This page was not yet optimized for use on mobile
devices.
secunet konnektor 2.1.0, Version 5.1.2:2.1.0
CSV information
| Status | active |
|---|---|
| Valid from | 09.09.2022 |
| Valid until | 08.09.2027 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Secunet Security Networks AG |
| Category | Other Devices and Systems |
| Security level | ALC_TAT.1, AVA_VAN.3, EAL3+, ADV_TDS.3, ALC_FLR.2, ADV_IMP.1, ADV_FSP.4 |
| Protection profiles | |
| Maintenance updates | secunet konnektor 2.1.0, Version 5.1.3:2.1.0 (21.11.2022) Certification report |
Heuristics summary
Certificate ID: BSI-DSZ-CC-1202-2022
Certificate
Extracted keywords
Security level
EAL 3, EAL 2Security Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR.2, ALC_FLR, AVA_VAN.3Protection profiles
BSI-CC-PP-0098-V3-2021-MA-01Certificates
BSI-DSZ-CC-1202-2022Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
| Title | Zertifikat BSI-DSZ-CC-1202-2022 |
|---|---|
| Subject | Zertifikat BSI-DSZ-CC-1202-2022 |
| Keywords | "Common Criteria, Certification, Zertifizierung, Konnektor" |
| Author | Bundesamt für Sicherheit in der Informtionstechnik |
| Creation date | D:20220907140925+02'00' |
| Modification date | D:20220913105656+02'00' |
| Pages | 1 |
| Creator | Writer |
| Producer | LibreOffice 7.2 |
Certification report
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES-, AES-256, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
RSAOAEP, ECDH, ECDSA, ECIES, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA-256, SHA256, SHA-512Schemes
Key Exchange, AEADProtocols
TLS, TLS v1.2, TLS 1.2, IKEv2, IKE, IPsec, VPNElliptic Curves
brainpoolP256r1, FRP256v1Block cipher modes
ECB, CBC, GCMOperating System name
STARCOS 3Security level
EAL 3, EAL 2, EAL 1, EAL 4, EAL 5+, EAL 6Claims
OE.NK, OE.AKSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, ALC_FLR.2, ALC_FLR, ALC_CMS.4, ALC_CMS, AVA_VAN.3Security Functional Requirements (SFR)
FCS_COP.1, FCS_COP, FCS_CKM.1, FCS_CKM, FDP_DAU, FDP_ITC, FDP_UIT, FMT_MTD, FPT_TDC, FTP_ITC, FTP_TRPProtection profiles
BSI-CC-PP-0098-V3-2021-MA-01, BSI-CC-PP-0098Certificates
BSI-DSZ-CC-1202-2022, BSI-DSZ-CC-1190-2022, CC-1190-2022Evaluation facilities
SRC Security Research & ConsultingStandards
FIPS 180-4, FIPS186-4, FIPS 197, FIPS180-4, FIPS PUB 180-4, FIPS197, SP 800-38D, PKCS#1, PKCS#12, PKCS5, AIS 20, AIS 32, AIS 34, RFC5652, RFC-8017, RFC-5639, RFC5639, RFC-6931, RFC 8017, RFC7027, RFC-3526, RFC-7296, RFC-5246, RFC-3268, RFC-4492, RFC-2404, RFC-2104, RFC-5869, RFC4055, RFC5280, RFC7292, RFC-4868, RFC-3602, RFC-4303, RFC-4301, RFC-5289, RFC-5116, RFC-5652, RFC-4880, RFC2104, RFC 2104, RFC2404, RFC3268, RFC 3268, RFC3526, RFC3602, RFC4301, RFC4303, RFC4346, RFC4868, RFC4880, RFC5246, RFC5289, RFC5996, RFC7296, RFC8017, RFC4106, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, X.509Technical reports
BSI TR-02102, BSI TR-03116-1, BSI TR-03154, BSI TR-03155, BSI TR-03157, BSI 7148File metadata
| Title | Zertifizierungsreport BSI-DSZ-CC-1202-2022 |
|---|---|
| Subject | Zertifizierungsreport BSI-DSZ-CC-1202-2022 |
| Keywords | "Common Criteria, Certification, Zertifizierung, Konnektor" |
| Author | Bundesamt für Sicherheit in der Informtionstechnik |
| Creation date | D:20220907140925+02'00' |
| Modification date | D:20220912170834+02'00' |
| Pages | 45 |
| Creator | Writer |
| Producer | LibreOffice 7.2 |
Frontpage
| Certificate ID | BSI-DSZ-CC-1202-2022 |
|---|---|
| Certified item | secunet konnektor 2.1.0, Version 5.1.2:2.1.0 |
| Certification lab | BSI |
| Developer | secunet Security Networks AG |
References
Outgoing- BSI-DSZ-CC-1190-2022 - active - secunet konnektor 2.1.0, Version 5.0.5:2.1.0
Security target
Extracted keywords
Symmetric Algorithms
AES128, AES256, AES, AES-128, AES-256, AES-192, HPC, E2, DES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
RSA 2048, RSA-2048, RSAOAEP, ECDH, ECDSA, ECIES, ECC, Diffie-HellmanHash functions
SHA-1, SHA-256, SHA256, SHA-384, SHA-512, SHA-2Schemes
MAC, Key ExchangeProtocols
SSL, TLS, TLS 1.2, TLS 1.3, IKEv2, IKE, IPsec, VPNRandomness
RNGElliptic Curves
P-256, P-384, brainpoolP256r1, brainpoolP384r1Block cipher modes
CBC, GCMTLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384147Operating System name
STARCOS 3Trusted Execution Environments
SESecurity level
EAL3Claims
O.NK, O.AK, T.NK, T.AK, A.AK, A.NK, OE.NK, OE.AK, OSP.AK, OSP.NKSecurity Assurance Requirements (SAR)
ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_ARC.1, ADV_TDS, ADV_FSP, ADV_IMP, AGD_OPE.1, AGD_OPE, AGD_PRE.1, ALC_TAT.1, ALC_FLR.2, ALC_DEL.1, AVA_VAN.3, AVA_VAN, AVA_VAN.5, ASE_TSS.1Security Functional Requirements (SFR)
FAU_STG, FAU_GEN, FAU_GEN.1, FAU_GEN.2, FAU_SAR, FAU_SAR.1, FAU_STG.1, FAU_STG.3, FAU_STG.4, FCS_COP, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM, FCS_CKM.2, FCS_CMK.4, FDP_ACF, FDP_IFC, FDP_IFF, FDP_IFF.1, FDP_IFC.1, FDP_RIP, FDP_RIP.1, FDP_ACC.1, FDP_ACC, FDP_ACF.1, FDP_ITC, FDP_ITC.1, FDP_UIT, FDP_UIT.1, FDP_ITC.2, FDP_ETC, FDP_ETC.2, FDP_SOS.2, FDP_UCT, FDP_UCT.1, FDP_ACF.1.2, FDP_DAU, FDP_DAU.1, FDP_DAU.2, FDP_DAU.2.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2, FIA_API, FIA_UAU, FIA_API.1, FIA_UAU.5, FIA_API.1.1, FIA_UID.1, FIA_UID, FIA_UAU.1, FIA_SOS, FIA_SOS.1, FIA_SOS.2, FMT_MTD.1, FMT_MSA, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMR.1.1, FMT_MOF, FMT_MTD, FMT_SMF.1, FMT_SMF, FMT_MOF.1, FMT_MSA.4, FMT_SMR, FPT_EMS, FPT_EMS.1, FPT_STM, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TDC, FPT_STM.1, FPT_TDC.1, FPT_TST, FPT_TST.1, FPT_TDC.1.2, FPT_FLS, FPT_FLS.1, FPT_TEE, FPT_TEE.1, FTA_TAB, FTA_TAB.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0098, BSI-CC-PP-0098“, BSI-CC-PP-0097, BSI-PP-0032Certificates
BSI-DSZ-CC-0098-V3-2021-MA-01, BSI-DSZ-CC-1202, CC-1190-2022Side-channel analysis
side channelStandards
FIPS PUB 180-4, FIPS 197, FIPS PUB 186-4, FIPS 180-4, PKCS#1, PKCS#12, PKCS#7, PKCS #12, RFC 2131, RFC 2132, RFC 5652, RFC 4301, RFC 4303, RFC 7296, RFC 3602, RFC 2404, RFC 4868, RFC 8017, RFC 4106, RFC 5246, RFC-5639, RFC-7027, RFC 2104, RFC 8422, RFC 5289, RFC 4055, RFC 5639, RFC5652, RFC 4122, RFC4122, RFC2617, RFC2818, RFC-5246, RFC-5869, RFC 5116, RFC 5126, RFC 2560, RFC7296, RFC 5905, RFC 4302, RFC 2406, RFC 3526, RFC 8446, RFC 3268, RFC 4492, RFC 5083, RFC 5084, RFC 5280, RFC 5869, RFC 7027, X.509, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004Technical reports
BSI TR-03114, BSI TR-03144, BSI TR-03116-1, BSI TR-03111, BSI TR-03154, BSI TR-03155, BSI TR-03157File metadata
| Title | Security Target für secunet konnektor 2.1.0 (eHealth Rechenzentrums Konnektor PTV5 WR1) |
|---|---|
| Subject | Security Target BSI-DSZ-CC-1202-2022 |
| Keywords | "Common Criteria, Certification, Zertifizierung, Konnektor" |
| Author | koob.christian |
| Creation date | D:20220627154755+02'00' |
| Modification date | D:20220916102254+02'00' |
| Pages | 424 |
| Creator | PDF24 Creator |
| Producer | GPL Ghostscript 9.56.1 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-1202-2022Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ALC_DEL.1, ALC_FLR.2, ALC_TAT.1, ASE_TSS.1, AVA_VAN.3Similar certificates
Showing 5 out of 22.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1202c_pdf.pdf",
"dgst": "df0c04c3b3dd10a9",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1202-2022",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL3+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.1.2",
"2.1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"359e684867077664"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1190-2022"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1190-2022",
"BSI-DSZ-CC-1184-2022"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-11-21",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1202MA1a_pdf.pdf",
"maintenance_st_link": null,
"maintenance_title": "secunet konnektor 2.1.0, Version 5.1.3:2.1.0"
}
]
},
"manufacturer": "Secunet Security Networks AG",
"manufacturer_web": "https://www.secunet.com/en/",
"name": "secunet konnektor 2.1.0, Version 5.1.2:2.1.0",
"not_valid_after": "2027-09-08",
"not_valid_before": "2022-09-09",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "1202c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1202-2022": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0098-V3-2021-MA-01": 1
}
},
"cc_sar": {
"ADV": {
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.2": 1,
"ALC_TAT.1": 1
},
"AVA": {
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 3": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informtionstechnik",
"/CreationDate": "D:20220907140925+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Konnektor\"",
"/ModDate": "D:20220913105656+02\u002700\u0027",
"/Producer": "LibreOffice 7.2",
"/Subject": "Zertifikat BSI-DSZ-CC-1202-2022",
"/Title": "Zertifikat BSI-DSZ-CC-1202-2022",
"pdf_file_size_bytes": 397888,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "1202a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-1202-2022",
"cert_item": "secunet konnektor 2.1.0, Version 5.1.2:2.1.0",
"cert_lab": "BSI",
"developer": "secunet Security Networks AG",
"match_rules": [
"(BSI-DSZ-CC-.+?) zu (.+?) der (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 5
},
"ECDH": {
"ECDH": 9
},
"ECDSA": {
"ECDSA": 29
},
"ECIES": {
"ECIES": 8
}
},
"FF": {
"DH": {
"DH": 7,
"Diffie-Hellman": 3
}
},
"RSA": {
"RSAOAEP": 4
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1190-2022": 1,
"BSI-DSZ-CC-1202-2022": 23
},
"NL": {
"CC-1190-2022": 1
}
},
"cc_claims": {
"OE": {
"OE.AK": 6,
"OE.NK": 4
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0098": 1,
"BSI-CC-PP-0098-V3-2021-MA-01": 3
}
},
"cc_sar": {
"ADV": {
"ADV_FSP.4": 4,
"ADV_IMP.1": 4,
"ADV_TDS.3": 4
},
"ALC": {
"ALC_CMS": 1,
"ALC_CMS.4": 1,
"ALC_FLR": 3,
"ALC_FLR.2": 4,
"ALC_TAT.1": 4
},
"AVA": {
"AVA_VAN.3": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 3,
"EAL 3": 4,
"EAL 4": 1,
"EAL 5+": 1,
"EAL 6": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 9,
"FCS_CKM.1": 1,
"FCS_COP": 44,
"FCS_COP.1": 2
},
"FDP": {
"FDP_DAU": 5,
"FDP_ITC": 2,
"FDP_UIT": 2
},
"FMT": {
"FMT_MTD": 2
},
"FPT": {
"FPT_TDC": 16
},
"FTP": {
"FTP_ITC": 5,
"FTP_TRP": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"ECB": {
"ECB": 1
},
"GCM": {
"GCM": 16
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 6,
"IKEv2": 12
},
"IPsec": {
"IPsec": 12
},
"TLS": {
"TLS": {
"TLS": 42,
"TLS 1.2": 2,
"TLS v1.2": 6
}
},
"VPN": {
"VPN": 13
}
},
"crypto_scheme": {
"AEAD": {
"AEAD": 3
},
"KEX": {
"Key Exchange": 5
}
},
"device_model": {},
"ecc_curve": {
"ANSSI": {
"FRP256v1": 1
},
"Brainpool": {
"brainpoolP256r1": 1
}
},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 4
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
},
"SHA2": {
"SHA-256": 19,
"SHA-512": 1,
"SHA256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 2
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 32": 1,
"AIS 34": 1
},
"FIPS": {
"FIPS 180-4": 24,
"FIPS 197": 9,
"FIPS PUB 180-4": 1,
"FIPS180-4": 1,
"FIPS186-4": 4,
"FIPS197": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"NIST": {
"SP 800-38D": 5
},
"PKCS": {
"PKCS#1": 8,
"PKCS#12": 2,
"PKCS5": 1
},
"RFC": {
"RFC 2104": 1,
"RFC 3268": 1,
"RFC 8017": 1,
"RFC-2104": 3,
"RFC-2404": 2,
"RFC-3268": 3,
"RFC-3526": 2,
"RFC-3602": 2,
"RFC-4301": 3,
"RFC-4303": 2,
"RFC-4492": 2,
"RFC-4868": 1,
"RFC-4880": 1,
"RFC-5116": 3,
"RFC-5246": 4,
"RFC-5289": 1,
"RFC-5639": 15,
"RFC-5652": 3,
"RFC-5869": 2,
"RFC-6931": 1,
"RFC-7296": 5,
"RFC-8017": 12,
"RFC2104": 1,
"RFC2404": 1,
"RFC3268": 1,
"RFC3526": 1,
"RFC3602": 1,
"RFC4055": 1,
"RFC4106": 1,
"RFC4301": 1,
"RFC4303": 1,
"RFC4346": 1,
"RFC4868": 1,
"RFC4880": 1,
"RFC5246": 1,
"RFC5280": 1,
"RFC5289": 1,
"RFC5639": 16,
"RFC5652": 1,
"RFC5996": 1,
"RFC7027": 3,
"RFC7292": 1,
"RFC7296": 1,
"RFC8017": 1
},
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 28,
"AES-": 3,
"AES-128": 2,
"AES-256": 2
}
},
"constructions": {
"MAC": {
"HMAC": 13,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1,
"BSI TR-03116-1": 1,
"BSI TR-03154": 1,
"BSI TR-03155": 1,
"BSI TR-03157": 2
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informtionstechnik",
"/CreationDate": "D:20220907140925+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Konnektor\"",
"/ModDate": "D:20220912170834+02\u002700\u0027",
"/Producer": "LibreOffice 7.2",
"/Subject": "Zertifizierungsreport BSI-DSZ-CC-1202-2022",
"/Title": "Zertifizierungsreport BSI-DSZ-CC-1202-2022",
"pdf_file_size_bytes": 777362,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-6",
"https://www.bsi.bund.de/zertifizierung",
"https://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/AIS",
"https://www.bsi.bund.de/",
"https://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 45
},
"st_filename": "1202b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 27
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 34
},
"ECIES": {
"ECIES": 37
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
},
"RSA": {
"RSA 2048": 2,
"RSA-2048": 1,
"RSAOAEP": 8
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0098-V3-2021-MA-01": 1,
"BSI-DSZ-CC-1202": 1
},
"NL": {
"CC-1190-2022": 1
}
},
"cc_claims": {
"A": {
"A.AK": 88,
"A.NK": 67
},
"O": {
"O.AK": 385,
"O.NK": 209
},
"OE": {
"OE.AK": 199,
"OE.NK": 207
},
"OSP": {
"OSP.AK": 84,
"OSP.NK": 23
},
"T": {
"T.AK": 113,
"T.NK": 131
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0097": 6,
"BSI-CC-PP-0098": 21,
"BSI-CC-PP-0098\u201c": 1,
"BSI-PP-0032": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP": 1,
"ADV_FSP.4": 6,
"ADV_IMP": 1,
"ADV_IMP.1": 6,
"ADV_TDS": 1,
"ADV_TDS.3": 6
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 13,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_DEL.1": 6,
"ALC_FLR.2": 6,
"ALC_TAT.1": 6
},
"ASE": {
"ASE_TSS.1": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.3": 7,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL3": 8
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 26,
"FAU_GEN.1": 12,
"FAU_GEN.2": 1,
"FAU_SAR": 6,
"FAU_SAR.1": 2,
"FAU_STG": 14,
"FAU_STG.1": 2,
"FAU_STG.3": 1,
"FAU_STG.4": 1
},
"FCS": {
"FCS_CKM": 131,
"FCS_CKM.1": 36,
"FCS_CKM.2": 8,
"FCS_CKM.4": 34,
"FCS_CMK.4": 1,
"FCS_COP": 291,
"FCS_COP.1": 33
},
"FDP": {
"FDP_ACC": 97,
"FDP_ACC.1": 43,
"FDP_ACF": 118,
"FDP_ACF.1": 72,
"FDP_ACF.1.2": 1,
"FDP_DAU": 33,
"FDP_DAU.1": 3,
"FDP_DAU.2": 9,
"FDP_DAU.2.1": 1,
"FDP_ETC": 17,
"FDP_ETC.2": 8,
"FDP_IFC": 19,
"FDP_IFC.1": 19,
"FDP_IFF": 21,
"FDP_IFF.1": 20,
"FDP_ITC": 36,
"FDP_ITC.1": 35,
"FDP_ITC.2": 52,
"FDP_RIP": 21,
"FDP_RIP.1": 2,
"FDP_SDI": 7,
"FDP_SDI.1": 1,
"FDP_SDI.2": 2,
"FDP_SOS.2": 1,
"FDP_UCT": 5,
"FDP_UCT.1": 1,
"FDP_UIT": 16,
"FDP_UIT.1": 6
},
"FIA": {
"FIA_API": 13,
"FIA_API.1": 3,
"FIA_API.1.1": 2,
"FIA_SOS": 17,
"FIA_SOS.1": 1,
"FIA_SOS.2": 3,
"FIA_UAU": 41,
"FIA_UAU.1": 4,
"FIA_UAU.5": 4,
"FIA_UID": 14,
"FIA_UID.1": 12
},
"FMT": {
"FMT_MOF": 18,
"FMT_MOF.1": 2,
"FMT_MSA": 108,
"FMT_MSA.1": 10,
"FMT_MSA.3": 28,
"FMT_MSA.4": 2,
"FMT_MTD": 44,
"FMT_MTD.1": 7,
"FMT_SMF": 29,
"FMT_SMF.1": 14,
"FMT_SMR": 10,
"FMT_SMR.1": 43,
"FMT_SMR.1.1": 1
},
"FPT": {
"FPT_EMS": 16,
"FPT_EMS.1": 9,
"FPT_EMS.1.1": 2,
"FPT_EMS.1.2": 2,
"FPT_FLS": 10,
"FPT_FLS.1": 2,
"FPT_STM": 17,
"FPT_STM.1": 4,
"FPT_TDC": 49,
"FPT_TDC.1": 17,
"FPT_TDC.1.2": 1,
"FPT_TEE": 9,
"FPT_TEE.1": 2,
"FPT_TST": 24,
"FPT_TST.1": 10
},
"FTA": {
"FTA_TAB": 14,
"FTA_TAB.1": 2
},
"FTP": {
"FTP_ITC": 138,
"FTP_ITC.1": 56,
"FTP_TRP": 15,
"FTP_TRP.1": 11
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"GCM": {
"GCM": 11
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 22,
"IKEv2": 7
},
"IPsec": {
"IPsec": 33
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 283,
"TLS 1.2": 3,
"TLS 1.3": 2
}
},
"VPN": {
"VPN": 58
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 3
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP256r1": 5,
"brainpoolP384r1": 1
},
"NIST": {
"P-256": 2,
"P-384": 2
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 7
},
"SHA2": {
"SHA-2": 8,
"SHA-256": 36,
"SHA-384": 6,
"SHA-512": 5,
"SHA256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 2
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 15
}
},
"side_channel_analysis": {
"SCA": {
"side channel": 1
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 180-4": 1,
"FIPS 197": 9,
"FIPS PUB 180-4": 15,
"FIPS PUB 186-4": 2
},
"PKCS": {
"PKCS #12": 1,
"PKCS#1": 22,
"PKCS#12": 2,
"PKCS#7": 1
},
"RFC": {
"RFC 2104": 2,
"RFC 2131": 3,
"RFC 2132": 3,
"RFC 2404": 2,
"RFC 2406": 1,
"RFC 2560": 1,
"RFC 3268": 1,
"RFC 3526": 1,
"RFC 3602": 3,
"RFC 4055": 2,
"RFC 4106": 2,
"RFC 4122": 2,
"RFC 4301": 4,
"RFC 4302": 1,
"RFC 4303": 5,
"RFC 4492": 1,
"RFC 4868": 2,
"RFC 5083": 1,
"RFC 5084": 1,
"RFC 5116": 3,
"RFC 5126": 1,
"RFC 5246": 7,
"RFC 5280": 1,
"RFC 5289": 2,
"RFC 5639": 7,
"RFC 5652": 2,
"RFC 5869": 1,
"RFC 5905": 1,
"RFC 7027": 1,
"RFC 7296": 6,
"RFC 8017": 4,
"RFC 8422": 2,
"RFC 8446": 1,
"RFC-5246": 2,
"RFC-5639": 1,
"RFC-5869": 2,
"RFC-7027": 1,
"RFC2617": 1,
"RFC2818": 1,
"RFC4122": 2,
"RFC5652": 3,
"RFC7296": 1
},
"X509": {
"X.509": 32
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 78,
"AES-128": 4,
"AES-192": 1,
"AES-256": 10,
"AES128": 4,
"AES256": 4
},
"E2": {
"E2": 2
},
"HPC": {
"HPC": 5
}
},
"DES": {
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"HMAC": 41,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03111": 2,
"BSI TR-03114": 2,
"BSI TR-03116-1": 4,
"BSI TR-03144": 8,
"BSI TR-03154": 1,
"BSI TR-03155": 1,
"BSI TR-03157": 1
}
},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 3,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 3,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 3,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 3,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 3,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 3,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 3,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 3,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384147": 1
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "koob.christian",
"/CreationDate": "D:20220627154755+02\u002700\u0027",
"/Creator": "PDF24 Creator",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Konnektor\"",
"/ModDate": "D:20220916102254+02\u002700\u0027",
"/Producer": "GPL Ghostscript 9.56.1",
"/Subject": "Security Target BSI-DSZ-CC-1202-2022",
"/Title": "Security Target f\u00fcr secunet konnektor 2.1.0 (eHealth Rechenzentrums Konnektor PTV5 WR1)",
"pdf_file_size_bytes": 3205173,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 424
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0098V3b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1202a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_TAT.1",
"EAL3+",
"ALC_FLR.2",
"AVA_VAN.3",
"ADV_TDS.3",
"ADV_FSP.4",
"ADV_IMP.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1202b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ef9df2cbf77dc42c54247dc936f261d0072cf4955f7ffb9e7bc5b3146d89188a",
"txt_hash": "deedb88f723f3fd0848f61543995e6bf9171c1f4a4dc45000921ebb3e9049588"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b5068d873b3f62d9e33af9edf27d30df1ab4374c804c40cfbdf09e0cc60cc41b",
"txt_hash": "11a545bf0359e730bfeeb838e7bc3d99a9a2aa88df86bc07070c0e7319f943f9"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4d8cb7ecdaa958fe34768d86a0229c25aa30fb8cbeaec8d9e607f0a5ff967045",
"txt_hash": "c534341e2bf0dac5053dd9231e6ab98ea921525b320881720f601b6af2c720ba"
}
},
"status": "active"
}