Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
F5 Networks BIG-IP® Application Delivery Firewall (ADF-Base) version 11.5 HF10
BSI-DSZ-CC-0856-2017
STARCOS 3.5 ID GCC C2R
BSI-DSZ-CC-0952-2014
name F5 Networks BIG-IP® Application Delivery Firewall (ADF-Base) version 11.5 HF10 STARCOS 3.5 ID GCC C2R
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_after 02.08.2022 18.11.2019
not_valid_before 03.08.2017 17.11.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0856a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0856b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0952b_pdf.pdf
manufacturer F5 Networks, Inc. G+D Mobile Security GmbH
manufacturer_web https://www.f5.com/ https://www.gi-de.com/de/de/mobile-security/
security_level EAL4+, ALC_FLR.3 EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5
dgst f34044c28e3c540c 27e724cd297034a1
heuristics/cert_id BSI-DSZ-CC-0856-2017 BSI-DSZ-CC-0952-2014
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 ALC_LCD.2, ASE_INT.1, ALC_DVS.2, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ASE_SPD.1, ATE_DPT.2, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_IND.3, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 11.5 3.5
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0975-2018 BSI-DSZ-CC-0952-V2-2016
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0813-2012
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0975-2018 BSI-DSZ-CC-0952-V2-2016
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0813-2012
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0813-2012
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012
heuristics/protection_profiles {} 0e62a9ea5e7ca3a7
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0061b_pdf.pdf
pdf_data/report_filename 0856a_pdf.pdf 0952a_pdf.pdf
pdf_data/report_frontpage
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.3
    • cc_version: Product specific Security Target Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0856-2017
    • cert_item: F5 Networks BIG-IP® Application Delivery Firewall (ADF-Base), version 11.5.1 HF10
    • cert_lab: BSI
    • developer: F5 Networks, Inc
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 SOGIS Recognition Agreement
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0952-2014
    • cert_item: STARCOS 3.5 ID GCC C2R
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 16 December 2009, BSI-CC-PP-0061-2009 and in accordance with BSI Technische Richtlinie BSI-TR-03116-2, 2013
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0856-2017: 21
  • DE:
    • BSI-DSZ-CC-0751-2013: 4
    • BSI-DSZ-CC-0813-2012: 4
    • BSI-DSZ-CC-0952-2014: 20
    • BSI-DSZ-CC-S-0017-2014: 2
    • BSI-DSZ-CC-S-0023-2013: 2
    • BSI-DSZ-CC-S-0029-2014: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0061-2009: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 10
    • EAL 4 augmented: 3
    • EAL 5: 6
    • EAL 6: 3
    • EAL 7: 4
    • EAL4: 1
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 14
    • EAL 4 augmented: 3
    • EAL 5: 8
    • EAL 6: 3
    • EAL 7: 4
    • EAL5+: 1
    • EAL6: 1
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 4
    • AGD_OPE.1: 1
    • AGD_PRE: 4
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 5
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 6
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_SOS: 1
  • FTP:
    • FTP_ITC.1: 1
    • FTP_TRP.1: 1
pdf_data/report_keywords/vendor
  • GD:
    • G&D: 2
    • Giesecke & Devrient: 19
  • Infineon:
    • Infineon: 3
    • Infineon Technologies: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
  • SRC:
    • SRC Security Research & Consulting: 3
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 9
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 10
    • ECDH:
      • ECDH: 7
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 13
  • FF:
    • DH:
      • DH: 7
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 5
  • SHA:
    • SHA1:
      • SHA-1: 11
    • SHA2:
      • SHA-256: 5
      • SHA-384: 7
      • SHA256: 2
      • SHA384: 1
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key agreement: 2
  • MAC:
    • MAC: 4
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • SSH:
    • SSH: 8
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 14
      • TLS v1.1: 2
      • TLSv1.1: 6
      • TLSv1.2: 7
  • VPN:
    • VPN: 1
  • PACE:
    • PACE: 3
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • NIST P-256: 1
    • P-256: 1
    • secp256r1: 8
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2013-0169: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • side channels: 1
  • FI:
    • fault injection: 1
    • physical tampering: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
  • BSI:
    • BSI 7125: 2
    • BSI 7138: 1
    • BSI 7148: 1
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 26
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
  • FIPS:
    • FIPS180-3: 16
    • FIPS180-310: 1
    • FIPS180-4: 1
    • FIPS186-3: 6
    • FIPS186-39: 1
    • FIPS186-4: 1
    • FIPS198-1: 3
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS#1: 10
  • RFC:
    • RFC1321: 1
    • RFC2104: 1
    • RFC3447: 10
    • RFC3526: 1
    • RFC4251: 1
    • RFC4252: 2
    • RFC4253: 4
    • RFC4346: 5
    • RFC4492: 6
    • RFC5246: 6
    • RFC6151: 1
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 1
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 4
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Version 5.1, 2017-07-28, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 2017-07-05, CI list for documentation in Perforce: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • ConfidentialDocument:
    • Evaluation Technical Report (ETR) STARCOS 3.5 ID GCC C2R, SRC Security Research & Consulting GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7820 A11, Version 3, 02.04: 1
    • TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [11] STARCOS 3.5 ID GCC C2 Configuration 1, Application Specification, Version 1.0, 14.03.2013: 1
    • Version 1.1, 05.11.2014, Konfigurationsliste von STARCOS 3.5 ID GCC C2R, Giesecke & Devrient GmbH (confidential document) 21 / 34 Certification Report BSI-DSZ-CC-0952-2014 This page is intentionally left blank. 22 / 34: 1
    • Version 2.7, 05.08.2013, STARCOS 3.5 ID GCC C2R Security Target, Giesecke & Devrient GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03, 15: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20141203132656+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Giesecke & Devrient, G&D, STARCOS, nPA, Personalausweis, Identity Card, ID Card"
  • /ModDate: D:20141203133150+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0952-2014
  • pdf_file_size_bytes: 1238020
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
pdf_data/st_filename 0856b_pdf.pdf 0952b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0813-2012: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0035: 1
    • BSI-CC-PP-0059-2009-MA-01: 2
    • BSI-CC-PP-0061: 3
    • BSI-PP-0055: 1
    • BSI-PP-0056: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 3
    • EAL4 augmented: 1
  • EAL:
    • EAL 4: 2
    • EAL 5: 2
    • EAL4: 13
    • EAL4 augmented: 3
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 1
    • AGD_PRE: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 5
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC.1: 4
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_ECD: 2
  • ATE:
    • ATE_DPT.1: 2
    • ATE_DPT.2: 9
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_STG: 1
    • FAU_STG_EXT.1: 14
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM: 9
    • FCS_CKM.1: 16
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.4: 3
    • FCS_CKM_EXT.4: 19
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 33
    • FCS_COP.1.1: 3
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_SSH_EXT.1: 15
    • FCS_SSH_EXT.1.1: 2
    • FCS_SSH_EXT.1.2: 2
    • FCS_SSH_EXT.1.3: 2
    • FCS_SSH_EXT.1.4: 2
    • FCS_SSH_EXT.1.5: 2
    • FCS_SSH_EXT.1.6: 2
    • FCS_SSH_EXT.1.7: 2
    • FCS_TLS_EXT.1: 21
    • FCS_TLS_EXT.1.1: 2
    • FCS_TLS_EXT.1.2: 2
  • FDP:
    • FDP_ACC.1: 17
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 4
    • FDP_ITC.1: 14
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 5
    • FDP_RIP.2: 11
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 8
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_PMG_EXT.1: 14
    • FIA_PMG_EXT.1.1: 1
    • FIA_SOS: 1
    • FIA_UAU.1: 2
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 14
    • FIA_UAU_EXT.2.1: 2
    • FIA_UIA_EXT.1: 21
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
    • FIA_UID.1: 3
    • FIA_UIU_EXT.1: 1
  • FMT:
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_APW: 1
    • FPT_APW_EXT.1: 13
    • FPT_APW_EXT.1.1: 2
    • FPT_APW_EXT.1.2: 2
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_SKP: 1
    • FPT_SKP_EXT.1: 13
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 2
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 13
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD: 1
    • FPT_TUD_EXT.1: 14
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 2
  • FRU:
    • FRU_RSA.1: 9
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 10
    • FTA_SSL.4.1: 1
    • FTA_TAB.1: 13
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 15
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 5
    • FAU_SAS.1: 17
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 52
    • FCS_CKM.1: 16
    • FCS_CKM.2: 4
    • FCS_CKM.4: 20
    • FCS_COP: 56
    • FCS_COP.1: 11
    • FCS_RND: 7
    • FCS_RND.1: 12
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 3
  • FDP:
    • FDP_ACC: 16
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF: 23
    • FDP_ACF.1: 21
    • FDP_IFC.1: 5
    • FDP_ITC.1: 7
    • FDP_ITC.2: 8
    • FDP_ITT.1: 1
    • FDP_RIP: 4
    • FDP_RIP.1: 13
    • FDP_SDI: 14
    • FDP_SDI.1: 3
    • FDP_SDI.2: 7
  • FIA:
    • FIA_AFL: 32
    • FIA_AFL.1: 8
    • FIA_API: 20
    • FIA_API.1: 4
    • FIA_API.1.1: 3
    • FIA_SOS.2: 1
    • FIA_UAU: 45
    • FIA_UAU.1: 10
    • FIA_UAU.4: 6
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 15
    • FIA_UAU.6: 8
    • FIA_UIA: 1
    • FIA_UID: 25
    • FIA_UID.1: 11
  • FMT:
    • FMT_LIM: 13
    • FMT_LIM.1: 16
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 15
    • FMT_LIM.2.1: 2
    • FMT_MOF: 2
    • FMT_MOF.1: 1
    • FMT_MSA: 14
    • FMT_MSA.1: 5
    • FMT_MSA.2: 1
    • FMT_MSA.3: 8
    • FMT_MSA.4: 1
    • FMT_MTD: 86
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 2
    • FMT_MTD.3: 9
    • FMT_MTD.3.1: 1
    • FMT_SMF: 5
    • FMT_SMF.1: 38
    • FMT_SMR: 4
    • FMT_SMR.1: 31
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP: 6
    • FPT_PHP.1: 5
    • FPT_PHP.3: 14
    • FPT_TST: 2
    • FPT_TST.1: 15
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT.2: 3
  • FTP:
    • FTP_ITC: 23
    • FTP_ITC.1: 6
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECTIONS: 3
    • A.KEYS: 2
    • A.LDAP: 3
    • A.LOGSERVER: 3
    • A.MGMTNET: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.PEERTRUST: 3
    • A.PHYSICAL: 3
    • A.TIME: 3
    • A.TRAINED_ADMIN: 3
    • A.TRUSTED_ADMIN: 3
  • O:
    • O.ADDRESS_FILTERING: 9
    • O.DISPLAY_BANNER: 5
    • O.FAILOVER: 5
    • O.LTM-TRAFFICMGMT: 13
    • O.PORT_FILTERING: 9
    • O.PROTECTED_COMMUNICATIONS: 19
    • O.RELATED_CONNECTION_FILTERING: 6
    • O.RESIDUAL_INFORMATION_CLEARING: 5
    • O.RESOURCE_AVAILABILITY: 5
    • O.SESSION_LOCK: 6
    • O.STATEFUL_INSPECTION: 4
    • O.SYSTEM_MONITORING: 9
    • O.TOE_ADMINISTRATION: 19
    • O.TSF_SELF_TEST: 5
    • O.VERIFIABLE_UPDATES: 5
  • OE:
    • OE.CONNECTIONS: 3
    • OE.KEYS: 2
    • OE.LDAP: 4
    • OE.LOGSERVER: 3
    • OE.MGMTNET: 3
    • OE.NO_GENERAL_PURPOSE: 3
    • OE.PEERTRUST: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
    • OE.TRAINED_ADMIN: 4
    • OE.TRUSTED_ADMIN: 4
  • T:
    • T.ADMIN_ERROR: 5
    • T.NETWORK_ACCESS: 5
    • T.NETWORK_DISCLOSURE: 2
    • T.NETWORK_DOS: 4
    • T.NETWORK_MISUSE: 2
    • T.PUBLIC_NETWORKS: 3
    • T.RESOURCE_EXHAUSTION: 3
    • T.TSF_FAILURE: 3
    • T.UNAUTHORIZED_ACCESS: 4
    • T.UNAUTHORIZED_UPDATE: 3
    • T.UNDETECTED_ACTIONS: 3
    • T.USER_DATA_REUSE: 3
  • A:
    • A.CGA: 2
    • A.SCA: 2
  • O:
    • O.MEM_ACCESS: 1
    • O.RND: 3
  • OE:
    • OE.CGA_SSCD: 3
    • OE.CGA_TC_SVD: 2
    • OE.HID_TC_VAD: 1
    • OE.HID_VAD: 2
    • OE.SCA_TC_DTBS: 1
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • GD:
    • Giesecke & Devrient: 7
  • Infineon:
    • Infineon: 3
    • Infineon Technologies AG: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 102
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
  • constructions:
    • MAC:
      • HMAC: 11
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
  • AES_competition:
    • AES:
      • AES: 20
  • DES:
    • 3DES:
      • Triple-DES: 6
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 9
      • KMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 11
    • ECDH:
      • ECDH: 7
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 15
  • FF:
    • DH:
      • DH: 6
      • DHE: 2
      • Diffie-Hellman: 2
  • RSA:
    • RSASSAPKCS1-v1_5: 1
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 7
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 8
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 5
  • SHA:
    • SHA1:
      • SHA-1: 15
    • SHA2:
      • SHA-256: 10
      • SHA-384: 9
      • SHA256: 1
      • SHA384: 1
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-2: 2
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 2
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 2
  • KA:
    • Key Agreement: 3
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 2
  • SSH:
    • SSH: 81
  • TLS:
    • DTLS:
      • DTLS: 1
    • SSL:
      • SSL: 12
    • TLS:
      • TLS: 83
      • TLS 1.0: 4
      • TLS 1.1: 4
      • TLS 1.2: 2
      • TLS v1.1: 1
      • TLSv1.1: 4
      • TLSv1.2: 7
  • VPN:
    • VPN: 1
  • PACE:
    • PACE: 95
pdf_data/st_keywords/randomness
  • RNG:
    • RBG: 6
    • RNG: 17
  • RNG:
    • RND: 6
    • RNG: 1
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • GCM:
    • GCM: 2
  • CBC:
    • CBC: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-256: 10
    • P-256: 13
    • curve P-256: 1
    • secp256r1: 8
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDH_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDH_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 14
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 14
    • Physical Tampering: 4
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 7
  • SCA:
    • DPA: 2
    • Leak-Inherent: 6
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 147
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS20: 1
  • FIPS:
    • FIPS 140-2: 6
    • FIPS 186-2: 1
    • FIPS PUB 186-3: 3
    • FIPS197: 2
    • FIPS198-1: 2
  • PKCS:
    • PKCS#1: 10
  • RFC:
    • RFC 2246: 1
    • RFC 2460: 1
    • RFC 2818: 1
    • RFC 3513: 1
    • RFC 4253: 2
    • RFC 4346: 1
    • RFC 4443: 1
    • RFC 5246: 1
    • RFC 768: 1
    • RFC 791: 1
    • RFC 792: 1
    • RFC 793: 1
    • RFC1321: 2
    • RFC2104: 2
    • RFC2326: 2
    • RFC2460: 4
    • RFC2818: 2
    • RFC3261: 2
    • RFC3447: 11
    • RFC3526: 2
    • RFC4251: 4
    • RFC4252: 5
    • RFC4253: 9
    • RFC4254: 2
    • RFC4291: 3
    • RFC4346: 9
    • RFC4443: 4
    • RFC4492: 7
    • RFC5228: 2
    • RFC5246: 8
    • RFC5280: 3
    • RFC5722: 2
    • RFC5735: 4
    • RFC6151: 1
    • RFC768: 4
    • RFC791: 4
    • RFC792: 4
    • RFC793: 4
    • RFC959: 4
  • X509:
    • X.509: 6
  • BSI:
    • AIS 31: 1
    • AIS20: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-4: 2
    • FIPS 197: 4
    • FIPS PUB 180-2: 2
    • FIPS PUB 180-4: 1
    • FIPS180-2: 1
  • ICAO:
    • ICAO: 7
    • ICAO-SAC: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#3: 3
  • RFC:
    • RFC 5639: 7
    • RFC3369: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • TOE, including the fipscardsync utility provided with BIG-IP for convenience, are considered to be out of scope for this evaluation. 7.1.3.3 Certificate validation For TLS sessions, the TOE implements: 1
    • out of scope: 1
  • OutOfScope:
    • out of scope: 1
    • to the plastic Identity Card is achieved by physical and organisational security measures being out of scope of the current ST. The TOE shall comprise at least a) the circuitry of the contactless chip incl: 1
pdf_data/st_metadata
  • /Author: stut
  • /CreationDate: D:20141103145118+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: Version 2.9 Status 03.11.2014
  • /ModDate: D:20141103145118+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: STARCOS 3.5 ID GCC C2R
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 2021253
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 132
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different