Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
BSI-DSZ-CC-0772-2014
IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0)
ANSSI-CC-2019/32
name - Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0)
category Data Protection ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_before 2014-11-07 2019-08-21
not_valid_after 2019-11-08 2024-08-21
scheme DE FR
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_32en.pdf
manufacturer Kanguru Solutions Idemia
manufacturer_web https://www.kanguru.com https://www.idemia.com
security_level ALC_FLR.1, EAL2+ EAL5+, AVA_VAN.5, ALC_DVS.2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_32fr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'}) frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2020, 6, 24), 'maintenance_title': 'IDeal Citiz v2.3-n embedding ID.me 1.6-n application, version ID.me 1.6-n / 2.1.6.0.0', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_32-m01.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_32-m01en.pdf'})
state/report/pdf_hash 16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57 76a7e1edc091abf39044cfa5a1de721f3d7b715ecc7b959ebd623821a1578a1a
state/report/txt_hash 8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82 feb9b75017a689d26e6949dbb60677f45eff7969f909c67010d62337f74ae3c7
state/st/pdf_hash 077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d 142d09f99d82918dd2e6f69bc278b23a3550ab948560e92e8b70bda77defa1de
state/st/txt_hash 74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147 a52a18403721acb9aa67a72bd66f9ed48f428d9f8e289032e452b2852ae11d14
heuristics/cert_id BSI-DSZ-CC-0772-2014 ANSSI-CC-2019/32
heuristics/cert_lab BSI CEA
heuristics/extracted_versions 2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6 2.3, 1.6, 2.1.6.0.0
heuristics/scheme_data None
  • product: IDeal Citiz v2.3-n embedding ID.me 1.6-n application, version ID.me 1.6-n / 2.1.6.0.0
  • url: https://cyber.gouv.fr/produits-certifies/ideal-citiz-v23-n-embedding-idme-16-n-application-version-idme-16-n-21600
  • description: Le produit évalué est l’applet Java Card «IDeal Citiz v2.3-n embedding ID.me 1.6-n application, version ID.me 1.6-n / 2.1.6.0.0 », développé par Idemia et NXP Semiconductors. Ce produit offre des services d’authentification et de signature électronique (SSCD) conformes aux spécifications IAS ECC v1.0.1. Il est embarqué sur la plateforme Java Card ouverte « NXP JCOP 3 P60 » (avec ou sans patch P
  • sponsor: Idemia
  • developer: Idemia, NXP Semiconductors
  • cert_id: 2019/32
  • level: EAL5+
  • enhanced:
    • cert_id: 2019/32
    • certification_date: 21/08/2019
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • developer: Idemia, NXP Semiconductors
    • sponsor: Idemia
    • evaluation_facility: CEA-LETI
    • level: EAL5+
    • protection_profile: PP for secure signature creation device (Part 2 à 6 incluse) BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_DVS.2, AVA_VAN.5
    • report_link: https://cyber.gouv.fr/sites/default/files/2019/09/anssi-cc-2019_32fr.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/2019/09/anssi-cible-cc-2019_32-m01en.pdf
heuristics/st_references/directly_referencing None BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-1059-2018
heuristics/st_references/indirectly_referencing None BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-1059-2018
pdf_data/report_filename 0772a_pdf.pdf anssi-cc-2019_32fr.pdf
pdf_data/report_frontpage
  • DE:
    • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
    • cert_id: BSI-DSZ-CC-0772-2014
    • cert_item: Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
    • developer: Kanguru Solutions
    • cert_lab: BSI
  • FR:
    • match_rules: Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
    • cert_id: ANSSI-CC-2019/32
    • cert_item: IDeal Citiz v2.3-n embedding ID.me 1.6-n application
    • cert_item_version: ID.me 1.6-n / 2.1.6.0.0
    • ref_protection_profiles: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, certifié BSI-CC-PP-0059-2009-MA-01 le 21 février 2012; Part 3: Device with key import, v1.0.2, certifié BSI-CC-PP-0075-2012 le 27 septembre 2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifié BSI-CC-PP-0071-2012 le 12 décembre 2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifié BSI-CC-PP-0072-2012 le 12 décembre 2012 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifié BSI-CC-PP-0076-2013 le 16 avril 2013
    • cc_version: Critères Communs version 3.1 révision 5
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • developer: IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France NXP Semiconductors Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France
    • cert_lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0772-2014: 22
  • DE:
    • BSI-DSZ-CC-1059-: 1
  • FR:
    • ANSSI-CC-2019/32: 19
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0772-2014: 22
  • BSI-DSZ-CC-1059-: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0025-2006: 4
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0076-2013: 1
    • BSI-CC-PP- 0059-2009-MA-01: 1
    • BSI-CC-PP- 0075-2012: 1
    • BSI-CC-PP- 0071-2012: 1
    • BSI-CC-PP- 0072-2012: 1
    • BSI-CC-PP-0076-: 1
    • BSI-CC-PP-0086-: 1
  • other:
    • PP-SSCD-Part2: 1
    • PP-SSCD-: 6
    • PP-SSCD-Part4: 1
    • PP-SSCD-Part5: 1
    • PP-SSCD-Part6: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0025-2006: 4
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075-2012: 1
  • BSI-CC-PP-0071-2012: 1
  • BSI-CC-PP-0072-2012: 1
  • BSI-CC-PP-0076-2013: 1
  • BSI-CC-PP- 0059-2009-MA-01: 1
  • BSI-CC-PP- 0075-2012: 1
  • BSI-CC-PP- 0071-2012: 1
  • BSI-CC-PP- 0072-2012: 1
  • BSI-CC-PP-0076-: 1
  • BSI-CC-PP-0086-: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.1: 5
    • ALC_FLR: 3
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
    • AVA_VAN: 2
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 5
    • AVA_VAN: 2
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.1: 1
  • ADV_FSP.2: 1
  • ADV_FSP.3: 1
  • ADV_FSP.4: 1
  • ADV_FSP.5: 1
  • ADV_FSP.6: 1
  • ADV_IMP.1: 1
  • ADV_IMP.2: 1
  • ADV_INT.1: 1
  • ADV_INT.2: 1
  • ADV_INT.3: 1
  • ADV_SPM.1: 1
  • ADV_TDS.1: 1
  • ADV_TDS.2: 1
  • ADV_TDS.3: 1
  • ADV_TDS.4: 1
  • ADV_TDS.5: 1
  • ADV_TDS.6: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
pdf_data/report_keywords/cc_sar/AGD
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_OPE: 1
  • AGD_PRE: 1
  • AGD_OPE: 1
  • AGD_PRE: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.1: 5
  • ALC_FLR: 3
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 1
  • ALC_CMC.5: 1
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_DVS.2: 1
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 1
  • ALC_LCD.2: 1
  • ALC_TAT.1: 1
  • ALC_TAT.2: 1
  • ALC_TAT.3: 1
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 2
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 1 2
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 3 2
pdf_data/report_keywords/cc_sar/ASE
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_TSS.2: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ATE
  • ATE_COV.1: 2
  • ATE_COV.2: 1
  • ATE_COV.3: 1
  • ATE_DPT.1: 1
  • ATE_DPT.2: 1
  • ATE_DPT.3: 1
  • ATE_DPT.4: 1
  • ATE_FUN.1: 1
  • ATE_FUN.2: 1
  • ATE_IND.1: 1
  • ATE_IND.2: 1
  • ATE_IND.3: 1
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_FUN: 1
  • ATE_IND: 1
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_FUN: 1
  • ATE_IND: 1
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN.1: 1
  • AVA_VAN.2: 1
  • AVA_VAN.3: 1
  • AVA_VAN.4: 1
  • AVA_VAN.5: 1
  • AVA_VAN: 2
  • AVA_VAN.5: 5
  • AVA_VAN: 2
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 1 5
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 2: 8
  • EAL 1: 7
  • EAL 4: 7
  • EAL2: 2
  • EAL 3: 4
  • EAL 5: 6
  • EAL 6: 3
  • EAL 7: 4
  • EAL 2 augmented: 3
  • EAL 5: 3
  • EAL2: 2
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 7 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 4 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 6 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 4 1
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC Evaluation: 1
  • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_COP.1: 1
    • FCS_CKM.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
  • FIA:
    • FIA_UID.2: 4
    • FIA_UAU.2: 4
    • FIA_UAU.6: 1
    • FIA_SOS.1: 1
  • FMT:
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User: 1
    • KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
  • Serma:
    • SERMA: 8
  • CESTI:
    • CESTI: 3
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 13
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 3: 5
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
  • ISO:
    • ISO/IEC 17065: 2
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-256: 1
      • AES: 4
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/technical_report_id/BSI
  • BSI TR-02102: 1
  • BSI 7138: 2
  • BSI 7125: 2
  • BSI 7148: 1
  • BSI TR-03110: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • NXP:
    • NXP Semiconductors: 1
    • NXP: 9
  • Oberthur:
    • Oberthur Technologies: 1
  • Idemia:
    • IDEMIA: 24
pdf_data/report_metadata//Author Bundesamt für Sicherheit in der Informationstechnik Géraldine Avoué
pdf_data/report_metadata//CreationDate D:20141121083051+01'00' D:20190913105844+02'00'
pdf_data/report_metadata//Creator Writer Microsoft® Word 2010
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender" ANSSI-CC-CER-F-07.29
pdf_data/report_metadata//ModDate D:20141121113713+01'00' D:20190913105844+02'00'
pdf_data/report_metadata//Producer LibreOffice 4.2 Microsoft® Word 2010
pdf_data/report_metadata//Subject Common Criteria Certification IDeal Citiz v2.3-n embedding ID.me 1.6-n application
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0772-2014 ANSSI-CC-2019/32
pdf_data/report_metadata/pdf_file_size_bytes 1643286 732853
pdf_data/report_metadata/pdf_hyperlinks https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ mailto:[email protected], http://www.ssi.gouv.fr/
pdf_data/report_metadata/pdf_number_of_pages 42 18
pdf_data/st_filename 0772b_pdf.pdf anssi-cible-cc-2019_32en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA-PSS: 1
    • RSA-OAEP: 1
  • ECC:
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 4
    • ECC:
      • ECC: 18
  • FF:
    • DH:
      • DH: 2
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0772: 1
  • DE:
    • BSI-DSZ-CC-1059-2018: 3
    • BSI-DSZ-CC-0973-2016: 1
  • NL:
    • CC-18-67206: 2
    • CC-16-67206-CR: 1
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0772: 1
  • BSI-DSZ-CC-1059-2018: 3
  • BSI-DSZ-CC-0973-2016: 1
pdf_data/st_keywords/cc_claims
  • D:
    • D.SCD: 1
    • D.SVD: 1
  • A:
    • A.CSP: 9
    • A.CGA: 6
    • A.SCA: 5
  • OE:
    • OE.HI_VAD: 2
    • OE.HID_VAD: 7
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0025: 6
    • BSI-PP- 0025: 13
  • BSI:
    • BSI-CC-PP-0086: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0076-2013: 1
  • ANSSI:
    • ANSSI-CC-PP-: 1
  • other:
    • PP-SSCD2: 22
    • PP-SSCD3: 22
    • PP-SSCD4: 22
    • PP-SSCD5: 23
    • PP-SSCD6: 21
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0025: 6
  • BSI-PP- 0025: 13
  • BSI-CC-PP-0086: 1
  • BSI-CC-PP-0068-V2-2011: 1
  • BSI-CC-PP-0084-2014: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075-2012: 1
  • BSI-CC-PP-0071-2012: 1
  • BSI-CC-PP-0072-2012: 1
  • BSI-CC-PP-0076-2013: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_SPM.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
  • ADV_ARC.1: 5
  • ADV_FSP.1: 3
  • ADV_TDS.1: 2
  • ADV_FSP.5: 8
  • ADV_TDS.4: 8
  • ADV_IMP.1: 8
  • ADV_TDS.3: 3
  • ADV_FSP.2: 2
  • ADV_FSP.4: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 1 5
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.2 1 2
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.1 1 2
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_PRE: 7
  • AGD_OPE: 6
  • AGD_OPE.1: 5
  • AGD_PRE.1: 5
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 1 5
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 1 5
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 5
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 8
  • ALC_TAT.1: 2
  • ALC_TAT.2: 3
  • ALC_CMC.4: 1
  • ALC_CMS.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 3
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ASE
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_CCL.1: 1
  • ASE_ECD.1: 4
  • ASE_INT.1: 5
  • ASE_REQ.1: 2
  • ASE_REQ.2: 2
  • ASE_OBJ.2: 3
  • ASE_SPD.1: 2
  • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 1 4
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 1 5
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 1 3
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 1 2
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 1 2
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.2: 3
  • ATE_FUN.1: 6
  • ATE_COV.1: 2
  • ATE_DPT.1: 1
  • ATE_DPT.3: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.1 1 2
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 1 6
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 1
  • AVA_VAN.5: 7
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL 5+: 1
  • EAL5: 6
  • EAL 5: 1
  • EAL5+: 1
  • EAL4+: 1
  • EAL5 augmented: 4
  • EAL 5 augmented: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_RNG.1: 15
    • FCS_CKM.1: 9
    • FCS_CKM.4: 9
    • FCS_COP.1: 9
    • FCS_RNG: 2
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM.2: 1
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_IFC.1: 1
  • FIA:
    • FIA_UAU.1: 7
    • FIA_UAU.6: 8
    • FIA_SOS.1: 8
    • FIA_UAU.2: 9
    • FIA_UID.2: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MTD: 12
    • FMT_SMF: 20
    • FMT_SMR.1: 12
    • FMT_SMF.1: 6
    • FMT_MTD.1: 3
    • FMT_MSA.1.1: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.3: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_RCV.4: 8
    • FPT_PHP.1: 8
    • FPT_RCV.4.1: 2
    • FPT_FLS.1.1: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_RND: 5
    • FCS_CKM.1: 25
    • FCS_CKM.4: 31
    • FCS_COP.1: 17
    • FCS_RND.1: 20
    • FCS_RND.1.1: 2
    • FCS_COP.1.1: 1
    • FCS_CKM.4.1: 1
    • FCS_CKM.1.1: 1
    • FCS_RNG.1: 1
    • FCS_CKM: 24
    • FCS_COP: 41
    • FCS_CKM.2: 2
  • FDP:
    • FDP_UIT: 18
    • FDP_DAU: 9
    • FDP_ACC: 67
    • FDP_ACF: 56
    • FDP_RIP.1: 25
    • FDP_SDI: 20
    • FDP_ITC: 11
    • FDP_UCT: 22
    • FDP_SDI.2: 4
    • FDP_RIP.1.1: 1
    • FDP_ACC.1: 19
    • FDP_ACF.1: 30
    • FDP_UCT.1: 2
    • FDP_ITC.1: 9
    • FDP_DAU.2: 2
    • FDP_UIT.1: 4
    • FDP_ITC.2: 6
    • FDP_IFC.1: 9
  • FIA:
    • FIA_API: 19
    • FIA_API.1: 12
    • FIA_UAU.1: 23
    • FIA_UID.1: 25
    • FIA_AFL.1: 13
    • FIA_API.1.1: 2
    • FIA_SOS.2: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU: 93
    • FIA_UAU.5: 3
    • FIA_AFL: 36
    • FIA_UAU.6: 2
    • FIA_UID: 34
    • FIA_UAU.4: 1
  • FMT:
    • FMT_LIM: 5
    • FMT_SMR.1: 37
    • FMT_SMF.1: 57
    • FMT_MOF.1: 9
    • FMT_MSA: 21
    • FMT_MSA.2: 11
    • FMT_MSA.3: 24
    • FMT_MSA.4: 13
    • FMT_MTD: 174
    • FMT_LIM.1: 14
    • FMT_LIM.2: 13
    • FMT_LIM.1.1: 2
    • FMT_LIM.2.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMF.1.1: 1
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 5
    • FMT_MSA.2.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4.1: 1
    • FMT_MTD.1: 15
    • FMT_SMR: 28
    • FMT_MTD.3: 11
    • FMT_MTD.3.1: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 16
    • FPT_FLS.1: 12
    • FPT_PHP.1: 7
    • FPT_PHP.3: 15
    • FPT_TST.1: 17
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS.1.1: 1
    • FPT_TST: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 73
    • FTP_ITC.1: 22
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG.1: 15
  • FCS_CKM.1: 9
  • FCS_CKM.4: 9
  • FCS_COP.1: 9
  • FCS_RNG: 2
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 3
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM.2: 1
  • FCS_RND: 5
  • FCS_CKM.1: 25
  • FCS_CKM.4: 31
  • FCS_COP.1: 17
  • FCS_RND.1: 20
  • FCS_RND.1.1: 2
  • FCS_COP.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_CKM.1.1: 1
  • FCS_RNG.1: 1
  • FCS_CKM: 24
  • FCS_COP: 41
  • FCS_CKM.2: 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 9 25
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 1 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 9 31
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 9 17
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 15 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 14
  • FDP_ACF.1: 13
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_IFC.1: 1
  • FDP_UIT: 18
  • FDP_DAU: 9
  • FDP_ACC: 67
  • FDP_ACF: 56
  • FDP_RIP.1: 25
  • FDP_SDI: 20
  • FDP_ITC: 11
  • FDP_UCT: 22
  • FDP_SDI.2: 4
  • FDP_RIP.1.1: 1
  • FDP_ACC.1: 19
  • FDP_ACF.1: 30
  • FDP_UCT.1: 2
  • FDP_ITC.1: 9
  • FDP_DAU.2: 2
  • FDP_UIT.1: 4
  • FDP_ITC.2: 6
  • FDP_IFC.1: 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 14 19
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 13 30
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 1 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 2 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 2 6
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UAU.1: 7
  • FIA_UAU.6: 8
  • FIA_SOS.1: 8
  • FIA_UAU.2: 9
  • FIA_UID.2: 10
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.6.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_UID.1: 2
  • FIA_API: 19
  • FIA_API.1: 12
  • FIA_UAU.1: 23
  • FIA_UID.1: 25
  • FIA_AFL.1: 13
  • FIA_API.1.1: 2
  • FIA_SOS.2: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU: 93
  • FIA_UAU.5: 3
  • FIA_AFL: 36
  • FIA_UAU.6: 2
  • FIA_UID: 34
  • FIA_UAU.4: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 7 23
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6 8 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 2 25
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 8
  • FMT_MTD: 12
  • FMT_SMF: 20
  • FMT_SMR.1: 12
  • FMT_SMF.1: 6
  • FMT_MTD.1: 3
  • FMT_MSA.1.1: 1
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.3: 1
  • FMT_LIM: 5
  • FMT_SMR.1: 37
  • FMT_SMF.1: 57
  • FMT_MOF.1: 9
  • FMT_MSA: 21
  • FMT_MSA.2: 11
  • FMT_MSA.3: 24
  • FMT_MSA.4: 13
  • FMT_MTD: 174
  • FMT_LIM.1: 14
  • FMT_LIM.2: 13
  • FMT_LIM.1.1: 2
  • FMT_LIM.2.1: 2
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1.1: 1
  • FMT_MOF.1.1: 1
  • FMT_MSA.1: 5
  • FMT_MSA.2.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.4.1: 1
  • FMT_MTD.1: 15
  • FMT_SMR: 28
  • FMT_MTD.3: 11
  • FMT_MTD.3.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 8 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 1 24
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 12 174
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 3 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 57
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 12 37
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 9
  • FPT_RCV.4: 8
  • FPT_PHP.1: 8
  • FPT_RCV.4.1: 2
  • FPT_FLS.1.1: 1
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_EMS: 5
  • FPT_EMS.1: 16
  • FPT_FLS.1: 12
  • FPT_PHP.1: 7
  • FPT_PHP.3: 15
  • FPT_TST.1: 17
  • FPT_EMS.1.1: 4
  • FPT_EMS.1.2: 3
  • FPT_FLS.1.1: 1
  • FPT_TST: 1
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 9 12
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1 8 7
pdf_data/st_keywords/certification_process/OutOfScope
  • Out of scope: 2
  • 11 1.5.4.3 Out of scope : 1
  • 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5: 1
  • from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●: 1
  • out of scope: 1
  • of the Common Criteria certified IDEMIA IDeal Pass v2.3-n JC with Privacy Protection applet (out of scope of this TOE). IDeal Citiz v2.3-n enforces separation of the data between the applets and associated: 1
pdf_data/st_keywords/cipher_mode/CBC/CBC 1 11
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 120
  • PGP:
    • PGP: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 8
  • KA:
    • Key agreement: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 40
  • CEA-LETI:
    • CEA-LETI: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA2:
    • SHA-256: 1
  • SHA1:
    • SHA-1: 6
  • SHA2:
    • SHA-224: 6
    • SHA-384: 5
    • SHA-512: 6
    • SHA-256: 5
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 1
  • SHA-224: 6
  • SHA-384: 5
  • SHA-512: 6
  • SHA-256: 5
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 1 5
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.ChipSecurity: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 3: 10
pdf_data/st_keywords/randomness/RNG/RNG 14 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 3
  • SCA:
    • physical probing: 3
    • side channel: 1
    • DPA: 3
    • SPA: 3
    • timing attacks: 2
  • FI:
    • physical tampering: 7
    • Physical Tampering: 1
    • malfunction: 5
    • Malfunction: 5
    • DFA: 1
    • fault injection: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 3
  • physical tampering: 7
  • Physical Tampering: 1
  • malfunction: 5
  • Malfunction: 5
  • DFA: 1
  • fault injection: 1
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 3 7
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
  • FIPS:
    • FIPS PUB 180-2: 2
    • FIPS180-4: 1
  • NIST:
    • NIST SP 800-38B: 1
  • PKCS:
    • PKCS#1: 4
    • PKCS1: 4
  • BSI:
    • AIS20: 2
  • ISO:
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9797-1: 3
    • ISO/IEC 15408:2005: 2
  • ICAO:
    • ICAO: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
    • CCMB-2012-09-004: 1
pdf_data/st_keywords/standard_id/BSI
  • AIS 20: 1
  • AIS 31: 1
  • AIS20: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • AES_competition:
    • AES:
      • AES: 20
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • TDES: 9
      • 3DES: 10
  • constructions:
    • MAC:
      • KMAC: 2
      • CMAC: 5
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 3 20
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 20
  • Idemia:
    • IDEMIA: 12
pdf_data/st_metadata
  • pdf_file_size_bytes: 704587
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 41
  • /Keywords: Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
  • /Subject:
  • /Title: Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
  • /Creator: Unknown
  • /Author: Andreas Siegert (generated by CCTool version 2.8)
  • /Producer: XEP 4.23
  • /application: CCTool version x.y
  • /Trapped: /False
  • /CreationDate: D:20141006150157Z
  • /ModDate: D:20141006150157Z
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
  • pdf_file_size_bytes: 2697853
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 142
  • /Title: Title
  • /Author: G509704
  • /Creator: Microsoft® Word 2016
  • /CreationDate: D:20190717162824+02'00'
  • /ModDate: D:20190717162824+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Andreas Siegert (generated by CCTool version 2.8) G509704
pdf_data/st_metadata//CreationDate D:20141006150157Z D:20190717162824+02'00'
pdf_data/st_metadata//Creator Unknown Microsoft® Word 2016
pdf_data/st_metadata//ModDate D:20141006150157Z D:20190717162824+02'00'
pdf_data/st_metadata//Producer XEP 4.23 Microsoft® Word 2016
pdf_data/st_metadata//Title Kanguru Defender Security Target (version 1.10 as of 2014-10-06) Title
pdf_data/st_metadata/pdf_file_size_bytes 704587 2697853
pdf_data/st_metadata/pdf_hyperlinks http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
pdf_data/st_metadata/pdf_number_of_pages 41 142
dgst eda06ca3c208ebd0 33e4966c9899cb42