Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SuSE Linux Enterprise Server V8
BSI-DSZ-CC-0216-2003
STARCOS 3.7 COS GKV C2
BSI-DSZ-CC-1243-2024
name SuSE Linux Enterprise Server V8 STARCOS 3.7 COS GKV C2
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
status archived active
not_valid_after 01.09.2019 22.08.2029
not_valid_before 01.02.2002 22.08.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1243c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0216a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1243a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0216b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1243b_pdf.pdf
manufacturer SUSE Linux Products Gmbh Giesecke+Devrient ePayments GmbH
manufacturer_web https://www.suse.com/ https://www.gi-de.com/de/
security_level ALC_FLR.1, EAL2+ AVA_VAN.5, ALC_DVS.2, ATE_DPT.2, EAL4+
dgst dc6f84b9f94390a1 7e00946c0c70e2a7
heuristics/cert_id BSI-DSZ-CC-0216-2003 BSI-DSZ-CC-1243-2024
heuristics/extracted_sars ASE_ENV.1, ASE_INT.1, ADV_RCR.1, ASE_PPC.1, ADV_HLD.1, ADV_FSP.1, ASE_TSS.1, ATE_FUN.1, ASE_OBJ.1, AVA_VLA.1, ASE_DES.1, ATE_COV.1, AVA_SOF.1, ASE_REQ.1, AGD_USR.1, ASE_SRE.1, ALC_FLR.1, AGD_ADM.1, ATE_IND.2 ASE_INT.1, ALC_TAT.1, ADV_FSP.4, ASE_SPD.1, ASE_CCL.1, ADV_TDS.3, ALC_CMC.4, ALC_LCD.1, ATE_COV.2, ASE_REQ.2, ASE_OBJ.2, ASE_TSS.1, AGD_PRE.1, AVA_VAN.5, ALC_DEL.1, ASE_ECD.1, ADV_IMP.1, ATE_FUN.1, AGD_OPE.1, ALC_DVS.2, ALC_FLR.1, ADV_ARC.1, ALC_CMS.4, ATE_DPT.2, ATE_IND.2
heuristics/extracted_versions - 3.7
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0976-V3-2019, BSI-DSZ-CC-1110-V6-2023
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0976-V3-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-0916-2015, BSI-DSZ-CC-1110-V5-2022, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-0976-2015, BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-1110-V6-2023, BSI-DSZ-CC-0976-V2-2018, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0879-2014, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-0945-V2-2018
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1110-V6-2023
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1110-V6-2023
heuristics/protection_profiles {} 55ed365edb2c317f
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0082b_pdf.pdf
pdf_data/cert_filename 1243c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1243-2024: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0082-V4-: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • ATE:
    • ATE_DPT.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
  • GD:
    • Giesecke+Devrient: 1
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
  • STARCOS:
    • STARCOS 3: 1
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, PP-0082-V4, G+D, STARCOS 3.7, eHealth"
  • /Subject: Common Criteria, Certification, Zertifizierung, PP-0082-V4, G+D, STARCOS 3.7, eHealth
  • /Title: Certification Report BSI-DSZ-CC-1243-2024
  • pdf_file_size_bytes: 233610
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 0216a.pdf 1243a_pdf.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0216-2003
    • cert_item: SuSE Linux Enterprise Server V8 with certification-sles-eal2 package
    • cert_lab: BSI
    • developer: SuSE Linux AG sponsored by IBM Corporation Linux Technology Center
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 valid until: 21 August 2029
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1243-2024
    • cert_item: STARCOS 3.7 COS GKV C2
    • cert_lab: BSI
    • developer: Giesecke+Devrient ePayments GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Card Operating System Generation 2 (PP COS G2), Version 2.1, 10 July 2019, BSI-CC-PP-0082-V4- 2019
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0216: 2
    • BSI-DSZ-CC-0216-2003: 27
  • DE:
    • BSI-DSZ-CC-0976-V3-: 2
    • BSI-DSZ-CC-0976-V3-2019: 3
    • BSI-DSZ-CC-0976-V3-2019-MA-01: 2
    • BSI-DSZ-CC-1110-V6-2023: 7
    • BSI-DSZ-CC-1243: 4
    • BSI-DSZ-CC-1243-2024: 21
    • BSI-DSZ-CC-S-0260-2023: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0082-V4-: 1
    • BSI-CC-PP-0082-V4-2019: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 5
    • EAL2 augmented: 2
    • EAL2+: 2
    • EAL3: 4
    • EAL4: 4
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL 5: 4
    • EAL 5+: 2
    • EAL 6: 2
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_CAP.2: 1
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.1: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.1: 1
    • ADV_HLD: 2
    • ADV_HLD.1: 1
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 5
    • ALC_LCD: 1
    • ALC_TAT: 2
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.1: 1
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.1: 2
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
  • ADV:
    • ADV_ARC: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 2
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_DPT.2: 4
  • AVA:
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_RIP.2: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_SOS.1: 1
    • FIA_UAU.2: 1
    • FIA_UAU.7: 1
    • FIA_UID.2: 1
    • FIA_USB.1: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_REV.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_COP: 25
    • FCS_RNG: 3
    • FCS_RNG.1: 1
  • FIA:
    • FIA_UAU: 2
    • FIA_USB: 1
  • FPT:
    • FPT_ITE.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.CONNECT: 2
    • A.COOP: 2
    • A.LOCATE: 2
    • A.MANAGE: 2
    • A.NET_COMP: 2
    • A.NO_EVIL_ADMIN: 2
    • A.PROTECT: 2
    • A.UTRAIN: 2
    • A.UTRUST: 2
  • OE:
    • OE.CREDEN: 1
    • OE.HW_SEP: 1
    • OE.INFO_PROTECT: 1
    • OE.INSTALL: 1
    • OE.MAINTENANCE: 1
    • OE.RECOVER: 1
    • OE.SERIAL_LOGIN: 1
    • OE.SOFTWARE_IN: 1
  • T:
    • T.UAACCESS: 1
    • T.UAUSER: 1
pdf_data/report_keywords/vendor
  • Broadcom:
    • Broadcom: 2
  • GD:
    • Giesecke+Devrient: 33
  • Infineon:
    • Infineon: 12
    • Infineon Technologies AG: 6
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 4
  • SRC:
    • SRC Security Research & Consulting: 3
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 21
    • HPC:
      • HPC: 1
  • constructions:
    • MAC:
      • CMAC: 9
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 9
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 13
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
  • RSA:
    • RSA-OAEP: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 3
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 18
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 5
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 6
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • DFA: 1
    • fault injection: 1
    • malfunction: 1
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • SPA: 1
    • side channel: 1
  • other:
    • JIL: 6
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
  • BSI:
    • BSI 7148: 1
    • BSI TR-03116-1: 1
    • BSI TR-03143: 5
    • BSI TR-03144: 11
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 38
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS33: 1
  • ISO:
    • ISO/IEC 15408:1999: 1
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 5
    • AIS 25: 4
    • AIS 26: 4
    • AIS 31: 4
    • AIS 32: 1
    • AIS 34: 4
    • AIS 35: 2
    • AIS 36: 5
    • AIS 37: 3
    • AIS 38: 1
    • AIS 46: 3
  • FIPS:
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18031:2005: 1
    • ISO/IEC 18045: 4
  • RFC:
    • RFC 5639: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Technical Report BSI-DSZ-CC-0216, Version 1.0, atsec Information Security GmbH, 2003-07-10 (confidential document) User Guidance Documentation: [9] SLES Security Guide, Version 1.49, 2003/05/15 [10] SuSE Linux: 1
  • ConfidentialDocument:
    • H13, Revision 4.4, 30 November 2023, Infineon Technologies AG, BSI-DSZ-CC- 1110-V6-2023 (confidential document) Security Target Lite of the underlying hardware platform, Common Criteria Public Security Target: 1
    • July 2024, Giesecke+Devrient ePayments GmbH (confidential document) [11] Guidance Documentation STARCOS 3.7 COS GKV C2 – Main Document, Version 1.5, 5 June 2024: 1
    • Target STARCOS 3.7 COS GKV C2, Version 1.6, 10 June 2024, Giesecke+Devrient ePayments GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1243, Security Target Lite STARCOS 3.7 COS GKV C2, Version 1.6: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • for STARCOS 3.7 COS GKV C2, Version 1.1, 1 August 2024, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-1243, Configuration List STARCOS 3.7 COS GKV C2, Version 1.2: 1
    • procedure BSI-DSZ-CC-1110-V6-2023, Version 3, 01 December 2023, TÜV Informationstechnik GmbH (confidential document) [21] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik (BSI) / German Federal Office for Information Security
  • /CreationDate: D:20030807070420+02'00'
  • /Keywords: CC Certificate Linux SuSE IBM BSI
  • /ModDate: D:20030807070746+02'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Subject: Common Criteria Certification BSI-DSZ-CC-0216-2003
  • /Title: Certification Report SuSE Linux Enterprise Server V8
  • pdf_file_size_bytes: 322593
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 55
pdf_data/st_filename 0216b.pdf 1243b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1110-V6-2023: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0082-V4: 1
    • BSI-CC-PP- 0084-2014: 8
    • BSI-CC-PP- 16: 1
    • BSI-CC-PP-0035-2007: 1
    • BSI-CC-PP-0082-: 1
    • BSI-CC-PP-0082-V4: 24
    • BSI-CC-PP-0084-: 4
    • BSI-CC-PP-0084-2007: 1
    • BSI-CC-PP-0084-2014: 54
    • BSI-PP-0082-V4: 147
    • BSI-PP-0084-: 2
    • BSI-PP-0084-2014: 8
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 5
    • EAL2 augmented: 2
  • EAL:
    • EAL 4: 2
    • EAL 6: 2
    • EAL4: 14
    • EAL4 augmented: 4
    • EAL6: 1
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 1
    • ADV_HLD.1: 1
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_FLR.1: 6
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_SOF.1: 1
    • AVA_VLA.1: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 9
    • ADV_FSP: 2
    • ADV_FSP.4: 6
    • ADV_IMP: 2
    • ADV_IMP.1: 6
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 6
    • AGD_PRE: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC: 2
    • ALC_CMC.4: 1
    • ALC_CMS: 2
    • ALC_CMS.4: 1
    • ALC_DEL: 2
    • ALC_DEL.1: 1
    • ALC_DVS: 2
    • ALC_DVS.2: 12
    • ALC_FLR.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 11
    • ATE_FUN.1: 6
    • ATE_IND.2: 5
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 10
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 21
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 2
    • FDP_ACF.2: 1
    • FDP_IFC.1: 1
    • FDP_MSA.3: 1
    • FDP_RIP.2: 15
  • FIA:
    • FIA_ATD.1: 16
    • FIA_SOS.1: 14
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 13
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 12
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 13
    • FIA_UID.2.1: 1
    • FIA_USB: 1
    • FIA_USB.1: 15
    • FIA_USB.1.1: 1
  • FMT:
    • FMT_MSA.1: 22
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 20
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 26
    • FMT_MTD.1.1: 3
    • FMT_REV.1: 27
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF: 1
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_RVM.1: 12
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 16
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FAU:
    • FAU_SAS: 8
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM: 67
    • FCS_CKM.1: 31
    • FCS_CKM.2: 8
    • FCS_CKM.4: 49
    • FCS_CKM.4.1: 1
    • FCS_COP: 144
    • FCS_COP.1: 21
    • FCS_COP.1.1: 1
    • FCS_RNG: 32
    • FCS_RNG.1: 20
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 114
    • FDP_ACC.1: 41
    • FDP_ACF: 93
    • FDP_ACF.1: 35
    • FDP_IFC: 7
    • FDP_IFC.1: 17
    • FDP_ITC.1: 27
    • FDP_ITC.2: 27
    • FDP_ITT: 7
    • FDP_ITT.1: 4
    • FDP_RIP: 9
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
    • FDP_SDC: 8
    • FDP_SDC.1: 4
    • FDP_SDI: 7
    • FDP_SDI.1: 1
    • FDP_SDI.2: 11
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT: 7
    • FDP_UCT.1: 1
    • FDP_UIT: 8
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 22
    • FIA_AFL.1: 4
    • FIA_API: 1
    • FIA_API.1: 14
    • FIA_API.1.1: 1
    • FIA_ATD: 10
    • FIA_ATD.1: 14
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU: 40
    • FIA_UAU.1: 20
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 12
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 17
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UID: 14
    • FIA_UID.1: 19
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 13
    • FIA_USB.1: 23
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM: 15
    • FMT_LIM.1: 4
    • FMT_LIM.2: 2
    • FMT_MSA: 60
    • FMT_MSA.1: 6
    • FMT_MSA.3: 33
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 38
    • FMT_MTD.1: 4
    • FMT_SMF.1: 51
    • FMT_SMF.1.1: 1
    • FMT_SMR: 9
    • FMT_SMR.1: 38
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SRM: 1
  • FPT:
    • FPT_EMS: 10
    • FPT_EMS.1: 15
    • FPT_EMS.1.1: 1
    • FPT_EMS.1.2: 1
    • FPT_FLS: 7
    • FPT_FLS.1: 16
    • FPT_FLS.1.1: 1
    • FPT_ITE: 11
    • FPT_ITE.1: 11
    • FPT_ITE.1.1: 1
    • FPT_ITE.1.2: 1
    • FPT_ITE.2: 13
    • FPT_ITE.2.1: 5
    • FPT_ITE.2.2: 1
    • FPT_ITT: 7
    • FPT_ITT.1: 4
    • FPT_PHP: 7
    • FPT_PHP.3: 5
    • FPT_TDC.1: 10
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 2
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT: 7
    • FRU_FLT.2: 4
  • FTP:
    • FTP_ITC: 22
    • FTP_ITC.1: 12
    • FTP_ITE: 1
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECT: 6
    • A.COOP: 3
    • A.LOCATE: 3
    • A.MANAGE: 4
    • A.NET_COMP: 4
    • A.NO_EVIL_ADMIN: 4
    • A.PEER: 3
    • A.PROTECT: 5
    • A.UTRAIN: 3
    • A.UTRUST: 3
  • O:
    • O.AUTHORIZATION: 15
    • O.DISCRETIONARY_ACCESS: 15
    • O.ENFORCEMENT: 8
    • O.MANAGE: 13
    • O.RESIDUAL_INFO: 8
    • O.RESIDUAL_INFORMATION: 1
  • OE:
    • OE.ADMIN: 6
    • OE.CREDEN: 4
    • OE.HW_SEP: 7
    • OE.INFO_PROTECT: 9
    • OE.INSTALL: 12
    • OE.MAINTENANCE: 4
    • OE.PHYSICAL: 8
    • OE.PROTECT: 9
    • OE.RECOVER: 7
    • OE.SERIAL_LOGIN: 3
    • OE.SOFTWARE_IN: 4
  • T:
    • T.UAACCESS: 4
    • T.UAUSER: 4
  • O:
    • O.AES: 6
    • O.PACE_CHIP: 2
    • O.RND: 7
  • T:
    • T.RND: 5
pdf_data/st_keywords/vendor
  • GD:
    • G+D: 147
    • Giesecke+Devrient: 13
  • Infineon:
    • Infineon: 2
    • Infineon Technologies: 1
    • Infineon Technologies AG: 1
  • NXP:
    • NXP Semiconductors: 1
  • STMicroelectronics:
    • STMicroelectronics: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 56
    • HPC:
      • HPC: 1
  • constructions:
    • MAC:
      • CMAC: 24
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 14
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 38
  • FF:
    • DH:
      • DH: 12
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 2
      • SHA-256: 11
      • SHA-384: 6
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
    • Key agreement: 1
  • MAC:
    • MAC: 33
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • PACE:
    • PACE: 125
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 14
    • RNG: 38
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 4
    • brainpoolP384r1: 4
    • brainpoolP512r1: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 3
  • FI:
    • DFA: 1
    • Malfunction: 16
    • malfunction: 1
    • physical tampering: 3
  • SCA:
    • DPA: 1
    • Leak-Inherent: 14
    • Physical Probing: 2
    • SPA: 1
    • side channel: 1
  • other:
    • Bleichenbacher attack: 1
    • JIL: 3
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03111: 3
    • BSI TR-03143: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 16
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 32: 6
  • CC:
    • CCIMB-99-031: 1
  • BSI:
    • AIS20: 2
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
    • CCMB-2017-05-001: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 197: 3
    • FIPS PUB 180-4: 1
  • ISO:
    • ISO/IEC 7816: 2
  • NIST:
    • NIST SP 800-38B: 1
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 5639: 1
    • RFC5639: 3
pdf_data/st_keywords/javacard_api_const
  • curves:
    • SM2: 4
pdf_data/st_metadata
  • /Author: Administrator
  • /CreationDate: D:20030729004134+02'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20030806155359+02'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Word Pro - SLES_security_target_v1-6_cpr_nh.lwp
  • pdf_file_size_bytes: 318694
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 60
  • /Author: wallhaek
  • /Keywords:
  • /Subject:
  • /Title: ASE_STA37_COSGKV_C2_Lite
  • pdf_file_size_bytes: 1178896
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 149
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different