STARCOS 3.3 Passport Edition Version 2.1a

CSV information

Status archived
Valid from 31.03.2010
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer G+D Mobile Security GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_MSU.3, EAL4+, ADV_IMP.2, AVA_VLA.4, ALC_DVS.2

Heuristics summary

Certificate ID: BSI-DSZ-CC-0635-2010

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Symmetric Algorithms
DES, Triple-DES
Asymmetric Algorithms
ECDH, ECDSA
Hash functions
SHA-1, SHA-256, SHA-224, MD5
Schemes
MAC
Randomness
RNG

Operating System name
STARCOS 3
Vendor
NXP, Infineon Technologies AG, Giesecke & Devrient, G&D, Philips

Security level
EAL 4, EAL4, EAL 1, EAL 7, EAL 5+, EAL5+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 4 augmented
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_DVS.2, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_LCD.1, ALC_TAT.1, ATE_FUN, ATE_IND, ATE_COV, ATE_DPT, AVA_MSU.3, AVA_VLA.4, AVA_VLA, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA.2, AVA_VLA.3, APE_DES, APE_ENV, APE_INT, APE_OBJ, APE_REQ, APE_SRE, ASE_DES, ASE_ENV, ASE_INT, ASE_OBJ, ASE_PPC, ASE_REQ, ASE_SRE, ASE_TSS
Protection profiles
BSI-CC-PP-0026, BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0635-2010, BSI-DSZ-CC-0521-2008, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-S-0002-2009, BSI-DSZ-CC-0635-, BSI-DSZ-CC-0410, BSI-DSZ-CC-S-0002-
Evaluation facilities
SRC Security Research & Consulting

Side-channel analysis
JIL
Certification process
Edition Version 2.1a, BSI-DSZ-CC-0635- 2010, Version 1.2, 16 March 2010, Giesecke & Devrient GmbH (confidential document) [7] Security Target Lite STARCOS 3.3 Passport Edition Version 2.1a, BSI-DSZ-CC- 0635-2010, Version, 23 March 2010, STARCOS 3.3 Passport Edition Version 2.1a, SRC Security Research & Consulting GmbH (confidential document) [9] Common Criteria Protection Profile Machine Readable Travel Document with „ICAO Application

Standards
FIPS 180-2, FIPS 46-3, FIPS PUB 180-2, AIS 34, AIS 35, AIS 20, AIS 25, AIS 26, AIS 32, AIS 36, AIS 38, ISO/IEC 9796-, ISO/IEC 15408:2005, ICAO
Technical reports
BSI 7125, BSI 7148, BSI 7149, BSI 25

File metadata

Title Certification Report BSI-DSZ-CC-0635-2010
Subject Common Criteria Certification
Keywords "Common Criteria, Certification, Zertifizierung, Giesecke & Devrient GmbH, G&D, MRTD, EAC, ePass"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20100412133631+02'00'
Modification date D:20100412143812+02'00'
Pages 38
Creator Writer
Producer OpenOffice.org 3.1

Frontpage

Certificate ID BSI-DSZ-CC-0635-2010
Certified item STARCOS 3.3 Passport Edition Version 2.1a
Certification lab BSI
Developer Giesecke & Devrient GmbH

References

Outgoing
  • BSI-DSZ-CC-0521-2008 - archived - STARCOS 3.3 Passport Edition Version 2.0a
  • BSI-DSZ-CC-0410-2007 - archived - NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software
Incoming

Security target

Extracted keywords

Symmetric Algorithms
DES, TDES, Triple-DES, KMAC
Asymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-224, SHA-256
Schemes
MAC, Key Agreement
Block cipher modes
CBC

Operating System name
STARCOS 3
IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG13, EF.DG14, EF.DG15, EF.COM, EF.SOD
Vendor
NXP, NXP Semiconductors, Giesecke & Devrient

Security level
EAL5+, EAL4+, EAL4, EAL 5+, EAL4 augmented
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_SPM.1, ADV_FSP.2, ADV_RCR.1, ADV_LLD.1, ADV_FSP.1, ADV_HLD.2, ADV_IMP.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_TAT.1, ATE_COV.2, ATE_FUN.1, AVA_MSU.3, AVA_VLA.4
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UCT, FDP_IFC.1, FDP_UIT, FDP_UIT.1, FDP_DAU.1, FDP_DAU, FDP_ACC, FIA_API, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UAU, FIA_AFL.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_AFL.1.1, FIA_AFL.1.2, FIA_AFL, FIA_UID, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.2, FMT_MTD, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.3, FMT_MTD.3.1, FMT_MDT.3, FMT_MSA.1, FMT_SMF, FMT_SMR, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_RVM.1, FPT_SEP.1, FPT_FLS.1.1, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_AMT.1, FPT_PHP.3.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_FLS, FPT_PHP, FPT_RVM, FPT_SEP, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0026, BSI-PP-0017, BSI-PP-0002-2001, BSI-PP- 0026
Certificates
BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0417-2008

Side-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering

Standards
FIPS 180-213, FIPS 46-3, FIPS PUB 180-2, FIPS 180-2, FIPS PUB 46-3, AIS 20, AIS20, AIS31, RFC 2631, RFC3369, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC 9796-2, ICAO, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003

File metadata

Title Security Target STARCOS 3.3 Passport Edition Version 2.1a
Subject Security Target STARCOS 3.3 Passport Edition Version 2.1a
Keywords Version 1.3 / Status 26.03.2010
Author Giesecke & Devrient
Creation date D:20100329102731+02'00'
Modification date D:20100329103003+02'00'
Pages 117
Creator Acrobat PDFMaker 9.1 für Word
Producer Acrobat Distiller 9.3.0 (Windows)

References

Outgoing
  • BSI-DSZ-CC-0410-2007 - archived - NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software
  • BSI-DSZ-CC-0417-2008 - archived - NXP Smart Card Controller P5CD080V0B with Dedicated software: Secured Crypto Library Release 2.0

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

BSI-DSZ-CC-0635-2010

Extracted SARs

ADV_DVS.2, ADV_FSP.2, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_FUN.1, AVA_MSU.3, AVA_VLA.4

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "0a06dce99856c4f2",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0635-2010",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.1",
        "3.3"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0642-2011"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0410-2007",
          "BSI-DSZ-CC-0521-2008"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0642-2011"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0410-2007",
          "BSI-DSZ-CC-0404-2007",
          "BSI-DSZ-CC-0521-2008",
          "BSI-DSZ-CC-0463-2008"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0410-2007",
          "BSI-DSZ-CC-0417-2008"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0410-2007",
          "BSI-DSZ-CC-0417-2008"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "G+D Mobile Security GmbH",
  "manufacturer_web": "https://www.gi-de.com/de/de/mobile-security/",
  "name": "STARCOS 3.3 Passport Edition Version 2.1a",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2010-03-31",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0635a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0635-2010",
        "cert_item": "STARCOS 3.3 Passport Edition Version 2.1a",
        "cert_lab": "BSI",
        "developer": "Giesecke \u0026 Devrient GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0410": 1,
          "BSI-DSZ-CC-0410-2007": 2,
          "BSI-DSZ-CC-0521-2008": 3,
          "BSI-DSZ-CC-0635-": 1,
          "BSI-DSZ-CC-0635-2010": 20,
          "BSI-DSZ-CC-S-0002-": 1,
          "BSI-DSZ-CC-S-0002-2009": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0026": 3,
          "BSI-PP-0002-2001": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 2,
          "ACM_AUT.1": 1,
          "ACM_CAP": 2,
          "ACM_CAP.4": 1,
          "ACM_SCP": 2,
          "ACM_SCP.2": 1
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.2": 1,
          "ADO_IGS": 2,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_DVS.2": 1,
          "ADV_FSP": 2,
          "ADV_HLD": 2,
          "ADV_IMP": 2,
          "ADV_IMP.2": 5,
          "ADV_INT": 2,
          "ADV_LLD": 2,
          "ADV_RCR": 2,
          "ADV_SPM": 2
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_USR": 2
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.2": 5,
          "ALC_FLR": 2,
          "ALC_LCD": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT": 2,
          "ALC_TAT.1": 1
        },
        "APE": {
          "APE_DES": 1,
          "APE_ENV": 1,
          "APE_INT": 1,
          "APE_OBJ": 1,
          "APE_REQ": 1,
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_DES": 1,
          "ASE_ENV": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_PPC": 1,
          "ASE_REQ": 1,
          "ASE_SRE": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_DPT": 2,
          "ATE_FUN": 4,
          "ATE_IND": 4
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_MSU": 2,
          "AVA_MSU.3": 5,
          "AVA_SOF": 3,
          "AVA_VLA": 5,
          "AVA_VLA.2": 1,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 9,
          "EAL 4 augmented": 3,
          "EAL 5+": 1,
          "EAL 7": 1,
          "EAL1": 5,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 6,
          "EAL5": 6,
          "EAL5+": 1,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "23 March 2010, STARCOS 3.3 Passport Edition Version 2.1a, SRC Security Research \u0026 Consulting GmbH (confidential document) [9] Common Criteria Protection Profile Machine Readable Travel Document with \u201eICAO Application": 1,
          "Edition Version 2.1a, BSI-DSZ-CC-0635- 2010, Version 1.2, 16 March 2010, Giesecke \u0026 Devrient GmbH (confidential document) [7] Security Target Lite STARCOS 3.3 Passport Edition Version 2.1a, BSI-DSZ-CC- 0635-2010, Version": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "SRC": {
          "SRC Security Research \u0026 Consulting": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "STARCOS": {
          "STARCOS 3": 25
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 25": 1,
          "AIS 26": 1,
          "AIS 32": 1,
          "AIS 34": 3,
          "AIS 35": 2,
          "AIS 36": 1,
          "AIS 38": 1
        },
        "FIPS": {
          "FIPS 180-2": 2,
          "FIPS 46-3": 1,
          "FIPS PUB 180-2": 1
        },
        "ICAO": {
          "ICAO": 10
        },
        "ISO": {
          "ISO/IEC 15408:2005": 3,
          "ISO/IEC 9796-": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "Triple-DES": 2
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 25": 1,
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 1,
          "Giesecke \u0026 Devrient": 16
        },
        "Infineon": {
          "Infineon Technologies AG": 1
        },
        "NXP": {
          "NXP": 8
        },
        "Philips": {
          "Philips": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20100412133631+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Giesecke \u0026 Devrient GmbH, G\u0026D, MRTD, EAC, ePass\"",
      "/ModDate": "D:20100412143812+02\u002700\u0027",
      "/Producer": "OpenOffice.org 3.1",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0635-2010",
      "pdf_file_size_bytes": 413104,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 38
    },
    "st_filename": "0635b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 7
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 3
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0410-2007": 1,
          "BSI-DSZ-CC-0417-2008": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0026": 1,
          "BSI-PP-0002-2001": 1,
          "BSI-PP-0017": 1,
          "BSI-PP-0026": 3
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 1,
          "ACM_SCP.2": 1
        },
        "ADO": {
          "ADO_DEL.2": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.1": 2,
          "ADV_FSP.2": 1,
          "ADV_HLD.2": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 6,
          "ADV_LLD.1": 2,
          "ADV_RCR.1": 2,
          "ADV_SPM.1": 5
        },
        "AGD": {
          "AGD_ADM.1": 3,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS.2": 6,
          "ALC_TAT.1": 2
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_MSU.3": 6,
          "AVA_VLA.4": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5+": 1,
          "EAL4": 11,
          "EAL4 augmented": 1,
          "EAL4+": 1,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 7,
          "FAU_SAS.1": 10,
          "FAU_SAS.1.1": 5
        },
        "FCS": {
          "FCS_CKM": 51,
          "FCS_CKM.1": 51,
          "FCS_CKM.2": 12,
          "FCS_CKM.4": 59,
          "FCS_COP": 106,
          "FCS_COP.1": 41,
          "FCS_RND": 24,
          "FCS_RND.1": 13,
          "FCS_RND.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 20,
          "FDP_ACC.1.1": 3,
          "FDP_ACF": 2,
          "FDP_ACF.1": 12,
          "FDP_ACF.1.1": 3,
          "FDP_ACF.1.2": 4,
          "FDP_ACF.1.3": 3,
          "FDP_ACF.1.4": 4,
          "FDP_DAU": 8,
          "FDP_DAU.1": 4,
          "FDP_IFC.1": 8,
          "FDP_ITC.1": 29,
          "FDP_ITC.2": 30,
          "FDP_UCT": 14,
          "FDP_UCT.1": 7,
          "FDP_UIT": 14,
          "FDP_UIT.1": 9
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 3,
          "FIA_AFL.1.2": 3,
          "FIA_API": 33,
          "FIA_API.1": 13,
          "FIA_API.1.1": 1,
          "FIA_SOS.2": 1,
          "FIA_UAU": 66,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 3,
          "FIA_UAU.1.2": 3,
          "FIA_UAU.4": 9,
          "FIA_UAU.5": 10,
          "FIA_UAU.6": 8,
          "FIA_UID": 1,
          "FIA_UID.1": 12,
          "FIA_UID.1.1": 3,
          "FIA_UID.1.2": 2
        },
        "FMT": {
          "FMT_LIM": 9,
          "FMT_LIM.1": 17,
          "FMT_LIM.1.1": 4,
          "FMT_LIM.2": 16,
          "FMT_LIM.2.1": 4,
          "FMT_MDT.3": 1,
          "FMT_MSA.1": 1,
          "FMT_MSA.2": 41,
          "FMT_MSA.3": 2,
          "FMT_MTD": 56,
          "FMT_MTD.1": 31,
          "FMT_MTD.3": 4,
          "FMT_MTD.3.1": 3,
          "FMT_SMF": 1,
          "FMT_SMF.1": 24,
          "FMT_SMF.1.1": 3,
          "FMT_SMR": 1,
          "FMT_SMR.1": 24,
          "FMT_SMR.1.1": 3,
          "FMT_SMR.1.2": 3
        },
        "FPT": {
          "FPT_AMT.1": 1,
          "FPT_FLS": 1,
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 3,
          "FPT_PHP": 1,
          "FPT_PHP.3": 8,
          "FPT_PHP.3.1": 3,
          "FPT_RVM": 1,
          "FPT_RVM.1": 6,
          "FPT_RVM.1.1": 3,
          "FPT_SEP": 1,
          "FPT_SEP.1": 7,
          "FPT_SEP.1.1": 3,
          "FPT_SEP.1.2": 3,
          "FPT_TST": 2,
          "FPT_TST.1": 8,
          "FPT_TST.1.1": 3,
          "FPT_TST.1.2": 3,
          "FPT_TST.1.3": 3
        },
        "FTP": {
          "FTP_ITC.1": 9,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 11
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 9
          },
          "SHA2": {
            "SHA-224": 3,
            "SHA-256": 5
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 16,
          "EF.DG1": 32,
          "EF.DG13": 3,
          "EF.DG14": 8,
          "EF.DG15": 4,
          "EF.DG16": 35,
          "EF.DG2": 10,
          "EF.DG3": 16,
          "EF.DG4": 15,
          "EF.DG5": 10,
          "EF.SOD": 17
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "STARCOS": {
          "STARCOS 3": 129
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 4,
          "Physical Tampering": 6,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 6,
          "physical tampering": 8
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 3,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 4,
          "AIS20": 3,
          "AIS31": 1
        },
        "CC": {
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-002": 1,
          "CCMB-2005-08-003": 1
        },
        "FIPS": {
          "FIPS 180-2": 5,
          "FIPS 180-213": 1,
          "FIPS 46-3": 5,
          "FIPS PUB 180-2": 3,
          "FIPS PUB 46-3": 1
        },
        "ICAO": {
          "ICAO": 18
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 9796-2": 1
        },
        "RFC": {
          "RFC 2631": 1,
          "RFC3369": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "TDES": 1,
            "Triple-DES": 17
          },
          "DES": {
            "DES": 12
          }
        },
        "constructions": {
          "MAC": {
            "KMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "Giesecke \u0026 Devrient": 10
        },
        "NXP": {
          "NXP": 4,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Giesecke \u0026 Devrient",
      "/Comments": "",
      "/Company": "G\u0026D",
      "/CreationDate": "D:20100329102731+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 9.1 f\u00fcr Word",
      "/Keywords": "Version 1.3 / Status 26.03.2010",
      "/ModDate": "D:20100329103003+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 9.3.0 (Windows)",
      "/STARCOS Version": "STARCOS 3.3 Passport Edition Version 2.1a",
      "/SourceModified": "D:20100329082617",
      "/Subject": "Security Target STARCOS 3.3 Passport Edition Version 2.1a",
      "/Title": "Security Target STARCOS 3.3 Passport Edition Version 2.1a",
      "pdf_file_size_bytes": 650696,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 117
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0635a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ADV_IMP.2",
      "EAL4+",
      "AVA_VLA.4",
      "ALC_DVS.2",
      "AVA_MSU.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0635b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4d3b06816b946fea7b894dfe2d4648270f7cfbf3061978c63760a618bc728947",
      "txt_hash": "b12dc7278941f985b6bc679f37e9191e55f7faf55077d8cb8f6c44cb6f87a81d"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ec49ee76576c778af42054c17e9e7d739adff3db79f0d5568904d4cb685af273",
      "txt_hash": "86f4ae7db1401f01a7697100d776ed4e4c7cc4380d53a5bcfb6edfe9f822019f"
    }
  },
  "status": "archived"
}