TCOS eEnergy Security Module Version 2.0 Release 1/P71

CSV information

Status active
Valid from 29.02.2024
Valid until 01.03.2034
Scheme 🇩🇪 DE
Manufacturer Deutsche Telekom Security GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ATE_DPT.2, ALC_DVS.2, AVA_VAN.5, EAL4+
Protection profiles

Heuristics summary

Certificate ID: BSI-DSZ-CC-1217-2024

Certificate

Extracted keywords

Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ATE_DPT.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0077-V2-2015
Certificates
BSI-DSZ-CC-1217-2024
Evaluation facilities
Deutsche Telekom Security

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certificate BSI-DSZ-CC-1217-2024
Subject Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2
Keywords "Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2"
Author Bundesamt für Sicherheit in der Informationstechnik
Pages 1

Certification report

Extracted keywords

Symmetric Algorithms
AES, CMAC
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman
Schemes
MAC, Key Agreement, KA
Protocols
TLS, PACE
Randomness
RNG
Block cipher modes
CBC

Vendor
NXP, NXP Semiconductors

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL5+, EAL6, EAL 5+, EAL 6, EAL 4 augmented
Security Assurance Requirements (SAR)
ADV_ARC, ALC_DVS.2, ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, AVA_VAN.5
Security Functional Requirements (SFR)
FCS_COP, FCS_CKM, FCS_RNG.1, FIA_UID.1, FIA_UAU.4, FIA_UAU.5, FTP_ITC.1
Protection profiles
BSI-CC-PP-0077-V2-2015
Certificates
BSI-DSZ-CC-1217-2024, BSI-DSZ-CC-1149-V3-2023, BSI-DSZ-CC-1217
Evaluation facilities
TÜV Informationstechnik, Deutsche Telekom Security, SRC Security Research & Consulting

Side-channel analysis
side channel, malfunction, fault injection, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Version 2.0 Release 1/P71, Version 1.1, 16 February 2024, SRC Security Research & Consulting GmbH (confidential document) [9] Configuration List BSI-DSZ-CC-1217, Konfigurationsliste von TCOS eESM Version 2.0 Release, P71D600, Version 1.0, 13 February 2024, Deutsche Telekom Security GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-1217, Operational Guidance for users and administrators, R1/R2R3), BSI- DSZ-CC-1149-V3-2023, Version 2, 1 December 2023, TÜV Informationstechnik GmbH (confidential document) [14] Technische Richtlinie BSI TR-03109-1: Smart Meter Gateway - Anforderungen an die

Standards
FIPS 180-4, FIPS 186, FIPS 197, AIS 34, AIS 36, AIS 37, AIS 26, AIS 25, AIS 20, AIS 31, AIS 46, AIS 1, AIS 14, AIS 19, AIS 32, AIS 35, AIS 38, RFC 5639, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-03109-2, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1217-2024
Subject Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2
Keywords "Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2"
Author Bundesamt für Sicherheit in der Informationstechnik
Pages 29

Frontpage

Certificate ID BSI-DSZ-CC-1217-2024
Certified item TCOS eEnergy Security Module Version 2.0 Release 1/P71
Certification lab BSI
Developer Deutsche Telekom Security GmbH

References

Outgoing
  • BSI-DSZ-CC-1149-V3-2023 - active - NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3)
Incoming

Security target

Extracted keywords

Symmetric Algorithms
AES, TDES, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-Hellman
Schemes
MAC, Key Agreement
Protocols
TLS, PACE
Randomness
RND, RNG
Elliptic Curves
P-256, P-384, NIST P-256, NIST P-384, secp256r1, secp384r1, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1
Block cipher modes
CBC

Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL 6+, EAL 4, EAL 6, EAL4 augmented, EAL 6 augmented
Claims
O.PACE, O.RND, O.AES, O.TDES, O.RSA, O.ECC, O.PUF, OE.PACE, OSP.SM
Security Assurance Requirements (SAR)
ADV_TDS, ADV_ARC.1, ADV_TDS.3, ADV_FUN.1, ADV_ARC, ADV_FSP, ADV_FSP.4, ADV_IMP.1, AGD_PRE.1, AGD_OPE.1, ALC_FLR.1, ALC_DVS.2, ALC_DEL.1, ALC_CMC.4, ALC_CMS.4, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FDP_ACF, FDP_ACC.2, FDP_ACF.1, FDP_SDI.2, FDP_RIP.1, FDP_ETC.1, FDP_ITC.1, FDP_UCT.1, FDP_UIT.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_RIP.1.1, FDP_IFC, FDP_ETC.1.1, FDP_ETC.1.2, FDP_IFC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UIT.1.2, FDP_ITC, FDP_SDI, FDP_RIP, FDP_UIT, FDP_SDC.1, FDP_ITT.1, FDP_ACC, FDP_UCT, FIA_ATD.1, FIA_SOS.1, FIA_UAU, FIA_UAU.4, FIA_UAU.5, FIA_UID.1, FIA_USB.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS, FIA_UID, FIA_USB, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMR, FMT_MSA, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_PHP, FPT_TST, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_ICT.1, FTP_ITC
Protection profiles
BSI-CC-PP-0077-V2-2015, BSI-CC-PP-0073-2014
Certificates
BSI-DSZ-CC-1217, BSI-DSZ-CC-1149-V3-2023
Evaluation facilities
Deutsche Telekom Security

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channels, side channel, side-channels, SPA, DPA, timing attacks, Physical tampering, physical tampering, Malfunction, malfunction, DFA, fault injection
Certification process
out of scope, entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the

Standards
FIPS186, FIPS197, FIPS PUB 186-4, AIS36, AIS 36, RFC5639, RFC 5639, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-03109

File metadata

Title Security Target TCOS Smart Meter Security Module (NXP)
Subject TCOS Smart Meter Security Module Version 1.0 Release 1
Keywords "TCOS Security Module, Sicherheitsmodul, Smart Meter"
Author Deutsche Telekom Security GmbH
Pages 75

References

Outgoing
  • BSI-DSZ-CC-1149-V3-2023 - active - NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3)
Incoming
  • BSI-DSZ-CC-0919-V4-2025 - active - CASA 1.0 (SW: 31100000__X026b, HW: 10 301, 10 302, 10 303, 10 304)CASA 1.1 (SW: 31100000__X026b, HW: 11 301, 11 302, 11 501, 11 502)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

BSI-DSZ-CC-1217-2024

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_FUN.1, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, AVA_VAN.5

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1217c_pdf.pdf",
  "dgst": "8239b6c33b01617f",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1217-2024",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "c8d6c0233df5d5fb"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0831",
          "BSI-DSZ-CC-0919-V4-2025",
          "BSI-DSZ-CC-0918-V8-2025"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-V3-2023"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0919-V4-2025",
          "BSI-DSZ-CC-0918-V8-2025",
          "BSI-DSZ-CC-0831"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-V3-2023",
          "BSI-DSZ-CC-1149-V2-2023",
          "BSI-DSZ-CC-1149-2022"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0919-V4-2025"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-V3-2023"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0919-V4-2025"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-V3-2023"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Deutsche Telekom Security GmbH",
  "manufacturer_web": "https://www.telekom.de/security",
  "name": "TCOS eEnergy Security Module Version 2.0 Release 1/P71",
  "not_valid_after": "2034-03-01",
  "not_valid_before": "2024-02-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1217c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1217-2024": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0077-V2-2015": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "ATE": {
          "ATE_DPT.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL 5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "DeutscheTelekom": {
          "Deutsche Telekom Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2",
      "/Title": "Certificate BSI-DSZ-CC-1217-2024",
      "pdf_file_size_bytes": 233498,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1217a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 valid until: 28 February 2034",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1217-2024",
        "cert_item": "TCOS eEnergy Security Module Version 2.0 Release 1/P71",
        "cert_lab": "BSI",
        "developer": "Deutsche Telekom Security GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP), Version 1.03, 11 December 2014, BSI-CC-PP-0077-V2-2015"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1149-V3-2023": 5,
          "BSI-DSZ-CC-1217": 3,
          "BSI-DSZ-CC-1217-2024": 16
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0077-V2-2015": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 5,
          "ALC_FLR": 2,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_DPT.2": 4
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 3,
          "EAL 4": 5,
          "EAL 4 augmented": 3,
          "EAL 5": 4,
          "EAL 5+": 1,
          "EAL 6": 1,
          "EAL5+": 1,
          "EAL6": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 4,
          "FCS_COP": 6,
          "FCS_RNG.1": 1
        },
        "FIA": {
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 1,
          "FIA_UID.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "P71D600, Version 1.0, 13 February 2024, Deutsche Telekom Security GmbH (confidential document) [10] Guidance Documentation BSI-DSZ-CC-1217, Operational Guidance for users and administrators": 1,
          "R1/R2R3), BSI- DSZ-CC-1149-V3-2023, Version 2, 1 December 2023, T\u00dcV Informationstechnik GmbH (confidential document) [14] Technische Richtlinie BSI TR-03109-1: Smart Meter Gateway - Anforderungen an die": 1,
          "Version 2.0 Release 1/P71, Version 1.1, 16 February 2024, SRC Security Research \u0026 Consulting GmbH (confidential document) [9] Configuration List BSI-DSZ-CC-1217, Konfigurationsliste von TCOS eESM Version 2.0 Release": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 9
        },
        "TLS": {
          "TLS": {
            "TLS": 6
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "KA": 1,
          "Key Agreement": 8
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "DeutscheTelekom": {
          "Deutsche Telekom Security": 15
        },
        "SRC": {
          "SRC Security Research \u0026 Consulting": 3
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 2,
          "malfunction": 1
        },
        "SCA": {
          "side channel": 2
        },
        "other": {
          "JIL": 6
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 14": 1,
          "AIS 19": 1,
          "AIS 20": 3,
          "AIS 25": 4,
          "AIS 26": 4,
          "AIS 31": 3,
          "AIS 32": 1,
          "AIS 34": 4,
          "AIS 35": 1,
          "AIS 36": 7,
          "AIS 37": 3,
          "AIS 38": 1,
          "AIS 46": 3
        },
        "FIPS": {
          "FIPS 180-4": 2,
          "FIPS 186": 5,
          "FIPS 197": 2
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "RFC": {
          "RFC 5639": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 3
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-03109-2": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 5,
          "NXP Semiconductors": 9
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, Smart Meter, Security Module, Gateway, PP-0077-V2",
      "/Title": "Certification Report BSI-DSZ-CC-1217-2024",
      "pdf_file_size_bytes": 416984,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "https://www.bsi.bund.de/",
          "https://www.commoncriteriaportal.org/",
          "http://www.commoncriteriaportal.org/cc/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    },
    "st_filename": "1217b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 12
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 19
          }
        },
        "FF": {
          "DH": {
            "DH": 13,
            "Diffie-Hellman": 5
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1149-V3-2023": 1,
          "BSI-DSZ-CC-1217": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.AES": 1,
          "O.ECC": 1,
          "O.PACE": 5,
          "O.PUF": 1,
          "O.RND": 2,
          "O.RSA": 1,
          "O.TDES": 1
        },
        "OE": {
          "OE.PACE": 1
        },
        "OSP": {
          "OSP.SM": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0073-2014": 1,
          "BSI-CC-PP-0077-V2-2015": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 2,
          "ADV_FSP": 1,
          "ADV_FSP.4": 1,
          "ADV_FUN.1": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS": 2,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS.2": 8,
          "ALC_FLR.1": 2,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_TSS.2": 2
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.2": 8,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 10
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 5,
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL 6+": 1,
          "EAL4": 6,
          "EAL4 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_CKM": 61,
          "FCS_CKM.1": 16,
          "FCS_CKM.2": 8,
          "FCS_CKM.4": 45,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 67,
          "FCS_COP.1": 12,
          "FCS_RNG": 9,
          "FCS_RNG.1": 17,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 2,
          "FDP_ACC.1": 12,
          "FDP_ACC.2": 17,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 4,
          "FDP_ACF.1": 8,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_ETC.1": 7,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 1,
          "FDP_IFC": 1,
          "FDP_IFC.1": 8,
          "FDP_ITC": 8,
          "FDP_ITC.1": 20,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 14,
          "FDP_ITT.1": 1,
          "FDP_RIP": 1,
          "FDP_RIP.1": 7,
          "FDP_RIP.1.1": 1,
          "FDP_SDC.1": 1,
          "FDP_SDI": 1,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 8,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UCT": 1,
          "FDP_UCT.1": 8,
          "FDP_UIT": 2,
          "FDP_UIT.1": 7,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 1,
          "FIA_SOS.1": 3,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 18,
          "FIA_UAU.1": 5,
          "FIA_UAU.4": 6,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 6,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 14,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 1,
          "FIA_USB.1": 6,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_LIM": 7,
          "FMT_LIM.1": 23,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 21,
          "FMT_LIM.2.1": 2,
          "FMT_MSA": 2,
          "FMT_MSA.3": 4,
          "FMT_SMF.1": 10,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 6,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 6,
          "FPT_EMS.1": 14,
          "FPT_EMS.1.1": 2,
          "FPT_EMS.1.2": 2,
          "FPT_FLS": 1,
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 1,
          "FPT_PHP": 1,
          "FPT_PHP.3": 9,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 9,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ICT.1": 4,
          "FTP_ITC": 2,
          "FTP_ITC.1": 10,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "entities. 72 As these external entities only indirectly interact with the TOE, these entities are out of scope for this ST. 73 During its pre-operational phases the TOE interacts with the Integrator and the": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 67
        },
        "TLS": {
          "TLS": {
            "TLS": 28
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 17
        },
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 2,
          "brainpoolP384r1": 2,
          "brainpoolP512r1": 2
        },
        "NIST": {
          "NIST P-256": 1,
          "NIST P-384": 1,
          "P-256": 11,
          "P-384": 15,
          "secp256r1": 1,
          "secp384r1": 1
        }
      },
      "eval_facility": {
        "DeutscheTelekom": {
          "Deutsche Telekom Security": 81
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 7
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Malfunction": 9,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 3,
          "physical tampering": 5
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 2,
          "Physical Probing": 1,
          "SPA": 2,
          "physical probing": 2,
          "side channel": 1,
          "side channels": 1,
          "side-channels": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 36": 1,
          "AIS36": 3
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS PUB 186-4": 1,
          "FIPS186": 10,
          "FIPS197": 3
        },
        "RFC": {
          "RFC 5639": 1,
          "RFC5639": 11
        },
        "X509": {
          "X.509": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 12
          }
        },
        "DES": {
          "3DES": {
            "TDES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 5
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03109": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 2,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Deutsche Telekom Security GmbH",
      "/Keywords": "\"TCOS Security Module, Sicherheitsmodul, Smart Meter\"",
      "/Subject": "TCOS Smart Meter Security Module Version 1.0 Release 1",
      "/Title": "Security Target TCOS Smart Meter Security Module (NXP)",
      "pdf_file_size_bytes": 930419,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 75
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0077b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1217a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "ATE_DPT.2",
      "AVA_VAN.5",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1217b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b614936b2d1f7d1555bee0f16f96141cdb06b86ef7c0fed1e6d10a8a1dfd526e",
      "txt_hash": "b70df464e41897e798d8a03b2ce1befe8a7e3d3f522bd148caf7f7b9caa7f3b2"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "0bedd2a193c3ba00bedfcc429bd9dcf1a852eea6bf7c207e1a7cd1f5701d9013",
      "txt_hash": "6b201fec135c46f5fa06400244b7f4a18aac436ce3b7d94eab3451bca1982a37"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3d8976b02e8509887aab898939d770d74abd3dc38e4a2df47b1fa7ff6263704b",
      "txt_hash": "8596b1c4e04223e6f206e3aa7294881be123c7bce9e9cee470c09fbefef12699"
    }
  },
  "status": "active"
}