This page was not yet optimized for use on mobile
devices.
STARCOS 3.3 ID EAC+AA C1
CSV information
| Status | archived |
|---|---|
| Valid from | 23.03.2011 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | G+D Mobile Security GmbH |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_MSU.3, EAL4+, ADV_IMP.2, AVA_VLA.4, ALC_DVS.2 |
| Protection profiles |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0642-2011
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
DES, Triple-DESAsymmetric Algorithms
ECDH, ECDSA, ECCHash functions
SHA-1, SHA-256, SHA-224, MD5Schemes
MACRandomness
RNGOperating System name
STARCOS 3Vendor
NXP, NXP Semiconductors, Infineon Technologies AG, Giesecke & Devrient, G&D, PhilipsSecurity level
EAL 4, EAL4, EAL1, EAL 5+, EAL5+, EAL6, EAL3, EAL5, EAL7, EAL2, EAL 4 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_LCD.1, ALC_TAT.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, APE_DES, APE_ENV, APE_INT, APE_OBJ, APE_REQ, APE_SRE, ASE_DES, ASE_ENV, ASE_INT, ASE_OBJ, ASE_PPC, ASE_REQ, ASE_SRE, ASE_TSSProtection profiles
BSI-PP-0026-2006-MA-01, BSI-PP- 0026-2006-MA-01, BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0642-2011, BSI-DSZ-CC-0635-2010, BSI-DSZ-CC-0555-2009Evaluation facilities
SRC Security Research & ConsultingSide-channel analysis
side channel, fault injection, JILCertification process
Version 1.7, 25.02.2011, Security Target STARCOS 3.3 ID EAC+AA C1, Giesecke & Devrient GmbH (confidential document) [7] Evaluation Technical Report for STARCOS 3.3 ID EAC+AA C1, Version 2.0, 02.03.2011, SRC, Research & Consulting GmbH (confidential document) [8] Configuration list for the TOE, Version 1.3, 01.03.2011, Configuration List STARCOS 3.3 ID, C1, Giesecke & Devrient GmbH (confidential document) [9] Security Target BSI-DSZ-CC-0642-2011, Version 1.9, 01.03.2011, Security Target Lite STARCOS 3Standards
FIPS 180-2, FIPS 46-3, FIPS PUB 180-2, AIS 34, AIS 25, AIS 26, AIS 35, AIS 20, AIS 31, AIS 32, AIS 36, AIS 38, ISO/IEC 9796-, ISO/IEC 15408:2005, ICAOTechnical reports
BSI 7125, BSI 7148, BSI 7149File metadata
| Title | Certification Report BSI-DSZ-CC-0642-2011 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, ePass, MRTD, G&D, STARCOS 3.3, EAC, Extended Access Control" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20110420112240+02'00' |
| Modification date | D:20110502082518+02'00' |
| Pages | 38 |
| Creator | Writer |
| Producer | OpenOffice.org 3.2 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0642-2011 |
|---|---|
| Certified item | STARCOS 3.3 ID EAC+AA C1 |
| Certification lab | BSI |
| Developer | Giesecke & Devrient GmbH |
References
Outgoing- BSI-DSZ-CC-0555-2009 - archived - NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
- BSI-DSZ-CC-0635-2010 - archived - STARCOS 3.3 Passport Edition Version 2.1a
Security target
Extracted keywords
Symmetric Algorithms
DES, TDES, Triple-DES, KMACAsymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DHHash functions
SHA-1, SHA-224, SHA-256Schemes
MAC, Key AgreementBlock cipher modes
CBCOperating System name
STARCOS 3IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG13, EF.DG14, EF.DG15, EF.COM, EF.SODVendor
NXP, NXP Semiconductors, Giesecke & DevrientSecurity level
EAL5+, EAL4+, EAL4, EAL 5+, EAL4 augmentedSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_SPM.1, ADV_FSP.2, ADV_RCR.1, ADV_LLD.1, ADV_FSP.1, ADV_HLD.2, ADV_IMP.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_TAT.1, ATE_COV.2, ATE_FUN.1, AVA_MSU.3, AVA_VLA.4Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UCT, FDP_IFC.1, FDP_UIT, FDP_UIT.1, FDP_DAU.1, FDP_DAU, FDP_ACC, FIA_API, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UAU, FIA_AFL.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_AFL.1.1, FIA_AFL.1.2, FIA_AFL, FIA_UID, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.2, FMT_MTD, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.3, FMT_MTD.3.1, FMT_MDT.3, FMT_MSA.1, FMT_SMF, FMT_SMR, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_RVM.1, FPT_SEP.1, FPT_FLS.1.1, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_AMT.1, FPT_PHP.3.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_FLS, FPT_PHP, FPT_RVM, FPT_SEP, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0026, BSI-PP-0017, BSI-PP-0002-2001, BSI-PP- 0026Certificates
BSI-DSZ-CC-0555-2009Side-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringStandards
FIPS 180-213, FIPS 46-3, FIPS PUB 180-2, FIPS 180-2, FIPS PUB 46-3, AIS 20, AIS20, AIS31, RFC 2631, RFC3369, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC 9796-2, ICAO, CCMB-2005-09-001, CCMB-2005-09-002, CCMB-2005-09-00, CCMB-2005-09-004File metadata
| Title | STARCOS 3.3 ID EAC+AA C1 |
|---|---|
| Subject | Security Target Lite |
| Keywords | Version 1.9 / Status 01.03.2011 |
| Author | Giesecke & Devrient |
| Creation date | D:20110301141134+01'00' |
| Modification date | D:20110301141558+01'00' |
| Pages | 117 |
| Creator | Acrobat PDFMaker 9.1 für Word |
| Producer | Acrobat Distiller 9.4.0 (Windows) |
References
Outgoing- BSI-DSZ-CC-0555-2009 - archived - NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0642-2011Extracted SARs
ADV_FSP.2, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_FUN.1, AVA_MSU.3, AVA_VLA.4Similar certificates
| Name | Certificate ID | |
|---|---|---|
| STARCOS 3.7 ID ePA C1, STARCOS 3.7 ID eAT C1, STARCOS 3.7 ID ePass C1 | BSI-DSZ-CC-1077-2020 | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "fd44821c66243378",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0642-2011",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.3"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"627a214702fd03e7"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0635-2010",
"BSI-DSZ-CC-0555-2009"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0635-2010",
"BSI-DSZ-CC-0555-2009",
"BSI-DSZ-CC-0521-2008",
"BSI-DSZ-CC-0463-2008",
"BSI-DSZ-CC-0410-2007",
"BSI-DSZ-CC-0404-2007"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0555-2009"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0555-2009"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "G+D Mobile Security GmbH",
"manufacturer_web": "https://www.gi-de.com/de/de/mobile-security/",
"name": "STARCOS 3.3 ID EAC+AA C1",
"not_valid_after": "2019-09-01",
"not_valid_before": "2011-03-23",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0642a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0642-2011",
"cert_item": "STARCOS 3.3 ID EAC+AA C1",
"cert_lab": "BSI",
"developer": "Giesecke \u0026 Devrient GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0555-2009": 4,
"BSI-DSZ-CC-0635-2010": 3,
"BSI-DSZ-CC-0642-2011": 22
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP- 0026-2006-MA-01": 1,
"BSI-PP-0002-2001": 1,
"BSI-PP-0026-2006-MA-01": 3
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 1,
"ACM_CAP": 2,
"ACM_CAP.4": 1,
"ACM_SCP": 2,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 1,
"ADO_IGS": 2,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP": 2,
"ADV_HLD": 2,
"ADV_IMP": 2,
"ADV_IMP.2": 5,
"ADV_INT": 2,
"ADV_LLD": 2,
"ADV_RCR": 2,
"ADV_SPM": 2
},
"AGD": {
"AGD_ADM": 2,
"AGD_USR": 2
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.2": 6,
"ALC_FLR": 2,
"ALC_LCD": 1,
"ALC_LCD.1": 1,
"ALC_TAT": 2,
"ALC_TAT.1": 1
},
"APE": {
"APE_DES": 1,
"APE_ENV": 1,
"APE_INT": 1,
"APE_OBJ": 1,
"APE_REQ": 1,
"APE_SRE": 1
},
"ASE": {
"ASE_DES": 1,
"ASE_ENV": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_PPC": 1,
"ASE_REQ": 1,
"ASE_SRE": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_DPT": 2,
"ATE_FUN": 2,
"ATE_IND": 2
},
"AVA": {
"AVA_CCA": 2,
"AVA_MSU": 2,
"AVA_MSU.3": 5,
"AVA_SOF": 3,
"AVA_VLA": 3,
"AVA_VLA.2": 1,
"AVA_VLA.3": 1,
"AVA_VLA.4": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 9,
"EAL 4 augmented": 3,
"EAL 5+": 1,
"EAL1": 6,
"EAL2": 3,
"EAL3": 4,
"EAL4": 9,
"EAL5": 6,
"EAL5+": 1,
"EAL6": 4,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"C1, Giesecke \u0026 Devrient GmbH (confidential document) [9] Security Target BSI-DSZ-CC-0642-2011, Version 1.9, 01.03.2011, Security Target Lite STARCOS 3": 1,
"Research \u0026 Consulting GmbH (confidential document) [8] Configuration list for the TOE, Version 1.3, 01.03.2011, Configuration List STARCOS 3.3 ID": 1,
"Version 1.7, 25.02.2011, Security Target STARCOS 3.3 ID EAC+AA C1, Giesecke \u0026 Devrient GmbH (confidential document) [7] Evaluation Technical Report for STARCOS 3.3 ID EAC+AA C1, Version 2.0, 02.03.2011, SRC": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 3
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
},
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 27
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 1
},
"SCA": {
"side channel": 1
},
"other": {
"JIL": 5
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 1,
"AIS 32": 1,
"AIS 34": 3,
"AIS 35": 3,
"AIS 36": 1,
"AIS 38": 1
},
"FIPS": {
"FIPS 180-2": 2,
"FIPS 46-3": 1,
"FIPS PUB 180-2": 1
},
"ICAO": {
"ICAO": 12
},
"ISO": {
"ISO/IEC 15408:2005": 3,
"ISO/IEC 9796-": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"Triple-DES": 2
},
"DES": {
"DES": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 1,
"Giesecke \u0026 Devrient": 17
},
"Infineon": {
"Infineon Technologies AG": 1
},
"NXP": {
"NXP": 10,
"NXP Semiconductors": 1
},
"Philips": {
"Philips": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20110420112240+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, ePass, MRTD, G\u0026D, STARCOS 3.3, EAC, Extended Access Control\"",
"/ModDate": "D:20110502082518+02\u002700\u0027",
"/Producer": "OpenOffice.org 3.2",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0642-2011",
"pdf_file_size_bytes": 938278,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "0642b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 7
},
"ECDSA": {
"ECDSA": 6
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 3
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0555-2009": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP- 0026": 1,
"BSI-PP-0002-2001": 1,
"BSI-PP-0017": 1,
"BSI-PP-0026": 3
}
},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL.2": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP.1": 2,
"ADV_FSP.2": 1,
"ADV_HLD.2": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 6,
"ADV_LLD.1": 2,
"ADV_RCR.1": 2,
"ADV_SPM.1": 5
},
"AGD": {
"AGD_ADM.1": 3,
"AGD_USR.1": 2
},
"ALC": {
"ALC_DVS.2": 6,
"ALC_TAT.1": 2
},
"ATE": {
"ATE_COV.2": 1,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_MSU.3": 6,
"AVA_VLA.4": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 5+": 1,
"EAL4": 11,
"EAL4 augmented": 1,
"EAL4+": 1,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 7,
"FAU_SAS.1": 10,
"FAU_SAS.1.1": 5
},
"FCS": {
"FCS_CKM": 51,
"FCS_CKM.1": 51,
"FCS_CKM.2": 12,
"FCS_CKM.4": 59,
"FCS_COP": 106,
"FCS_COP.1": 41,
"FCS_RND": 24,
"FCS_RND.1": 13,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 21,
"FDP_ACC.1.1": 3,
"FDP_ACF": 2,
"FDP_ACF.1": 11,
"FDP_ACF.1.1": 3,
"FDP_ACF.1.2": 4,
"FDP_ACF.1.3": 3,
"FDP_ACF.1.4": 4,
"FDP_DAU": 8,
"FDP_DAU.1": 4,
"FDP_IFC.1": 8,
"FDP_ITC.1": 29,
"FDP_ITC.2": 30,
"FDP_UCT": 14,
"FDP_UCT.1": 7,
"FDP_UIT": 14,
"FDP_UIT.1": 9
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 3,
"FIA_AFL.1.2": 3,
"FIA_API": 33,
"FIA_API.1": 13,
"FIA_API.1.1": 1,
"FIA_SOS.2": 1,
"FIA_UAU": 66,
"FIA_UAU.1": 11,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 3,
"FIA_UAU.4": 9,
"FIA_UAU.5": 10,
"FIA_UAU.6": 8,
"FIA_UID": 1,
"FIA_UID.1": 12,
"FIA_UID.1.1": 3,
"FIA_UID.1.2": 3
},
"FMT": {
"FMT_LIM": 9,
"FMT_LIM.1": 17,
"FMT_LIM.1.1": 4,
"FMT_LIM.2": 16,
"FMT_LIM.2.1": 4,
"FMT_MDT.3": 1,
"FMT_MSA.1": 1,
"FMT_MSA.2": 41,
"FMT_MSA.3": 2,
"FMT_MTD": 60,
"FMT_MTD.1": 35,
"FMT_MTD.3": 4,
"FMT_MTD.3.1": 3,
"FMT_SMF": 1,
"FMT_SMF.1": 26,
"FMT_SMF.1.1": 3,
"FMT_SMR": 1,
"FMT_SMR.1": 26,
"FMT_SMR.1.1": 3,
"FMT_SMR.1.2": 3
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS": 1,
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 3,
"FPT_PHP": 1,
"FPT_PHP.3": 8,
"FPT_PHP.3.1": 3,
"FPT_RVM": 1,
"FPT_RVM.1": 6,
"FPT_RVM.1.1": 3,
"FPT_SEP": 1,
"FPT_SEP.1": 7,
"FPT_SEP.1.1": 3,
"FPT_SEP.1.2": 3,
"FPT_TST": 2,
"FPT_TST.1": 8,
"FPT_TST.1.1": 3,
"FPT_TST.1.2": 3,
"FPT_TST.1.3": 3
},
"FTP": {
"FTP_ITC.1": 9,
"FTP_TRP.1": 5
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 11
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 9
},
"SHA2": {
"SHA-224": 3,
"SHA-256": 5
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 16,
"EF.DG1": 32,
"EF.DG13": 3,
"EF.DG14": 8,
"EF.DG15": 4,
"EF.DG16": 35,
"EF.DG2": 10,
"EF.DG3": 16,
"EF.DG4": 15,
"EF.DG5": 10,
"EF.SOD": 17
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 130
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 4,
"Physical Tampering": 6,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 6,
"physical tampering": 8
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 3,
"timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 4,
"AIS20": 3,
"AIS31": 1
},
"CC": {
"CCMB-2005-09-00": 1,
"CCMB-2005-09-001": 1,
"CCMB-2005-09-002": 1,
"CCMB-2005-09-004": 1
},
"FIPS": {
"FIPS 180-2": 5,
"FIPS 180-213": 1,
"FIPS 46-3": 5,
"FIPS PUB 180-2": 3,
"FIPS PUB 46-3": 1
},
"ICAO": {
"ICAO": 18
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816-4": 1,
"ISO/IEC 9796-2": 1
},
"RFC": {
"RFC 2631": 1,
"RFC3369": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 1,
"Triple-DES": 17
},
"DES": {
"DES": 12
}
},
"constructions": {
"MAC": {
"KMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"Giesecke \u0026 Devrient": 14
},
"NXP": {
"NXP": 3,
"NXP Semiconductors": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Giesecke \u0026 Devrient",
"/Chip Version": "NXP P5CD081",
"/Comments": "",
"/Company": "Giesecke \u0026 Devrient",
"/CreationDate": "D:20110301141134+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 9.1 f\u00fcr Word",
"/Keywords": "Version 1.9 / Status 01.03.2011",
"/ModDate": "D:20110301141558+01\u002700\u0027",
"/Producer": "Acrobat Distiller 9.4.0 (Windows)",
"/STARCOS Version": "STARCOS 3.3 ID EAC+AA C1",
"/SourceModified": "D:20110301131050",
"/Subject": "Security Target Lite",
"/Title": "STARCOS 3.3 ID EAC+AA C1",
"pdf_file_size_bytes": 699018,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 117
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0026_ma1b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0642a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ADV_IMP.2",
"EAL4+",
"AVA_VLA.4",
"ALC_DVS.2",
"AVA_MSU.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0642b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8096dcac0c4b36c674aca880a6446b5541aec4a4b5d974caee296c7d53991d2d",
"txt_hash": "41a4d50535e711e6d062db2b991a4e52cc2d0a1839a2f863e301b1e9e494b002"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7dfcadd1f53c73efa8040529c3ecabc88d98b3325704cf882c1c7f08c2d535f6",
"txt_hash": "62842d3a924c946054579f8d53d8df0801e6025254e9e3f19bf30cdf526e7a23"
}
},
"status": "archived"
}