This page was not yet optimized for use on mobile devices.
Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version 1.03
Web information ?
Status: activeCertification date: 2009-12-11
Scheme: 🇩🇪
Category: Products for Digital Signatures
Security level: EAL4+
Certification report ?
Extracted keywords
Security level
EAL 4, EAL1, EAL3, EAL5, EAL7, EAL2, EAL4, EAL6, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2, APE_OBJ.1, APE_REQ.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0059-2009Evaluation facilities
SRC Security Research & ConsultingCertification process
Creation Device – Part 2: Device with Key Generation“, SRC Security Research & Consulting GmbH (confidential document) [6] Protection Profiles for Secure Signature Creation Device – Part 2: Device with Key GenerationStandards
AIS 32Technical reports
BSI 7125, BSI 2, BSI 7148, BSI 7149File metadata
Title | Certification Report BSI-CC-PP-0059-2009 |
---|---|
Subject | Protection Profile, Certification, |
Keywords | Schutzprofil, PP, Protection Profile, Certification, Zertifzierung, Protection Profiles for Secure Signature Creation Device - Part 2: Device with Key Generation, Version 1.03, CEN/ISSS - Information Society Standardization System |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20100407081616+02'00' |
Modification date | D:20100407151701+02'00' |
Pages | 28 |
Creator | Writer |
Producer | OpenOffice.org 3.1 |
Profile ?
Extracted keywords
Security level
EAL 4, EAL 4+, EAL4, EAL4 augmentedClaims
A.CGA, A.SCA, OE.HID_VADSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_ACF, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2, FDP_IFC.1, FDP_AFC, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FMT_MSA.3, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FMT_MTD.1.1, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TEE.1Protection profiles
BSI-CC-PP-0059, BSI-PP-0006-2002TSide-channel analysis
SPA, DPA, timing attacks, physical tampering, DFA, fault injectionStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003File metadata
Title | Protection profiles for Secure signature creation device — Part 2: Device with key generation |
---|---|
Subject | Protection Profile, Schutzprofil |
Keywords | Protection Profile, BSI-CC-PP-0059-2009, Secure Signature-Creation, Device |
Author | CEN/TC 224 |
Creation date | D:20100330081414+02'00' |
Modification date | D:20100330081536+02'00' |
Pages | 46 |
Creator | Acrobat PDFMaker 8.1 für Word |
Producer | Acrobat Distiller 8.1.0 (Windows) |
References ?
- cv act ePasslet/ePKI v3.6 archived
- ASapp-QSCD (OSB) v1.0 archived
- ChipDoc v2 on JCOP 3 P60 in SSCD configuration (v7b4_2) (ANSSI-CC-2023/38) active
- JPKI applet v1.0 on Sm@rtSIM CX Copernicus ST54J/K active
- ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration active
- HID Global S.p.A. HIDApp-eDoc suite eIDAS eSign Application Version 3_00 active
- SOMA-c007 Machine Readable Electronic Document SSCD Application (SOMA-c007_2) version 2 archived
- ID-A v1.1 on ID-One Cosmo X active
- ACOS-IDv2.1 SSCD (A) CL-TC-Comm (Version 2.1 SSCD (A)) active
- JPKI applet v1.0 on JCOP 4.1 active
- ID-One eIDAS v1.0 en configuration SSCD-2 sur les composants P60x144PVA/PVE archived
- MaskTech eSign Applet on Secora ID S v1.1 active
- ChipDoc v3 on JCOP 4 P71 in SSCD configuration active
- Veridos Suite v3.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD) archived
- CELES-c001 Machine Readable Electronic Document SSCD Application, version 1 (CELES-c001_1) active
- NXP JAVA OS1 ChipDoc v1.0 SSCD (J3K080/J2K080) archived
- IAS ECC v2, version 1.3, in configuration #2 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/51-R01) active
- NXP eDoc Suite v3.5 on JCOP4 P71 - cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD) active
- SOMA-c016 Machine Readable Electronic Document eIDAS QSCD Application, version 3 active
- NXP JCOP 3 SECID P40 ChipDoc-Lite in SSCD Configuration (version 1.0.10) archived
- CardOS V5.3 QES, V1.0 archived
- CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523) active
- BELPIC V1.8 applet on MultiApp V4.1 Platform Révision 1.0 archived
- ID&Trust CNS Card: NXP JCOP 2.4.2 R3 Smart Card with ID&Trust HTCNS v1.03 archived
- BelPIC V1.8 on MultiApp V5.0 Platform active
- DNIe-DSCF (dispositivo seguro de creación de firma) versión 3.0 archived
- IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2 active
- cv act ePasslet Suite v2.1 – Java Card applet configuration providing Secure Signature Device with Key generation (SSCD) archived
- ID-One Cosmo X embedding VITALE application(version 2.1.5 archived
- Idemia CombICAO Applet in SSCD configuration on Cosmo V9 archived
- IDentity Applet v3.4-p1/QSCD on NXP JCOP 4 P71 active
- SmartApp SIGN 2.2 archived
- IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/52-R01) active
- IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0) archived
- IAS ECC V2, Version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2 archived
- CardOS V6.0 ID R1.1 active
- DNIe version 4.0 active
- IDentity Applet v3.4/QSCD on NXP JCOP 4 P71 active
- IAS ECC V2, Version 1.3 en configuration #3 sur la plateforme ID-One Cosmo v8.2 archived
- ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration (v2) active
- IAS ECC v2, version 1.3, in configuration #4 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/53-R01) active
- ID-A v1.0 on ID-ONE COSMO X Codes SAAAAR applet : 417692 et 417693 ; Code SAAAR du Common package : 417641 active
- IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2 active
- MTCOS Pro 2.6 SSCD / P71D352 (N7121) active
- CardOS V6.0 ID R1.0 active
- ID-A v1.0 on ID-ONE COSMO X Code SAAAR de l’applet : 417692 Code SAAAR du Common package : 417641 archived
- JPKI applet v1.0 on Combo CE 4.2.3 ST54J/K active
- ID-One Cosmo v8.2 embedding VITALE application (Version 2.0.83) archived
- IAS Classic v5.2 on MultiApp V5.0 active
- Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Version du patch : 1.3) archived
- Applet ID.me v1.12 sur la plateforme IDeal Citiz v2.1 archived
- ID-One Cosmo X embedding VITALE application version 2.1.5 active
- CardOS DI V5.4 QES Version 1.0 active
- ID-One Cosmo v9.1 embedding VITALE application version 2.1.4 active
- ChipDoc v3 on JCOP 4 P71 in SSCD configuration active
- IAS Classic v5.0 with MOC Server v3.0 on MultiApp v4.2 Version 5.0.0.A.C, version 3.0.1A active
- Application IAS V4.2.0.D sur la plateforme Javacard ouverte MultiApp V3.1S masquée sur le composant P60D144JVA (version du patch: 1.4) archived
- Idemia ID-Oneâ„¢ CNS V2 on Cosmo V9.1 active
- IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71 active
- IAS ECC V2 en configuration #3 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB active
- AKD eID Card 1.0 archived
- STMicroelectronics JSIGN4 V1.0.4 active
- CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration) SAAAAR : 203742 (ANSSI-CC-2023/51) active
- IAS ECC V2 en configuration #2 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB active
- Permiso de Residencia versión 4.0 active
- ACOS-IDv2.1 SSCD (A) CB-Comm (Version 2.1 SSCD (A)) active
- ID-A v1.0 on ID-One Cosmo X Codes SAAAAR : 417692, 417693 active
- ACOS-IDv2.0 SSCD (A) CB-Comm (v2.0 SSCD (A)) active
- JPKI applet v1.0 on JCOP 6.2 active
- JPKI applet v1.0 on Connected eSE 5.3.4 ST54L active
- IAS ECC V2, version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2 active
- IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2 archived
- NXP eDoc Suite v4.0 on JCOP4.5 P71 - cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD) active
- CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration) SAAAAR : 203742 archived
- ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration Version 3.1.6.52 archived
- Pasaporte electrónico versión 4.0 active
- IAS ECC V2, version 1.3 en configuration #3 sur la plateforme ID-One Cosmo v8.2 active
- STARCOS 3.5 ID ECC C1 archived
- CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration) SAAAAR : 203742 active
- A.E.T. SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD v3.0.1.12 active
- Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7793 A12 et G12 archived
- Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Version du patch : 1.3) archived
- NXP ASEPCOS-CNS v1.84 in SSCD Configuration on NXP P60D080PVG Dual Interface Microcontroller archived
- NXP eDoc Suite v3.5 on JCOP4 P71 - cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD) active
- IAS Classic V4.4 with MOC Server 1.1 on MultiApp V4 active
- STARCOS 3.5 ID ECC C1R archived
- NXP eDoc Suite v3.0 - cryptovision ePasslet Suite - Java Card applet configuration providing Secure Signature Device with Key generation (SSCD) archived
- ASapp-QSCD v1.0 archived
- HID Global S.p.A. SOMA-c016 Machine Readable Electronic Document eIDAS QSCD Application, version 4 active
- IDentity Applet v3.4-p2/QSCD on NXP JCOP 4 P71 active
- IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2 archived
- ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration(Version 4.0.1.52) active
- ChipDoc v2 on JCOP 3 P60 in SSCD configuration active
- JPKI applet v1.0 on JCOP 5.1 active
- Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 archived
- SECORA™ ID X Applet Collection with ePasslet Suite v3.5 by cryptovision GmbH, version 1.0– Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD) active
- IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) active
- A.E.T. SafeSign IC PKI applet on JCOP 3 P60 eIDAS QSCD v3.0.1.11 active
- ACOS-IDv2.0 SSCD (A) CL-TC-Comm (v2.0 SSCD (A)) active
- ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) active
- CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523) active
- Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) active
- IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l’application : F0 02 02 13) (ANSSI-CC-2020/50-R01) active
- IDentity Applet v3.4-p2/eIDAS on NXP JCOP 4 P71 active
- MTCOS Pro 2.5 SSCD / P60D145VB_J (P6022y VB) archived
- ID-One eIDAS v1.0 en configuration SSCD-2 sur les composants P60x080PVC/PVG archived
- ID.me 1.28 on IDeal Citiz MOSID V2.1.1 archived
- IAS ECC V2 en configuration #4 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB active
- ID-One CNS v2 archived
- BELPIC V1.8 applet on MultiApp V4.1 (Révision 1.0) (ANSSI-CC-2019/31-R01) active
- MTCOS Pro 2.5 SSCD / SLE78CLFX400VPHM/BPHM/7PHM (M7892) archived
- SOMA-c007 Machine Readable Electronic Document SSCD Application version 4 active
- ID-A v1.0 on ID-One Cosmo J (SAAAAR : 417701, 418402 et 417652) active
- STMicroelectronics JSIGN3 V1.1.4 active
- ChipDoc P60 on JCOP 3 SECID P60 (OSAà SSCD chargé sur composant P6022J VB, Version v7b1 archived
- ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) active
- JPKI applet v1.0 on JCOP 5.2 active
- CardOS DI V5.4 QES Version 1.0 active
- IAS ECC V2 en configuration #1 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB active
- TC-FNMT version 5.6 active
- AKD eID 2.0 SSCD active
- SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14 active
- CardOS V6.0 ID R1.2 active
- MTCOS Pro 2.6 QSCD/SSCD / SLC37 (V11) active
- JPKI applet v1.0 on JCOP 8.9 active
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version 1.03 was processed.
Raw data
{
"_id": "d918b28fd7bb5d79",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "d918b28fd7bb5d79",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp0059b_pdf.pdf",
"pp_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CGA": 4,
"A.SCA": 4
},
"OE": {
"OE.HID_VAD": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059": 1,
"BSI-PP-0006-2002T": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.4": 2,
"ADV_IMP.1": 2,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 2,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL 4+": 1,
"EAL4": 7,
"EAL4 augmented": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2
},
"FCS": {
"FCS_CKM.1": 13,
"FCS_CKM.1.1": 3,
"FCS_CKM.2": 2,
"FCS_CKM.4": 10,
"FCS_CKM.4.1": 2,
"FCS_COP.1": 6,
"FCS_COP.1.1": 3
},
"FDP": {
"FDP_ACC": 23,
"FDP_ACC.1": 17,
"FDP_ACF": 13,
"FDP_ACF.1": 19,
"FDP_AFC": 4,
"FDP_IFC.1": 8,
"FDP_ITC.1": 4,
"FDP_ITC.2": 4,
"FDP_RIP.1": 4,
"FDP_RIP.1.1": 1,
"FDP_SDI": 11,
"FDP_SDI.1": 2,
"FDP_SDI.2": 4
},
"FIA": {
"FIA_AFL.1": 4,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 1,
"FIA_UAU.1": 7,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 9,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1": 5,
"FMT_MOF.1.1": 1,
"FMT_MSA": 11,
"FMT_MSA.1": 5,
"FMT_MSA.2": 6,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 15,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MSA.4": 6,
"FMT_MSA.4.1": 1,
"FMT_MTD": 10,
"FMT_MTD.1": 2,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 20,
"FMT_SMF.1.1": 2,
"FMT_SMR.1": 22,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 5,
"FPT_FLS.1.1": 2,
"FPT_PHP.1": 5,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 5,
"FPT_PHP.3.1": 2,
"FPT_TEE.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 9,
"FPT_TST.1.1": 2,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"fault injection": 1,
"physical tampering": 10
},
"SCA": {
"DPA": 3,
"SPA": 3,
"timing attacks": 3
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 2,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "CEN/TC 224",
"/Company": "afnor",
"/CreationDate": "D:20100330081414+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 8.1 f\u00fcr Word",
"/Keywords": "Protection Profile, BSI-CC-PP-0059-2009, Secure Signature-Creation, Device",
"/ModDate": "D:20100330081536+02\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/SourceModified": "D:20100330054815",
"/Subject": "Protection Profile, Schutzprofil",
"/Title": "Protection profiles for Secure signature creation device \u2014 Part 2: Device with key generation",
"pdf_file_size_bytes": 517242,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
},
"report_filename": "pp0059a_pdf.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009": 15
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 2,
"APE_ECD.1": 2,
"APE_INT.1": 2,
"APE_OBJ.1": 1,
"APE_OBJ.2": 2,
"APE_REQ.1": 1,
"APE_REQ.2": 2,
"APE_SPD.1": 2
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 4,
"EAL 4 augmented": 2,
"EAL1": 6,
"EAL2": 3,
"EAL3": 4,
"EAL4": 4,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Creation Device \u2013 Part 2: Device with Key Generation\u201c, SRC Security Research \u0026 Consulting GmbH (confidential document) [6] Protection Profiles for Secure Signature Creation Device \u2013 Part 2: Device with Key Generation": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 2": 1,
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20100407081616+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Schutzprofil, PP, Protection Profile, Certification, Zertifzierung, Protection Profiles for Secure Signature Creation Device - Part 2: Device with Key Generation, Version 1.03, CEN/ISSS - Information Society Standardization System",
"/ModDate": "D:20100407151701+02\u002700\u0027",
"/Producer": "OpenOffice.org 3.1",
"/Subject": "Protection Profile, Certification, ",
"/Title": "Certification Report BSI-CC-PP-0059-2009",
"pdf_file_size_bytes": 770510,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8791c39e538f2635f80bf50a013f8af8520563964b747775f325c425e59e5513",
"txt_hash": "dded9375b8012acec3e3b8a0d8efc6ae045df74e91c6b3058eb74f41405f062a"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "c415b13279c67724fc744619b9cac17848b2f1f51acdc07eec68df6d234e8173",
"txt_hash": "37a64de975a2fe1a4e2c2d131287007fa9f73c7e0d3318faa36ece522631ba3d"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Products for Digital Signatures",
"is_collaborative": false,
"maintenances": [
[
"2012-02-21",
"Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation Version 2.01",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059_ma1a_pdf.pdf"
],
[
"2016-06-30",
"EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device with key generation",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059_ma2a_pdf.pdf"
]
],
"name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version 1.03",
"not_valid_after": null,
"not_valid_before": "2009-12-11",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+"
]
},
"status": "active",
"version": "1.03"
}
}