
  • /ModDate: D:20180222105939+01'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: deutsch
  • /Title: cv act ePasslet/MRTD-BAC Security Target
  • pdf_file_size_bytes: 1942376
  • pdf_hyperlinks: file:///C:/tzeggel/Desktop/glossar.htm%23aes
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 81
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different