STARCOS 3.4 ID Tachograph version C2

CSV information

Status archived
Valid from 02.09.2010
Valid until 02.09.2025
Scheme 🇳🇱 NL
Manufacturer G+D Mobile Security GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL4+, AVA_VAN.5, ADV_IMP.2
Maintenance updates Starcos 3.4 ID Tachograph version C3 (31.01.2011) Certification report Security target

Heuristics summary

Certificate ID: NSCIB-CC-09-11192-CR2

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Device models
ATMEL AT90SC24036RCU, ATMEL ATV4/ATV4
Operating System name
STARCOS 3
Vendor
Giesecke & Devrient, G&D

Security level
EAL4, EAL7, EAL 4+, EAL5+, EAL 4, EAL 4 augmented
Security Assurance Requirements (SAR)
ADV_IMP.2, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.5, ALC_CMS.4, ALC_DEL.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.5
Protection profiles
BSI-PP-0002
Certificates
ANSSI-2009/24, NSCIB-CC-09-11192-CR2, NSCIB-CC-09-11192, NSCIB-CC-09-11192-CR, NSCIB-09-11192
Evaluation facilities
Brightsight

Side-channel analysis
SPA, DPA, JIL

File metadata

Title Certification Report NSCIB-CC-09-11192-CR2.pdf
Creation date D:20100903105626+02'00'
Pages 17
Creator pdfFactory Pro www.pdffactory.com
Producer pdfFactory Pro 3.22 (Windows XP Professional Dutch)

References

Outgoing
  • ANSSI-CC-2009/24 - archived - Secure microcontroller ATMEL AT90SC24036RCU (AT58U48) rev. B

Security target

Extracted keywords

Symmetric Algorithms
DES, 3DES, 3-DES
Hash functions
SHA-1
Schemes
MAC
Randomness
RND, RNG
Block cipher modes
CBC

Device models
ATMEL AT90SC24036RCU
Operating System name
STARCOS 3
Vendor
Giesecke & Devrient

Security level
EAL5+, EAL4, EAL 4, EAL 4+, EAL 5, EAL5, EAL4 augmented, ITSEC E3 high
Claims
O.CLON, O.DEV_DIS_ES, O.DEV, O.SOFT_DLV, O.INIT_ACS, O.TAMPER_ES, O.OPERATE, O.FLAW, O.MOD_MEMORY, O.RND, O.DLV_DATA, O.DLV_PROTECT, O.DLV_AUDIT, O.DLV_RESP, O.USE_DIAG, O.TEST_OPERATE, T.RND, T.DIS_TEST_ES, T.T_TOOLS, T.T_ES, T.T_CMD, T.MOD, T.MOD_LOAD, T.MOD_EXE, T.MOD_SHARE, T.CLON, T.DIS_INFO, T.DIS_DEL, T.T, T.MOD_DEL, T.MOD_SOFT, OT.TAMPER_ES, OT.PERSONALIZATION
Security Assurance Requirements (SAR)
ADO_DEL.2, ADO_IGS.1, ADO_IGS, ADO_DEL, ADO_IGS.2, ADV_IMP.2, ADV_SPM.1, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_CMC.5, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VLA.4, AVA_MSU.3
Security Functional Requirements (SFR)
FAU_SAA.1, FAU_GEN.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_DAU.1.1, FCO_NRO, FCO_NRO.1, FCO_NRO.1.1, FCO_NRO.1.2, FCO_NRO.1.3, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP, FCS_COP.1.1, FCS_RND.1, FDP_ITC.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACC.2, FDP_ACC.1, FDP_ACF.1.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF, FDP_ACF.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_DAU.1, FDP_DAU.1.2, FDP_ETC, FDP_ETC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ETC.2, FDP_IFC.1, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FIA_UID.1, FIA_AFL, FIA_AFL.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU, FIA_UID, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.3, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UAU.4, FIA_UAU.4.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MSA.3, FMT_MOF, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD, FMT_MTD.1, FMT_MTD.1.1, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP, FPT_PHP.3, FPT_PHP.3.1, FPT_TDC, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TST.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
BSI-PP-0002

Side-channel analysis
Leak-Inherent, side channel, timing attacks, physical tampering, Malfunction, JIL

Standards
PKCS#1, RFC 3447, ISO/IEC 9798-3, ISO/IEC 7816-8, ISO/IEC 9796-2, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004

File metadata

Title Security Target Lite STARCOS 3.4 ID Tachograph C2
Subject Security Target Lite STARCOS 3.4 ID Tachograph C2
Keywords Version 2.0 / Status 29.06.2010
Author CSRD22/stut
Creation date D:20100629134954+02'00'
Modification date D:20100629134956+02'00'
Pages 70
Creator Acrobat PDFMaker 7.0 für Word
Producer Acrobat Distiller 7.0 (Windows)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

NSCIB-CC-09-11192-CR2

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.2, ADV_SPM.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VAN.5, AVA_VLA.4

Similar certificates

Name Certificate ID
STARCOS 3.7 ID ePA C2, STARCOS 3.7 ID eAT C2, STARCOS 3.7 ID ePass C2 BSI-DSZ-CC-1077-V2-2024 Compare

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "8e597216ef8fc1a9",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-09-11192-CR2",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.4"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2009/24"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2009/22",
          "ANSSI-CC-2009/10",
          "ANSSI-CC-2008/10",
          "ANSSI-CC-2009/24"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2011-01-31",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Maintenance_Report_NSCIB-CC-09-11192-MA1.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/GDM_STA34_TACHO_ASE_C3_Lite.pdf",
        "maintenance_title": "Starcos 3.4 ID Tachograph version C3"
      }
    ]
  },
  "manufacturer": "G+D Mobile Security GmbH",
  "manufacturer_web": "https://www.gi-de.com/de/de/mobile-security/",
  "name": "STARCOS 3.4 ID Tachograph version C2",
  "not_valid_after": "2025-09-02",
  "not_valid_before": "2010-09-02",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "Certification_Report_NSCIB-CC-09-11192-CR2.pdf",
    "report_frontpage": {
      "NL": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-2009/24": 1
        },
        "NL": {
          "NSCIB-09-11192": 1,
          "NSCIB-CC-09-11192": 3,
          "NSCIB-CC-09-11192-CR": 1,
          "NSCIB-CC-09-11192-CR2": 16
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP": 4,
          "ADV_FSP.4": 1,
          "ADV_IMP.2": 3,
          "ADV_TDS": 2,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.5": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS.2": 3,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.2": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL 4+": 1,
          "EAL4": 1,
          "EAL5+": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {
        "ATMEL": {
          "ATMEL AT90SC24036RCU": 3,
          "ATMEL ATV4/ATV4": 1
        }
      },
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "STARCOS": {
          "STARCOS 3": 25
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "DPA": 2,
          "SPA": 3
        },
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 2,
          "Giesecke \u0026 Devrient": 5
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20100903105626+02\u002700\u0027",
      "/Creator": "pdfFactory Pro www.pdffactory.com",
      "/Producer": "pdfFactory Pro 3.22 (Windows XP Professional Dutch)",
      "/Title": "Certification Report NSCIB-CC-09-11192-CR2.pdf",
      "pdf_file_size_bytes": 195336,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 17
    },
    "st_filename": "GDM_STA34_TACHO_ASE_Lite.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.CLON": 1,
          "O.DEV": 1,
          "O.DEV_DIS_ES": 4,
          "O.DLV_AUDIT": 1,
          "O.DLV_DATA": 1,
          "O.DLV_PROTECT": 1,
          "O.DLV_RESP": 1,
          "O.FLAW": 1,
          "O.INIT_ACS": 3,
          "O.MOD_MEMORY": 1,
          "O.OPERATE": 1,
          "O.RND": 1,
          "O.SOFT_DLV": 3,
          "O.TAMPER_ES": 2,
          "O.TEST_OPERATE": 1,
          "O.USE_DIAG": 1
        },
        "OT": {
          "OT.PERSONALIZATION": 1,
          "OT.TAMPER_ES": 13
        },
        "T": {
          "T.CLON": 2,
          "T.DIS_DEL": 2,
          "T.DIS_INFO": 2,
          "T.DIS_TEST_ES": 1,
          "T.MOD": 1,
          "T.MOD_DEL": 2,
          "T.MOD_EXE": 4,
          "T.MOD_LOAD": 4,
          "T.MOD_SHARE": 4,
          "T.MOD_SOFT": 2,
          "T.RND": 1,
          "T.T": 2,
          "T.T_CMD": 4,
          "T.T_ES": 4,
          "T.T_TOOLS": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002": 1
        }
      },
      "cc_sar": {
        "ADO": {
          "ADO_DEL": 1,
          "ADO_DEL.2": 2,
          "ADO_IGS": 1,
          "ADO_IGS.1": 1,
          "ADO_IGS.2": 2
        },
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.2": 12,
          "ADV_SPM.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.5": 2,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 6,
          "ALC_LCD.1": 2,
          "ALC_TAT.1": 2
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.2": 3,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_MSU.3": 1,
          "AVA_VAN.5": 11,
          "AVA_VLA.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 4,
          "EAL 4+": 1,
          "EAL 5": 2,
          "EAL4": 10,
          "EAL4 augmented": 5,
          "EAL5": 2,
          "EAL5+": 2
        },
        "ITSEC": {
          "ITSEC E3 high": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_DAU.1.1": 4,
          "FAU_GEN.1": 3,
          "FAU_SAA.1": 4,
          "FAU_SAA.1.1": 3,
          "FAU_SAA.1.2": 1
        },
        "FCO": {
          "FCO_NRO": 1,
          "FCO_NRO.1": 3,
          "FCO_NRO.1.1": 3,
          "FCO_NRO.1.2": 1,
          "FCO_NRO.1.3": 3
        },
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.1": 11,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 5,
          "FCS_CKM.2.1": 4,
          "FCS_CKM.4": 9,
          "FCS_CKM.4.1": 5,
          "FCS_COP": 1,
          "FCS_COP.1": 10,
          "FCS_COP.1.1": 8,
          "FCS_RND.1": 3
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 4,
          "FDP_ACC.2": 5,
          "FDP_ACC.2.1": 5,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 1,
          "FDP_ACF.1": 4,
          "FDP_ACF.1.1": 6,
          "FDP_ACF.1.2": 3,
          "FDP_ACF.1.3": 4,
          "FDP_ACF.1.4": 2,
          "FDP_DAU.1": 4,
          "FDP_DAU.1.2": 3,
          "FDP_ETC": 1,
          "FDP_ETC.1": 2,
          "FDP_ETC.1.1": 4,
          "FDP_ETC.1.2": 1,
          "FDP_ETC.2": 4,
          "FDP_ETC.2.1": 4,
          "FDP_ETC.2.2": 1,
          "FDP_ETC.2.3": 3,
          "FDP_ETC.2.4": 2,
          "FDP_IFC.1": 5,
          "FDP_ITC": 1,
          "FDP_ITC.1": 4,
          "FDP_ITC.1.1": 5,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 4,
          "FDP_ITC.2": 1,
          "FDP_RIP": 1,
          "FDP_RIP.1": 2,
          "FDP_RIP.1.1": 4,
          "FDP_SDI": 1,
          "FDP_SDI.2": 2,
          "FDP_SDI.2.1": 4,
          "FDP_SDI.2.2": 2
        },
        "FIA": {
          "FIA_AFL": 3,
          "FIA_AFL.1": 2,
          "FIA_AFL.1.1": 5,
          "FIA_AFL.1.2": 3,
          "FIA_ATD": 1,
          "FIA_ATD.1": 3,
          "FIA_ATD.1.1": 4,
          "FIA_UAU": 1,
          "FIA_UAU.1": 3,
          "FIA_UAU.1.1": 4,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.3": 2,
          "FIA_UAU.3.1": 4,
          "FIA_UAU.3.2": 2,
          "FIA_UAU.4": 2,
          "FIA_UAU.4.1": 4,
          "FIA_UID": 2,
          "FIA_UID.1": 5,
          "FIA_UID.1.1": 4,
          "FIA_UID.1.2": 1,
          "FIA_USB": 1,
          "FIA_USB.1": 2,
          "FIA_USB.1.1": 4,
          "FIA_USB.1.2": 2,
          "FIA_USB.1.3": 4
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_MOF.1": 2,
          "FMT_MOF.1.1": 4,
          "FMT_MSA": 1,
          "FMT_MSA.1": 5,
          "FMT_MSA.1.1": 4,
          "FMT_MSA.2": 6,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 3,
          "FMT_MSA.3.1": 4,
          "FMT_MSA.3.2": 2,
          "FMT_MTD": 1,
          "FMT_MTD.1": 3,
          "FMT_MTD.1.1": 4,
          "FMT_SMF.1": 4,
          "FMT_SMR": 1,
          "FMT_SMR.1": 6,
          "FMT_SMR.1.1": 4,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO": 1,
          "FPR_UNO.1": 2,
          "FPR_UNO.1.1": 4
        },
        "FPT": {
          "FPT_FLS": 1,
          "FPT_FLS.1": 9,
          "FPT_FLS.1.1": 4,
          "FPT_PHP": 1,
          "FPT_PHP.3": 10,
          "FPT_PHP.3.1": 4,
          "FPT_TDC": 2,
          "FPT_TDC.1": 1,
          "FPT_TDC.1.1": 4,
          "FPT_TDC.1.2": 2,
          "FPT_TST": 2,
          "FPT_TST.1": 3,
          "FPT_TST.1.1": 4,
          "FPT_TST.1.2": 2,
          "FPT_TST.1.3": 3
        },
        "FRU": {
          "FRU_FLT.2": 3
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 3,
          "FTP_ITC.1.1": 3,
          "FTP_ITC.1.2": 3,
          "FTP_ITC.1.3": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {
        "ATMEL": {
          "ATMEL AT90SC24036RCU": 8
        }
      },
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "STARCOS": {
          "STARCOS 3": 88
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 2,
          "physical tampering": 1
        },
        "SCA": {
          "Leak-Inherent": 2,
          "side channel": 1,
          "timing attacks": 1
        },
        "other": {
          "JIL": 6
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2006-09-001": 2,
          "CCMB-2007-09-002": 2,
          "CCMB-2007-09-003": 2,
          "CCMB-2007-09-004": 2
        },
        "ISO": {
          "ISO/IEC 7816-8": 1,
          "ISO/IEC 9796-2": 1,
          "ISO/IEC 9798-3": 2
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "RFC": {
          "RFC 3447": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "3-DES": 6,
            "3DES": 1
          },
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "Giesecke \u0026 Devrient": 7
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "CSRD22/stut",
      "/Comments": "Open",
      "/Company": "GuD",
      "/CreationDate": "D:20100629134954+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0 f\u00fcr Word",
      "/Keywords": "Version 2.0 / Status 29.06.2010",
      "/ModDate": "D:20100629134956+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0 (Windows)",
      "/Subject": "Security Target Lite STARCOS 3.4 ID Tachograph C2",
      "/Title": "Security Target Lite STARCOS 3.4 ID Tachograph C2",
      "pdf_file_size_bytes": 475709,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 70
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification_Report_NSCIB-CC-09-11192-CR2.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_DVS.2",
      "AVA_VAN.5",
      "ADV_IMP.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/GDM_STA34_TACHO_ASE_Lite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2e7dae23316d3e07bdbb88f15d49b6e7136329897eea3cde4bc36f18d321df12",
      "txt_hash": "013eb9393636ee12d38b03fa636e04b0e8deed90f5c9273d0d292311f8ed0d92"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "001355b73da7c8cfa55911987527833e77e4aae11031dc0bad0204be55f0a15f",
      "txt_hash": "c33d1c512336da13724cdbb31cc3e80c1085a9a47729309e984c081af4e6307c"
    }
  },
  "status": "archived"
}