TCOS CSP Module Version 1.0 Release 1/P6022y
CSV information ?
Status | active |
---|---|
Valid from | 07.04.2020 |
Valid until | 07.04.2025 |
Scheme | 🇩🇪 DE |
Manufacturer | T-Systems International GMBH |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL4+ |
Protection profiles |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, AVA_VAN.5Protection profiles
BSI-CC-PP-0104-2019Certificates
BSI-DSZ-CC-1118-2020Evaluation facilities
T-Systems InternationalStandards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Certificate BSI-DSZ-CC-1118-2020 |
---|---|
Subject | TCOS CSP Module Version 1.0 Release 1/P6022y |
Keywords | "Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP" |
Author | Bundesamt fĂĽr Sicherheit in der Informationstechnik |
Creation date | D:20200409141124+02'00' |
Modification date | D:20200409141414+02'00' |
Pages | 1 |
Creator | Writer |
Producer | LibreOffice 6.2 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES-, AES-256, DES, TDEA, HMAC, CMACAsymmetric Algorithms
ECDSA, ECCHash functions
SHA-512, SHA-256Schemes
MAC, Key agreement, Key AgreementProtocols
PACERandomness
RNGBlock cipher modes
CBC, OFB, GCMVendor
NXP, NXP SemiconductorsSecurity level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL5+, EAL 4 augmentedClaims
OE.SUCPSecurity Assurance Requirements (SAR)
ADV_ARC, ALC_DVS.2, ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, AVA_VAN.5Security Functional Requirements (SFR)
FCS_COP, FCS_CKM, FIA_APIProtection profiles
BSI-CC-PP-0104-2019, BSI-CC-PP-0107-2019, BSI-CC-PP-0107-Certificates
BSI-DSZ-CC-1118-2020, BSI-DSZ-CC-1078, BSI-DSZ-CC-1059-V2-2019, BSI-DSZ-CC-1059-Evaluation facilities
SRC Security Research & Consulting, T-Systems InternationalSide-channel analysis
side channel, malfunction, fault injection, JILCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Update im Feld unter TCOS CSP Module 1.0 R1, T-Systems International GmbH, Version 0.2, 11.10.2019 (confidential document) [RNG] Zufallszahlengenerierung in TCOS,Version 1.01, 21.02.2019 (confidential document) [HWST] NXP, Report (ETR) - TCOS CSP Module Version 1.0 Release 1/P6022y”, SRC Security Research & Consulting, (confidential document) [8] Protection Profile (PP-0104) and Protection Profile-Module (PP-0107): Cryptographic Service, CSP Module Version 1.0 Release 1/NXP P60D145 VB”, 24.03.2020, v1.0.1, T-Systems International GmbH (confidential document) [11] “TCOS Cryptographic Service Provider Version 2.0 Release 1/P6022yTCOS Cryptographic Service, 0 Release 1/P6022y User guidance manual”, Version 1.0.4, 24.03.2020, T-Systems International GmbH (confidential document) [12] “TCOS CSP Module Personalization Guidance”, Version 1.4, 04.03.2020, T- Systems International, confidential document) [13] “Update im Feld unter TCOS CSP Module 1.0 R1”, T-Systems International GmbH, Version 0.2, 11, 2019 (confidential document) 7 See secton 9.1 for list of used AIS 28 / 31 BSI-DSZ-CC-1118-2020 Certification Report CStandards
FIPS186, FIPS 180-4, FIPS197, FIPS186-4, FIPS46, FIPS PUB 46-3, FIPS180, FIPS PUB 180-4, FIPS180-4, FIPS PUB 186-4, SP 800-108, AIS 34, AIS 1, AIS14, AIS19, AIS20, AIS25, AIS26, AIS31, AIS32, AIS34, AIS35, AIS36, AIS37, AIS38, AIS46, AIS47, AIS 36, AIS 28, RFC 5639, RFC8017, RFC5639, RFC2104, RFC 2104, RFC 8017, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 10116:2017, ICAOTechnical reports
BSI TR-02102, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-1118-2020 |
---|---|
Subject | TCOS CSP Module Version 1.0 Release 1/P6022y |
Keywords | "Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP" |
Author | Bundesamt fĂĽr Sicherheit in der Informationstechnik |
Creation date | D:20200409135722+02'00' |
Modification date | D:20200409141001+02'00' |
Pages | 31 |
Creator | Writer |
Producer | LibreOffice 6.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-1118-2020 |
---|---|
Certified item | TCOS CSP Module Version 1.0 Release 1/P6022y |
Certification lab | BSI |
Developer | T-Systems International GmbH |
References
Outgoing- BSI-DSZ-CC-1059-V2-2019 - archived - NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software
- BSI-DSZ-CC-1121-V2-2021 - active - Swissbit TSE SMAERS Firmware
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES-256, AES-, Triple-DES, TDES, TDEA, HMAC, CMACAsymmetric Algorithms
ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA-256, SHA-384, SHA384, SHA-512Schemes
MAC, Key Exchange, Key agreement, Key AgreementProtocols
PACE, IKE, IKEv2Randomness
RNG, RNDElliptic Curves
Curve P-192, Curve P-256, Curve P-384, Curve P-521, P-192, P-256, P-384, P-521, brainpoolP192r1, brainpoolP224r1, brainpoolP256r1, brainpoolP320r1, brainpoolP384r1, brainpoolP512r1, brainpoolP192t1, brainpoolP224t1, brainpoolP256t1, brainpoolP320t1, brainpoolP384t1, brainpoolP512t1Block cipher modes
CBC, CFB, OFB, GCM, CCMTrusted Execution Environments
SEVendor
NXP, NXP Semiconductors, STMSecurity level
EAL4, EAL 6+, EAL 4, EAL 6, EAL4 augmented, EAL 4 augmented, EAL 6 augmentedClaims
O.RBGS, O.TST, O.PUF, O.RND, O.AES, O.CUST_RECONF_PLAIN, O.EEPROM_INTEGRITY, O.FM_FW, O.MEM_ACCESS, O.SFR_ACCESS, O.TDES, OE.SUCP, OSP.TCSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, AVA_VAN.5, ASE_TSS.2Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_STG.1, FAU_STG.3, FAU_STG.3.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_SAS.1, FCS_RNG, FCS_CKM.5, FCS_COP, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.5.1, FCS_CKM.4.1, FDP_SDC, FDP_DAU, FDP_UCT, FDP_ACC.1, FDP_IFC.1, FDP_UIT, FDP_ITC, FDP_ETC, FDP_SDC.1, FDP_SDI, FDP_SDC.1.1, FDP_ACC, FDP_ACF, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_DAU.1, FDP_DAU.2, FDP_ETC.2, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ETC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_RIP, FDP_RIP.1, FDP_SDI.2, FDP_ITT.1, FIA_API, FIA_UID.1, FIA_UAU.1, FIA_API.1, FIA_API.1.1, FIA_UAU.5.1, FIA_UAU.5, FIA_ATD.1, FIA_ATD.1.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FMT_MTD.1, FMT_MTD.3, FMT_MSA.1, FMT_MSA.4, FMT_MTD, FMT_MOF, FMT_SMF, FMT_SMR, FMT_MSA, FMT_SMR.1, FMT_SMF.1, FMT_MSA.3, FMT_MOF.1.1, FMT_SAE.1, FMT_MTD.3.1, FMT_SAE.1.1, FMT_SAE.1.2, FMT_SMF.1.1, FMT_MOF.1, FMT_MSA.2, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.2.1, FMT_LIM.1, FMT_LIM.2, FPT_TCT, FPT_TIT, FPT_ISA, FPT_ESA, FPT_SDC, FPT_TCT.1, FPT_TCT.1.1, FPT_TIT.1, FPT_TIT.1.1, FPT_TIT.1.2, FPT_ISA.1, FPT_TDC.1, FPT_ISA.1.1, FPT_ISA.1.2, FPT_ISA.1.3, FPT_ISA.1.4, FPT_ISA.1.5, FPT_ESA.1, FPT_ESA.1.1, FPT_ESA.1.2, FPT_ESA.1.3, FPT_ESA.1.4, FPT_STM.1, FPT_TDC, FPT_TST.1, FPT_STM.1.1, FPT_FLS.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS.1.1, FPT_PHP.3, FPT_TST.1.1, FPT_TST, FPT_PHP.3.1, FPT_EMS.1, FPT_FLS, FPT_PHP, FPT_ITT.1, FRU_FLT.2, FRU_FLT.1, FRU_FLT.2.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Protection profiles
BSI-CC-PP-0104-2019, BSI-CC-PP-0107-2019, BSI-CC-PP0035, BSI-CC-PP0104, BSI-CC-PP-0104-Certificates
BSI-DSZ-CC-1118, BSI-DSZ-CC-1059-2018Evaluation facilities
T-Systems InternationalSide-channel analysis
Leak-Inherent, physical probing, side channels, physical tampering, malfunction, Malfunction, JILStandards
FIPS PUB 186-4, FIPS186, FIPS 180-4, FIPS180, FIPS197, FIPS PUB 180-4, NIST SP 800-108, PKCS #1, PKCS#1, AIS36, AIS31, AIS 31, AIS 36, RFC5639, RFC5903, RFC6954, RFC8017, RFC2104, RFC 2104, RFC 5639, RFC 5903, RFC 6954, RFC 8017, ISO/IEC 19790, ISO/IEC 10116:2017, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2012-09-004, CCMB-2017-04-004Technical reports
BSI TR-03151File metadata
Title | TCOS CSP Module 1.0 Release 1/P6022y |
---|---|
Subject | TCOS Cryptographic Service Provider |
Keywords | Crypto Service Provider, TCOS, Electronic Cash Register, TSE |
Author | T-Systems International GmbH |
Creation date | D:20200228103153+01'00' |
Modification date | D:20200228103153+01'00' |
Pages | 102 |
Creator | Microsoft® Word für Office 365 |
Producer | Microsoft® Word für Office 365 |
References
Outgoing- BSI-DSZ-CC-1059-2018 - archived - NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, AVA_VAN.5Similar certificates
Name | Certificate ID | |
---|---|---|
TCOS Passport Version 1.0 Release 2 / P5CD072V0Q and TCOS Passport Version 1.0 Release 3 / SLE66CLX641P/m1522-a14 | BSI-DSZ-CC-0445-2007 | Compare |
TCOS Passport Version 1.0 Release 2 / P5CD072V0Q and TCOS Passport Version 1.0 Release 2 / SLE66CLX641P/m1522-a12 | BSI-DSZ-CC-0362-2006 | Compare |
Scheme data ?
Cert Id | BSI-DSZ-CC-1118-2020 | |
---|---|---|
Product | TCOS CSP Module Version 1.0 Release 1/P6022y | |
Vendor | T-Systems International GmbH | |
Certification Date | 07.04.2020 | |
Category | Smart Cards and similar devices | |
Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_Betriebssysteme_Anwendungen/1118.html | |
Enhanced | ||
Product | TCOS CSP Module Version 1.0 Release 1/P6022y | |
Applicant | T-Systems International GmbH Untere IndustriestraĂźe 20 57250 Netphen | |
Evaluation Facility | SRC Security Research & Consulting GmbH | |
Assurance Level | EAL4+,ALC_DVS.2,AVA_VAN.5 | |
Protection Profile | Cryptographic Service Provider (CSP) Version 0.9.8, 19 February 2019, BSI-CC-PP-0104-2019Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit (PPC-CSP-TS-Au) Version 0.9.5, 8 April 2019, BSI-CC-PP-0107-2019 | |
Certification Date | 07.04.2020 | |
Expiration Date | 06.04.2025 | |
Entries | [frozendict({'id': 'Cryptographic Service Provider (', 'description': ') Version 0.9.8, 19 February 2019'}), frozendict({'id': 'Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit (PPC-', 'description': '-Au) Version 0.9.5, 8 April 2019'})] | |
Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118a_pdf.pdf?__blob=publicationFile&v=1 | |
Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118b_pdf.pdf?__blob=publicationFile&v=1 | |
Cert Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118c_pdf.pdf?__blob=publicationFile&v=1 | |
Description | The Target of Evaluation (TOE) is a Cryptographic Service Provider (CSP) representing a smart card with contact based interfaces programmed according to the Protection Profile BSI-CC-PP-0104-2019 in conjunction with the Timestamp and Audit functionality Protection Profile BSI-CC-PP-0107-2019. | |
Subcategory | Operating systems and applications |
References ?
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2020-04-07', 'enhanced': {'__update__': {'applicant': 'T-Systems International GmbH Untere IndustriestraĂźe 20 57250 Netphen', 'certification_date': '2020-04-07', 'expiration_date': '2025-04-06'}}}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The following values were removed:
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Cryptographic Service Provider (CSP)', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0104b_pdf.pdf', 'pp_ids': None}]}
. - The following values were added:
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Cryptographic Service Provider (CSP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0104b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BSI-PP-0104']}}]}
.
- The following values were removed:
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '33577e27adbf3806e359f7add39a179eb479f75fb9d4658c397b6ce880fd4f26', 'txt_hash': '582d73cb8c17211a156f6e17039b72b7a7a532cd7ff246a3a44bac4b9905594a'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ea378ad3793cea56ef641ec4a1dbfaf1b0a49d147ed00587aaa73c71c1fabe3e', 'txt_hash': '8383a3dc90eb03c4a8262fb1fe1ba69251c6c279c87975f4534b7f41cea863ff'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1352317, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 102, '/Title': 'TCOS CSP Module 1.0 Release 1/P6022y', '/Author': 'T-Systems International GmbH', '/Subject': 'TCOS Cryptographic Service Provider', '/Keywords': 'Crypto Service Provider, TCOS, Electronic Cash Register, TSE', '/Creator': 'Microsoft® Word für Office 365', '/CreationDate': "D:20200228103153+01'00'", '/ModDate': "D:20200228103153+01'00'", '/Producer': 'Microsoft® Word für Office 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip', 'http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 889220, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/CreationDate': "D:20200409141124+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP"', '/ModDate': "D:20200409141414+02'00'", '/Producer': 'LibreOffice 6.2', '/Subject': 'TCOS CSP Module Version 1.0 Release 1/P6022y', '/Title': 'Certificate BSI-DSZ-CC-1118-2020', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1118': 1, 'BSI-DSZ-CC-1059-2018': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0104-2019': 1, 'BSI-CC-PP-0107-2019': 2, 'BSI-CC-PP0035': 1, 'BSI-CC-PP0104': 1, 'BSI-CC-PP-0104-': 1}}, 'cc_security_level': {'EAL': {'EAL4': 8, 'EAL 6+': 1, 'EAL 4': 1, 'EAL 6': 1, 'EAL4 augmented': 2, 'EAL 4 augmented': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 4, 'ADV_FSP.4': 2, 'ADV_TDS.3': 2, 'ADV_IMP.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 8, 'ALC_FLR.1': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.1': 1, 'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 8}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 2, 'FAU_GEN.1': 7, 'FAU_STG.1': 5, 'FAU_STG.3': 5, 'FAU_STG.3.1': 4, 'FAU_GEN.1.1': 4, 'FAU_GEN.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_SAS.1': 1}, 'FCS': {'FCS_RNG': 6, 'FCS_CKM.5': 16, 'FCS_COP': 135, 'FCS_RNG.1': 13, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 85, 'FCS_CKM.1': 30, 'FCS_CKM.2': 14, 'FCS_COP.1': 38, 'FCS_CKM.4': 28, 'FCS_CKM.5.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_SDC': 3, 'FDP_DAU': 18, 'FDP_UCT': 1, 'FDP_ACC.1': 29, 'FDP_IFC.1': 19, 'FDP_UIT': 1, 'FDP_ITC': 19, 'FDP_ETC': 4, 'FDP_SDC.1': 11, 'FDP_SDI': 1, 'FDP_SDC.1.1': 3, 'FDP_ACC': 13, 'FDP_ACF': 11, 'FDP_ACF.1': 19, 'FDP_ITC.1': 21, 'FDP_ITC.2': 31, 'FDP_DAU.1': 3, 'FDP_DAU.2': 6, 'FDP_ETC.2': 8, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_ETC.1': 4, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_RIP': 4, 'FDP_RIP.1': 1, 'FDP_SDI.2': 2, 'FDP_ITT.1': 1}, 'FIA': {'FIA_API': 14, 'FIA_UID.1': 11, 'FIA_UAU.1': 6, 'FIA_API.1': 7, 'FIA_API.1.1': 1, 'FIA_UAU.5.1': 11, 'FIA_UAU.5': 5, 'FIA_ATD.1': 4, 'FIA_ATD.1.1': 1, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_USB.1': 3, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 4, 'FIA_UAU.6.1': 1}, 'FMT': {'FMT_MTD.1': 17, 'FMT_MTD.3': 13, 'FMT_MSA.1': 9, 'FMT_MSA.4': 5, 'FMT_MTD': 21, 'FMT_MOF': 5, 'FMT_SMF': 4, 'FMT_SMR': 4, 'FMT_MSA': 10, 'FMT_SMR.1': 17, 'FMT_SMF.1': 11, 'FMT_MSA.3': 6, 'FMT_MOF.1.1': 7, 'FMT_SAE.1': 6, 'FMT_MTD.3.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1': 7, 'FMT_MSA.2': 5, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.2.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPT': {'FPT_TCT': 10, 'FPT_TIT': 15, 'FPT_ISA': 12, 'FPT_ESA': 8, 'FPT_SDC': 1, 'FPT_TCT.1': 5, 'FPT_TCT.1.1': 1, 'FPT_TIT.1': 10, 'FPT_TIT.1.1': 2, 'FPT_TIT.1.2': 1, 'FPT_ISA.1': 14, 'FPT_TDC.1': 16, 'FPT_ISA.1.1': 1, 'FPT_ISA.1.2': 1, 'FPT_ISA.1.3': 1, 'FPT_ISA.1.4': 1, 'FPT_ISA.1.5': 1, 'FPT_ESA.1': 9, 'FPT_ESA.1.1': 1, 'FPT_ESA.1.2': 1, 'FPT_ESA.1.3': 1, 'FPT_ESA.1.4': 1, 'FPT_STM.1': 11, 'FPT_TDC': 9, 'FPT_TST.1': 5, 'FPT_STM.1.1': 4, 'FPT_FLS.1': 9, 'FPT_TST.1.2': 2, 'FPT_TST.1.3': 2, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 5, 'FPT_TST.1.1': 1, 'FPT_TST': 2, 'FPT_PHP.3.1': 1, 'FPT_EMS.1': 1, 'FPT_FLS': 1, 'FPT_PHP': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT.1': 1, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 16, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.RBGS': 6, 'O.TST': 6, 'O.PUF': 1, 'O.RND': 1, 'O.AES': 1, 'O.CUST_RECONF_PLAIN': 1, 'O.EEPROM_INTEGRITY': 1, 'O.FM_FW': 1, 'O.MEM_ACCESS': 1, 'O.SFR_ACCESS': 1, 'O.TDES': 1}, 'OE': {'OE.SUCP': 3}, 'OSP': {'OSP.TC': 3}}, 'vendor': {'NXP': {'NXP': 3, 'NXP Semiconductors': 1}, 'STMicroelectronics': {'STM': 1}}, 'eval_facility': {'TSystems': {'T-Systems International': 107}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 24, 'AES-128': 9, 'AES-256': 11, 'AES-': 2}}, 'DES': {'3DES': {'Triple-DES': 1, 'TDES': 4, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 8, 'CMAC': 13}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 3}, 'ECC': {'ECC': 14}}, 'FF': {'DH': {'Diffie-Hellman': 4, 'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-256': 4, 'SHA-384': 2, 'SHA384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 46}, 'KEX': {'Key Exchange': 1}, 'KA': {'Key agreement': 5, 'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 14}, 'IKE': {'IKE': 1, 'IKEv2': 2}}, 'randomness': {'RNG': {'RNG': 10, 'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 8}, 'CFB': {'CFB': 1}, 'OFB': {'OFB': 2}, 'GCM': {'GCM': 5}, 'CCM': {'CCM': 4}}, 'ecc_curve': {'NIST': {'Curve P-192': 1, 'Curve P-256': 1, 'Curve P-384': 1, 'Curve P-521': 1, 'P-192': 1, 'P-256': 1, 'P-384': 1, 'P-521': 1}, 'Brainpool': {'brainpoolP192r1': 1, 'brainpoolP224r1': 1, 'brainpoolP256r1': 4, 'brainpoolP320r1': 1, 'brainpoolP384r1': 2, 'brainpoolP512r1': 2, 'brainpoolP192t1': 1, 'brainpoolP224t1': 1, 'brainpoolP256t1': 1, 'brainpoolP320t1': 1, 'brainpoolP384t1': 1, 'brainpoolP512t1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'physical probing': 5, 'side channels': 1}, 'FI': {'physical tampering': 1, 'malfunction': 2, 'Malfunction': 1}, 'other': {'JIL': 8}}, 'technical_report_id': {'BSI': {'BSI TR-03151': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 4, 'FIPS186': 4, 'FIPS 180-4': 1, 'FIPS180': 2, 'FIPS197': 11, 'FIPS PUB 180-4': 1}, 'NIST': {'NIST SP 800-108': 2}, 'PKCS': {'PKCS #1': 4, 'PKCS#1': 2}, 'BSI': {'AIS36': 2, 'AIS31': 4, 'AIS 31': 1, 'AIS 36': 1}, 'RFC': {'RFC5639': 13, 'RFC5903': 3, 'RFC6954': 4, 'RFC8017': 5, 'RFC2104': 2, 'RFC 2104': 1, 'RFC 5639': 1, 'RFC 5903': 1, 'RFC 6954': 1, 'RFC 8017': 1}, 'ISO': {'ISO/IEC 19790': 6, 'ISO/IEC 10116:2017': 1}, 'ICAO': {'ICAO': 1}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2012-09-004': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1118-2020': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0104-2019': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 5': 1, 'EAL 2': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'TSystems': {'T-Systems International': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
1118b_pdf.pdf
. - The cert_filename property was set to
1118c_pdf.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-2018']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-2018']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1121-V2-2021']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1121-V2-2021']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-V2-2019', 'BSI-DSZ-CC-0973-V2-2016', 'BSI-DSZ-CC-1059-2018', 'BSI-DSZ-CC-0973-2016']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '50e91985d5e93a030ffb340fe91c72781eac7378372afc930122cf5be4fc4491', 'txt_hash': '7fadb5ab9d450a488d564f4107fd1b641888560e6ae7eb07394414f9efe13ee1'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1420347, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 31, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/CreationDate': "D:20200409135722+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP"', '/ModDate': "D:20200409141001+02'00'", '/Producer': 'LibreOffice 6.2', '/Subject': 'TCOS CSP Module Version 1.0 Release 1/P6022y', '/Title': 'Certification Report BSI-DSZ-CC-1118-2020', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS']}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1118-2020', 'cert_item': 'TCOS CSP Module Version 1.0 Release 1/P6022y', 'developer': 'T-Systems International GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Cryptographic Service Provider (CSP) Version 0.9.8, 19 February 2019, BSI-CC-PP-0104-2019, Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit (PPC-CSP-TS-Au) Version 0.9.5, 8 April 2019, BSI- CC-PP-0107-2019', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant / extended EAL 4 augmented by ALC_DVS.2 and AVA_VAN.5 SOGIS Recognition Agreement'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1118-2020': 17, 'BSI-DSZ-CC-1078': 2, 'BSI-DSZ-CC-1059-V2-2019': 1, 'BSI-DSZ-CC-1059-': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0104-2019': 3, 'BSI-CC-PP-0107-2019': 2, 'BSI-CC-PP-0107-': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 5, 'EAL 5': 1, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL5+': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC': 1}, 'ALC': {'ALC_DVS.2': 5, 'ALC_FLR': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'AVA': {'AVA_VAN.5': 4}}, 'cc_sfr': {'FCS': {'FCS_COP': 18, 'FCS_CKM': 24}, 'FIA': {'FIA_API': 3}}, 'cc_claims': {'OE': {'OE.SUCP': 1}}, 'vendor': {'NXP': {'NXP': 4, 'NXP Semiconductors': 1}}, 'eval_facility': {'SRC': {'SRC Security Research & Consulting': 3}, 'TSystems': {'T-Systems International': 13}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 12, 'AES-128': 6, 'AES-': 4, 'AES-256': 4}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-512': 1, 'SHA-256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 5}, 'KA': {'Key agreement': 1, 'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 4}}, 'randomness': {'RNG': {'RNG': 3}}, 'cipher_mode': {'CBC': {'CBC': 2}, 'OFB': {'OFB': 1}, 'GCM': {'GCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1}, 'FI': {'malfunction': 1, 'fault injection': 1}, 'other': {'JIL': 1}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS186': 9, 'FIPS 180-4': 3, 'FIPS197': 9, 'FIPS186-4': 2, 'FIPS46': 1, 'FIPS PUB 46-3': 1, 'FIPS180': 2, 'FIPS PUB 180-4': 1, 'FIPS180-4': 1, 'FIPS PUB 186-4': 1}, 'NIST': {'SP 800-108': 1}, 'BSI': {'AIS 34': 1, 'AIS 1': 1, 'AIS14': 1, 'AIS19': 1, 'AIS20': 1, 'AIS25': 1, 'AIS26': 1, 'AIS31': 1, 'AIS32': 1, 'AIS34': 1, 'AIS35': 1, 'AIS36': 1, 'AIS37': 1, 'AIS38': 1, 'AIS46': 1, 'AIS47': 1, 'AIS 36': 1, 'AIS 28': 1}, 'RFC': {'RFC 5639': 9, 'RFC8017': 4, 'RFC5639': 4, 'RFC2104': 2, 'RFC 2104': 1, 'RFC 8017': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2, 'ISO/IEC 10116:2017': 1}, 'ICAO': {'ICAO': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Update im Feld unter TCOS CSP Module 1.0 R1, T-Systems International GmbH, Version 0.2, 11.10.2019 (confidential document) [RNG] Zufallszahlengenerierung in TCOS,Version 1.01, 21.02.2019 (confidential document) [HWST] NXP': 1, 'Report (ETR) - TCOS CSP Module Version 1.0 Release 1/P6022y”, SRC Security Research & Consulting, (confidential document) [8] Protection Profile (PP-0104) and Protection Profile-Module (PP-0107): Cryptographic Service': 1, 'CSP Module Version 1.0 Release 1/NXP P60D145 VB”, 24.03.2020, v1.0.1, T-Systems International GmbH (confidential document) [11] “TCOS Cryptographic Service Provider Version 2.0 Release 1/P6022yTCOS Cryptographic Service': 1, '0 Release 1/P6022y User guidance manual”, Version 1.0.4, 24.03.2020, T-Systems International GmbH (confidential document) [12] “TCOS CSP Module Personalization Guidance”, Version 1.4, 04.03.2020, T- Systems International': 1, 'confidential document) [13] “Update im Feld unter TCOS CSP Module 1.0 R1”, T-Systems International GmbH, Version 0.2, 11': 1, '2019 (confidential document) 7 See secton 9.1 for list of used AIS 28 / 31 BSI-DSZ-CC-1118-2020 Certification Report C': 1}}}
. - The report_filename property was set to
1118a_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-1118-2020
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1118a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1118b_pdf.pdf
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}]}
values discarded.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name TCOS CSP Module Version 1.0 Release 1/P6022y was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1118c_pdf.pdf",
"dgst": "55b8d7537c8fdcc1",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1118-2020",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1121-V2-2021"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1059-V2-2019"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1121-V2-2021"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1059-2018",
"BSI-DSZ-CC-1059-V2-2019",
"BSI-DSZ-CC-0973-V2-2016",
"BSI-DSZ-CC-0973-2016"
]
}
},
"scheme_data": {
"category": "Smart Cards and similar devices",
"cert_id": "BSI-DSZ-CC-1118-2020",
"certification_date": "2020-04-07",
"enhanced": {
"applicant": "T-Systems International GmbH Untere Industriestra\u00dfe 20 57250 Netphen",
"assurance_level": "EAL4+,ALC_DVS.2,AVA_VAN.5",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118c_pdf.pdf?__blob=publicationFile\u0026v=1",
"certification_date": "2020-04-07",
"description": "The Target of Evaluation (TOE) is a Cryptographic Service Provider (CSP) representing a smart card with contact based interfaces programmed according to the Protection Profile BSI-CC-PP-0104-2019 in conjunction with the Timestamp and Audit functionality Protection Profile BSI-CC-PP-0107-2019.",
"entries": [
{
"description": ") Version 0.9.8, 19 February 2019",
"id": "Cryptographic Service Provider ("
},
{
"description": "-Au) Version 0.9.5, 8 April 2019",
"id": "Protection Profile Configuration Cryptographic Service Provider \u2013 Time Stamp Service and Audit (PPC-"
}
],
"evaluation_facility": "SRC Security Research \u0026 Consulting GmbH",
"expiration_date": "2025-04-06",
"product": "TCOS CSP Module Version 1.0 Release 1/P6022y",
"protection_profile": "Cryptographic Service Provider (CSP) Version 0.9.8, 19 February 2019, BSI-CC-PP-0104-2019Protection Profile Configuration Cryptographic Service Provider \u2013 Time Stamp Service and Audit (PPC-CSP-TS-Au) Version 0.9.5, 8 April 2019, BSI-CC-PP-0107-2019",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118a_pdf.pdf?__blob=publicationFile\u0026v=1",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118b_pdf.pdf?__blob=publicationFile\u0026v=1"
},
"product": "TCOS CSP Module Version 1.0 Release 1/P6022y",
"subcategory": "Operating systems and applications",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_Betriebssysteme_Anwendungen/1118.html",
"vendor": "T-Systems International GmbH"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1059-2018"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1059-2018"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "T-Systems International GMBH",
"manufacturer_web": "https://www.t-systems.de/",
"name": "TCOS CSP Module Version 1.0 Release 1/P6022y",
"not_valid_after": "2025-04-07",
"not_valid_before": "2020-04-07",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "1118c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1118-2020": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0104-2019": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TSystems": {
"T-Systems International": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20200409141124+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP\"",
"/ModDate": "D:20200409141414+02\u002700\u0027",
"/Producer": "LibreOffice 6.2",
"/Subject": "TCOS CSP Module Version 1.0 Release 1/P6022y",
"/Title": "Certificate BSI-DSZ-CC-1118-2020",
"pdf_file_size_bytes": 889220,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "1118a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant / extended EAL 4 augmented by ALC_DVS.2 and AVA_VAN.5 SOGIS Recognition Agreement",
"cc_version": "PP conformant Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-1118-2020",
"cert_item": "TCOS CSP Module Version 1.0 Release 1/P6022y",
"cert_lab": "BSI",
"developer": "T-Systems International GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Cryptographic Service Provider (CSP) Version 0.9.8, 19 February 2019, BSI-CC-PP-0104-2019, Protection Profile Configuration Cryptographic Service Provider \u2013 Time Stamp Service and Audit (PPC-CSP-TS-Au) Version 0.9.5, 8 April 2019, BSI- CC-PP-0107-2019"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDSA": {
"ECDSA": 4
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1059-": 1,
"BSI-DSZ-CC-1059-V2-2019": 1,
"BSI-DSZ-CC-1078": 2,
"BSI-DSZ-CC-1118-2020": 17
}
},
"cc_claims": {
"OE": {
"OE.SUCP": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0104-2019": 3,
"BSI-CC-PP-0107-": 1,
"BSI-CC-PP-0107-2019": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 5,
"ALC_FLR": 3,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 5,
"EAL 4 augmented": 3,
"EAL 5": 1,
"EAL5+": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 24,
"FCS_COP": 18
},
"FIA": {
"FIA_API": 3
}
},
"certification_process": {
"ConfidentialDocument": {
"0 Release 1/P6022y User guidance manual\u201d, Version 1.0.4, 24.03.2020, T-Systems International GmbH (confidential document) [12] \u201cTCOS CSP Module Personalization Guidance\u201d, Version 1.4, 04.03.2020, T- Systems International": 1,
"2019 (confidential document) 7 See secton 9.1 for list of used AIS 28 / 31 BSI-DSZ-CC-1118-2020 Certification Report C": 1,
"CSP Module Version 1.0 Release 1/NXP P60D145 VB\u201d, 24.03.2020, v1.0.1, T-Systems International GmbH (confidential document) [11] \u201cTCOS Cryptographic Service Provider Version 2.0 Release 1/P6022yTCOS Cryptographic Service": 1,
"Report (ETR) - TCOS CSP Module Version 1.0 Release 1/P6022y\u201d, SRC Security Research \u0026 Consulting, (confidential document) [8] Protection Profile (PP-0104) and Protection Profile-Module (PP-0107): Cryptographic Service": 1,
"Update im Feld unter TCOS CSP Module 1.0 R1, T-Systems International GmbH, Version 0.2, 11.10.2019 (confidential document) [RNG] Zufallszahlengenerierung in TCOS,Version 1.01, 21.02.2019 (confidential document) [HWST] NXP": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"confidential document) [13] \u201cUpdate im Feld unter TCOS CSP Module 1.0 R1\u201d, T-Systems International GmbH, Version 0.2, 11": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"GCM": {
"GCM": 1
},
"OFB": {
"OFB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 4
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1,
"Key agreement": 1
},
"MAC": {
"MAC": 5
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 3
},
"TSystems": {
"T-Systems International": 13
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 3
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 1,
"malfunction": 1
},
"SCA": {
"side channel": 1
},
"other": {
"JIL": 1
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 28": 1,
"AIS 34": 1,
"AIS 36": 1,
"AIS14": 1,
"AIS19": 1,
"AIS20": 1,
"AIS25": 1,
"AIS26": 1,
"AIS31": 1,
"AIS32": 1,
"AIS34": 1,
"AIS35": 1,
"AIS36": 1,
"AIS37": 1,
"AIS38": 1,
"AIS46": 1,
"AIS47": 1
},
"FIPS": {
"FIPS 180-4": 3,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-4": 1,
"FIPS PUB 46-3": 1,
"FIPS180": 2,
"FIPS180-4": 1,
"FIPS186": 9,
"FIPS186-4": 2,
"FIPS197": 9,
"FIPS46": 1
},
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 10116:2017": 1,
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"NIST": {
"SP 800-108": 1
},
"RFC": {
"RFC 2104": 1,
"RFC 5639": 9,
"RFC 8017": 1,
"RFC2104": 2,
"RFC5639": 4,
"RFC8017": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 12,
"AES-": 4,
"AES-128": 6,
"AES-256": 4
}
},
"DES": {
"3DES": {
"TDEA": 1
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 3,
"HMAC": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 4,
"NXP Semiconductors": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20200409135722+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP\"",
"/ModDate": "D:20200409141001+02\u002700\u0027",
"/Producer": "LibreOffice 6.2",
"/Subject": "TCOS CSP Module Version 1.0 Release 1/P6022y",
"/Title": "Certification Report BSI-DSZ-CC-1118-2020",
"pdf_file_size_bytes": 1420347,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.sogis.eu/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/AIS",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 31
},
"st_filename": "1118b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 14
},
"ECDSA": {
"ECDSA": 3
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 4
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1059-2018": 1,
"BSI-DSZ-CC-1118": 1
}
},
"cc_claims": {
"O": {
"O.AES": 1,
"O.CUST_RECONF_PLAIN": 1,
"O.EEPROM_INTEGRITY": 1,
"O.FM_FW": 1,
"O.MEM_ACCESS": 1,
"O.PUF": 1,
"O.RBGS": 6,
"O.RND": 1,
"O.SFR_ACCESS": 1,
"O.TDES": 1,
"O.TST": 6
},
"OE": {
"OE.SUCP": 3
},
"OSP": {
"OSP.TC": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0104-": 1,
"BSI-CC-PP-0104-2019": 1,
"BSI-CC-PP-0107-2019": 2,
"BSI-CC-PP0035": 1,
"BSI-CC-PP0104": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 4,
"ADV_FSP.4": 2,
"ADV_IMP.1": 2,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 8,
"ALC_FLR.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 6": 1,
"EAL 6 augmented": 1,
"EAL 6+": 1,
"EAL4": 8,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 7,
"FAU_GEN.1.1": 4,
"FAU_GEN.1.2": 1,
"FAU_SAS.1": 1,
"FAU_STG.1": 5,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 5,
"FAU_STG.3.1": 4
},
"FCS": {
"FCS_CKM": 85,
"FCS_CKM.1": 30,
"FCS_CKM.2": 14,
"FCS_CKM.4": 28,
"FCS_CKM.4.1": 1,
"FCS_CKM.5": 16,
"FCS_CKM.5.1": 1,
"FCS_COP": 135,
"FCS_COP.1": 38,
"FCS_RNG": 6,
"FCS_RNG.1": 13,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 13,
"FDP_ACC.1": 29,
"FDP_ACF": 11,
"FDP_ACF.1": 19,
"FDP_DAU": 18,
"FDP_DAU.1": 3,
"FDP_DAU.2": 6,
"FDP_ETC": 4,
"FDP_ETC.1": 4,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_ETC.2": 8,
"FDP_ETC.2.1": 1,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC.1": 19,
"FDP_ITC": 19,
"FDP_ITC.1": 21,
"FDP_ITC.2": 31,
"FDP_ITT.1": 1,
"FDP_RIP": 4,
"FDP_RIP.1": 1,
"FDP_SDC": 3,
"FDP_SDC.1": 11,
"FDP_SDC.1.1": 3,
"FDP_SDI": 1,
"FDP_SDI.2": 2,
"FDP_UCT": 1,
"FDP_UIT": 1
},
"FIA": {
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_API": 14,
"FIA_API.1": 7,
"FIA_API.1.1": 1,
"FIA_ATD.1": 4,
"FIA_ATD.1.1": 1,
"FIA_UAU.1": 6,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 5,
"FIA_UAU.5.1": 11,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 4,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 11,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 3,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MOF": 5,
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 7,
"FMT_MSA": 10,
"FMT_MSA.1": 9,
"FMT_MSA.2": 5,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 6,
"FMT_MSA.4": 5,
"FMT_MTD": 21,
"FMT_MTD.1": 17,
"FMT_MTD.3": 13,
"FMT_MTD.3.1": 1,
"FMT_SAE.1": 6,
"FMT_SAE.1.1": 1,
"FMT_SAE.1.2": 1,
"FMT_SMF": 4,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR": 4,
"FMT_SMR.1": 17,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS.1": 1,
"FPT_ESA": 8,
"FPT_ESA.1": 9,
"FPT_ESA.1.1": 1,
"FPT_ESA.1.2": 1,
"FPT_ESA.1.3": 1,
"FPT_ESA.1.4": 1,
"FPT_FLS": 1,
"FPT_FLS.1": 9,
"FPT_FLS.1.1": 1,
"FPT_ISA": 12,
"FPT_ISA.1": 14,
"FPT_ISA.1.1": 1,
"FPT_ISA.1.2": 1,
"FPT_ISA.1.3": 1,
"FPT_ISA.1.4": 1,
"FPT_ISA.1.5": 1,
"FPT_ITT.1": 1,
"FPT_PHP": 1,
"FPT_PHP.3": 5,
"FPT_PHP.3.1": 1,
"FPT_SDC": 1,
"FPT_STM.1": 11,
"FPT_STM.1.1": 4,
"FPT_TCT": 10,
"FPT_TCT.1": 5,
"FPT_TCT.1.1": 1,
"FPT_TDC": 9,
"FPT_TDC.1": 16,
"FPT_TIT": 15,
"FPT_TIT.1": 10,
"FPT_TIT.1.1": 2,
"FPT_TIT.1.2": 1,
"FPT_TST": 2,
"FPT_TST.1": 5,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 2,
"FPT_TST.1.3": 2
},
"FRU": {
"FRU_FLT.1": 1,
"FRU_FLT.2": 6,
"FRU_FLT.2.1": 1
},
"FTP": {
"FTP_ITC.1": 16,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 8
},
"CCM": {
"CCM": 4
},
"CFB": {
"CFB": 1
},
"GCM": {
"GCM": 5
},
"OFB": {
"OFB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 1,
"IKEv2": 2
},
"PACE": {
"PACE": 14
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1,
"Key agreement": 5
},
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 46
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP192r1": 1,
"brainpoolP192t1": 1,
"brainpoolP224r1": 1,
"brainpoolP224t1": 1,
"brainpoolP256r1": 4,
"brainpoolP256t1": 1,
"brainpoolP320r1": 1,
"brainpoolP320t1": 1,
"brainpoolP384r1": 2,
"brainpoolP384t1": 1,
"brainpoolP512r1": 2,
"brainpoolP512t1": 1
},
"NIST": {
"Curve P-192": 1,
"Curve P-256": 1,
"Curve P-384": 1,
"Curve P-521": 1,
"P-192": 1,
"P-256": 1,
"P-384": 1,
"P-521": 1
}
},
"eval_facility": {
"TSystems": {
"T-Systems International": 107
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 4,
"SHA-384": 2,
"SHA-512": 1,
"SHA384": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 1,
"RNG": 10
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 1,
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"Leak-Inherent": 1,
"physical probing": 5,
"side channels": 1
},
"other": {
"JIL": 8
}
},
"standard_id": {
"BSI": {
"AIS 31": 1,
"AIS 36": 1,
"AIS31": 4,
"AIS36": 2
},
"CC": {
"CCMB-2012-09-004": 1,
"CCMB-2017-04-001": 2,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 180-4": 1,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-4": 4,
"FIPS180": 2,
"FIPS186": 4,
"FIPS197": 11
},
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 10116:2017": 1,
"ISO/IEC 19790": 6
},
"NIST": {
"NIST SP 800-108": 2
},
"PKCS": {
"PKCS #1": 4,
"PKCS#1": 2
},
"RFC": {
"RFC 2104": 1,
"RFC 5639": 1,
"RFC 5903": 1,
"RFC 6954": 1,
"RFC 8017": 1,
"RFC2104": 2,
"RFC5639": 13,
"RFC5903": 3,
"RFC6954": 4,
"RFC8017": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 24,
"AES-": 2,
"AES-128": 9,
"AES-256": 11
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 4,
"Triple-DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 13,
"HMAC": 8
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03151": 1
}
},
"tee_name": {
"IBM": {
"SE": 3
}
},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 3,
"NXP Semiconductors": 1
},
"STMicroelectronics": {
"STM": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "T-Systems International GmbH",
"/CreationDate": "D:20200228103153+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word f\u00fcr Office 365",
"/Keywords": "Crypto Service Provider, TCOS, Electronic Cash Register, TSE",
"/ModDate": "D:20200228103153+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word f\u00fcr Office 365",
"/Subject": "TCOS Cryptographic Service Provider",
"/Title": "TCOS CSP Module 1.0 Release 1/P6022y",
"pdf_file_size_bytes": 1352317,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz",
"http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 102
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"BSI-PP-0104"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0104b_pdf.pdf",
"pp_name": "Cryptographic Service Provider (CSP)"
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0107b_pdf.pdf",
"pp_name": "Protection Profile Configuration Cryptographic Service Provider \u2013 Time Stamp Service and Audit ..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1118a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL4+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1118b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ea378ad3793cea56ef641ec4a1dbfaf1b0a49d147ed00587aaa73c71c1fabe3e",
"txt_hash": "8383a3dc90eb03c4a8262fb1fe1ba69251c6c279c87975f4534b7f41cea863ff"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "50e91985d5e93a030ffb340fe91c72781eac7378372afc930122cf5be4fc4491",
"txt_hash": "7fadb5ab9d450a488d564f4107fd1b641888560e6ae7eb07394414f9efe13ee1"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "33577e27adbf3806e359f7add39a179eb479f75fb9d4658c397b6ce880fd4f26",
"txt_hash": "582d73cb8c17211a156f6e17039b72b7a7a532cd7ff246a3a44bac4b9905594a"
}
},
"status": "active"
}