This page was not yet optimized for use on mobile
devices.
STARCOS 3.3 Passport Edition Version 2.1a
CSV information
| Status | archived |
|---|---|
| Valid from | 31.03.2010 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | G+D Mobile Security GmbH |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_MSU.3, EAL4+, ADV_IMP.2, AVA_VLA.4, ALC_DVS.2 |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0635-2010
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
DES, Triple-DESAsymmetric Algorithms
ECDH, ECDSAHash functions
SHA-1, SHA-256, SHA-224, MD5Schemes
MACRandomness
RNGOperating System name
STARCOS 3Vendor
NXP, Infineon Technologies AG, Giesecke & Devrient, G&D, PhilipsSecurity level
EAL 4, EAL4, EAL 1, EAL 7, EAL 5+, EAL5+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_DVS.2, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_LCD.1, ALC_TAT.1, ATE_FUN, ATE_IND, ATE_COV, ATE_DPT, AVA_MSU.3, AVA_VLA.4, AVA_VLA, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA.2, AVA_VLA.3, APE_DES, APE_ENV, APE_INT, APE_OBJ, APE_REQ, APE_SRE, ASE_DES, ASE_ENV, ASE_INT, ASE_OBJ, ASE_PPC, ASE_REQ, ASE_SRE, ASE_TSSProtection profiles
BSI-CC-PP-0026, BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0635-2010, BSI-DSZ-CC-0521-2008, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-S-0002-2009, BSI-DSZ-CC-0635-, BSI-DSZ-CC-0410, BSI-DSZ-CC-S-0002-Evaluation facilities
SRC Security Research & ConsultingSide-channel analysis
JILCertification process
Edition Version 2.1a, BSI-DSZ-CC-0635- 2010, Version 1.2, 16 March 2010, Giesecke & Devrient GmbH (confidential document) [7] Security Target Lite STARCOS 3.3 Passport Edition Version 2.1a, BSI-DSZ-CC- 0635-2010, Version, 23 March 2010, STARCOS 3.3 Passport Edition Version 2.1a, SRC Security Research & Consulting GmbH (confidential document) [9] Common Criteria Protection Profile Machine Readable Travel Document with „ICAO ApplicationStandards
FIPS 180-2, FIPS 46-3, FIPS PUB 180-2, AIS 34, AIS 35, AIS 20, AIS 25, AIS 26, AIS 32, AIS 36, AIS 38, ISO/IEC 9796-, ISO/IEC 15408:2005, ICAOTechnical reports
BSI 7125, BSI 7148, BSI 7149, BSI 25File metadata
| Title | Certification Report BSI-DSZ-CC-0635-2010 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, Giesecke & Devrient GmbH, G&D, MRTD, EAC, ePass" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20100412133631+02'00' |
| Modification date | D:20100412143812+02'00' |
| Pages | 38 |
| Creator | Writer |
| Producer | OpenOffice.org 3.1 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0635-2010 |
|---|---|
| Certified item | STARCOS 3.3 Passport Edition Version 2.1a |
| Certification lab | BSI |
| Developer | Giesecke & Devrient GmbH |
References
Outgoing- BSI-DSZ-CC-0521-2008 - archived - STARCOS 3.3 Passport Edition Version 2.0a
- BSI-DSZ-CC-0410-2007 - archived - NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software
- BSI-DSZ-CC-0642-2011 - archived - STARCOS 3.3 ID EAC+AA C1
Security target
Extracted keywords
Symmetric Algorithms
DES, TDES, Triple-DES, KMACAsymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DHHash functions
SHA-1, SHA-224, SHA-256Schemes
MAC, Key AgreementBlock cipher modes
CBCOperating System name
STARCOS 3IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG13, EF.DG14, EF.DG15, EF.COM, EF.SODVendor
NXP, NXP Semiconductors, Giesecke & DevrientSecurity level
EAL5+, EAL4+, EAL4, EAL 5+, EAL4 augmentedSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_SPM.1, ADV_FSP.2, ADV_RCR.1, ADV_LLD.1, ADV_FSP.1, ADV_HLD.2, ADV_IMP.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_TAT.1, ATE_COV.2, ATE_FUN.1, AVA_MSU.3, AVA_VLA.4Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UCT, FDP_IFC.1, FDP_UIT, FDP_UIT.1, FDP_DAU.1, FDP_DAU, FDP_ACC, FIA_API, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UAU, FIA_AFL.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_AFL.1.1, FIA_AFL.1.2, FIA_AFL, FIA_UID, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.2, FMT_MTD, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.3, FMT_MTD.3.1, FMT_MDT.3, FMT_MSA.1, FMT_SMF, FMT_SMR, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_RVM.1, FPT_SEP.1, FPT_FLS.1.1, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_AMT.1, FPT_PHP.3.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_FLS, FPT_PHP, FPT_RVM, FPT_SEP, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0026, BSI-PP-0017, BSI-PP-0002-2001, BSI-PP- 0026Certificates
BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0417-2008Side-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringStandards
FIPS 180-213, FIPS 46-3, FIPS PUB 180-2, FIPS 180-2, FIPS PUB 46-3, AIS 20, AIS20, AIS31, RFC 2631, RFC3369, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC 9796-2, ICAO, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003File metadata
| Title | Security Target STARCOS 3.3 Passport Edition Version 2.1a |
|---|---|
| Subject | Security Target STARCOS 3.3 Passport Edition Version 2.1a |
| Keywords | Version 1.3 / Status 26.03.2010 |
| Author | Giesecke & Devrient |
| Creation date | D:20100329102731+02'00' |
| Modification date | D:20100329103003+02'00' |
| Pages | 117 |
| Creator | Acrobat PDFMaker 9.1 für Word |
| Producer | Acrobat Distiller 9.3.0 (Windows) |
References
Outgoing- BSI-DSZ-CC-0410-2007 - archived - NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software
- BSI-DSZ-CC-0417-2008 - archived - NXP Smart Card Controller P5CD080V0B with Dedicated software: Secured Crypto Library Release 2.0
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0635-2010Extracted SARs
ADV_DVS.2, ADV_FSP.2, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_FUN.1, AVA_MSU.3, AVA_VLA.4References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "0a06dce99856c4f2",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0635-2010",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.1",
"3.3"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0642-2011"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0410-2007",
"BSI-DSZ-CC-0521-2008"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0642-2011"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0410-2007",
"BSI-DSZ-CC-0404-2007",
"BSI-DSZ-CC-0521-2008",
"BSI-DSZ-CC-0463-2008"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0410-2007",
"BSI-DSZ-CC-0417-2008"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0410-2007",
"BSI-DSZ-CC-0417-2008"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "G+D Mobile Security GmbH",
"manufacturer_web": "https://www.gi-de.com/de/de/mobile-security/",
"name": "STARCOS 3.3 Passport Edition Version 2.1a",
"not_valid_after": "2019-09-01",
"not_valid_before": "2010-03-31",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0635a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0635-2010",
"cert_item": "STARCOS 3.3 Passport Edition Version 2.1a",
"cert_lab": "BSI",
"developer": "Giesecke \u0026 Devrient GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0410": 1,
"BSI-DSZ-CC-0410-2007": 2,
"BSI-DSZ-CC-0521-2008": 3,
"BSI-DSZ-CC-0635-": 1,
"BSI-DSZ-CC-0635-2010": 20,
"BSI-DSZ-CC-S-0002-": 1,
"BSI-DSZ-CC-S-0002-2009": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0026": 3,
"BSI-PP-0002-2001": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 1,
"ACM_CAP": 2,
"ACM_CAP.4": 1,
"ACM_SCP": 2,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 1,
"ADO_IGS": 2,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_DVS.2": 1,
"ADV_FSP": 2,
"ADV_HLD": 2,
"ADV_IMP": 2,
"ADV_IMP.2": 5,
"ADV_INT": 2,
"ADV_LLD": 2,
"ADV_RCR": 2,
"ADV_SPM": 2
},
"AGD": {
"AGD_ADM": 2,
"AGD_USR": 2
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.2": 5,
"ALC_FLR": 2,
"ALC_LCD": 1,
"ALC_LCD.1": 1,
"ALC_TAT": 2,
"ALC_TAT.1": 1
},
"APE": {
"APE_DES": 1,
"APE_ENV": 1,
"APE_INT": 1,
"APE_OBJ": 1,
"APE_REQ": 1,
"APE_SRE": 1
},
"ASE": {
"ASE_DES": 1,
"ASE_ENV": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_PPC": 1,
"ASE_REQ": 1,
"ASE_SRE": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_DPT": 2,
"ATE_FUN": 4,
"ATE_IND": 4
},
"AVA": {
"AVA_CCA": 2,
"AVA_MSU": 2,
"AVA_MSU.3": 5,
"AVA_SOF": 3,
"AVA_VLA": 5,
"AVA_VLA.2": 1,
"AVA_VLA.3": 1,
"AVA_VLA.4": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 9,
"EAL 4 augmented": 3,
"EAL 5+": 1,
"EAL 7": 1,
"EAL1": 5,
"EAL2": 3,
"EAL3": 4,
"EAL4": 6,
"EAL5": 6,
"EAL5+": 1,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"23 March 2010, STARCOS 3.3 Passport Edition Version 2.1a, SRC Security Research \u0026 Consulting GmbH (confidential document) [9] Common Criteria Protection Profile Machine Readable Travel Document with \u201eICAO Application": 1,
"Edition Version 2.1a, BSI-DSZ-CC-0635- 2010, Version 1.2, 16 March 2010, Giesecke \u0026 Devrient GmbH (confidential document) [7] Security Target Lite STARCOS 3.3 Passport Edition Version 2.1a, BSI-DSZ-CC- 0635-2010, Version": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 3
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
},
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 25
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"other": {
"JIL": 4
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 25": 1,
"AIS 26": 1,
"AIS 32": 1,
"AIS 34": 3,
"AIS 35": 2,
"AIS 36": 1,
"AIS 38": 1
},
"FIPS": {
"FIPS 180-2": 2,
"FIPS 46-3": 1,
"FIPS PUB 180-2": 1
},
"ICAO": {
"ICAO": 10
},
"ISO": {
"ISO/IEC 15408:2005": 3,
"ISO/IEC 9796-": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"Triple-DES": 2
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI 25": 1,
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 1,
"Giesecke \u0026 Devrient": 16
},
"Infineon": {
"Infineon Technologies AG": 1
},
"NXP": {
"NXP": 8
},
"Philips": {
"Philips": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20100412133631+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Giesecke \u0026 Devrient GmbH, G\u0026D, MRTD, EAC, ePass\"",
"/ModDate": "D:20100412143812+02\u002700\u0027",
"/Producer": "OpenOffice.org 3.1",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0635-2010",
"pdf_file_size_bytes": 413104,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "0635b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 7
},
"ECDSA": {
"ECDSA": 6
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 3
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0410-2007": 1,
"BSI-DSZ-CC-0417-2008": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP- 0026": 1,
"BSI-PP-0002-2001": 1,
"BSI-PP-0017": 1,
"BSI-PP-0026": 3
}
},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL.2": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP.1": 2,
"ADV_FSP.2": 1,
"ADV_HLD.2": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 6,
"ADV_LLD.1": 2,
"ADV_RCR.1": 2,
"ADV_SPM.1": 5
},
"AGD": {
"AGD_ADM.1": 3,
"AGD_USR.1": 2
},
"ALC": {
"ALC_DVS.2": 6,
"ALC_TAT.1": 2
},
"ATE": {
"ATE_COV.2": 1,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_MSU.3": 6,
"AVA_VLA.4": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 5+": 1,
"EAL4": 11,
"EAL4 augmented": 1,
"EAL4+": 1,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 7,
"FAU_SAS.1": 10,
"FAU_SAS.1.1": 5
},
"FCS": {
"FCS_CKM": 51,
"FCS_CKM.1": 51,
"FCS_CKM.2": 12,
"FCS_CKM.4": 59,
"FCS_COP": 106,
"FCS_COP.1": 41,
"FCS_RND": 24,
"FCS_RND.1": 13,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 20,
"FDP_ACC.1.1": 3,
"FDP_ACF": 2,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 3,
"FDP_ACF.1.2": 4,
"FDP_ACF.1.3": 3,
"FDP_ACF.1.4": 4,
"FDP_DAU": 8,
"FDP_DAU.1": 4,
"FDP_IFC.1": 8,
"FDP_ITC.1": 29,
"FDP_ITC.2": 30,
"FDP_UCT": 14,
"FDP_UCT.1": 7,
"FDP_UIT": 14,
"FDP_UIT.1": 9
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 3,
"FIA_AFL.1.2": 3,
"FIA_API": 33,
"FIA_API.1": 13,
"FIA_API.1.1": 1,
"FIA_SOS.2": 1,
"FIA_UAU": 66,
"FIA_UAU.1": 10,
"FIA_UAU.1.1": 3,
"FIA_UAU.1.2": 3,
"FIA_UAU.4": 9,
"FIA_UAU.5": 10,
"FIA_UAU.6": 8,
"FIA_UID": 1,
"FIA_UID.1": 12,
"FIA_UID.1.1": 3,
"FIA_UID.1.2": 2
},
"FMT": {
"FMT_LIM": 9,
"FMT_LIM.1": 17,
"FMT_LIM.1.1": 4,
"FMT_LIM.2": 16,
"FMT_LIM.2.1": 4,
"FMT_MDT.3": 1,
"FMT_MSA.1": 1,
"FMT_MSA.2": 41,
"FMT_MSA.3": 2,
"FMT_MTD": 56,
"FMT_MTD.1": 31,
"FMT_MTD.3": 4,
"FMT_MTD.3.1": 3,
"FMT_SMF": 1,
"FMT_SMF.1": 24,
"FMT_SMF.1.1": 3,
"FMT_SMR": 1,
"FMT_SMR.1": 24,
"FMT_SMR.1.1": 3,
"FMT_SMR.1.2": 3
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS": 1,
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 3,
"FPT_PHP": 1,
"FPT_PHP.3": 8,
"FPT_PHP.3.1": 3,
"FPT_RVM": 1,
"FPT_RVM.1": 6,
"FPT_RVM.1.1": 3,
"FPT_SEP": 1,
"FPT_SEP.1": 7,
"FPT_SEP.1.1": 3,
"FPT_SEP.1.2": 3,
"FPT_TST": 2,
"FPT_TST.1": 8,
"FPT_TST.1.1": 3,
"FPT_TST.1.2": 3,
"FPT_TST.1.3": 3
},
"FTP": {
"FTP_ITC.1": 9,
"FTP_TRP.1": 5
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 11
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 9
},
"SHA2": {
"SHA-224": 3,
"SHA-256": 5
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 16,
"EF.DG1": 32,
"EF.DG13": 3,
"EF.DG14": 8,
"EF.DG15": 4,
"EF.DG16": 35,
"EF.DG2": 10,
"EF.DG3": 16,
"EF.DG4": 15,
"EF.DG5": 10,
"EF.SOD": 17
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 129
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 4,
"Physical Tampering": 6,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 6,
"physical tampering": 8
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 3,
"timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 4,
"AIS20": 3,
"AIS31": 1
},
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-002": 1,
"CCMB-2005-08-003": 1
},
"FIPS": {
"FIPS 180-2": 5,
"FIPS 180-213": 1,
"FIPS 46-3": 5,
"FIPS PUB 180-2": 3,
"FIPS PUB 46-3": 1
},
"ICAO": {
"ICAO": 18
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816-4": 1,
"ISO/IEC 9796-2": 1
},
"RFC": {
"RFC 2631": 1,
"RFC3369": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 1,
"Triple-DES": 17
},
"DES": {
"DES": 12
}
},
"constructions": {
"MAC": {
"KMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"Giesecke \u0026 Devrient": 10
},
"NXP": {
"NXP": 4,
"NXP Semiconductors": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Giesecke \u0026 Devrient",
"/Comments": "",
"/Company": "G\u0026D",
"/CreationDate": "D:20100329102731+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 9.1 f\u00fcr Word",
"/Keywords": "Version 1.3 / Status 26.03.2010",
"/ModDate": "D:20100329103003+02\u002700\u0027",
"/Producer": "Acrobat Distiller 9.3.0 (Windows)",
"/STARCOS Version": "STARCOS 3.3 Passport Edition Version 2.1a",
"/SourceModified": "D:20100329082617",
"/Subject": "Security Target STARCOS 3.3 Passport Edition Version 2.1a",
"/Title": "Security Target STARCOS 3.3 Passport Edition Version 2.1a",
"pdf_file_size_bytes": 650696,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 117
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0635a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ADV_IMP.2",
"EAL4+",
"AVA_VLA.4",
"ALC_DVS.2",
"AVA_MSU.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0635b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4d3b06816b946fea7b894dfe2d4648270f7cfbf3061978c63760a618bc728947",
"txt_hash": "b12dc7278941f985b6bc679f37e9191e55f7faf55077d8cb8f6c44cb6f87a81d"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ec49ee76576c778af42054c17e9e7d739adff3db79f0d5568904d4cb685af273",
"txt_hash": "86f4ae7db1401f01a7697100d776ed4e4c7cc4380d53a5bcfb6edfe9f822019f"
}
},
"status": "archived"
}