This page was not yet optimized for use on mobile
devices.
Digital Tachograph DTCO 1381, Release 4.0e
CSV information
| Status | archived |
|---|---|
| Valid from | 14.12.2020 |
| Valid until | 14.12.2025 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Continental Automotive GmbH |
| Category | Other Devices and Systems |
| Security level | EAL4+, ATE_DPT.2, AVA_VAN.5 |
| Protection profiles | |
| Maintenance updates | Digital Tachograph DTCO 1381, Release 4.0f (12.07.2023) Certification report Security target |
| Digital Tachograph DTCO 1381, Release 4.0ed (22.03.2021) Certification report Security target |
Heuristics summary
Certificate ID: BSI-DSZ-CC-1158-2020
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR, ATE_DPT.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0094-2017Certificates
BSI-DSZ-CC-1158-2020Standards
ISO/IEC 15408, ISO/IEC 18045Certification report
Extracted keywords
Asymmetric Algorithms
RSA2048, RSA4096Hash functions
SHA256Randomness
RNGVendor
Infineon Technologies, Infineon Technologies AGSecurity level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL4, EAL4+, EAL 5+, EAL 6, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0094-2017Certificates
BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V8-2020Evaluation facilities
Deutsche Telekom SecuritySide-channel analysis
JILCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, 1.0, 2020-12-01, Digital Tachograph, DTCO 1381, Release 4.0e, Deutsche Telekom Security GmbH, (confidential document) [8] Protection Profile for Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, zu DTCO 1381 Release 4.0e (Excelsheet), Version 1.20, 23.11.2020, Continental Automotive GmbH (confidential document) [12] Digitaler Tachograph – DTCO® 4.0 / 4.0e Leitfaden für die Kontrollorgane, BA00.1381.40 202Standards
AIS 34, AIS 36, AIS 25, AIS 26, AIS 37, AIS 40, AIS 20, AIS 32, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI 7148File metadata
| Title | Single Evaluation Report CC |
|---|---|
| Subject | Common Criteria, BSI-DSZ-CC-1158-2020 |
| Keywords | "Common Criteria, Certification, Zertifizierung, " |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20210112100622+01'00' |
| Modification date | D:20210112130147+01'00' |
| Pages | 25 |
| Creator | Writer |
| Producer | LibreOffice 6.3 |
Frontpage
| Certificate ID | BSI-DSZ-CC-1158-2020 |
|---|---|
| Certified item | Digital Tachograph DTCO 1381, Release 4.0e |
| Certification lab | BSI |
| Developer | Continental Automotive GmbH |
References
Outgoing- BSI-DSZ-CC-1069-2018 - archived - Digital Tachograph DTCO 1381 Release 4.0
- BSI-DSZ-CC-0827-V8-2020 - archived - Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software
- BSI-DSZ-CC-1158-V2-2023 - active - Digital Tachograph DTCO 1381 Release 4.1
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, Triple-DES, CMAC, CBC-MACAsymmetric Algorithms
ECDH, ECDSA, ECCHash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512, SHA256, SHA-2Schemes
MACRandomness
RNGElliptic Curves
P-256, P-384, P-521, NIST P-256, NIST P-384, NIST P-521, secp256r1, secp384r1, secp521r1, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1Block cipher modes
ECB, CBCVendor
Infineon AGSecurity level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmentedClaims
OE.EOLSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ATE_DPT.2, ATE_FUN.1, ATE_DPT.1, AVA_VAN.5Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4, FAU_STG.3, FAU_STG.4.1, FCO_NRO.1, FCO_NRO.1.1, FCO_NRO.1.2, FCO_NRO.1.3, FCS_RNG, FCS_RNG.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.4, FCS_CKM, FCS_CKM.2, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP, FCS_CKM.3, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ITC.2.5, FDP_ITT.1, FDP_ACC, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF, FDP_ACF.1.1, FDP_ACF.1.4, FDP_ITC.2, FDP_ETC, FDP_ETC.2, FDP_IFC.1, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_IFC, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITT, FDP_ITT.1.1, FDP_RIP, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_MSA.3, FIA_UAU.2, FIA_AFL.1, FIA_SOS.2, FIA_UID.1, FIA_AFL, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU, FIA_UAU.3, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UID, FIA_UID.2, FIA_UID.2.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.2.1, FMT_MSA.3, FMT_MSA, FMT_MSA.1, FMT_SMR, FMT_SMF, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MOF, FMT_MOF.1, FMT_MOF.1.1, FMT_MTD, FMT_MTD.1, FMT_SMR.1, FMT_SMF.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.2, FPT_STM.1, FPT_TDC.1, FPT_FLS, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP, FPT_PHP.2, FPT_PHP.1, FPT_PHP.2.1, FPT_PHP.2.2, FPT_PHP.2.3, FPT_PHP.3, FPT_PHP.3.1, FPT_STM, FPT_STM.1.1, FPT_TST, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TDC, FPT_TDC.1.1, FPT_TDC.1.2, FPT_ITC.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Protection profiles
BSI-CC-PP-0094Side-channel analysis
DPA, physical tampering, Physical tampering, malfunction, reverse engineeringCertification process
Out of scope, 10-3 RSA Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable VU non-volatile memory Card.PK (conditional, possibly multiple) Card, by card or card manufacturer; obtained by VU in card certificate during mutual authentication Out of scope for this ST Not applicable VU non-volatile memory MS.PK (conditional, possibly multiple) Public key, foreign) MSCA; obtained by VU in MS certificate presented by a card during mutual authentication Out of scope for this ST Not applicable VU non-volatile memory Table 10-1 First-generation asymmetric keys, 10-6. ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable VU non-volatile memory EUR.PK (previous) The previous public key of ERCA, issued under the previous ECC Generated by ERCA; inserted in VU by manufacturer at the end Out of scope for this ST Not applicable VU non-volatile memory (conditional; only present if existing at DTCO, C as part of the EUR.Link.C; obtained by VU du-ring mutual authentication towards such card or EGF Out of scope for this ST Not applicable VU general nonvo- latile memory (con- ditional; only if the VU has, by card or card manufac-turer; obtained by VU in card certi-ficate during mu- tual authentication Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) DTCO 1381, obtained by VU in EGF certificate during mutual authentication as part of the coupling process Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA _Card.PK, 10-6) ECC Generated by MSCA ; obtained by VU in MSCA-_Card certificate during mutual authentication Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) VUEGF.PK Public, 10-6. ECC Generated by MSCA ; obtained by VU in MSCA_VU-EGF certificate during coupling to an EGF Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) Table 10-4, the VU AES Generated by ERCA; inserted by VU manufacturer at the end of the manufacturing phase. Out of scope for this ST Made unavailable when the VU has reached end of life VU non-volatile Memory DTCO 1381, key generations). However, a VU will retrieve only one of these keys during the pairing process. Out of scope for this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only, under Km) at the end of the manufac- turing phase; obtained and decrypted by VU during pairing Out of scope for this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only, received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope for this ST Made unavailable when the VU has reached end of life VU non-volatile memory 37 Note, received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope for this ST Made unavailable when the VU has reached end of life VU non-volatile memory TK, for upgrade file To ensure confidentiality of the upgrade file AES Generated by the VU manufacturer Out of scope of this ST Made unavailable when the VU has reached end of life Not permanently stored CBC-MAC, of the underlying elliptic curve and the CBC- MAC key itself AES Generated by the VU manufacturer Out of scope of this ST Made unavailable when the VU has reached end of life VU non-volatile memory Kvu, MACs for the data integrity control of user data records AES Generated by the VU manufacturer Out of scope of this ST Made unavailable when the VU has reached end of life VU non-volatile memory Table 10-5Standards
FIPS PUB 46-3, FIPS PUB 197, SP 800-38B, RFC3447, RFC 5639, RFC 5480, RFC 5869, ISO/IEC 9797-1, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Title | Digital Tachograph DTCO 1381 Security Target |
|---|---|
| Subject | Security Target for smart tachograph vehicle unit (VU) in the sense of Annex IC of regulation 799/2019 (EU) |
| Keywords | VU; Security Target; ST; DTCO; DTCO1381; Smart Tachograph; VDO |
| Author | Norbert Köhn |
| Creation date | D:20201215121041+01'00' |
| Modification date | D:20201215122510+01'00' |
| Pages | 111 |
| Creator | Acrobat PDFMaker 20 for Word |
| Producer | Adobe PDF Library 20.1.58 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-1158-2020Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_FUN.1, AVA_VAN.5References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1158c_pdf.pdf",
"dgst": "0490e7a083af0bd6",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1158-2020",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"40651f75a5887085"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1158-V2-2023"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V8-2020",
"BSI-DSZ-CC-1069-2018"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1158-V3-2025",
"BSI-DSZ-CC-1158-V2-2023",
"BSI-DSZ-CC-1158-V4-2025"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0559-2012",
"BSI-DSZ-CC-0827-V2-2014",
"BSI-DSZ-CC-0269-2006",
"BSI-DSZ-CC-0827-V6-2017",
"BSI-DSZ-CC-0827-2013",
"BSI-DSZ-CC-0376-2006",
"BSI-DSZ-CC-1015-2017",
"BSI-DSZ-CC-0791-2012",
"BSI-DSZ-CC-0827-V3-2015",
"BSI-DSZ-CC-0827",
"BSI-DSZ-CC-0632-2011",
"BSI-DSZ-CC-0827-V7-2018",
"BSI-DSZ-CC-0827-V9-2024",
"BSI-DSZ-CC-0395-2007",
"BSI-DSZ-CC-0827-V4-2016",
"BSI-DSZ-CC-0827-V5-2017",
"BSI-DSZ-CC-0936-2015",
"BSI-DSZ-CC-0827-V8-2020",
"BSI-DSZ-CC-0878-2013",
"BSI-DSZ-CC-1069-2018"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2021-03-22",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1158ma1a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1158ma1b_pdf.pdf",
"maintenance_title": "Digital Tachograph DTCO 1381, Release 4.0ed"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2023-07-12",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1158ma2a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1158ma2b_pdf.pdf",
"maintenance_title": "Digital Tachograph DTCO 1381, Release 4.0f"
}
]
},
"manufacturer": "Continental Automotive GmbH",
"manufacturer_web": "https://www.continental-corporation.com",
"name": "Digital Tachograph DTCO 1381, Release 4.0e",
"not_valid_after": "2025-12-14",
"not_valid_before": "2020-12-14",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "1158c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1158-2020": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0094-2017": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 1
},
"ATE": {
"ATE_DPT.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "1158a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ATE_DPT.2 and AVA_VAN.5",
"cc_version": "PP conformant Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-1158-2020",
"cert_item": "Digital Tachograph DTCO 1381, Release 4.0e",
"cert_lab": "BSI",
"developer": "Continental Automotive GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017, BSI-CC-PP-0094-2017"
}
},
"report_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA2048": 1,
"RSA4096": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0827-V8-2020": 1,
"BSI-DSZ-CC-1069-2018": 3,
"BSI-DSZ-CC-1158-2020": 14
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0094-2017": 3
}
},
"cc_sar": {
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR": 3,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_DPT.2": 4
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 5,
"EAL 4 augmented": 3,
"EAL 5": 4,
"EAL 5+": 1,
"EAL 6": 1,
"EAL4": 1,
"EAL4+": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"1.0, 2020-12-01, Digital Tachograph, DTCO 1381, Release 4.0e, Deutsche Telekom Security GmbH, (confidential document) [8] Protection Profile for Digital Tachograph - Vehicle Unit (VU PP) Version 1.0, 9 May 2017": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"zu DTCO 1381 Release 4.0e (Excelsheet), Version 1.20, 23.11.2020, Continental Automotive GmbH (confidential document) [12] Digitaler Tachograph \u2013 DTCO\u00ae 4.0 / 4.0e Leitfaden f\u00fcr die Kontrollorgane, BA00.1381.40 202": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"DeutscheTelekom": {
"Deutsche Telekom Security": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"other": {
"JIL": 3
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 25": 2,
"AIS 26": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 36": 3,
"AIS 37": 2,
"AIS 38": 1,
"AIS 40": 2
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7148": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20210112100622+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, \"",
"/ModDate": "D:20210112130147+01\u002700\u0027",
"/Producer": "LibreOffice 6.3",
"/Subject": "Common Criteria, BSI-DSZ-CC-1158-2020",
"/Title": "Single Evaluation Report CC",
"pdf_file_size_bytes": 623290,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/AIS",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
},
"st_filename": "1158b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 24
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 6
}
}
},
"cc_cert_id": {},
"cc_claims": {
"OE": {
"OE.EOL": 4
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0094": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ATE": {
"ATE_DPT.1": 1,
"ATE_DPT.2": 7,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 3,
"EAL 4 augmented": 1,
"EAL4": 11,
"EAL4 augmented": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 6,
"FAU_GEN.1": 12,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR": 2,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG": 3,
"FAU_STG.1": 9,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 1,
"FAU_STG.4": 5,
"FAU_STG.4.1": 1
},
"FCO": {
"FCO_NRO.1": 7,
"FCO_NRO.1.1": 1,
"FCO_NRO.1.2": 1,
"FCO_NRO.1.3": 1
},
"FCS": {
"FCS_CKM": 7,
"FCS_CKM.1": 46,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 18,
"FCS_CKM.2.1": 2,
"FCS_CKM.3": 2,
"FCS_CKM.4": 27,
"FCS_CKM.4.1": 2,
"FCS_COP": 5,
"FCS_COP.1": 35,
"FCS_COP.1.1": 7,
"FCS_RNG": 8,
"FCS_RNG.1": 28,
"FCS_RNG.1.1": 8,
"FCS_RNG.1.2": 8
},
"FDP": {
"FDP_ACC": 11,
"FDP_ACC.1": 76,
"FDP_ACC.1.1": 6,
"FDP_ACF": 11,
"FDP_ACF.1": 58,
"FDP_ACF.1.1": 12,
"FDP_ACF.1.2": 7,
"FDP_ACF.1.3": 7,
"FDP_ACF.1.4": 6,
"FDP_ETC": 2,
"FDP_ETC.2": 10,
"FDP_ETC.2.1": 1,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 8,
"FDP_ITC": 7,
"FDP_ITC.1": 25,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 35,
"FDP_ITC.2.1": 1,
"FDP_ITC.2.2": 1,
"FDP_ITC.2.3": 1,
"FDP_ITC.2.4": 1,
"FDP_ITC.2.5": 2,
"FDP_ITT": 1,
"FDP_ITT.1": 2,
"FDP_ITT.1.1": 1,
"FDP_MSA.3": 2,
"FDP_RIP": 2,
"FDP_RIP.1": 9,
"FDP_RIP.1.1": 1,
"FDP_SDI": 3,
"FDP_SDI.2": 12,
"FDP_SDI.2.1": 2,
"FDP_SDI.2.2": 2
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 27,
"FIA_AFL.1.1": 6,
"FIA_AFL.1.2": 7,
"FIA_ATD": 2,
"FIA_ATD.1": 17,
"FIA_ATD.1.1": 3,
"FIA_SOS.2": 1,
"FIA_UAU": 7,
"FIA_UAU.1": 26,
"FIA_UAU.1.1": 3,
"FIA_UAU.1.2": 3,
"FIA_UAU.2": 12,
"FIA_UAU.2.1": 2,
"FIA_UAU.3": 8,
"FIA_UAU.3.1": 1,
"FIA_UAU.3.2": 1,
"FIA_UAU.5": 8,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 8,
"FIA_UAU.6.1": 1,
"FIA_UID": 4,
"FIA_UID.1": 14,
"FIA_UID.2": 15,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF": 2,
"FMT_MOF.1": 25,
"FMT_MOF.1.1": 5,
"FMT_MSA": 9,
"FMT_MSA.1": 17,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 1,
"FMT_MSA.3": 51,
"FMT_MSA.3.1": 6,
"FMT_MSA.3.2": 6,
"FMT_MTD": 1,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 1,
"FMT_SMF": 9,
"FMT_SMF.1": 19,
"FMT_SMF.1.1": 1,
"FMT_SMR": 14,
"FMT_SMR.1": 33,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS": 2,
"FPT_FLS.1": 4,
"FPT_FLS.1.1": 1,
"FPT_ITC.1": 3,
"FPT_PHP": 3,
"FPT_PHP.1": 1,
"FPT_PHP.2": 5,
"FPT_PHP.2.1": 1,
"FPT_PHP.2.2": 1,
"FPT_PHP.2.3": 2,
"FPT_PHP.3": 5,
"FPT_PHP.3.1": 1,
"FPT_STM": 3,
"FPT_STM.1": 10,
"FPT_STM.1.1": 1,
"FPT_TDC": 2,
"FPT_TDC.1": 21,
"FPT_TDC.1.1": 2,
"FPT_TDC.1.2": 2,
"FPT_TST": 2,
"FPT_TST.1": 6,
"FPT_TST.1.1": 2,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 2
},
"FTP": {
"FTP_ITC": 3,
"FTP_ITC.1": 17,
"FTP_ITC.1.1": 4,
"FTP_ITC.1.2": 4,
"FTP_ITC.1.3": 4,
"FTP_TRP.1": 3
}
},
"certification_process": {
"OutOfScope": {
"10-3 RSA Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable VU non-volatile memory Card.PK (conditional, possibly multiple) Card": 1,
"10-6) ECC Generated by MSCA ; obtained by VU in MSCA-_Card certificate during mutual authentication Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) VUEGF.PK Public": 1,
"10-6. ECC Generated by ERCA; inserted in VU by manufacturer at the end of the manufacturing phase Out of scope for this ST Not applicable VU non-volatile memory EUR.PK (previous) The previous public key of ERCA": 1,
"10-6. ECC Generated by MSCA ; obtained by VU in MSCA_VU-EGF certificate during coupling to an EGF Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) Table 10-4": 1,
"C as part of the EUR.Link.C; obtained by VU du-ring mutual authentication towards such card or EGF Out of scope for this ST Not applicable VU general nonvo- latile memory (con- ditional; only if the VU has": 1,
"MACs for the data integrity control of user data records AES Generated by the VU manufacturer Out of scope of this ST Made unavailable when the VU has reached end of life VU non-volatile memory Table 10-5": 1,
"Out of scope": 18,
"by card or card manufac-turer; obtained by VU in card certi-ficate during mu- tual authentication Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) DTCO 1381": 1,
"by card or card manufacturer; obtained by VU in card certificate during mutual authentication Out of scope for this ST Not applicable VU non-volatile memory MS.PK (conditional, possibly multiple) Public key": 1,
"for upgrade file To ensure confidentiality of the upgrade file AES Generated by the VU manufacturer Out of scope of this ST Made unavailable when the VU has reached end of life Not permanently stored CBC-MAC": 1,
"foreign) MSCA; obtained by VU in MS certificate presented by a card during mutual authentication Out of scope for this ST Not applicable VU non-volatile memory Table 10-1 First-generation asymmetric keys": 1,
"issued under the previous ECC Generated by ERCA; inserted in VU by manufacturer at the end Out of scope for this ST Not applicable VU non-volatile memory (conditional; only present if existing at DTCO": 1,
"key generations). However, a VU will retrieve only one of these keys during the pairing process. Out of scope for this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only": 1,
"obtained by VU in EGF certificate during mutual authentication as part of the coupling process Out of scope for this ST Not applicable VU non-volatile memory (conditional, possibly multiple) MSCA _Card.PK": 1,
"of the underlying elliptic curve and the CBC- MAC key itself AES Generated by the VU manufacturer Out of scope of this ST Made unavailable when the VU has reached end of life VU non-volatile memory Kvu": 1,
"received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope for this ST Made unavailable when the VU has reached end of life VU non-volatile memory 37 Note": 1,
"received from VU manufacturer; inserted by VU manufacturer at the end of the manufacturing phase Out of scope for this ST Made unavailable when the VU has reached end of life VU non-volatile memory TK": 1,
"the VU AES Generated by ERCA; inserted by VU manufacturer at the end of the manufacturing phase. Out of scope for this ST Made unavailable when the VU has reached end of life VU non-volatile Memory DTCO 1381": 1,
"under Km) at the end of the manufac- turing phase; obtained and decrypted by VU during pairing Out of scope for this ST Made unavailable at the latest by end of calibration phase Not permanently stored; only": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 8
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 5
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP256r1": 3,
"brainpoolP384r1": 1,
"brainpoolP512r1": 1
},
"NIST": {
"NIST P-256": 5,
"NIST P-384": 5,
"NIST P-521": 5,
"P-256": 5,
"P-384": 5,
"P-521": 5,
"secp256r1": 1,
"secp384r1": 1,
"secp521r1": 1
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 4,
"SHA1": 3
},
"SHA2": {
"SHA-2": 2,
"SHA-256": 9,
"SHA-384": 10,
"SHA-512": 10,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 44
}
},
"side_channel_analysis": {
"FI": {
"Physical tampering": 1,
"malfunction": 1,
"physical tampering": 7
},
"SCA": {
"DPA": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 2,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 2
},
"ISO": {
"ISO/IEC 9797-1": 1
},
"NIST": {
"SP 800-38B": 4
},
"RFC": {
"RFC 5480": 1,
"RFC 5639": 1,
"RFC 5869": 1,
"RFC3447": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 32
}
},
"DES": {
"3DES": {
"TDES": 4,
"Triple-DES": 1
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1,
"CMAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon AG": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Norbert K\u00f6hn",
"/CreationDate": "D:20201215121041+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 20 for Word",
"/Keywords": "VU; Security Target; ST; DTCO; DTCO1381; Smart Tachograph; VDO",
"/ModDate": "D:20201215122510+01\u002700\u0027",
"/Producer": "Adobe PDF Library 20.1.58",
"/Subject": "Security Target for smart tachograph vehicle unit (VU) in the sense of Annex IC of regulation 799/2019 (EU)",
"/Title": "Digital Tachograph DTCO 1381 Security Target",
"pdf_file_size_bytes": 1558840,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 111
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0094b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1158a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"ATE_DPT.2",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1158b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "231d328e17566a1b12e5654418cddc5a316eef5baa9c2601a19e6ea6c2c5ebe9",
"txt_hash": "1410e321837b55ef8ab597a7eb2e9f663bae3c8c6766233982c872b66ec2ae3e"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "bb1e5e00f603fd5e508f206a63f9996dfb7d70a47c557372afdf7218d9e107a9",
"txt_hash": "d4b7f1ae0984eafada32ecd043083fd757bd60fde80078bc09aa8cb1872dbcf8"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "984d6cfa086be69e92803d221daeba4f0e471a4dcf462c9d62de7cce32fe89f7",
"txt_hash": "d3eb2693f01df1dbe1c1470ff85acc3d91fe0a1c972794ff206518504c824e0a"
}
},
"status": "archived"
}