This page was not yet optimized for use on mobile
devices.
STARCOS 3.4 ID Tachograph version C2
CSV information
| Status | archived |
|---|---|
| Valid from | 02.09.2010 |
| Valid until | 02.09.2025 |
| Scheme | 🇳🇱 NL |
| Manufacturer | G+D Mobile Security GmbH |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ALC_DVS.2, EAL4+, AVA_VAN.5, ADV_IMP.2 |
| Maintenance updates | Starcos 3.4 ID Tachograph version C3 (31.01.2011) Certification report Security target |
Heuristics summary
Certificate ID: NSCIB-CC-09-11192-CR2
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Device models
ATMEL AT90SC24036RCU, ATMEL ATV4/ATV4Operating System name
STARCOS 3Vendor
Giesecke & Devrient, G&DSecurity level
EAL4, EAL7, EAL 4+, EAL5+, EAL 4, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ADV_IMP.2, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.5, ALC_CMS.4, ALC_DEL.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Protection profiles
BSI-PP-0002Certificates
ANSSI-2009/24, NSCIB-CC-09-11192-CR2, NSCIB-CC-09-11192, NSCIB-CC-09-11192-CR, NSCIB-09-11192Evaluation facilities
BrightsightSide-channel analysis
SPA, DPA, JILFile metadata
| Title | Certification Report NSCIB-CC-09-11192-CR2.pdf |
|---|---|
| Creation date | D:20100903105626+02'00' |
| Pages | 17 |
| Creator | pdfFactory Pro www.pdffactory.com |
| Producer | pdfFactory Pro 3.22 (Windows XP Professional Dutch) |
References
Outgoing- ANSSI-CC-2009/24 - archived - Secure microcontroller ATMEL AT90SC24036RCU (AT58U48) rev. B
Security target
Extracted keywords
Symmetric Algorithms
DES, 3DES, 3-DESHash functions
SHA-1Schemes
MACRandomness
RND, RNGBlock cipher modes
CBCDevice models
ATMEL AT90SC24036RCUOperating System name
STARCOS 3Vendor
Giesecke & DevrientSecurity level
EAL5+, EAL4, EAL 4, EAL 4+, EAL 5, EAL5, EAL4 augmented, ITSEC E3 highClaims
O.CLON, O.DEV_DIS_ES, O.DEV, O.SOFT_DLV, O.INIT_ACS, O.TAMPER_ES, O.OPERATE, O.FLAW, O.MOD_MEMORY, O.RND, O.DLV_DATA, O.DLV_PROTECT, O.DLV_AUDIT, O.DLV_RESP, O.USE_DIAG, O.TEST_OPERATE, T.RND, T.DIS_TEST_ES, T.T_TOOLS, T.T_ES, T.T_CMD, T.MOD, T.MOD_LOAD, T.MOD_EXE, T.MOD_SHARE, T.CLON, T.DIS_INFO, T.DIS_DEL, T.T, T.MOD_DEL, T.MOD_SOFT, OT.TAMPER_ES, OT.PERSONALIZATIONSecurity Assurance Requirements (SAR)
ADO_DEL.2, ADO_IGS.1, ADO_IGS, ADO_DEL, ADO_IGS.2, ADV_IMP.2, ADV_SPM.1, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_CMC.5, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VLA.4, AVA_MSU.3Security Functional Requirements (SFR)
FAU_SAA.1, FAU_GEN.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_DAU.1.1, FCO_NRO, FCO_NRO.1, FCO_NRO.1.1, FCO_NRO.1.2, FCO_NRO.1.3, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP, FCS_COP.1.1, FCS_RND.1, FDP_ITC.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACC.2, FDP_ACC.1, FDP_ACF.1.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF, FDP_ACF.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_DAU.1, FDP_DAU.1.2, FDP_ETC, FDP_ETC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ETC.2, FDP_IFC.1, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FIA_UID.1, FIA_AFL, FIA_AFL.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU, FIA_UID, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.3, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UAU.4, FIA_UAU.4.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MSA.3, FMT_MOF, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD, FMT_MTD.1, FMT_MTD.1.1, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP, FPT_PHP.3, FPT_PHP.3.1, FPT_TDC, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TST.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Protection profiles
BSI-PP-0002Side-channel analysis
Leak-Inherent, side channel, timing attacks, physical tampering, Malfunction, JILStandards
PKCS#1, RFC 3447, ISO/IEC 9798-3, ISO/IEC 7816-8, ISO/IEC 9796-2, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004File metadata
| Title | Security Target Lite STARCOS 3.4 ID Tachograph C2 |
|---|---|
| Subject | Security Target Lite STARCOS 3.4 ID Tachograph C2 |
| Keywords | Version 2.0 / Status 29.06.2010 |
| Author | CSRD22/stut |
| Creation date | D:20100629134954+02'00' |
| Modification date | D:20100629134956+02'00' |
| Pages | 70 |
| Creator | Acrobat PDFMaker 7.0 für Word |
| Producer | Acrobat Distiller 7.0 (Windows) |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
NSCIB-CC-09-11192-CR2Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.2, ADV_SPM.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VAN.5, AVA_VLA.4Similar certificates
| Name | Certificate ID | |
|---|---|---|
| STARCOS 3.7 ID ePA C2, STARCOS 3.7 ID eAT C2, STARCOS 3.7 ID ePass C2 | BSI-DSZ-CC-1077-V2-2024 | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "8e597216ef8fc1a9",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-09-11192-CR2",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.4"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2009/24"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2009/22",
"ANSSI-CC-2009/10",
"ANSSI-CC-2008/10",
"ANSSI-CC-2009/24"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2011-01-31",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Maintenance_Report_NSCIB-CC-09-11192-MA1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/GDM_STA34_TACHO_ASE_C3_Lite.pdf",
"maintenance_title": "Starcos 3.4 ID Tachograph version C3"
}
]
},
"manufacturer": "G+D Mobile Security GmbH",
"manufacturer_web": "https://www.gi-de.com/de/de/mobile-security/",
"name": "STARCOS 3.4 ID Tachograph version C2",
"not_valid_after": "2025-09-02",
"not_valid_before": "2010-09-02",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "Certification_Report_NSCIB-CC-09-11192-CR2.pdf",
"report_frontpage": {
"NL": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-2009/24": 1
},
"NL": {
"NSCIB-09-11192": 1,
"NSCIB-CC-09-11192": 3,
"NSCIB-CC-09-11192-CR": 1,
"NSCIB-CC-09-11192-CR2": 16
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP": 4,
"ADV_FSP.4": 1,
"ADV_IMP.2": 3,
"ADV_TDS": 2,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.5": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 2,
"ALC_DVS.2": 3,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.2": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 4+": 1,
"EAL4": 1,
"EAL5+": 1,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {
"ATMEL": {
"ATMEL AT90SC24036RCU": 3,
"ATMEL ATV4/ATV4": 1
}
},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 25
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"DPA": 2,
"SPA": 3
},
"other": {
"JIL": 2
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 2,
"Giesecke \u0026 Devrient": 5
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20100903105626+02\u002700\u0027",
"/Creator": "pdfFactory Pro www.pdffactory.com",
"/Producer": "pdfFactory Pro 3.22 (Windows XP Professional Dutch)",
"/Title": "Certification Report NSCIB-CC-09-11192-CR2.pdf",
"pdf_file_size_bytes": 195336,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 17
},
"st_filename": "GDM_STA34_TACHO_ASE_Lite.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.CLON": 1,
"O.DEV": 1,
"O.DEV_DIS_ES": 4,
"O.DLV_AUDIT": 1,
"O.DLV_DATA": 1,
"O.DLV_PROTECT": 1,
"O.DLV_RESP": 1,
"O.FLAW": 1,
"O.INIT_ACS": 3,
"O.MOD_MEMORY": 1,
"O.OPERATE": 1,
"O.RND": 1,
"O.SOFT_DLV": 3,
"O.TAMPER_ES": 2,
"O.TEST_OPERATE": 1,
"O.USE_DIAG": 1
},
"OT": {
"OT.PERSONALIZATION": 1,
"OT.TAMPER_ES": 13
},
"T": {
"T.CLON": 2,
"T.DIS_DEL": 2,
"T.DIS_INFO": 2,
"T.DIS_TEST_ES": 1,
"T.MOD": 1,
"T.MOD_DEL": 2,
"T.MOD_EXE": 4,
"T.MOD_LOAD": 4,
"T.MOD_SHARE": 4,
"T.MOD_SOFT": 2,
"T.RND": 1,
"T.T": 2,
"T.T_CMD": 4,
"T.T_ES": 4,
"T.T_TOOLS": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002": 1
}
},
"cc_sar": {
"ADO": {
"ADO_DEL": 1,
"ADO_DEL.2": 2,
"ADO_IGS": 1,
"ADO_IGS.1": 1,
"ADO_IGS.2": 2
},
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.2": 12,
"ADV_SPM.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.5": 2,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 6,
"ALC_LCD.1": 2,
"ALC_TAT.1": 2
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.2": 3,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_MSU.3": 1,
"AVA_VAN.5": 11,
"AVA_VLA.4": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 4,
"EAL 4+": 1,
"EAL 5": 2,
"EAL4": 10,
"EAL4 augmented": 5,
"EAL5": 2,
"EAL5+": 2
},
"ITSEC": {
"ITSEC E3 high": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_DAU.1.1": 4,
"FAU_GEN.1": 3,
"FAU_SAA.1": 4,
"FAU_SAA.1.1": 3,
"FAU_SAA.1.2": 1
},
"FCO": {
"FCO_NRO": 1,
"FCO_NRO.1": 3,
"FCO_NRO.1.1": 3,
"FCO_NRO.1.2": 1,
"FCO_NRO.1.3": 3
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 11,
"FCS_CKM.1.1": 3,
"FCS_CKM.2": 5,
"FCS_CKM.2.1": 4,
"FCS_CKM.4": 9,
"FCS_CKM.4.1": 5,
"FCS_COP": 1,
"FCS_COP.1": 10,
"FCS_COP.1.1": 8,
"FCS_RND.1": 3
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 4,
"FDP_ACC.2": 5,
"FDP_ACC.2.1": 5,
"FDP_ACC.2.2": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 4,
"FDP_ACF.1.1": 6,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 4,
"FDP_ACF.1.4": 2,
"FDP_DAU.1": 4,
"FDP_DAU.1.2": 3,
"FDP_ETC": 1,
"FDP_ETC.1": 2,
"FDP_ETC.1.1": 4,
"FDP_ETC.1.2": 1,
"FDP_ETC.2": 4,
"FDP_ETC.2.1": 4,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 3,
"FDP_ETC.2.4": 2,
"FDP_IFC.1": 5,
"FDP_ITC": 1,
"FDP_ITC.1": 4,
"FDP_ITC.1.1": 5,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 4,
"FDP_ITC.2": 1,
"FDP_RIP": 1,
"FDP_RIP.1": 2,
"FDP_RIP.1.1": 4,
"FDP_SDI": 1,
"FDP_SDI.2": 2,
"FDP_SDI.2.1": 4,
"FDP_SDI.2.2": 2
},
"FIA": {
"FIA_AFL": 3,
"FIA_AFL.1": 2,
"FIA_AFL.1.1": 5,
"FIA_AFL.1.2": 3,
"FIA_ATD": 1,
"FIA_ATD.1": 3,
"FIA_ATD.1.1": 4,
"FIA_UAU": 1,
"FIA_UAU.1": 3,
"FIA_UAU.1.1": 4,
"FIA_UAU.1.2": 1,
"FIA_UAU.3": 2,
"FIA_UAU.3.1": 4,
"FIA_UAU.3.2": 2,
"FIA_UAU.4": 2,
"FIA_UAU.4.1": 4,
"FIA_UID": 2,
"FIA_UID.1": 5,
"FIA_UID.1.1": 4,
"FIA_UID.1.2": 1,
"FIA_USB": 1,
"FIA_USB.1": 2,
"FIA_USB.1.1": 4,
"FIA_USB.1.2": 2,
"FIA_USB.1.3": 4
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 2,
"FMT_MOF.1.1": 4,
"FMT_MSA": 1,
"FMT_MSA.1": 5,
"FMT_MSA.1.1": 4,
"FMT_MSA.2": 6,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 3,
"FMT_MSA.3.1": 4,
"FMT_MSA.3.2": 2,
"FMT_MTD": 1,
"FMT_MTD.1": 3,
"FMT_MTD.1.1": 4,
"FMT_SMF.1": 4,
"FMT_SMR": 1,
"FMT_SMR.1": 6,
"FMT_SMR.1.1": 4,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO": 1,
"FPR_UNO.1": 2,
"FPR_UNO.1.1": 4
},
"FPT": {
"FPT_FLS": 1,
"FPT_FLS.1": 9,
"FPT_FLS.1.1": 4,
"FPT_PHP": 1,
"FPT_PHP.3": 10,
"FPT_PHP.3.1": 4,
"FPT_TDC": 2,
"FPT_TDC.1": 1,
"FPT_TDC.1.1": 4,
"FPT_TDC.1.2": 2,
"FPT_TST": 2,
"FPT_TST.1": 3,
"FPT_TST.1.1": 4,
"FPT_TST.1.2": 2,
"FPT_TST.1.3": 3
},
"FRU": {
"FRU_FLT.2": 3
},
"FTP": {
"FTP_ITC": 1,
"FTP_ITC.1": 3,
"FTP_ITC.1.1": 3,
"FTP_ITC.1.2": 3,
"FTP_ITC.1.3": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {
"ATMEL": {
"ATMEL AT90SC24036RCU": 8
}
},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"STARCOS": {
"STARCOS 3": 88
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 2,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 2,
"physical tampering": 1
},
"SCA": {
"Leak-Inherent": 2,
"side channel": 1,
"timing attacks": 1
},
"other": {
"JIL": 6
}
},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 2,
"CCMB-2007-09-002": 2,
"CCMB-2007-09-003": 2,
"CCMB-2007-09-004": 2
},
"ISO": {
"ISO/IEC 7816-8": 1,
"ISO/IEC 9796-2": 1,
"ISO/IEC 9798-3": 2
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC 3447": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3-DES": 6,
"3DES": 1
},
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"Giesecke \u0026 Devrient": 7
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "CSRD22/stut",
"/Comments": "Open",
"/Company": "GuD",
"/CreationDate": "D:20100629134954+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0 f\u00fcr Word",
"/Keywords": "Version 2.0 / Status 29.06.2010",
"/ModDate": "D:20100629134956+02\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0 (Windows)",
"/Subject": "Security Target Lite STARCOS 3.4 ID Tachograph C2",
"/Title": "Security Target Lite STARCOS 3.4 ID Tachograph C2",
"pdf_file_size_bytes": 475709,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 70
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification_Report_NSCIB-CC-09-11192-CR2.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_DVS.2",
"AVA_VAN.5",
"ADV_IMP.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/GDM_STA34_TACHO_ASE_Lite.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2e7dae23316d3e07bdbb88f15d49b6e7136329897eea3cde4bc36f18d321df12",
"txt_hash": "013eb9393636ee12d38b03fa636e04b0e8deed90f5c9273d0d292311f8ed0d92"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "001355b73da7c8cfa55911987527833e77e4aae11031dc0bad0204be55f0a15f",
"txt_hash": "c33d1c512336da13724cdbb31cc3e80c1085a9a47729309e984c081af4e6307c"
}
},
"status": "archived"
}