name |
Siemens RUGGEDCOM ROS v4.2.2.F running on the M969F, RS900F, RS900GF, RS900GPF, RS940GF, M2100F, RSG2100F, RSG2100PF, M2200F, RSG2200F, RSG2300F, RSG2300PF, RS400F, RS416F, RS416PF, RSG2488F switches |
STSAFE-J100-BS Smart Meter Security Module V2.1.6 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
DE |
status |
archived |
archived |
not_valid_after |
21.08.2020 |
17.05.2023 |
not_valid_before |
21.08.2018 |
17.05.2018 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10877-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1037c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10877-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1037a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10877-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1037b_pdf.pdf |
manufacturer |
Siemens Canada Ltd. |
STMicroelectronics |
manufacturer_web |
https://www.siemens.com |
https://www.st.com/ |
security_level |
{} |
EAL4+, AVA_VAN.5 |
dgst |
d832f21299727366 |
8150f131f14ae24a |
heuristics/cert_id |
CCEVS-VR-VID-10877-2018 |
BSI-DSZ-CC-1037-2018 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
cpe:2.3:h:siemens:ruggedcom_rsg2100f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs900gf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2488f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs416pf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs900gpf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_m2200f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2300f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2300pf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_m969f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs900f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs400f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2100pf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2200f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_m2100f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs940gf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs416f:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
4.2.2 |
2.1.6 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2017/23 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2017/23, ANSSI-CC-2017/10, ANSSI-CC-2015/59 |
heuristics/scheme_data |
- category: Network Device
- certification_date: 21.08.2018
- evaluation_facility: COACT, Inc. Labs
- expiration_date: 21.08.2020
- id: CCEVS-VR-VID10877
- product: Siemens RUGGEDCOM ROS v4.2.2.F running on the M969F, RS900F, RS900GF, RS900GPF, RS940GF, M2100F, RSG2100F, RSG2100PF, M2200F, RSG2200F, RSG2300F, RSG2300PF, RS400F, RS416F, RS416PF, RSG2488F switches
- scheme: US
- url: https://www.niap-ccevs.org/product/10877
- vendor: Siemens Canada Ltd.
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2017/23, ANSSI-CC-2015/59 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2017/23, ANSSI-CC-2015/59 |
heuristics/protection_profiles |
48ac4778e4272298 |
15eda6dafddbf8ca |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0077V2b_pdf.pdf |
pdf_data/cert_filename |
st_vid10877-ci.pdf |
1037c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10877-2018: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0077-V2-2015: 1
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180823111041-04'00'
- /ModDate: D:20180823111041-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 183909
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20180523122005+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, STSAFE, STM"
- /ModDate: D:20180524134941+02'00'
- /Producer: LibreOffice 5.2
- /Subject: STSAFE-J100-BS Security Module for Smart Metering V01.03
- /Title: Certificate BSI-DSZ-CC-1037-2018
- pdf_file_size_bytes: 369743
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid10877-vr.pdf |
1037a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID10877-2018
- cert_item: Siemens Canada Ltd. RUGGEDCOM Rugged Operating System (ROS) V4.2.2.F Running on the M2100F, M2200F, M969F, RSG2100F, RSG2100PF, RSG2200F, RSG2300F, RSG2300PF, RSG2488F, RS400F, RS416F, RS416PF, RS900F, RS900GF, RS900GPF, and RS940GF RUGGEDCOM switches
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.5
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1037-2018
- cert_item: STSAFE-J100-BS Smart Meter Security Module V2.1.6
- cert_lab: BSI
- developer: STMicroelectronics
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) - Schutzprofil für das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10877-2018: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0077-V2-2015: 4
- BSI-CCPP-0073-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- TUV:
- TÜV Informationstechnik: 3
- TÜViT: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 8
- Key agreement: 1
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 2
- AIS 23: 1
- AIS 26: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 2
- AIS 37: 1
- AIS 45: 1
- AIS 46: 1
- FIPS:
- FIPS PUB 180-2: 1
- FIPS PUB 186-3: 1
- FIPS PUB 197: 1
- FIPS197: 2
- ISO:
- ISO/IEC 10116: 2
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- RFC 4493: 1
- RFC 5639: 1
- RFC4493: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- TÜV Informationstechnik GmbH, (confidential document) [8] Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) -: 1
- Version Rev.I, September 19th , 2017, STSAFE-J100-BS Security Target, STMicroelectronics (confidential document) [7] Evaluation Technical Report, Version 4, April 17th , 2018, Evaluation Technical Report Summary: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- public document) [10] Configuration list for the TOE, Version 2.1.6, Kerkey2 SMARAGD ConfigList (confidential document) [11] Operational Guidance documentation for the TOE, Rev. E, STSAFE-J100-BS – Operational user: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20180822131120-04'00'
- /ModDate: D:20180822131120-04'00'
- pdf_file_size_bytes: 690785
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20180523121939+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, STSAFE, STM"
- /ModDate: D:20180523123310+02'00'
- /Producer: LibreOffice 5.2
- /Subject: STSAFE-J100-BS Security Module for Smart Metering V01.03
- /Title: Certification Report BSI-DSZ-CC-1037-2018
- pdf_file_size_bytes: 796336
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
pdf_data/st_filename |
st_vid10877-st.pdf |
1037b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2015/59: 1
- ANSSI-CC-2015/59-M01: 1
- ANSSI-CC-2015/59-S01: 1
- ANSSI-CC-2017/23: 1
- ANSSI-CC-PP-2010/07-M01: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/07-M01: 1
- BSI:
- BSI-CC-PP-0077-V2: 2
- BSI-CC-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 5
- EAL4: 6
- EAL4 augmented: 2
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 11
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 15
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_STG.1: 1
- FAU_STG_EXT.1: 13
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 2
- FCS:
- FCS_CKM.1: 35
- FCS_CKM.1.1: 1
- FCS_CKM.2: 16
- FCS_CKM.2.1: 1
- FCS_CKM.4: 21
- FCS_CKM.4.1: 1
- FCS_COP: 65
- FCS_COP.1: 13
- FCS_RBG_EXT.1: 19
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSHS_EXT.1: 20
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 2
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSS_EXT: 3
- FCS_TLSS_EXT.1: 15
- FCS_TLSS_EXT.1.1: 2
- FCS_TLSS_EXT.1.2: 2
- FCS_TLSS_EXT.1.3: 2
- FCS_TLS_EXT.1: 2
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 13
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 3
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 13
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 19
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 4
- FMT:
- FMT_MOF: 8
- FMT_MOF.1: 1
- FMT_MTD: 9
- FMT_MTD.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 4
- FMT_SMR.2: 10
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 13
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_ITT.1: 2
- FPT_PTD: 1
- FPT_SKP_EXT.1: 12
- FPT_SKP_EXT.1.1: 2
- FPT_SSP.1: 1
- FPT_STM.1: 3
- FPT_STM_EXT.1: 15
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 2
- FPT_TST: 1
- FPT_TST_EXT.1: 12
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT.1: 14
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTA_SSL.4: 8
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 2
- FTA_SSL_EXT.1: 12
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 15
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 17
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 10
- FTP_TRP.1: 3
|
- FCS:
- FCS_CKM: 57
- FCS_CKM.1: 16
- FCS_CKM.2: 8
- FCS_CKM.4: 48
- FCS_CKM.4.1: 1
- FCS_COP: 47
- FCS_COP.1: 13
- FCS_RNG: 5
- FCS_RNG.1: 16
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.2: 17
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC.1: 6
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 1
- FDP_IFC.1: 7
- FDP_ITC: 7
- FDP_ITC.1: 19
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 14
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 11
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 1
- FDP_UCT.1: 7
- FDP_UIT.1: 7
- FDP_UIT.1.2: 1
- FIA:
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 2
- FIA_UAU: 14
- FIA_UAU.1: 4
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 5
- FMT_LIM.1: 22
- FMT_LIM.1.1: 2
- FMT_LIM.2: 19
- FMT_LIM.2.1: 2
- FMT_MSA.3: 4
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 18
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS.1: 15
- FPT_FLS.1.1: 1
- FPT_PHP.3: 14
- FPT_PHP.3.1: 1
- FPT_TST.1: 15
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ICT.1: 4
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
|
- O:
- O.ALARM: 1
- O.CIPHER: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_INTEG: 1
- O.LIFE_CYCLE: 1
- O.NATIVE: 1
- O.OPERATE: 1
- O.PACE: 10
- O.PIN-MNGT: 1
- O.RESOURCES: 1
- O.ROLES: 1
- O.SCP: 3
- O.SID: 1
- O.SIDE_CHANNEL: 1
- O.TRANSACTION: 1
- OE:
- OSP:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 11
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 5
- DHE: 1
- Diffie-Hellman: 13
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 14
- SHA-384: 11
- SHA-512: 13
- SHA256: 3
|
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 19
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 6
- SSL 2.0: 2
- SSL 3.0: 2
- TLS:
- TLS: 51
- TLS 1.0: 2
- TLS 1.1: 3
- TLS 1.2: 3
- TLS v1.0: 1
- TLS v1.1: 1
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 10
- P-384: 10
- P-521: 12
- secp256r1: 3
- secp384r1: 3
- secp521r1: 3
|
- Brainpool:
- brainpoolP256r1: 2
- brainpoolP384r1: 2
- brainpoolP512r1: 2
- NIST:
- NIST P-256: 1
- NIST P-384: 1
- P-256: 3
- P-384: 3
- secp256r1: 1
- secp384r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 12
- Physical tampering: 1
- fault injection: 1
- malfunction: 3
- physical tampering: 7
- SCA:
- DPA: 2
- SPA: 2
- physical probing: 2
- side channel: 3
- side channels: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03109: 1
- BSI TR-03109-2: 1
- BSI TR-03116-3: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 2
- FIPS 197: 2
- FIPS 198-1: 1
- FIPS PUB 186-4: 3
- ISO:
- ISO/IEC 18031:2011: 4
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-38D: 1
- NIST SP 800-56A: 1
- NIST SP 800-90A: 1
- SP 800-135: 1
- SP 800-52: 1
- SP 800-56A: 2
- SP 800-56B: 1
- SP 800-57: 1
- PKCS:
- RFC:
- RFC 2818: 3
- RFC 2986: 2
- RFC 3268: 4
- RFC 3526: 3
- RFC 4253: 2
- RFC 4346: 2
- RFC 4492: 2
- RFC 5246: 6
- RFC 5280: 5
- RFC 5289: 2
- RFC 5759: 1
- RFC 6069: 1
- RFC 6960: 1
- RFC24: 1
- X509:
|
- BSI:
- AIS 31: 1
- AIS 36: 1
- AIS36: 2
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 2
- FIPS:
- ISO:
- ISO/IEC 10116: 2
- ISO/IEC 7810:2003: 1
- RFC:
- RFC 5639: 1
- RFC4493: 4
- RFC5639: 10
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- entities. 62 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 63 During its pre-operational phases the TOE interacts with the Integrator and the: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Siemens Canada Ltd
- /CreationDate: D:20180814122918-04'00'
- /Creator: DocBook XSL Stylesheets with Apache FOP
- /ModDate: D:20180822130851-04'00'
- /PDFVersion: 1.4
- /Producer: Apache FOP Version 1.0
- /Title: v4.2.2.F
- pdf_file_size_bytes: 468220
- pdf_hyperlinks: http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.html#3336, http://csrc.nist.gov/groups/STM/cavp/documents/dss/rsanewval.html#2078, http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html#2631, http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html#4037, http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html#2635, http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.html#3329, http://csrc.nist.gov/groups/STM/cavp/documents/dss/rsanewval.html#2072, http://csrc.nist.gov/groups/STM/cavp/documents/dss/ecdsanewval.html#903, http://csrc.nist.gov/groups/STM/cavp/documents/components/componentnewval.html#858, http://csrc.nist.gov/groups/STM/cavp/documents/dss/ecdsanewval.html#899, mailto:[email protected], https://support.automation.siemens.com, https://www.siemens.com/ruggedcom, http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgnewval.html#1207, http://csrc.nist.gov/groups/STM/cavp/documents/components/componentnewval.html#863, http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html#4030, http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgnewval.html#1204, https://www.siemens.com/industrialsecurity
- pdf_is_encrypted: False
- pdf_number_of_pages: 92
|
- /Author: Saverio Donatiello - STMicroelectronics
- /CreationDate: D:20180416181359+02'00'
- /Creator: PDFCreator 2.0.0.0
- /Keywords: Elliptic Curve Cryptography, Gateway, Gateway administrator, Key Derivation Function, Personal Identification Number, Random Number Generator, Security Functional Requirement, Security Function, Security module, Smart meter, Secure Hash Algorithm,Target Of Evaluation
- /ModDate: D:20180416181359+02'00'
- /Producer: PDFCreator 2.0.0.0
- /Subject: The document is the security target public version of the of a security module for a smart meter gateway- Product Name STSAFE-J100-BS - Company STMicroelectronics
- /Title: STSAFE-J100-BS_SecurtyTarget_LITE
- pdf_file_size_bytes: 543894
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 72
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |