This page was not yet optimized for use on mobile
devices.
CardOS V5.0 with Application for QES, V1.0
CSV information
| Status | archived |
|---|---|
| Valid from | 26.07.2013 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Atos IT Solutions and Services GmbH |
| Category | Products for Digital Signatures |
| Security level | AVA_VAN.5, EAL4+ |
| Maintenance updates | CardOS V5.0 with Application for QES, V1.0 (07.07.2017) Certification report |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0833-2013
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
DES, TDESHash functions
SHA-2Randomness
TRNG, RNGLibraries
v1.02.013Vendor
Infineon, Infineon Technologies AG, Infineon TechnologiesSecurity level
EAL 4, EAL 5, EAL1, EAL4, EAL5+, EAL6, EAL3, EAL5, EAL7, EAL2, EAL 4 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_COMP.1, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_FUN, ATE_COV, ATE_DPT, ATE_IND, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-PP0059-2009Certificates
BSI-DSZ-CC-0833-2013, BSI-DSZ-CC-0758-2012, BSI-DSZ-CC-0758-2012-MA-01, BSI-DSZ-CC-0833, BSI-DSZ-CC-0758Evaluation facilities
TÜV Informationstechnik, TÜViTSide-channel analysis
JILCertification process
Report, CardOS V5.0 with Application for QES V1.0, BSI-DSZ-CC-0833, Version 4, 25.07.2013, TÜViT, (confidential document) [9] ETR for Composite Evaluation (ETR-COMP), M7892 A21, BSI-DSZ-CC-0758, Version 3, 16.07.2012, for QES V1.0', Rev. 1.10, Edition 04/2013, Atos IT Solutions and Services GmbH, 08.04.2013 (confidential document) [11] Administrator Guidance 'CardOS V5.0 with Application for QES V1.0', Rev. 1.30, Edition, Atos IT Solutions and Services GmbH, 27.03.2013 (confidential document) [12] User Guidance 'CardOS V5.0 with Application for QES V1.0', Rev. 1.40, Edition 03/2013, Atos, Solutions and Services GmbH, 27.03.2013 (confidential document) 10 specifically • AIS 25, Version 7, Anwendung der CC auf Integrierte Schaltungen including JIL, 13] CardOS V5.0 User's Manual, Edition 03/2013, Atos IT Solutions and Services GmbH, 03.2013 (confidential document) [14] CardOS V5.0 Package & Release Notes, Edition 03/2013, Atos IT Solutions and Services GmbH, 03, confidential document) [15] Application Digital Signature 'CardOS V5.0 with Application for QES V1.0', Rev. 1.10, Edition, Atos IT Solutions and Services GmbH, 27.03.2013 (confidential document) [16] Directive 1999/93/ec of the European parliament and of the council of 13 December 1999 on aStandards
FIPS180-3, PKCS1, AIS 34, AIS 36, AIS 25, AIS 26, AIS 32, AIS 38Technical reports
BSI TR-02102, BSI 7125, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-0833-2013 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, QES, Signatur, Signaturkarte, signature, SSCD""" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20130807083122+02'00' |
| Modification date | D:20130807083751+02'00' |
| Pages | 46 |
| Creator | Writer |
| Producer | LibreOffice 3.6 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0833-2013 |
|---|---|
| Certified item | CardOS V5.0 with Application for QES, V1.0 |
| Certification lab | BSI |
| Developer | Atos IT Solutions and Services GmbH |
References
Outgoing- BSI-DSZ-CC-0758-2012 - archived - Infineon Security Controller M7892 A21 with optional RSA 2048/4096 1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
Security target
Extracted keywords
Symmetric Algorithms
AESHash functions
SHA-256, SHA-384, SHA-512, SHA-2Schemes
MACRandomness
TRNGLibraries
v1.02.013Vendor
Infineon, Infineon Technologies AG, Infineon TechnologiesSecurity level
EAL 4, EAL4, EAL 4+, EAL 5+, EAL4 augmentedClaims
A.CGA, A.SCA, A.III, A.I, A.II, OE.HID_VADSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ALC_DEL, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SAS.1, FCS_CKM, FCS_COP, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_RNG.1, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_SDI, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2, FDP_IFC.1, FDP_ITT.1, FIA_UID.1, FIA_UAU.1, FIA_AFL, FIA_UAU, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1, FIA_UAU.6, FMT_MSA, FMT_MSA.4, FMT_MTD, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1, FMT_MSA.2, FMT_SMF, FMT_SMR, FMT_MOF, FMT_MSA.1, FMT_MSA.4.1, FMT_MTD.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1.1, FMT_MSA.2.1, FMT_LIM.1, FMT_LIM.2, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITT.1, FPT_TST.2, FRU_FLT.2Protection profiles
BSI-CC-PP-0035-2007, BSI-PP-0006-2002T, BSI-PP-0035, BSI-CC-PP-0059-2009, BSI-PP0059-2009, BSI-PP- 0035, BSI-PP0059-Certificates
BSI-DSZ-CC-0758-2012, BSI-DSZ-CC-0758-2012-MA-01, BSI-DSZ-CC-0833, CC-3Side-channel analysis
DPA, SPA, timing attacks, physical tampering, DFA, fault injectionStandards
PKCS #1, AIS36, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
| Title | Security Target 'CardOS V5.0 with Application for QES V1.0', Rev. 2.00, Edition 03/2013 |
|---|---|
| Subject | Security Target CardOS V5.0 QES (SSCD for QES) |
| Keywords | Common Criteria, Security Target, CardOS, SigG Germany, SigG Switzerland, Mass Signature |
| Author | Atos IT Solutions and Services GmbH |
| Creation date | D:20130716153355+02'00' |
| Modification date | D:20130716153848+02'00' |
| Pages | 88 |
| Creator | Writer |
| Producer | OpenOffice.org 3.2 |
References
Outgoing- BSI-DSZ-CC-0758-2012 - archived - Infineon Security Controller M7892 A21 with optional RSA 2048/4096 1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0833-2013Extracted SARs
ADV_ARC.1, ADV_COMP.1, ADV_FSP.4, ADV_IMP.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Products for Digital Signatures",
"cert_link": null,
"dgst": "236b01ad914b9af4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0833-2013",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.0",
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0758-2012"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0758-2012"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0758-2012"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0758-2012"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2017-07-07",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0833ma1a_pdf.pdf",
"maintenance_st_link": null,
"maintenance_title": "CardOS V5.0 with Application for QES, V1.0"
}
]
},
"manufacturer": "Atos IT Solutions and Services GmbH",
"manufacturer_web": "https://www.de.atos.net",
"name": "CardOS V5.0 with Application for QES, V1.0",
"not_valid_after": "2019-09-01",
"not_valid_before": "2013-07-26",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0833a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0833-2013",
"cert_item": "CardOS V5.0 with Application for QES, V1.0",
"cert_lab": "BSI",
"developer": "Atos IT Solutions and Services GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0758": 1,
"BSI-DSZ-CC-0758-2012": 3,
"BSI-DSZ-CC-0758-2012-MA-01": 1,
"BSI-DSZ-CC-0833": 1,
"BSI-DSZ-CC-0833-2013": 25
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP0059-2009": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 2,
"ADV_ARC.1": 1,
"ADV_COMP.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 2,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 2,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 2,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 2,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 8,
"EAL 4 augmented": 3,
"EAL 5": 2,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 8,
"EAL5": 6,
"EAL5+": 1,
"EAL6": 4,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"13] CardOS V5.0 User\u0027s Manual, Edition 03/2013, Atos IT Solutions and Services GmbH, 03.2013 (confidential document) [14] CardOS V5.0 Package \u0026 Release Notes, Edition 03/2013, Atos IT Solutions and Services GmbH, 03": 1,
"Atos IT Solutions and Services GmbH, 27.03.2013 (confidential document) [12] User Guidance \u0027CardOS V5.0 with Application for QES V1.0\u0027, Rev. 1.40, Edition 03/2013, Atos": 1,
"Atos IT Solutions and Services GmbH, 27.03.2013 (confidential document) [16] Directive 1999/93/ec of the European parliament and of the council of 13 December 1999 on a": 1,
"Report, CardOS V5.0 with Application for QES V1.0, BSI-DSZ-CC-0833, Version 4, 25.07.2013, T\u00dcViT, (confidential document) [9] ETR for Composite Evaluation (ETR-COMP), M7892 A21, BSI-DSZ-CC-0758, Version 3, 16.07.2012": 1,
"Solutions and Services GmbH, 27.03.2013 (confidential document) 10 specifically \u2022 AIS 25, Version 7, Anwendung der CC auf Integrierte Schaltungen including JIL": 1,
"confidential document) [15] Application Digital Signature \u0027CardOS V5.0 with Application for QES V1.0\u0027, Rev. 1.10, Edition": 1,
"for QES V1.0\u0027, Rev. 1.10, Edition 04/2013, Atos IT Solutions and Services GmbH, 08.04.2013 (confidential document) [11] Administrator Guidance \u0027CardOS V5.0 with Application for QES V1.0\u0027, Rev. 1.30, Edition": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 9
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 2,
"T\u00dcViT": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"other": {
"JIL": 3
}
},
"standard_id": {
"BSI": {
"AIS 25": 3,
"AIS 26": 3,
"AIS 32": 1,
"AIS 34": 2,
"AIS 36": 2,
"AIS 38": 1
},
"FIPS": {
"FIPS180-3": 2
},
"PKCS": {
"PKCS1": 5
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 1
},
"DES": {
"DES": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 10,
"Infineon Technologies": 1,
"Infineon Technologies AG": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20130807083122+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, QES, Signatur, Signaturkarte, signature, SSCD\"\"\"",
"/ModDate": "D:20130807083751+02\u002700\u0027",
"/Producer": "LibreOffice 3.6",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0833-2013",
"pdf_file_size_bytes": 1194236,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
},
"st_filename": "0833b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0758-2012": 1,
"BSI-DSZ-CC-0758-2012-MA-01": 1,
"BSI-DSZ-CC-0833": 1
},
"NL": {
"CC-3": 8
}
},
"cc_claims": {
"A": {
"A.CGA": 4,
"A.I": 1,
"A.II": 1,
"A.III": 9,
"A.SCA": 4
},
"OE": {
"OE.HID_VAD": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 3,
"BSI-CC-PP-0059-2009": 1,
"BSI-PP- 0035": 1,
"BSI-PP-0006-2002T": 3,
"BSI-PP-0035": 3,
"BSI-PP0059-": 1,
"BSI-PP0059-2009": 77
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.4": 2,
"ADV_IMP.1": 2,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL": 4,
"ASE_CCL.1": 1,
"ASE_ECD": 4,
"ASE_ECD.1": 1,
"ASE_INT": 11,
"ASE_INT.1": 1,
"ASE_OBJ": 11,
"ASE_OBJ.2": 1,
"ASE_REQ": 24,
"ASE_REQ.2": 1,
"ASE_SPD": 6,
"ASE_SPD.1": 1,
"ASE_TSS": 15,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 2,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL 4+": 1,
"EAL 5+": 2,
"EAL4": 8,
"EAL4 augmented": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS.1": 1
},
"FCS": {
"FCS_CKM": 18,
"FCS_CKM.1": 7,
"FCS_CKM.2": 2,
"FCS_CKM.4": 10,
"FCS_COP": 34,
"FCS_COP.1": 4,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC": 47,
"FDP_ACC.1": 25,
"FDP_ACF": 37,
"FDP_ACF.1": 25,
"FDP_IFC.1": 13,
"FDP_ITC.1": 6,
"FDP_ITC.2": 6,
"FDP_ITT.1": 1,
"FDP_RIP.1": 8,
"FDP_RIP.1.1": 1,
"FDP_SDI": 18,
"FDP_SDI.1": 3,
"FDP_SDI.2": 5
},
"FIA": {
"FIA_AFL": 42,
"FIA_AFL.1": 8,
"FIA_UAU": 15,
"FIA_UAU.1": 16,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.6": 2,
"FIA_UID.1": 14,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MOF": 14,
"FMT_MOF.1": 12,
"FMT_MOF.1.1": 1,
"FMT_MSA": 64,
"FMT_MSA.1": 11,
"FMT_MSA.2": 12,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 26,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MSA.4": 11,
"FMT_MSA.4.1": 1,
"FMT_MTD": 116,
"FMT_MTD.1": 9,
"FMT_SMF": 23,
"FMT_SMF.1": 58,
"FMT_SMF.1.1": 3,
"FMT_SMR": 17,
"FMT_SMR.1": 52,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP.1": 6,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 8,
"FPT_PHP.3.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 12,
"FPT_TST.1.1": 6,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1,
"FPT_TST.2": 1
},
"FRU": {
"FRU_FLT.2": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 11
}
},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 6,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"TRNG": {
"TRNG": 4
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"fault injection": 1,
"physical tampering": 5
},
"SCA": {
"DPA": 2,
"SPA": 3,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS36": 2
},
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
},
"PKCS": {
"PKCS #1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 16,
"Infineon Technologies": 1,
"Infineon Technologies AG": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Atos IT Solutions and Services GmbH",
"/CreationDate": "D:20130716153355+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Common Criteria, Security Target, CardOS, SigG Germany, SigG Switzerland, Mass Signature",
"/ModDate": "D:20130716153848+02\u002700\u0027",
"/Producer": "OpenOffice.org 3.2",
"/Subject": "Security Target CardOS V5.0 QES (SSCD for QES)",
"/Title": "Security Target \u0027CardOS V5.0 with Application for QES V1.0\u0027, Rev. 2.00, Edition 03/2013",
"pdf_file_size_bytes": 593631,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 88
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0833a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0833b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ce98b4e97c1b076b81a335638558700ea6ed312df764238e940a52c57c30c551",
"txt_hash": "78c2a903eed9a1e332335f265e42639f8fa142a7b3de96de9dee0cd2954c854c"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e4791bc18fb94779c9fd5604adf324014d8ccf967327474b2c1997b5d3dccd7e",
"txt_hash": "5bc79eefce5d4706a436d7881b03cba9193016d679188d876eccbd77dda6847e"
}
},
"status": "archived"
}