CardOS V5.3 QES, V1.0

CSV information

Status archived
Valid from 06.08.2014
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer Atos IT Solutions and Services GmbH
Category Products for Digital Signatures
Security level AVA_VAN.5, EAL4+
Protection profiles
Maintenance updates CardOS V5.3 QES, V1.0 (04.07.2017) Certification report

Heuristics summary

Certificate ID: BSI-DSZ-CC-0921-2014

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Symmetric Algorithms
AES, 3DES, TDES, Triple-DES, TDEA, CMAC
Asymmetric Algorithms
ECDSA, ECC, DSA
Hash functions
SHA-256, SHA-384, SHA-512, SHA-2
Schemes
Key Agreement
Randomness
RNG
Libraries
v1.02.013
Elliptic Curves
Curve P-256, Curve P-384, curve P-256, curve P-384, P-256, P-384, secp256r1, secp384r1, brainpoolP256r1, brainpoolP384r1
Block cipher modes
CBC

Vendor
Infineon, Infineon Technologies AG

Security level
EAL 4, EAL 5, EAL1, EAL4, EAL5+, EAL6, EAL3, EAL5, EAL7, EAL2, EAL 4 augmented, ITSEC Evaluation
Claims
OE.HID_VAD
Security Assurance Requirements (SAR)
ADV_ARC, ADV_COMP.1, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_FUN, ATE_COV, ATE_DPT, ATE_IND, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, AVA_VAN.5, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Security Functional Requirements (SFR)
FCS_CKM, FCS_COP, FIA_AFL, FIA_UID.1, FIA_UAU.1, FMT_SMF.1, FMT_MTD
Protection profiles
BSI-CC-PP-0059-2009-MA-01
Certificates
BSI-DSZ-CC-0921-2014, BSI-DSZ-CC-0782-2012-MA-01, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0782
Evaluation facilities
TÜV Informationstechnik, TÜViT

Side-channel analysis
JIL
Certification process
Technical Report BSI-DSZ-CC-0921-2014, Version 3.0, 31 July 2014, TÜV Informationstechnik GmbH, (confidential document) [9] Certification Report BSI-DSZ-CC-0782-2012 for Infineon Security Controller M7892 B11 with, ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜV Informationstechnik GmbH, (confidential document) [12] Configuration List 'CardOS V5.3 QES, V1.0', Revision 1.30, 30 July 2014, Atos IT Solutions, Services GmbH, (confidential document) [13] Users Manual CardOS V5.3, Edition 05/2014, Atos IT Solutions and Services GmbH, (confidential, & Release Notes 'CardOS V5.3 QES, V1.0', Edition 05/2014, Atos IT Solutions and Services GmbH, (confidential document) [15] Administrator Guidance 'CardOS V5.3 QES, V1.0', Revision 1.20, 07 May 2014, Atos IT Solutions, Services GmbH, (confidential document) [16] User Guidance 'CardOS V5.3 QES, V1.0', Revision 1.30, 02 May 2014, Atos IT Solutions and, GmbH, (confidential document) [17] Application Digital Signature 'CardOS V5.3 QES, V1.0', Revision 1.10, 07 May 2014, Atos IT, and Services GmbH, (confidential document) [18] ISO 7816 Part 3: Electronic Signals and Transmission Protocols – ISO/IEC 7816-3:1997/Amd

Standards
FIPS PUB 197, PKCS1, AIS 34, AIS 25, AIS 26, AIS 32, AIS 36, AIS 20, AIS 31, AIS 38, RFC3447, RFC 5639, ISO/IEC 15946-2
Technical reports
BSI TR-02102, BSI 7125, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-0921-2014
Subject Common Criteria Certification
Keywords "Common Criteria, Certification, Zertifizierung, SSCD, ATOS, SLE78, 0921"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20140825113014+02'00'
Modification date D:20140825114646+02'00'
Pages 48
Creator Writer
Producer LibreOffice 3.6

Frontpage

Certificate ID BSI-DSZ-CC-0921-2014
Certified item CardOS V5.3 QES, V1.0
Certification lab BSI
Developer Atos IT Solutions and Services GmbH

References

Outgoing
  • BSI-DSZ-CC-0782-2012 - archived - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, TDES, Triple-DES, CMAC
Asymmetric Algorithms
ECDSA, ECC, DSA
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-2
Schemes
MAC, Key Agreement
Randomness
RNG
Libraries
v1.02.013
Elliptic Curves
Curve P-256, Curve P-384, P-256, P-384, secp256r1, secp384r1, brainpoolP256r1, brainpoolP384r1
Block cipher modes
CBC

Trusted Execution Environments
SSC, SE
Vendor
NXP Semiconductors, Infineon Technologies AG, Infineon, Infineon Technologies, STMicroelectronics

Security level
EAL 4, EAL4, EAL 4+, EAL 6+, EAL4 augmented
Claims
A.CGA, A.SCA, A.III, OE.HID_VAD
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ALC_DEL, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_SAS.1, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_COP.1, FCS_CKM.2, FCS_CKM.4.1, FCS_RNG.1, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_SDI, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2, FDP_IFC.1, FDP_ITT.1, FIA_API, FIA_UID.1, FIA_UAU.1, FIA_AFL, FIA_API.1, FIA_AFL.1, FIA_API.1.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MSA.4, FMT_MTD, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4.1, FMT_MTD.1, FMT_LIM.1, FMT_LIM.2, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1.1, FPT_TST, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TST.2, FRU_FLT.2, FTP_ITC, FTP_ITC.1
Protection profiles
BSI-PP-0035, BSI-CC-PP-0035-2007, BSI-CC-PP-0071, BSI-CC-PP-0071-2012, BSI-CC-PP-0059-2009-MA-01, BSI-PP0059-2009, BSI-CC-PP-0059-, BSI-CC-PP-0059-2009-MA-, BSI-PP-0006-2002, BSI-CC-PP- 0059-2009-MA-01
Certificates
BSI-DSZ-CC-0782-2012-MA-01, BSI-DSZ-CC-921, CC-3

Side-channel analysis
physical probing, DPA, SPA, timing attacks, physical tampering, DFA, fault injection
Certification process
out of scope, no longer needed for any tasks concerning Application for QES. It has to be deleted. 10. Step 22 is out of scope of the TOE. 28 Security Target 'CardOS V5.3 QES, V1.0', Rev. 1.61, Edition 07/2014 Copyright © Atos

Standards
FIPS PUB 197, PKCS1, RFC 5639, RFC3447, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title Security Target 'CardOS V5.3 QES, V1.0', Rev. 1.61, Edition 07/2014
Subject Security Target CardOS V5.3 QES (SSCD for QES)
Keywords Common Criteria, Security Target, CardOS
Author Atos IT Solutions and Services GmbH
Creation date D:20140723191014+02'00'
Modification date D:20140723191641+02'00'
Pages 102
Creator Writer
Producer OpenOffice.org 3.2

References

Incoming

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

BSI-DSZ-CC-0921-2014

Extracted SARs

ADV_ARC.1, ADV_COMP.1, ADV_FSP.4, ADV_IMP.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Products for Digital Signatures",
  "cert_link": null,
  "dgst": "60c5f6b486bdffeb",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0921-2014",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0",
        "5.3"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "d918b28fd7bb5d79"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-2012"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-2012"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1193-2024"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1193-2024"
        ]
      },
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2017-07-04",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0921ma1a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "CardOS V5.3 QES, V1.0"
      }
    ]
  },
  "manufacturer": "Atos IT Solutions and Services GmbH",
  "manufacturer_web": "https://www.de.atos.net",
  "name": "CardOS V5.3 QES, V1.0",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2014-08-06",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0921a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0921-2014",
        "cert_item": "CardOS V5.3 QES, V1.0",
        "cert_lab": "BSI",
        "developer": "Atos IT Solutions and Services GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDSA": {
            "ECDSA": 8
          }
        },
        "FF": {
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0782": 1,
          "BSI-DSZ-CC-0782-2012": 2,
          "BSI-DSZ-CC-0782-2012-MA-01": 4,
          "BSI-DSZ-CC-0921-2014": 27
        }
      },
      "cc_claims": {
        "OE": {
          "OE.HID_VAD": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 2,
          "ADV_ARC.1": 1,
          "ADV_COMP.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 1,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 2,
          "ALC_CMS.5": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 2,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 1,
          "ATE_DPT.4": 1,
          "ATE_FUN": 2,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 2,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 4,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 6,
          "EAL 4 augmented": 3,
          "EAL 5": 2,
          "EAL1": 7,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 9,
          "EAL5": 6,
          "EAL5+": 1,
          "EAL6": 4,
          "EAL7": 4
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 2,
          "FCS_COP": 2
        },
        "FIA": {
          "FIA_AFL": 3,
          "FIA_UAU.1": 1,
          "FIA_UID.1": 1
        },
        "FMT": {
          "FMT_MTD": 4,
          "FMT_SMF.1": 2
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "\u0026 Release Notes \u0027CardOS V5.3 QES, V1.0\u0027, Edition 05/2014, Atos IT Solutions and Services GmbH, (confidential document) [15] Administrator Guidance \u0027CardOS V5.3 QES, V1.0\u0027, Revision 1.20, 07 May 2014, Atos IT Solutions": 1,
          "ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, T\u00dcV Informationstechnik GmbH, (confidential document) [12] Configuration List \u0027CardOS V5.3 QES, V1.0\u0027, Revision 1.30, 30 July 2014, Atos IT Solutions": 1,
          "GmbH, (confidential document) [17] Application Digital Signature \u0027CardOS V5.3 QES, V1.0\u0027, Revision 1.10, 07 May 2014, Atos IT": 1,
          "Services GmbH, (confidential document) [13] Users Manual CardOS V5.3, Edition 05/2014, Atos IT Solutions and Services GmbH, (confidential": 1,
          "Services GmbH, (confidential document) [16] User Guidance \u0027CardOS V5.3 QES, V1.0\u0027, Revision 1.30, 02 May 2014, Atos IT Solutions and": 1,
          "Technical Report BSI-DSZ-CC-0921-2014, Version 3.0, 31 July 2014, T\u00dcV Informationstechnik GmbH, (confidential document) [9] Certification Report BSI-DSZ-CC-0782-2012 for Infineon Security Controller M7892 B11 with": 1,
          "and Services GmbH, (confidential document) [18] ISO 7816 Part 3: Electronic Signals and Transmission Protocols \u2013 ISO/IEC 7816-3:1997/Amd": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 11
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 3,
          "brainpoolP384r1": 3
        },
        "NIST": {
          "Curve P-256": 4,
          "Curve P-384": 4,
          "P-256": 5,
          "P-384": 5,
          "curve P-256": 1,
          "curve P-384": 1,
          "secp256r1": 2,
          "secp384r1": 2
        }
      },
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 4,
          "T\u00dcViT": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 5,
            "SHA-256": 6,
            "SHA-384": 3,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "other": {
          "JIL": 3
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS 25": 2,
          "AIS 26": 2,
          "AIS 31": 2,
          "AIS 32": 2,
          "AIS 34": 2,
          "AIS 36": 3,
          "AIS 38": 1
        },
        "FIPS": {
          "FIPS PUB 197": 2
        },
        "ISO": {
          "ISO/IEC 15946-2": 1
        },
        "PKCS": {
          "PKCS1": 4
        },
        "RFC": {
          "RFC 5639": 1,
          "RFC3447": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 11
          }
        },
        "DES": {
          "3DES": {
            "3DES": 4,
            "TDEA": 1,
            "TDES": 5,
            "Triple-DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 9,
          "Infineon Technologies AG": 5
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20140825113014+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, SSCD, ATOS, SLE78, 0921\"",
      "/ModDate": "D:20140825114646+02\u002700\u0027",
      "/Producer": "LibreOffice 3.6",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0921-2014",
      "pdf_file_size_bytes": 1331954,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/",
          "http://www.ris.bka.gv.at/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 48
    },
    "st_filename": "0921b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDSA": {
            "ECDSA": 14
          }
        },
        "FF": {
          "DSA": {
            "DSA": 3
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0782-2012-MA-01": 6,
          "BSI-DSZ-CC-921": 1
        },
        "NL": {
          "CC-3": 10
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 4,
          "A.III": 2,
          "A.SCA": 5
        },
        "OE": {
          "OE.HID_VAD": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0059-2009-MA-01": 1,
          "BSI-CC-PP-0035-2007": 2,
          "BSI-CC-PP-0059-": 3,
          "BSI-CC-PP-0059-2009-MA-": 2,
          "BSI-CC-PP-0059-2009-MA-01": 45,
          "BSI-CC-PP-0071": 4,
          "BSI-CC-PP-0071-2012": 2,
          "BSI-PP-0006-2002": 1,
          "BSI-PP-0035": 4,
          "BSI-PP0059-2009": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.4": 2,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL": 10,
          "ASE_CCL.1": 1,
          "ASE_ECD": 5,
          "ASE_ECD.1": 1,
          "ASE_INT": 16,
          "ASE_INT.1": 1,
          "ASE_OBJ": 11,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 33,
          "ASE_REQ.2": 1,
          "ASE_SPD": 6,
          "ASE_SPD.1": 1,
          "ASE_TSS": 17,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 2,
          "EAL 4+": 1,
          "EAL 6+": 3,
          "EAL4": 8,
          "EAL4 augmented": 5
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_CKM": 62,
          "FCS_CKM.1": 26,
          "FCS_CKM.2": 6,
          "FCS_CKM.4": 33,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 98,
          "FCS_COP.1": 15,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 55,
          "FDP_ACC.1": 23,
          "FDP_ACF": 39,
          "FDP_ACF.1": 25,
          "FDP_IFC.1": 11,
          "FDP_ITC.1": 20,
          "FDP_ITC.2": 20,
          "FDP_ITT.1": 1,
          "FDP_RIP.1": 11,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 19,
          "FDP_SDI.1": 3,
          "FDP_SDI.2": 5
        },
        "FIA": {
          "FIA_AFL": 54,
          "FIA_AFL.1": 14,
          "FIA_API": 17,
          "FIA_API.1": 5,
          "FIA_API.1.1": 1,
          "FIA_UAU.1": 21,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 14,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 28,
          "FMT_MSA.1": 7,
          "FMT_MSA.2": 12,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 25,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 8,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 40,
          "FMT_MTD.1": 3,
          "FMT_SMF.1": 39,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 29,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 8,
          "FPT_EMS.1": 22,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 6,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 8,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 14,
          "FPT_TST.1.1": 6,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1,
          "FPT_TST.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 8,
          "FTP_ITC.1": 3
        }
      },
      "certification_process": {
        "OutOfScope": {
          "no longer needed for any tasks concerning Application for QES. It has to be deleted. 10. Step 22 is out of scope of the TOE. 28 Security Target \u0027CardOS V5.3 QES, V1.0\u0027, Rev. 1.61, Edition 07/2014 Copyright \u00a9 Atos": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 7
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 15
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 17
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 5,
          "brainpoolP384r1": 5
        },
        "NIST": {
          "Curve P-256": 4,
          "Curve P-384": 4,
          "P-256": 8,
          "P-384": 8,
          "secp256r1": 3,
          "secp384r1": 3
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-2": 11,
            "SHA-256": 15,
            "SHA-384": 8,
            "SHA-512": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "fault injection": 1,
          "physical tampering": 5
        },
        "SCA": {
          "DPA": 2,
          "SPA": 3,
          "physical probing": 2,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        },
        "FIPS": {
          "FIPS PUB 197": 4
        },
        "PKCS": {
          "PKCS1": 8
        },
        "RFC": {
          "RFC 5639": 1,
          "RFC3447": 7
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 34
          }
        },
        "DES": {
          "3DES": {
            "3DES": 7,
            "TDES": 15,
            "Triple-DES": 10
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1,
          "SSC": 7
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 17,
          "Infineon Technologies": 1,
          "Infineon Technologies AG": 3
        },
        "NXP": {
          "NXP Semiconductors": 1
        },
        "STMicroelectronics": {
          "STMicroelectronics": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Atos IT Solutions and Services GmbH",
      "/CreationDate": "D:20140723191014+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Common Criteria, Security Target, CardOS",
      "/ModDate": "D:20140723191641+02\u002700\u0027",
      "/Producer": "OpenOffice.org 3.2",
      "/Subject": "Security Target CardOS V5.3 QES (SSCD for QES)",
      "/Title": "Security Target \u0027CardOS V5.3 QES, V1.0\u0027, Rev. 1.61, Edition 07/2014",
      "pdf_file_size_bytes": 530532,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 102
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0921a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0921b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a88803c39ce0fa055febf8db7817855832de0ee5160131c531621896f01f39ad",
      "txt_hash": "069808a91f45c90fdf2b2242cf8a8e48ba947459d8cbdf23bfbcb5b64eec770a"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c6028dfe01fb9ee387cba93bbd7236f457c4ccf9b4ae6c467a0a9b2dab9be57f",
      "txt_hash": "ed77c808e0005fb5556daed9409c2830f5e85874e5f9523118ca272e0a585aee"
    }
  },
  "status": "archived"
}