STARCOS 3.5 ID ECC C1

CSV information ?

Status archived
Valid from 31.08.2012
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer G+D Mobile Security GmbH
Category Products for Digital Signatures
Security level EAL4+, AVA_VAN.5

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0769-2012

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-224, SHA-2
Protocols
PACE
Randomness
RNG

Operating System name
STARCOS 3, STARCOS
Vendor
Infineon Technologies AG, Infineon, Giesecke & Devrient, G&D

Security level
EAL 4, EAL 5, EAL 1, EAL 5+, EAL 6, EAL1, EAL3, EAL5, EAL7, EAL2, EAL4, EAL6, EAL 4 augmented, ITSEC Evaluation
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Security Functional Requirements (SFR)
FCS_CKM, FCS_COP, FIA_API.1, FTP_ITC
Protection profiles
BSI-CC-PP-0059-2009, BSI-CC-PP-0059
Certificates
BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0769, BSI-DSZ-CC-0813, BSI-DSZ-CC-S-0009-2012, BSI-DSZ-CC-S-0007-2011, BSI-DSZ-CC-S-0008-2011, BSI-DSZ-CC-S-0004-2010, BSI-DSZ-CC-S-0012-2012, BSI-DSZ-CC-S-0010-2012
Evaluation facilities
TÃœViT, SRC Security Research & Consulting
Certification process
STARCOS 3.5 ID ECC C1 Security Target, Version 1.6, 12.06.2012, Giesecke & Devrient GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0769, STARCOS 3.5 ID ECC C1 Security Target Lite, Version 1.7, 05, Version 1.3, Date: 23.07.2012, Evaluation Facility: SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile for Secure Signature Creation Device – Part 2: Device with Key Generation

Side-channel analysis
side channel, physical tampering, Malfunction, fault injection, JIL
Certification process
STARCOS 3.5 ID ECC C1 Security Target, Version 1.6, 12.06.2012, Giesecke & Devrient GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0769, STARCOS 3.5 ID ECC C1 Security Target Lite, Version 1.7, 05, Version 1.3, Date: 23.07.2012, Evaluation Facility: SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile for Secure Signature Creation Device – Part 2: Device with Key Generation

Standards
FIPS PUB 180-2, FIPS PUB 197, PKCS #1, AIS 34, AIS 1, AIS 14, AIS 19, AIS 20, AIS 25, AIS 26, AIS 36, AIS 37, AIS 38, AIS 35, AIS 32, AIS36
Technical reports
BSI 7125, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-0769-2012
Subject Common Criteria Certification
Keywords "Common Criteria, Certification, Zertifizierung, Giesecke & Devrient GmbH, STARCOS 3.5 ID ECC C1"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20120912074352+02'00'
Modification date D:20120912074832+02'00'
Pages 40
Creator Writer
Producer LibreOffice 3.5

Frontpage

Certificate ID BSI-DSZ-CC-0769-2012
Certified item STARCOS 3.5 ID ECC C1
Certification lab BSI
Developer Giesecke & Devrient GmbH

References

Outgoing
  • BSI-DSZ-CC-0813-2012 - archived - Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Asymmetric Algorithms
ECDSA, ECC
Hash functions
SHA-224, SHA-2
Protocols
PACE
Randomness
TRNG, RND
Elliptic Curves
secp256r1, secp384r1, secp521r1, brainpoolP256r1, brainpoolP320r1, brainpoolP384r1, brainpoolP512r1, brainpoolP224r1

Operating System name
STARCOS 3, STARCOS
Vendor
Infineon, Giesecke & Devrient, G&D

Security level
EAL 4, EAL4, EAL 5, EAL4 augmented
Claims
O.RND, A.CGA, A.SCA, OT.TOE_TC_SVD_EXP, OE.HID_VAD
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_DVS.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_CKM.1.1, FCS_COP, FCS_COP.1.1, FCS_RNG.1, FCS_RND.1, FDP_UIT, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_ACF, FDP_DAU, FDP_DAU.1, FDP_DAU.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2, FDP_IFC.1, FDP_ITT.1, FIA_API, FIA_API.1, FIA_API.1.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FMT_MSA.3, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITT.1, FPT_TST.3, FPT_TST.2, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1
Protection profiles
BSI-CC-PP-0035, BSI-CC-PP-0059
Certificates
BSI-DSZ-CC-0813-2012

Side-channel analysis
Leak-Inherent, SPA, DPA, timing attacks, physical tampering, Malfunction, DFA, fault injection

Standards
FIPS PUB 197, FIPS PUB 180-2, PKCS #1, AIS20, AIS 31, AIS 20, ISO/IEC 7816, ISO/IEC 14443, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003

File metadata

Title STARCOS 3.5 ID ECC C1
Subject Security Target Lite STARCOS 3.5 ID ECC C1
Keywords Version 1.7/05.07.12
Author Giesecke & Devrient GmbH
Creation date D:20120705144942+02'00'
Modification date D:20120705144944+02'00'
Pages 86
Creator Acrobat PDFMaker 9.1 for Word
Producer Acrobat Distiller 9.3.3 (Windows)

References

Outgoing
  • BSI-DSZ-CC-0813-2012 - archived - Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software

Heuristics ?

Certificate ID: BSI-DSZ-CC-0769-2012

Extracted SARs

ADV_FSP.4, ASE_CCL.1, AGD_PRE.1, ATE_COV.2, ADV_TDS.3, ALC_CMS.4, APE_INT.1, ASE_REQ.2, ASE_TSS.1, ALC_FLR.3, ATE_IND.2, ASE_ECD.1, ASE_SPD.1, AVA_VAN.5, ALC_CMC.4, APE_ECD.1, ALC_DEL.1, APE_CCL.1, ALC_DVS.2, ADV_SPM.1, ATE_DPT.1, ALC_LCD.1, ASE_INT.1, ATE_FUN.1, APE_SPD.1, ASE_OBJ.2, ADV_IMP.1, ADV_INT.3, APE_OBJ.2, APE_REQ.2, ALC_TAT.1, ADV_ARC.1, AGD_OPE.1

References ?

Updates ?

  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name STARCOS 3.5 ID ECC C1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Products for Digital Signatures",
  "cert_link": null,
  "dgst": "3248c326fec7a323",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0769-2012",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.5"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0880-2013"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0813-2012"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0880-2013"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0640-2010",
          "BSI-DSZ-CC-0728-2011",
          "BSI-DSZ-CC-0813-2012"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0813-2012"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0640-2010",
          "BSI-DSZ-CC-0728-2011",
          "BSI-DSZ-CC-0813-2012"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "G+D Mobile Security GmbH",
  "manufacturer_web": "https://www.gi-de.com/de/de/mobile-security/",
  "name": "STARCOS 3.5 ID ECC C1",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2012-08-31",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0769a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0769-2012",
        "cert_item": "STARCOS 3.5 ID ECC C1",
        "cert_lab": "BSI",
        "developer": "Giesecke \u0026 Devrient GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 42
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 2
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 3
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0769": 3,
          "BSI-DSZ-CC-0769-2012": 21,
          "BSI-DSZ-CC-0813": 1,
          "BSI-DSZ-CC-0813-2012": 3,
          "BSI-DSZ-CC-S-0004-2010": 1,
          "BSI-DSZ-CC-S-0007-2011": 1,
          "BSI-DSZ-CC-S-0008-2011": 1,
          "BSI-DSZ-CC-S-0009-2012": 1,
          "BSI-DSZ-CC-S-0010-2012": 1,
          "BSI-DSZ-CC-S-0012-2012": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059": 1,
          "BSI-CC-PP-0059-2009": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 1,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 2,
          "ALC_CMS.5": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 1,
          "ATE_DPT.4": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 1,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 10,
          "EAL 4 augmented": 3,
          "EAL 5": 4,
          "EAL 5+": 1,
          "EAL 6": 1,
          "EAL1": 6,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 4,
          "EAL5": 6,
          "EAL6": 3,
          "EAL7": 4
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 2,
          "FCS_COP": 1
        },
        "FIA": {
          "FIA_API.1": 5
        },
        "FTP": {
          "FTP_ITC": 2
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "STARCOS 3.5 ID ECC C1 Security Target, Version 1.6, 12.06.2012, Giesecke \u0026 Devrient GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0769, STARCOS 3.5 ID ECC C1 Security Target Lite, Version 1.7, 05": 1,
          "Version 1.3, Date: 23.07.2012, Evaluation Facility: SRC Security Research \u0026 Consulting GmbH (confidential document) [9] Protection Profile for Secure Signature Creation Device \u2013 Part 2: Device with Key Generation": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 9
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "SRC": {
          "SRC Security Research \u0026 Consulting": 3
        },
        "TUV": {
          "T\u00dcViT": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 1,
            "SHA-224": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "STARCOS": {
          "STARCOS": 1,
          "STARCOS 3": 40
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 1,
          "fault injection": 1,
          "physical tampering": 1
        },
        "SCA": {
          "side channel": 1
        },
        "other": {
          "JIL": 3
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 2,
          "AIS 14": 2,
          "AIS 19": 2,
          "AIS 20": 3,
          "AIS 25": 2,
          "AIS 26": 2,
          "AIS 32": 1,
          "AIS 34": 3,
          "AIS 35": 2,
          "AIS 36": 3,
          "AIS 37": 2,
          "AIS 38": 2,
          "AIS36": 1
        },
        "FIPS": {
          "FIPS PUB 180-2": 2,
          "FIPS PUB 197": 1
        },
        "PKCS": {
          "PKCS #1": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 3,
          "Giesecke \u0026 Devrient": 24
        },
        "Infineon": {
          "Infineon": 1,
          "Infineon Technologies AG": 4
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20120912074352+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Giesecke \u0026 Devrient GmbH, STARCOS 3.5 ID ECC C1\"",
      "/ModDate": "D:20120912074832+02\u002700\u0027",
      "/Producer": "LibreOffice 3.5",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0769-2012",
      "pdf_file_size_bytes": 1012887,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierung"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 40
    },
    "st_filename": "0769b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 106
          },
          "ECDSA": {
            "ECDSA": 3
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0813-2012": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 4,
          "A.SCA": 4
        },
        "O": {
          "O.RND": 3
        },
        "OE": {
          "OE.HID_VAD": 1
        },
        "OT": {
          "OT.TOE_TC_SVD_EXP": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0035": 2,
          "BSI-CC-PP-0059": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 3,
          "ADV_FSP.4": 2,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 4,
          "EAL 5": 2,
          "EAL4": 7,
          "EAL4 augmented": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FCS": {
          "FCS_CKM": 13,
          "FCS_CKM.1": 19,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 16,
          "FCS_COP": 10,
          "FCS_COP.1": 6,
          "FCS_COP.1.1": 2,
          "FCS_RND.1": 2,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 27,
          "FDP_ACC.1": 17,
          "FDP_ACF": 18,
          "FDP_ACF.1": 18,
          "FDP_DAU": 7,
          "FDP_DAU.1": 1,
          "FDP_DAU.2": 2,
          "FDP_IFC.1": 11,
          "FDP_ITC.1": 8,
          "FDP_ITC.2": 8,
          "FDP_ITT.1": 3,
          "FDP_RIP.1": 6,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 13,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 4,
          "FDP_UIT": 1
        },
        "FIA": {
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 4,
          "FIA_API.1": 17,
          "FIA_API.1.1": 3,
          "FIA_UAU.1": 8,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 13,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 6,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 14,
          "FMT_MSA.1": 4,
          "FMT_MSA.2": 6,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 16,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 7,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 12,
          "FMT_MTD.1": 2,
          "FMT_SMF.1": 22,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 23,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 9,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 3,
          "FPT_PHP.1": 9,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 11,
          "FPT_PHP.3.1": 2,
          "FPT_TST": 2,
          "FPT_TST.1": 14,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1,
          "FPT_TST.2": 1,
          "FPT_TST.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 3
        },
        "FTP": {
          "FTP_ITC": 35,
          "FTP_ITC.1": 9,
          "FTP_ITC.1.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 5
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP224r1": 3,
          "brainpoolP256r1": 8,
          "brainpoolP320r1": 8,
          "brainpoolP384r1": 8,
          "brainpoolP512r1": 8
        },
        "NIST": {
          "secp256r1": 8,
          "secp384r1": 8,
          "secp521r1": 8
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 2,
            "SHA-224": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "STARCOS": {
          "STARCOS": 1,
          "STARCOS 3": 108
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 3
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 2,
          "Malfunction": 7,
          "fault injection": 1,
          "physical tampering": 14
        },
        "SCA": {
          "DPA": 3,
          "Leak-Inherent": 6,
          "SPA": 2,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 31": 2,
          "AIS20": 1
        },
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1
        },
        "FIPS": {
          "FIPS PUB 180-2": 1,
          "FIPS PUB 197": 1
        },
        "ISO": {
          "ISO/IEC 14443": 4,
          "ISO/IEC 7816": 4
        },
        "PKCS": {
          "PKCS #1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 13
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 6,
          "Giesecke \u0026 Devrient": 8
        },
        "Infineon": {
          "Infineon": 5
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Giesecke \u0026 Devrient GmbH",
      "/Category": "M7820",
      "/Comments": "Public",
      "/Company": "Giesecke \u0026 Devrient",
      "/CreationDate": "D:20120705144942+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 9.1 for Word",
      "/Keywords": "Version 1.7/05.07.12",
      "/Manager": "Infineon",
      "/ModDate": "D:20120705144944+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 9.3.3 (Windows)",
      "/Subject": "Security Target Lite STARCOS 3.5 ID ECC C1",
      "/Title": "STARCOS 3.5 ID ECC C1",
      "pdf_file_size_bytes": 282111,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 86
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
        "pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0769a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0769b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "23ee6066502587f59ff6a98fd0ba58a01cbf28a0ac229e5b05d27e2511cc431b",
      "txt_hash": "64926f8468e1db0438f4d40111578b34ef9d1bb84e37f6928f401112c680f878"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "13bd45bb7f17c978d30fe2b0633549c1a66f06ad3c7ef80cdaf85fac0ee13a6c",
      "txt_hash": "aaf98fd9f33fa6d3b95d8706ed78e5b49914ec395e81e4b49deeb1052f5c7f96"
    }
  },
  "status": "archived"
}