| name |
THD89 1.0.3 Secure Element version 1.0 |
STARCOS 3.2 QES Version 2.0B |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Products for Digital Signatures |
| scheme |
ES |
DE |
| status |
active |
archived |
| not_valid_after |
26.09.2028 |
01.09.2019 |
| not_valid_before |
26.09.2023 |
04.03.2009 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36_Certificado.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36%20INF-4157.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0495a.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36%20ST_lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0495b.pdf |
| manufacturer |
Tongxin Microelectronics Co., Ltd. |
G+D Mobile Security GmbH |
| manufacturer_web |
https://www.tsinghuaic.com/english/article/article.asp?id=483248&bid=8610# |
https://www.gi-de.com/de/de/mobile-security/ |
| security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL4+, AVA_VLA.4, AVA_MSU.3 |
| dgst |
f030b4c2adc03fa7 |
b59c5a88ea2e67d4 |
| heuristics/cert_id |
2021-36-INF-4157 |
BSI-DSZ-CC-0495-2009 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 |
ADV_LLD.1, ALC_LCD.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, ATE_IND.2, AVA_VLA.4, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_IMP.1, AVA_MSU.3, ADV_SPM.1, ALC_DVS.1 |
| heuristics/extracted_versions |
1.0, 1.0.3 |
3.2, 2.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
NSCIB-CC-2400034-01-CR, NSCIB-CC-2400175-01-CR |
BSI-DSZ-CC-0648-2010 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0456-2009 |
| heuristics/report_references/indirectly_referenced_by |
NSCIB-CC-2400034-01-CR, NSCIB-CC-2400175-01-CR |
BSI-DSZ-CC-0648-2010 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0456-2009, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0169-2002 |
| heuristics/scheme_data |
- category: Smart Cards and similiar devices
- certification_date: 26.09.2023
- enhanced:
- category: Smart Cards and similiar devices
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1876
- certification_date: 26.09.2023
- description: Renovación de certificado (12/08/2025) The TOE consists of hardware and IC dedicated software. The hardware is based on a 32-bit secure CPU with ROM (Non-Volatile Read-Only Memory), NVM (Non-volatile Programmable Memory) and RAM (Volatile Memory). The hardware of the TOE also incorporates communication peripherals and cryptographic coprocessors for execution and acceleration of symmetric and asymmetric cryptographic algorithms. The IC dedicated software consists of boot code and 3 libraries of cryptographic services. Among all the possibilities offered by these software and hardware requirements, the configuration selected for the evaluation is the following: TYPE NAME VERSION PACKAGE Hardware THD89 1.0.3 Module Software Crypto Library 2.1.0 SW library in ROM Crypto SU Library 2.2.0 SW library in NVM CryptoECCSec Library 1.0.0 SW library in NVM Boot code 1.0 Boot code in ROM Header file 0.1 cryptolib.h The TOE TOE THD89 1.0.3 Secure Element version 1.0 has gone through a Certificate Renewal process according to certification procedure PO-005. This process consists in updating the analysis of the certified product’s resistance against updated state of the art attack methods and vulnerabilities. The resistance to attacks has been re-assessed in the course of the Certificate Renewal process, and therefore the date to be considered as an archived certificate is reset in the certificate product list of the certification body considering the date of the renewal of the certificate.
- evaluation_facility: Applus Laboratories
- level: EAL5 + ALC_DVS.2 + AVA_VAN.5
- manufacturer: Tongxin Microelectronics Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2316
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1875
- type: Product
- manufacturer: Tongxin Microelectronics Co., Ltd.
- product: THD89 1.0.3 Secure Element version 1.0
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/998-thd89-1-0-3-secure-element-version-1-0
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0322-2005 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0322-2005 |
| heuristics/protection_profiles |
cf0f01bcd7be3e9c |
40002c3611fc465f |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf |
| pdf_data/cert_filename |
2021-36_Certificado.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20230904141829+02'00'
- /ModDate: D:20230904141829+02'00'
- /Producer: GPL Ghostscript 9.27
- pdf_file_size_bytes: 887800
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
| pdf_data/report_filename |
2021-36 INF-4157.pdf |
0495a.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0495-2009
- cert_item: STARCOS 3.2 QES Version 2.0B
- cert_lab: BSI
- developer: Giesecke & Devrient GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-S-0201-2022: 1
- ES:
|
- DE:
- BSI-DSZ-CC-0322-2005: 1
- BSI-DSZ-CC-0456-2009: 4
- BSI-DSZ-CC-0495-2009: 18
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL5: 8
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 4: 7
- EAL 4 augmented: 2
- EAL 4+: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL4 augmented: 1
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 4
- ATE_IND: 5
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 6
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 7
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_COP.1: 4
- FCS_RNG.1: 1
- FDP:
- FDP_ITT.1: 1
- FDP_SDC.1: 1
- FMT:
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FRU:
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
- TÜViT: 1
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
- RIPEMD:
- SHA:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
- Brainpool:
- brainpoolP224r1: 1
- brainpoolP256r1: 1
- brainpoolP512r1: 1
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- malfunction: 1
- physical tampering: 1
- other:
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 2
- AIS 25: 3
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 4
- AIS 38: 1
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- / m1534a13 SLE66CX360PE / m1536a13 both with RSA2048 V1.4, Version 5, 2007- 11-13, TÜViT (confidential document) 8 specifically • AIS 20, Version 1, 2 December 1999, Funktionalitätsklassen und: 1
- IT Security of TÜV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 1.3, 2009-01-08, Configuration List STARCOS 3.2 QES V2: 1
- Target BSI-DSZ-0495-2009, Version 1.0, 08.01.2009, STARCOS 3.2 QES V2.0B, Giesecke & Devrient GmbH (confidential document) [7] Evaluation Technical Report, Version 4, 2009-01-20, STARCOS 3.2 QES 2.0/2.0B, Evaluation Body: 1
- confidential document) [9] Security Target BSI-DSZ-0495-2009, Version 1.0, 08.01.2009, STARCOS 3.2 QES V2.0B, Giesecke &: 1
|
| pdf_data/report_metadata |
- /Author: 9308
- /CreationDate: D:20230925160654+02'00'
- /Creator: Microsoft® Word LTSC
- /ModDate: D:20230925160654+02'00'
- /Producer: Microsoft® Word LTSC
- pdf_file_size_bytes: 418348
- pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20090319111933+01'00'
- /Creator: Writer
- /Keywords: "BSI-DSZ-CC-0495-2009, Certification, Common Criteria, Giesecke & Devrient GmbH, STARCOS 3.2 QES, Version 2.0B"
- /ModDate: D:20090319112806+01'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria, Certification
- /Title: Certification Report BSI-DSZ-CC-0495-2009
- pdf_file_size_bytes: 395114
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
| pdf_data/st_filename |
2021-36 ST_lite.pdf |
0495b.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0322-2005: 2
- BSI-DSZ-CC-0322-2005-MA-04: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0006-2002: 1
- BSI-PP-0002-2001: 2
- BSI-PP-0006-2002: 2
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 1
- EAL5: 4
- EAL5 augmented: 2
- EAL5+: 4
|
- EAL:
- EAL 4: 21
- EAL4: 7
- EAL4 augmented: 2
- EAL4+: 5
- EAL5+: 2
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 3
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 3
- ACM_CAP.3: 1
- ACM_CAP.4: 2
- ACM_SCP.2: 3
- ADO:
- ADO_DEL.2: 4
- ADO_IGS.1: 5
- ADV:
- ADV_FSP.1: 10
- ADV_FSP.2: 3
- ADV_HLD.1: 2
- ADV_HLD.2: 4
- ADV_IMP.1: 6
- ADV_LLD.1: 5
- ADV_RCR.1: 5
- ADV_SPM.1: 3
- AGD:
- AGD_ADM.1: 10
- AGD_USR.1: 8
- ALC:
- ALC_DVS.1: 4
- ALC_LCD.1: 2
- ALC_TAT.1: 5
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_FUN.1: 5
- ATE_IND.2: 1
- AVA:
- AVA_MSU.3: 9
- AVA_SOF: 1
- AVA_SOF.1: 3
- AVA_VLA.4: 10
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.4: 9
- FCS_COP.1: 34
- FCS_COP.1.1: 4
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_IFC.1: 5
- FDP_ITC.1: 9
- FDP_ITC.2: 9
- FDP_ITT.1: 7
- FDP_SDC.1: 6
- FDP_SDC.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FPT:
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_ITT.1: 7
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FRU:
|
- FAU:
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 10
- FCS_CKM.1.1: 3
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 14
- FCS_COP: 12
- FCS_COP.1: 9
- FDP:
- FDP_ACC: 25
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF: 26
- FDP_ACF.1: 17
- FDP_ETC: 5
- FDP_ETC.1: 3
- FDP_ITC: 7
- FDP_ITC.1: 7
- FDP_RIP.1: 5
- FDP_RIP.1.1: 2
- FDP_SDI: 10
- FDP_SDI.2: 6
- FDP_UIT: 18
- FDP_UIT.1: 11
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 3
- FMT_MSA: 9
- FMT_MSA.1: 8
- FMT_MSA.2: 10
- FMT_MSA.2.1: 3
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 3
- FMT_SMF.1: 10
- FMT_SMF.1.1: 3
- FMT_SMR: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 2
- FPT_FLS: 1
- FPT_FLS.1: 5
- FPT_FLS.1.1: 2
- FPT_PHP: 1
- FPT_PHP.1: 5
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 2
- FPT_RVM: 1
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
- FPT_SEP.1: 9
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TRP: 1
- FPT_TST: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 19
- FTP_ITC.1: 16
- FTP_TRP: 9
- FTP_TRP.1: 8
|
| pdf_data/st_keywords/cc_claims |
- O:
- O.AES: 7
- O.ECC: 6
- O.RND: 3
- O.RSA: 7
- O.TDES: 8
- T:
|
|
| pdf_data/st_keywords/vendor |
|
- GD:
- G&D: 8
- Giesecke & Devrient: 7
- Infineon:
- Infineon: 5
- Infineon Technologies AG: 4
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 29
- Triple-DES: 3
- DES:
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- RIPEMD:
- RIPEMD-160: 2
- RIPEMD160: 1
- SHA:
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- Brainpool:
- brainpoolP224r1: 3
- brainpoolP256r1: 1
- brainpoolP320r1: 3
- brainpoolP384r1: 1
- brainpoolP512r1: 1
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 7
- malfunction: 3
- physical tampering: 1
- SCA:
- Leak-Inherent: 5
- Physical Probing: 2
- physical probing: 4
- side channel: 1
|
- FI:
- DFA: 1
- physical tampering: 9
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ISO:
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-67: 1
- RFC:
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS 32: 1
- AIS20: 1
- AIS31: 1
- FIPS:
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 9796-1: 1
- ISO/IEC 9796-2: 1
- PKCS:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /CreationDate: D:20230627103637+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20230627103637+02'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 780001
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
- /Author: Giesecke & Devrient
- /Company: Giesecke & Devrient
- /CreationDate: D:20090108190334+01'00'
- /Creator: Acrobat PDFMaker 7.0 für Word
- /Keywords: Version 1.0/Status 08.01.2009
- /ModDate: D:20090108190834+01'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Subject: STARCOS 3.2 QES V2.0B
- /Title: Security Target
- pdf_file_size_bytes: 332386
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 72
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |