TCOS CSP Module Version 1.0 Release 1/P6022y

CSV information ?

Status active
Valid from 07.04.2020
Valid until 07.04.2025
Scheme 🇩🇪 DE
Manufacturer T-Systems International GMBH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL4+, ALC_DVS.2
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1118-2020

Certificate ?

Extracted keywords

Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, AVA_VAN.5
Protection profiles
BSI-CC-PP-0104-2019
Certificates
BSI-DSZ-CC-1118-2020
Evaluation facilities
T-Systems International

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title: Certificate BSI-DSZ-CC-1118-2020
Subject: TCOS CSP Module Version 1.0 Release 1/P6022y
Keywords: "Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP"
Author: Bundesamt fĂĽr Sicherheit in der Informationstechnik
Creation date: D:20200409141124+02'00'
Modification date: D:20200409141414+02'00'
Pages: 1
Creator: Writer
Producer: LibreOffice 6.2

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, AES-128, AES-, AES-256, DES, TDEA, HMAC, CMAC
Asymmetric Algorithms
ECDSA, ECC
Hash functions
SHA-512, SHA-256
Schemes
MAC, Key agreement, Key Agreement
Protocols
PACE
Randomness
RNG
Block cipher modes
CBC, OFB, GCM

Vendor
NXP, NXP Semiconductors

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL5+, EAL 4 augmented
Claims
OE.SUCP
Security Assurance Requirements (SAR)
ADV_ARC, ALC_DVS.2, ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, AVA_VAN.5
Security Functional Requirements (SFR)
FCS_COP, FCS_CKM, FIA_API
Protection profiles
BSI-CC-PP-0104-2019, BSI-CC-PP-0107-2019, BSI-CC-PP-0107-
Certificates
BSI-DSZ-CC-1118-2020, BSI-DSZ-CC-1078, BSI-DSZ-CC-1059-V2-2019, BSI-DSZ-CC-1059-
Evaluation facilities
SRC Security Research & Consulting, T-Systems International
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Update im Feld unter TCOS CSP Module 1.0 R1, T-Systems International GmbH, Version 0.2, 11.10.2019 (confidential document) [RNG] Zufallszahlengenerierung in TCOS,Version 1.01, 21.02.2019 (confidential document) [HWST] NXP, Report (ETR) - TCOS CSP Module Version 1.0 Release 1/P6022y”, SRC Security Research & Consulting, (confidential document) [8] Protection Profile (PP-0104) and Protection Profile-Module (PP-0107): Cryptographic Service, CSP Module Version 1.0 Release 1/NXP P60D145 VB”, 24.03.2020, v1.0.1, T-Systems International GmbH (confidential document) [11] “TCOS Cryptographic Service Provider Version 2.0 Release 1/P6022yTCOS Cryptographic Service, 0 Release 1/P6022y User guidance manual”, Version 1.0.4, 24.03.2020, T-Systems International GmbH (confidential document) [12] “TCOS CSP Module Personalization Guidance”, Version 1.4, 04.03.2020, T- Systems International, confidential document) [13] “Update im Feld unter TCOS CSP Module 1.0 R1”, T-Systems International GmbH, Version 0.2, 11, 2019 (confidential document) 7 See secton 9.1 for list of used AIS 28 / 31 BSI-DSZ-CC-1118-2020 Certification Report C

Side-channel analysis
side channel, malfunction, fault injection, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Update im Feld unter TCOS CSP Module 1.0 R1, T-Systems International GmbH, Version 0.2, 11.10.2019 (confidential document) [RNG] Zufallszahlengenerierung in TCOS,Version 1.01, 21.02.2019 (confidential document) [HWST] NXP, Report (ETR) - TCOS CSP Module Version 1.0 Release 1/P6022y”, SRC Security Research & Consulting, (confidential document) [8] Protection Profile (PP-0104) and Protection Profile-Module (PP-0107): Cryptographic Service, CSP Module Version 1.0 Release 1/NXP P60D145 VB”, 24.03.2020, v1.0.1, T-Systems International GmbH (confidential document) [11] “TCOS Cryptographic Service Provider Version 2.0 Release 1/P6022yTCOS Cryptographic Service, 0 Release 1/P6022y User guidance manual”, Version 1.0.4, 24.03.2020, T-Systems International GmbH (confidential document) [12] “TCOS CSP Module Personalization Guidance”, Version 1.4, 04.03.2020, T- Systems International, confidential document) [13] “Update im Feld unter TCOS CSP Module 1.0 R1”, T-Systems International GmbH, Version 0.2, 11, 2019 (confidential document) 7 See secton 9.1 for list of used AIS 28 / 31 BSI-DSZ-CC-1118-2020 Certification Report C

Standards
FIPS186, FIPS 180-4, FIPS197, FIPS186-4, FIPS46, FIPS PUB 46-3, FIPS180, FIPS PUB 180-4, FIPS180-4, FIPS PUB 186-4, SP 800-108, AIS 34, AIS 1, AIS14, AIS19, AIS20, AIS25, AIS26, AIS31, AIS32, AIS34, AIS35, AIS36, AIS37, AIS38, AIS46, AIS47, AIS 36, AIS 28, RFC 5639, RFC8017, RFC5639, RFC2104, RFC 2104, RFC 8017, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 10116:2017, ICAO
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-1118-2020
Subject: TCOS CSP Module Version 1.0 Release 1/P6022y
Keywords: "Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP"
Author: Bundesamt fĂĽr Sicherheit in der Informationstechnik
Creation date: D:20200409135722+02'00'
Modification date: D:20200409141001+02'00'
Pages: 31
Creator: Writer
Producer: LibreOffice 6.2

Frontpage

Certificate ID: BSI-DSZ-CC-1118-2020
Certified item: TCOS CSP Module Version 1.0 Release 1/P6022y
Certification lab: BSI
Developer: T-Systems International GmbH

References

Outgoing Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-128, AES-256, AES-, Triple-DES, TDES, TDEA, HMAC, CMAC
Asymmetric Algorithms
ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-256, SHA-384, SHA384, SHA-512
Schemes
MAC, Key Exchange, Key agreement, Key Agreement
Protocols
PACE, IKE, IKEv2
Randomness
RNG, RND
Elliptic Curves
Curve P-192, Curve P-256, Curve P-384, Curve P-521, P-192, P-256, P-384, P-521, brainpoolP192r1, brainpoolP224r1, brainpoolP256r1, brainpoolP320r1, brainpoolP384r1, brainpoolP512r1, brainpoolP192t1, brainpoolP224t1, brainpoolP256t1, brainpoolP320t1, brainpoolP384t1, brainpoolP512t1
Block cipher modes
CBC, CFB, OFB, GCM, CCM

Trusted Execution Environments
SE
Vendor
NXP, NXP Semiconductors, STM

Security level
EAL4, EAL 6+, EAL 4, EAL 6, EAL4 augmented, EAL 4 augmented, EAL 6 augmented
Claims
O.RBGS, O.TST, O.PUF, O.RND, O.AES, O.CUST_RECONF_PLAIN, O.EEPROM_INTEGRITY, O.FM_FW, O.MEM_ACCESS, O.SFR_ACCESS, O.TDES, OE.SUCP, OSP.TC
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, AVA_VAN.5, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_STG.1, FAU_STG.3, FAU_STG.3.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_SAS.1, FCS_RNG, FCS_CKM.5, FCS_COP, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.5.1, FCS_CKM.4.1, FDP_SDC, FDP_DAU, FDP_UCT, FDP_ACC.1, FDP_IFC.1, FDP_UIT, FDP_ITC, FDP_ETC, FDP_SDC.1, FDP_SDI, FDP_SDC.1.1, FDP_ACC, FDP_ACF, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_DAU.1, FDP_DAU.2, FDP_ETC.2, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ETC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_RIP, FDP_RIP.1, FDP_SDI.2, FDP_ITT.1, FIA_API, FIA_UID.1, FIA_UAU.1, FIA_API.1, FIA_API.1.1, FIA_UAU.5.1, FIA_UAU.5, FIA_ATD.1, FIA_ATD.1.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FMT_MTD.1, FMT_MTD.3, FMT_MSA.1, FMT_MSA.4, FMT_MTD, FMT_MOF, FMT_SMF, FMT_SMR, FMT_MSA, FMT_SMR.1, FMT_SMF.1, FMT_MSA.3, FMT_MOF.1.1, FMT_SAE.1, FMT_MTD.3.1, FMT_SAE.1.1, FMT_SAE.1.2, FMT_SMF.1.1, FMT_MOF.1, FMT_MSA.2, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.2.1, FMT_LIM.1, FMT_LIM.2, FPT_TCT, FPT_TIT, FPT_ISA, FPT_ESA, FPT_SDC, FPT_TCT.1, FPT_TCT.1.1, FPT_TIT.1, FPT_TIT.1.1, FPT_TIT.1.2, FPT_ISA.1, FPT_TDC.1, FPT_ISA.1.1, FPT_ISA.1.2, FPT_ISA.1.3, FPT_ISA.1.4, FPT_ISA.1.5, FPT_ESA.1, FPT_ESA.1.1, FPT_ESA.1.2, FPT_ESA.1.3, FPT_ESA.1.4, FPT_STM.1, FPT_TDC, FPT_TST.1, FPT_STM.1.1, FPT_FLS.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS.1.1, FPT_PHP.3, FPT_TST.1.1, FPT_TST, FPT_PHP.3.1, FPT_EMS.1, FPT_FLS, FPT_PHP, FPT_ITT.1, FRU_FLT.2, FRU_FLT.1, FRU_FLT.2.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1
Protection profiles
BSI-CC-PP-0104-2019, BSI-CC-PP-0107-2019, BSI-CC-PP0035, BSI-CC-PP0104, BSI-CC-PP-0104-
Certificates
BSI-DSZ-CC-1118, BSI-DSZ-CC-1059-2018
Evaluation facilities
T-Systems International

Side-channel analysis
Leak-Inherent, physical probing, side channels, physical tampering, malfunction, Malfunction, JIL

Standards
FIPS PUB 186-4, FIPS186, FIPS 180-4, FIPS180, FIPS197, FIPS PUB 180-4, NIST SP 800-108, PKCS #1, PKCS#1, AIS36, AIS31, AIS 31, AIS 36, RFC5639, RFC5903, RFC6954, RFC8017, RFC2104, RFC 2104, RFC 5639, RFC 5903, RFC 6954, RFC 8017, ISO/IEC 19790, ISO/IEC 10116:2017, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2012-09-004, CCMB-2017-04-004
Technical reports
BSI TR-03151

File metadata

Title: TCOS CSP Module 1.0 Release 1/P6022y
Subject: TCOS Cryptographic Service Provider
Keywords: Crypto Service Provider, TCOS, Electronic Cash Register, TSE
Author: T-Systems International GmbH
Creation date: D:20200228103153+01'00'
Modification date: D:20200228103153+01'00'
Pages: 102
Creator: Microsoft® Word für Office 365
Producer: Microsoft® Word für Office 365

References

Outgoing
  • BSI-DSZ-CC-1059-2018 - NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software
Incoming

Heuristics ?

Certificate ID: BSI-DSZ-CC-1118-2020

Extracted SARs

ATE_COV.2, AVA_VAN.5, ADV_IMP.1, ALC_DEL.1, ALC_TAT.1, ALC_LCD.1, AGD_PRE.1, ADV_ARC.1, ATE_FUN.1, ALC_DVS.2, ALC_CMC.4, ASE_TSS.2, ALC_FLR.1, ADV_TDS.3, ADV_FSP.4, ATE_DPT.2, AGD_OPE.1, ALC_CMS.4

Scheme data ?

Cert Id BSI-DSZ-CC-1118-2020
Product TCOS CSP Module Version 1.0 Release 1/P6022y
Vendor T-Systems International GmbH
Certification Date 07.04.2020
Category Smart Cards and similar devices
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_Betriebssysteme_Anwendungen/1118.html
Enhanced
Product TCOS CSP Module Version 1.0 Release 1/P6022y
Applicant T-Systems International GmbH Untere IndustriestraĂźe 20 57250 Netphen
Evaluation Facility SRC Security Research & Consulting GmbH
Assurance Level EAL4+,ALC_DVS.2,AVA_VAN.5
Protection Profile Cryptographic Service Provider (CSP) Version 0.9.8, 19 February 2019, BSI-CC-PP-0104-2019Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit (PPC-CSP-TS-Au) Version 0.9.5, 8 April 2019, BSI-CC-PP-0107-2019
Certification Date 07.04.2020
Expiration Date 06.04.2025
Entries [frozendict({'id': 'Cryptographic Service Provider (', 'description': ') Version 0.9.8, 19 February 2019'}), frozendict({'id': 'Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit (PPC-', 'description': '-Au) Version 0.9.5, 8 April 2019'})]
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118a_pdf.pdf?__blob=publicationFile&v=1
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118b_pdf.pdf?__blob=publicationFile&v=1
Cert Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118c_pdf.pdf?__blob=publicationFile&v=1
Description The Target of Evaluation (TOE) is a Cryptographic Service Provider (CSP) representing a smart card with contact based interfaces programmed according to the Protection Profile BSI-CC-PP-0104-2019 in conjunction with the Timestamp and Audit functionality Protection Profile BSI-CC-PP-0107-2019.
Subcategory Operating systems and applications

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '50e91985d5e93a030ffb340fe91c72781eac7378372afc930122cf5be4fc4491', 'txt_hash': '7fadb5ab9d450a488d564f4107fd1b641888560e6ae7eb07394414f9efe13ee1'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '33577e27adbf3806e359f7add39a179eb479f75fb9d4658c397b6ce880fd4f26', 'txt_hash': '582d73cb8c17211a156f6e17039b72b7a7a532cd7ff246a3a44bac4b9905594a'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ea378ad3793cea56ef641ec4a1dbfaf1b0a49d147ed00587aaa73c71c1fabe3e', 'txt_hash': '8383a3dc90eb03c4a8262fb1fe1ba69251c6c279c87975f4534b7f41cea863ff'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 889220, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/CreationDate': "D:20200409141124+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP"', '/ModDate': "D:20200409141414+02'00'", '/Producer': 'LibreOffice 6.2', '/Subject': 'TCOS CSP Module Version 1.0 Release 1/P6022y', '/Title': 'Certificate BSI-DSZ-CC-1118-2020', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1118-2020': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0104-2019': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 5': 1, 'EAL 2': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'TSystems': {'T-Systems International': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': '1118c_pdf.pdf'}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1118-2020', 'cert_item': 'TCOS CSP Module Version 1.0 Release 1/P6022y', 'developer': 'T-Systems International GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Cryptographic Service Provider (CSP) Version 0.9.8, 19 February 2019, BSI-CC-PP-0104-2019, Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit (PPC-CSP-TS-Au) Version 0.9.5, 8 April 2019, BSI- CC-PP-0107-2019', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant / extended EAL 4 augmented by ALC_DVS.2 and AVA_VAN.5 SOGIS Recognition Agreement'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1078': 2, 'BSI-DSZ-CC-1059-': 1}, '__update__': {'BSI-DSZ-CC-1118-2020': 17, 'BSI-DSZ-CC-1059-V2-2019': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1118': 1}, '__update__': {'BSI-DSZ-CC-1059-2018': 1}, '__delete__': ['BSI-DSZ-CC-1059-V2']}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1118-2020': 34, 'BSI-DSZ-CC-1059-V2-2019': 2}, '__delete__': ['BSI-DSZ-CC-1078', 'BSI-DSZ-CC-1059-']}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1059-V2': 3}, '__update__': {'BSI-DSZ-CC-1059-2018': 2}, '__delete__': ['BSI-DSZ-CC-1118']}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1078': 2, 'BSI-DSZ-CC-1059-': 1}, '__update__': {'BSI-DSZ-CC-1118-2020': 17, 'BSI-DSZ-CC-1059-V2-2019': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1118': 1}, '__update__': {'BSI-DSZ-CC-1059-2018': 1}, '__delete__': ['BSI-DSZ-CC-1059-V2']}}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'BSI-DSZ-CC-1118-2020', 'product': 'TCOS CSP Module Version 1.0 Release 1/P6022y', 'certification_date': '07.04.2020', 'category': 'Smart Cards and similar devices', 'url': 'https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_Betriebssysteme_Anwendungen/1118.html', 'enhanced': {'__insert__': {'protection_profile': 'Cryptographic Service Provider (CSP) Version 0.9.8, 19 February 2019, BSI-CC-PP-0104-2019Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit (PPC-CSP-TS-Au) Version 0.9.5, 8 April 2019, BSI-CC-PP-0107-2019', 'entries': [{'id': 'Cryptographic Service Provider (', 'description': ') Version 0.9.8, 19 February 2019'}, {'id': 'Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit (PPC-', 'description': '-Au) Version 0.9.5, 8 April 2019'}], 'cert_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118c_pdf.pdf?__blob=publicationFile&v=1'}, '__update__': {'product': 'TCOS CSP Module Version 1.0 Release 1/P6022y', 'assurance_level': 'EAL4+,ALC_DVS.2,AVA_VAN.5', 'certification_date': '07.04.2020', 'expiration_date': '06.04.2025', 'report_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118a_pdf.pdf?__blob=publicationFile&v=1', 'target_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118b_pdf.pdf?__blob=publicationFile&v=1', 'description': 'The Target of Evaluation (TOE) is a Cryptographic Service Provider (CSP) representing a smart card with contact based interfaces programmed according to the Protection Profile BSI-CC-PP-0104-2019 in conjunction with the Timestamp and Audit functionality Protection Profile BSI-CC-PP-0107-2019.'}}, 'subcategory': 'Operating systems and applications'} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'BSI-DSZ-CC-1035-2017', 'product': 'TCOS Secure Crypto Module Version 1.0 Release 1/P60C144PVE', 'vendor': 'T-Systems International GmbH', 'certification_date': '06.10.2017', 'category': 'Intelligent measuring systems', 'url': 'https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_MiniHSM/1035.html', 'enhanced': {'product': 'TCOS Secure Crypto Module Version 1.0 Release 1/P60C144PVE', 'applicant': 'T-Systems International GmbH\nUntere IndustriestraĂźe 20\n57250 Netphen', 'evaluation_facility': 'SRC Security Research & Consulting GmbH', 'assurance_level': 'EAL4+,AVA_VAN.5', 'certification_date': '06.10.2017', 'expiration_date': '05.10.2027', 'report_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1035a_pdf.pdf?__blob=publicationFile&v=1', 'target_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1035b_pdf.pdf?__blob=publicationFile&v=1', 'description': 'The Target of Evaluation (TOE) is the product TCOS Secure Crypto Module Version 1.0 Release 1/P60C144PVE developed by T-Systems International GmbH. The TOE is a Security Module according to the Technical Guideline BSI TR-03109-2 Annex B, Version 1.0 and is intended to be integrated in a so-called Smart Meter Mini-HSM. The TOE serves as a cryptographic service provider and supports different parties (as e.g. the Gateway Administrator) for their specific cryptographic needs in the framework of Smart Metering Systems. These cryptographic services cover the following issues: Digital Signature Generation, Digital Signature Verification, Key Agreement for TLS, Key Agreement for Content Data Encryption, Key Pair Generation, Random Number Generation, Component Authentication via the PACE Protocol with Negotiation of Session Keys, Secure Messaging, and Secure Storage of Key Material and further sensitive data relevant for the user.'}, 'subcategory': 'Security module for an Smart Meter Mini-HSM'}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].
    • The report_pdf_hash property was set to 50e91985d5e93a030ffb340fe91c72781eac7378372afc930122cf5be4fc4491.
    • The report_txt_hash property was set to 7fadb5ab9d450a488d564f4107fd1b641888560e6ae7eb07394414f9efe13ee1.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1420347, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 31, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/CreationDate': "D:20200409135722+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP"', '/ModDate': "D:20200409141001+02'00'", '/Producer': 'LibreOffice 6.2', '/Subject': 'TCOS CSP Module Version 1.0 Release 1/P6022y', '/Title': 'Certification Report BSI-DSZ-CC-1118-2020', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.sogis.eu/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/AIS']}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1118-2020', 'cert_item': 'TCOS CSP Module Version 1.0 Release 1/P6022y', 'developer': 'T-Systems International GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Cryptographic Service Provider (CSP) Version 0.9.8, 19 February 2019, BSI-CC-PP-0104-2019, Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit (PPC-CSP-TS-Au) Version 0.9.5, 8 April 2019, BSI- CC-PP-0107-2019', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant / extended EAL 4 augmented by ALC_DVS.2 and AVA_VAN.5 SOGIS Recognition Agreement'}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1118-2020': 34, 'BSI-DSZ-CC-1059-V2-2019': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0104-2019': 3, 'BSI-CC-PP-0107-2019': 2, 'BSI-CC-PP-0107-': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 5, 'EAL 5': 1, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL5+': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC': 1}, 'ALC': {'ALC_DVS.2': 5, 'ALC_FLR': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'AVA': {'AVA_VAN.5': 4}}, 'cc_sfr': {'FCS': {'FCS_COP': 18, 'FCS_CKM': 24}, 'FIA': {'FIA_API': 3}}, 'cc_claims': {'OE': {'OE.SUCP': 1}}, 'vendor': {'NXP': {'NXP': 4, 'NXP Semiconductors': 1}}, 'eval_facility': {'SRC': {'SRC Security Research & Consulting': 3}, 'TSystems': {'T-Systems International': 13}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 12, 'AES-128': 6, 'AES-': 4, 'AES-256': 4}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-512': 1, 'SHA-256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 5}, 'KA': {'Key agreement': 1, 'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 4}}, 'randomness': {'RNG': {'RNG': 3}}, 'cipher_mode': {'CBC': {'CBC': 2}, 'OFB': {'OFB': 1}, 'GCM': {'GCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1}, 'FI': {'malfunction': 1, 'fault injection': 1}, 'other': {'JIL': 1}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS186': 9, 'FIPS 180-4': 3, 'FIPS197': 9, 'FIPS186-4': 2, 'FIPS46': 1, 'FIPS PUB 46-3': 1, 'FIPS180': 2, 'FIPS PUB 180-4': 1, 'FIPS180-4': 1, 'FIPS PUB 186-4': 1}, 'NIST': {'SP 800-108': 1}, 'BSI': {'AIS 34': 1, 'AIS 1': 1, 'AIS14': 1, 'AIS19': 1, 'AIS20': 1, 'AIS25': 1, 'AIS26': 1, 'AIS31': 1, 'AIS32': 1, 'AIS34': 1, 'AIS35': 1, 'AIS36': 1, 'AIS37': 1, 'AIS38': 1, 'AIS46': 1, 'AIS47': 1, 'AIS 36': 1, 'AIS 28': 1}, 'RFC': {'RFC 5639': 9, 'RFC8017': 4, 'RFC5639': 4, 'RFC2104': 2, 'RFC 2104': 1, 'RFC 8017': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2, 'ISO/IEC 10116:2017': 1}, 'ICAO': {'ICAO': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Update im Feld unter TCOS CSP Module 1.0 R1, T-Systems International GmbH, Version 0.2, 11.10.2019 (confidential document) [RNG] Zufallszahlengenerierung in TCOS,Version 1.01, 21.02.2019 (confidential document) [HWST] NXP': 1, 'Report (ETR) - TCOS CSP Module Version 1.0 Release 1/P6022y”, SRC Security Research & Consulting, (confidential document) [8] Protection Profile (PP-0104) and Protection Profile-Module (PP-0107): Cryptographic Service': 1, 'CSP Module Version 1.0 Release 1/NXP P60D145 VB”, 24.03.2020, v1.0.1, T-Systems International GmbH (confidential document) [11] “TCOS Cryptographic Service Provider Version 2.0 Release 1/P6022yTCOS Cryptographic Service': 1, '0 Release 1/P6022y User guidance manual”, Version 1.0.4, 24.03.2020, T-Systems International GmbH (confidential document) [12] “TCOS CSP Module Personalization Guidance”, Version 1.4, 04.03.2020, T- Systems International': 1, 'confidential document) [13] “Update im Feld unter TCOS CSP Module 1.0 R1”, T-Systems International GmbH, Version 0.2, 11': 1, '2019 (confidential document) 7 See secton 9.1 for list of used AIS 28 / 31 BSI-DSZ-CC-1118-2020 Certification Report C': 1}}}.
    • The report_filename property was set to 1118a_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-1118-2020.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-2018']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-2018']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1121-V2-2021']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1121-V2-2021']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016', 'BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-1059-V2-2019', 'BSI-DSZ-CC-1059-2018']}} data.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/1118a_pdf.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/1118a_pdf.pdf, code: 408'].
    • The report_pdf_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 33577e27adbf3806e359f7add39a179eb479f75fb9d4658c397b6ce880fd4f26.
    • The st_txt_hash property was set to 582d73cb8c17211a156f6e17039b72b7a7a532cd7ff246a3a44bac4b9905594a.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1352317, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 102, '/Title': 'TCOS CSP Module 1.0 Release 1/P6022y', '/Author': 'T-Systems International GmbH', '/Subject': 'TCOS Cryptographic Service Provider', '/Keywords': 'Crypto Service Provider, TCOS, Electronic Cash Register, TSE', '/Creator': 'Microsoft® Word fĂĽr Office 365', '/CreationDate': "D:20200228103153+01'00'", '/ModDate': "D:20200228103153+01'00'", '/Producer': 'Microsoft® Word fĂĽr Office 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz', 'http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1059-2018': 2, 'BSI-DSZ-CC-1059-V2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0104-2019': 1, 'BSI-CC-PP-0107-2019': 2, 'BSI-CC-PP0035': 1, 'BSI-CC-PP0104': 1, 'BSI-CC-PP-0104-': 1}}, 'cc_security_level': {'EAL': {'EAL4': 8, 'EAL 6+': 1, 'EAL 4': 1, 'EAL 6': 1, 'EAL4 augmented': 2, 'EAL 4 augmented': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 4, 'ADV_FSP.4': 2, 'ADV_TDS.3': 2, 'ADV_IMP.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 8, 'ALC_FLR.1': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.1': 1, 'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 8}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 2, 'FAU_GEN.1': 7, 'FAU_STG.1': 5, 'FAU_STG.3': 5, 'FAU_STG.3.1': 4, 'FAU_GEN.1.1': 4, 'FAU_GEN.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_SAS.1': 1}, 'FCS': {'FCS_RNG': 6, 'FCS_CKM.5': 16, 'FCS_COP': 135, 'FCS_RNG.1': 13, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 85, 'FCS_CKM.1': 30, 'FCS_CKM.2': 14, 'FCS_COP.1': 38, 'FCS_CKM.4': 28, 'FCS_CKM.5.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_SDC': 3, 'FDP_DAU': 18, 'FDP_UCT': 1, 'FDP_ACC.1': 29, 'FDP_IFC.1': 19, 'FDP_UIT': 1, 'FDP_ITC': 19, 'FDP_ETC': 4, 'FDP_SDC.1': 11, 'FDP_SDI': 1, 'FDP_SDC.1.1': 3, 'FDP_ACC': 13, 'FDP_ACF': 11, 'FDP_ACF.1': 19, 'FDP_ITC.1': 21, 'FDP_ITC.2': 31, 'FDP_DAU.1': 3, 'FDP_DAU.2': 6, 'FDP_ETC.2': 8, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_ETC.1': 4, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_RIP': 4, 'FDP_RIP.1': 1, 'FDP_SDI.2': 2, 'FDP_ITT.1': 1}, 'FIA': {'FIA_API': 14, 'FIA_UID.1': 11, 'FIA_UAU.1': 6, 'FIA_API.1': 7, 'FIA_API.1.1': 1, 'FIA_UAU.5.1': 11, 'FIA_UAU.5': 5, 'FIA_ATD.1': 4, 'FIA_ATD.1.1': 1, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_USB.1': 3, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 4, 'FIA_UAU.6.1': 1}, 'FMT': {'FMT_MTD.1': 17, 'FMT_MTD.3': 13, 'FMT_MSA.1': 9, 'FMT_MSA.4': 5, 'FMT_MTD': 21, 'FMT_MOF': 5, 'FMT_SMF': 4, 'FMT_SMR': 4, 'FMT_MSA': 10, 'FMT_SMR.1': 17, 'FMT_SMF.1': 11, 'FMT_MSA.3': 6, 'FMT_MOF.1.1': 7, 'FMT_SAE.1': 6, 'FMT_MTD.3.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1': 7, 'FMT_MSA.2': 5, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.2.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPT': {'FPT_TCT': 10, 'FPT_TIT': 15, 'FPT_ISA': 12, 'FPT_ESA': 8, 'FPT_SDC': 1, 'FPT_TCT.1': 5, 'FPT_TCT.1.1': 1, 'FPT_TIT.1': 10, 'FPT_TIT.1.1': 2, 'FPT_TIT.1.2': 1, 'FPT_ISA.1': 14, 'FPT_TDC.1': 16, 'FPT_ISA.1.1': 1, 'FPT_ISA.1.2': 1, 'FPT_ISA.1.3': 1, 'FPT_ISA.1.4': 1, 'FPT_ISA.1.5': 1, 'FPT_ESA.1': 9, 'FPT_ESA.1.1': 1, 'FPT_ESA.1.2': 1, 'FPT_ESA.1.3': 1, 'FPT_ESA.1.4': 1, 'FPT_STM.1': 11, 'FPT_TDC': 9, 'FPT_TST.1': 5, 'FPT_STM.1.1': 4, 'FPT_FLS.1': 9, 'FPT_TST.1.2': 2, 'FPT_TST.1.3': 2, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 5, 'FPT_TST.1.1': 1, 'FPT_TST': 2, 'FPT_PHP.3.1': 1, 'FPT_EMS.1': 1, 'FPT_FLS': 1, 'FPT_PHP': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT.1': 1, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 16, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.RBGS': 6, 'O.TST': 6, 'O.PUF': 1, 'O.RND': 1, 'O.AES': 1, 'O.CUST_RECONF_PLAIN': 1, 'O.EEPROM_INTEGRITY': 1, 'O.FM_FW': 1, 'O.MEM_ACCESS': 1, 'O.SFR_ACCESS': 1, 'O.TDES': 1}, 'OE': {'OE.SUCP': 3}, 'OSP': {'OSP.TC': 3}}, 'vendor': {'NXP': {'NXP': 3, 'NXP Semiconductors': 1}, 'STMicroelectronics': {'STM': 1}}, 'eval_facility': {'TSystems': {'T-Systems International': 107}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 24, 'AES-128': 9, 'AES-256': 11, 'AES-': 2}}, 'DES': {'3DES': {'Triple-DES': 1, 'TDES': 4, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 8, 'CMAC': 13}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 3}, 'ECC': {'ECC': 14}}, 'FF': {'DH': {'Diffie-Hellman': 4, 'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-256': 4, 'SHA-384': 2, 'SHA384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 46}, 'KEX': {'Key Exchange': 1}, 'KA': {'Key agreement': 5, 'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 14}, 'IKE': {'IKE': 1, 'IKEv2': 2}}, 'randomness': {'RNG': {'RNG': 10, 'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 8}, 'CFB': {'CFB': 1}, 'OFB': {'OFB': 2}, 'GCM': {'GCM': 5}, 'CCM': {'CCM': 4}}, 'ecc_curve': {'NIST': {'Curve P-192': 1, 'Curve P-256': 1, 'Curve P-384': 1, 'Curve P-521': 1, 'P-192': 1, 'P-256': 1, 'P-384': 1, 'P-521': 1}, 'Brainpool': {'brainpoolP192r1': 1, 'brainpoolP224r1': 1, 'brainpoolP256r1': 4, 'brainpoolP320r1': 1, 'brainpoolP384r1': 2, 'brainpoolP512r1': 2, 'brainpoolP192t1': 1, 'brainpoolP224t1': 1, 'brainpoolP256t1': 1, 'brainpoolP320t1': 1, 'brainpoolP384t1': 1, 'brainpoolP512t1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'physical probing': 5, 'side channels': 1}, 'FI': {'physical tampering': 1, 'malfunction': 2, 'Malfunction': 1}, 'other': {'JIL': 8}}, 'technical_report_id': {'BSI': {'BSI TR-03151': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 4, 'FIPS186': 4, 'FIPS 180-4': 1, 'FIPS180': 2, 'FIPS197': 11, 'FIPS PUB 180-4': 1}, 'NIST': {'NIST SP 800-108': 2}, 'PKCS': {'PKCS #1': 4, 'PKCS#1': 2}, 'BSI': {'AIS36': 2, 'AIS31': 4, 'AIS 31': 1, 'AIS 36': 1}, 'RFC': {'RFC5639': 13, 'RFC5903': 3, 'RFC6954': 4, 'RFC8017': 5, 'RFC2104': 2, 'RFC 2104': 1, 'RFC 5639': 1, 'RFC 5903': 1, 'RFC 6954': 1, 'RFC 8017': 1}, 'ISO': {'ISO/IEC 19790': 6, 'ISO/IEC 10116:2017': 1}, 'ICAO': {'ICAO': 1}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2012-09-004': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 1118b_pdf.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-2018']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-2018']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1118b_pdf.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The report_pdf_hash property was set to 50e91985d5e93a030ffb340fe91c72781eac7378372afc930122cf5be4fc4491.
    • The report_txt_hash property was set to 7fadb5ab9d450a488d564f4107fd1b641888560e6ae7eb07394414f9efe13ee1.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1420347, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 31, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/CreationDate': "D:20200409135722+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP"', '/ModDate': "D:20200409141001+02'00'", '/Producer': 'LibreOffice 6.2', '/Subject': 'TCOS CSP Module Version 1.0 Release 1/P6022y', '/Title': 'Certification Report BSI-DSZ-CC-1118-2020', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.sogis.eu/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/AIS']}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1118-2020', 'cert_item': 'TCOS CSP Module Version 1.0 Release 1/P6022y', 'developer': 'T-Systems International GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Cryptographic Service Provider (CSP) Version 0.9.8, 19 February 2019, BSI-CC-PP-0104-2019, Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit (PPC-CSP-TS-Au) Version 0.9.5, 8 April 2019, BSI- CC-PP-0107-2019', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant / extended EAL 4 augmented by ALC_DVS.2 and AVA_VAN.5 SOGIS Recognition Agreement'}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1118-2020': 34, 'BSI-DSZ-CC-1059-V2-2019': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0104-2019': 3, 'BSI-CC-PP-0107-2019': 2, 'BSI-CC-PP-0107-': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 5, 'EAL 5': 1, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL5+': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC': 1}, 'ALC': {'ALC_DVS.2': 5, 'ALC_FLR': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'AVA': {'AVA_VAN.5': 4}}, 'cc_sfr': {'FCS': {'FCS_COP': 18, 'FCS_CKM': 24}, 'FIA': {'FIA_API': 3}}, 'cc_claims': {'OE': {'OE.SUCP': 1}}, 'vendor': {'NXP': {'NXP': 4, 'NXP Semiconductors': 1}}, 'eval_facility': {'SRC': {'SRC Security Research & Consulting': 3}, 'TSystems': {'T-Systems International': 13}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 12, 'AES-128': 6, 'AES-': 4, 'AES-256': 4}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-512': 1, 'SHA-256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 5}, 'KA': {'Key agreement': 1, 'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 4}}, 'randomness': {'RNG': {'RNG': 3}}, 'cipher_mode': {'CBC': {'CBC': 2}, 'OFB': {'OFB': 1}, 'GCM': {'GCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1}, 'FI': {'malfunction': 1, 'fault injection': 1}, 'other': {'JIL': 1}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS186': 9, 'FIPS 180-4': 3, 'FIPS197': 9, 'FIPS186-4': 2, 'FIPS46': 1, 'FIPS PUB 46-3': 1, 'FIPS180': 2, 'FIPS PUB 180-4': 1, 'FIPS180-4': 1, 'FIPS PUB 186-4': 1}, 'NIST': {'SP 800-108': 1}, 'BSI': {'AIS 34': 1, 'AIS 1': 1, 'AIS14': 1, 'AIS19': 1, 'AIS20': 1, 'AIS25': 1, 'AIS26': 1, 'AIS31': 1, 'AIS32': 1, 'AIS34': 1, 'AIS35': 1, 'AIS36': 1, 'AIS37': 1, 'AIS38': 1, 'AIS46': 1, 'AIS47': 1, 'AIS 36': 1, 'AIS 28': 1}, 'RFC': {'RFC 5639': 9, 'RFC8017': 4, 'RFC5639': 4, 'RFC2104': 2, 'RFC 2104': 1, 'RFC 8017': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2, 'ISO/IEC 10116:2017': 1}, 'ICAO': {'ICAO': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Update im Feld unter TCOS CSP Module 1.0 R1, T-Systems International GmbH, Version 0.2, 11.10.2019 (confidential document) [RNG] Zufallszahlengenerierung in TCOS,Version 1.01, 21.02.2019 (confidential document) [HWST] NXP': 1, 'Report (ETR) - TCOS CSP Module Version 1.0 Release 1/P6022y”, SRC Security Research & Consulting, (confidential document) [8] Protection Profile (PP-0104) and Protection Profile-Module (PP-0107): Cryptographic Service': 1, 'CSP Module Version 1.0 Release 1/NXP P60D145 VB”, 24.03.2020, v1.0.1, T-Systems International GmbH (confidential document) [11] “TCOS Cryptographic Service Provider Version 2.0 Release 1/P6022yTCOS Cryptographic Service': 1, '0 Release 1/P6022y User guidance manual”, Version 1.0.4, 24.03.2020, T-Systems International GmbH (confidential document) [12] “TCOS CSP Module Personalization Guidance”, Version 1.4, 04.03.2020, T- Systems International': 1, 'confidential document) [13] “Update im Feld unter TCOS CSP Module 1.0 R1”, T-Systems International GmbH, Version 0.2, 11': 1, '2019 (confidential document) 7 See secton 9.1 for list of used AIS 28 / 31 BSI-DSZ-CC-1118-2020 Certification Report C': 1}}}.
    • The report_filename property was set to 1118a_pdf.pdf.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-1118-2020.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1121-V2-2021']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1121-V2-2021']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016', 'BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-1059-V2-2019', 'BSI-DSZ-CC-1059-2018']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/1118c_pdf.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.t-systems.de/.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit ...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0107b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Cryptographic Service Provider (CSP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0104b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BSI-PP-0104']}}]}.

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The report_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/1118a_pdf.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/1118a_pdf.pdf, code: 408', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1118b_pdf.pdf, code: nok'].
    • The report_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The st_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'BSI-PP-0107', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'BSI-PP-0104', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 33577e27adbf3806e359f7add39a179eb479f75fb9d4658c397b6ce880fd4f26.
    • The st_txt_hash property was set to 582d73cb8c17211a156f6e17039b72b7a7a532cd7ff246a3a44bac4b9905594a.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1352317, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 102, '/Title': 'TCOS CSP Module 1.0 Release 1/P6022y', '/Author': 'T-Systems International GmbH', '/Subject': 'TCOS Cryptographic Service Provider', '/Keywords': 'Crypto Service Provider, TCOS, Electronic Cash Register, TSE', '/Creator': 'Microsoft® Word fĂĽr Office 365', '/CreationDate': "D:20200228103153+01'00'", '/ModDate': "D:20200228103153+01'00'", '/Producer': 'Microsoft® Word fĂĽr Office 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz', 'http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1059-2018': 2, 'BSI-DSZ-CC-1059-V2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0104-2019': 1, 'BSI-CC-PP-0107-2019': 2, 'BSI-CC-PP0035': 1, 'BSI-CC-PP0104': 1, 'BSI-CC-PP-0104-': 1}}, 'cc_security_level': {'EAL': {'EAL4': 8, 'EAL 6+': 1, 'EAL 4': 1, 'EAL 6': 1, 'EAL4 augmented': 2, 'EAL 4 augmented': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 4, 'ADV_FSP.4': 2, 'ADV_TDS.3': 2, 'ADV_IMP.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 8, 'ALC_FLR.1': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.1': 1, 'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 8}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 2, 'FAU_GEN.1': 7, 'FAU_STG.1': 5, 'FAU_STG.3': 5, 'FAU_STG.3.1': 4, 'FAU_GEN.1.1': 4, 'FAU_GEN.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_SAS.1': 1}, 'FCS': {'FCS_RNG': 6, 'FCS_CKM.5': 16, 'FCS_COP': 135, 'FCS_RNG.1': 13, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 85, 'FCS_CKM.1': 30, 'FCS_CKM.2': 14, 'FCS_COP.1': 38, 'FCS_CKM.4': 28, 'FCS_CKM.5.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_SDC': 3, 'FDP_DAU': 18, 'FDP_UCT': 1, 'FDP_ACC.1': 29, 'FDP_IFC.1': 19, 'FDP_UIT': 1, 'FDP_ITC': 19, 'FDP_ETC': 4, 'FDP_SDC.1': 11, 'FDP_SDI': 1, 'FDP_SDC.1.1': 3, 'FDP_ACC': 13, 'FDP_ACF': 11, 'FDP_ACF.1': 19, 'FDP_ITC.1': 21, 'FDP_ITC.2': 31, 'FDP_DAU.1': 3, 'FDP_DAU.2': 6, 'FDP_ETC.2': 8, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_ETC.1': 4, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_RIP': 4, 'FDP_RIP.1': 1, 'FDP_SDI.2': 2, 'FDP_ITT.1': 1}, 'FIA': {'FIA_API': 14, 'FIA_UID.1': 11, 'FIA_UAU.1': 6, 'FIA_API.1': 7, 'FIA_API.1.1': 1, 'FIA_UAU.5.1': 11, 'FIA_UAU.5': 5, 'FIA_ATD.1': 4, 'FIA_ATD.1.1': 1, 'FIA_AFL.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_USB.1': 3, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 4, 'FIA_UAU.6.1': 1}, 'FMT': {'FMT_MTD.1': 17, 'FMT_MTD.3': 13, 'FMT_MSA.1': 9, 'FMT_MSA.4': 5, 'FMT_MTD': 21, 'FMT_MOF': 5, 'FMT_SMF': 4, 'FMT_SMR': 4, 'FMT_MSA': 10, 'FMT_SMR.1': 17, 'FMT_SMF.1': 11, 'FMT_MSA.3': 6, 'FMT_MOF.1.1': 7, 'FMT_SAE.1': 6, 'FMT_MTD.3.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1': 7, 'FMT_MSA.2': 5, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.2.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPT': {'FPT_TCT': 10, 'FPT_TIT': 15, 'FPT_ISA': 12, 'FPT_ESA': 8, 'FPT_SDC': 1, 'FPT_TCT.1': 5, 'FPT_TCT.1.1': 1, 'FPT_TIT.1': 10, 'FPT_TIT.1.1': 2, 'FPT_TIT.1.2': 1, 'FPT_ISA.1': 14, 'FPT_TDC.1': 16, 'FPT_ISA.1.1': 1, 'FPT_ISA.1.2': 1, 'FPT_ISA.1.3': 1, 'FPT_ISA.1.4': 1, 'FPT_ISA.1.5': 1, 'FPT_ESA.1': 9, 'FPT_ESA.1.1': 1, 'FPT_ESA.1.2': 1, 'FPT_ESA.1.3': 1, 'FPT_ESA.1.4': 1, 'FPT_STM.1': 11, 'FPT_TDC': 9, 'FPT_TST.1': 5, 'FPT_STM.1.1': 4, 'FPT_FLS.1': 9, 'FPT_TST.1.2': 2, 'FPT_TST.1.3': 2, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 5, 'FPT_TST.1.1': 1, 'FPT_TST': 2, 'FPT_PHP.3.1': 1, 'FPT_EMS.1': 1, 'FPT_FLS': 1, 'FPT_PHP': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT.1': 1, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 16, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.RBGS': 6, 'O.TST': 6, 'O.PUF': 1, 'O.RND': 1, 'O.AES': 1, 'O.CUST_RECONF_PLAIN': 1, 'O.EEPROM_INTEGRITY': 1, 'O.FM_FW': 1, 'O.MEM_ACCESS': 1, 'O.SFR_ACCESS': 1, 'O.TDES': 1}, 'OE': {'OE.SUCP': 3}, 'OSP': {'OSP.TC': 3}}, 'vendor': {'NXP': {'NXP': 3, 'NXP Semiconductors': 1}, 'STMicroelectronics': {'STM': 1}}, 'eval_facility': {'TSystems': {'T-Systems International': 107}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 24, 'AES-128': 9, 'AES-256': 11, 'AES-': 2}}, 'DES': {'3DES': {'Triple-DES': 1, 'TDES': 4, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 8, 'CMAC': 13}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 3}, 'ECC': {'ECC': 14}}, 'FF': {'DH': {'Diffie-Hellman': 4, 'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-256': 4, 'SHA-384': 2, 'SHA384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 46}, 'KEX': {'Key Exchange': 1}, 'KA': {'Key agreement': 5, 'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 14}, 'IKE': {'IKE': 1, 'IKEv2': 2}}, 'randomness': {'RNG': {'RNG': 10, 'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 8}, 'CFB': {'CFB': 1}, 'OFB': {'OFB': 2}, 'GCM': {'GCM': 5}, 'CCM': {'CCM': 4}}, 'ecc_curve': {'NIST': {'Curve P-192': 1, 'Curve P-256': 1, 'Curve P-384': 1, 'Curve P-521': 1, 'P-192': 1, 'P-256': 1, 'P-384': 1, 'P-521': 1}, 'Brainpool': {'brainpoolP192r1': 1, 'brainpoolP224r1': 1, 'brainpoolP256r1': 4, 'brainpoolP320r1': 1, 'brainpoolP384r1': 2, 'brainpoolP512r1': 2, 'brainpoolP192t1': 1, 'brainpoolP224t1': 1, 'brainpoolP256t1': 1, 'brainpoolP320t1': 1, 'brainpoolP384t1': 1, 'brainpoolP512t1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'physical probing': 5, 'side channels': 1}, 'FI': {'physical tampering': 1, 'malfunction': 2, 'Malfunction': 1}, 'other': {'JIL': 8}}, 'technical_report_id': {'BSI': {'BSI TR-03151': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 4, 'FIPS186': 4, 'FIPS 180-4': 1, 'FIPS180': 2, 'FIPS197': 11, 'FIPS PUB 180-4': 1}, 'NIST': {'NIST SP 800-108': 2}, 'PKCS': {'PKCS #1': 4, 'PKCS#1': 2}, 'BSI': {'AIS36': 2, 'AIS31': 4, 'AIS 31': 1, 'AIS 36': 1}, 'RFC': {'RFC5639': 13, 'RFC5903': 3, 'RFC6954': 4, 'RFC8017': 5, 'RFC2104': 2, 'RFC 2104': 1, 'RFC 5639': 1, 'RFC 5903': 1, 'RFC 6954': 1, 'RFC 8017': 1}, 'ISO': {'ISO/IEC 19790': 6, 'ISO/IEC 10116:2017': 1}, 'ICAO': {'ICAO': 1}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2012-09-004': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 1118b_pdf.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-2018']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-2018']}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016', 'BSI-DSZ-CC-0973-2016']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values added.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1118b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values discarded.
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016', 'BSI-DSZ-CC-0973-2016']}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit ...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0107b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Cryptographic Service Provider (CSP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0104b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BSI-PP-0104']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit ...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0107b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Cryptographic Service Provider (CSP)', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0104b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-V2']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-V2']}}} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-V2']}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '1118a_pdf.pdf', 'st_filename': '1118b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1118-2020': 34}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 5}}}}, 'cc_sar': {'__update__': {'AVA': {'__update__': {'AVA_VAN.5': 4}}}}, 'cc_sfr': {'FCS': {'FCS_COP': 18, 'FCS_CKM': 24}, 'FIA': {'FIA_API': 3}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 12}}}}, 'DES': {'__update__': {'DES': {'__delete__': ['DEA']}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECC': {'__update__': {'ECC': 4}}}}}, '__delete__': ['FF']}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__delete__': ['SHA256']}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 5}}, 'KA': {'__delete__': ['KA']}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 4}}}}, 'cipher_mode': {'__delete__': ['CTR']}, 'technical_report_id': {'__update__': {'BSI': {'__insert__': {'BSI TR-02102': 1}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__update__': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'__insert__': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, '0 Release 1/P6022y User guidance manual”, Version 1.0.4, 24.03.2020, T-Systems International GmbH (confidential document) [12] “TCOS CSP Module Personalization Guidance”, Version 1.4, 04.03.2020, T- Systems International': 1, 'confidential document) [13] “Update im Feld unter TCOS CSP Module 1.0 R1”, T-Systems International GmbH, Version 0.2, 11': 1, '2019 (confidential document) 7 See secton 9.1 for list of used AIS 28 / 31 BSI-DSZ-CC-1118-2020 Certification Report C': 1}, '__delete__': ['identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification', '.0 Release 1/P6022y User guidance manual”, Version 1.0.4, 24.03.2020, T-Systems International GmbH (confidential document) [12] “TCOS CSP Module Personalization Guidance”, Version 1.4, 04.03.2020, T- Systems International', 'GmbH (confidential document) [13] “Update im Feld unter TCOS CSP Module 1.0 R1”, T-Systems International GmbH, Version 0.2', '11.10.2019 (confidential document) 7 See secton 9.1 for list of used AIS 28 / 31 BSI-DSZ-CC-1118-2020 Certification Report C']}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL 6+': 1}}}}, 'cc_sar': {'__insert__': {'ASE': {'ASE_TSS.2': 1}}, '__update__': {'ADV': {'__update__': {'ADV_ARC.1': 4}}, 'ATE': {'__insert__': {'ATE_DPT.1': 1}}, 'AVA': {'__update__': {'AVA_VAN.5': 8}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_SAS.1': 1}, '__update__': {'FAU_GEN': 2, 'FAU_GEN.1': 7, 'FAU_GEN.1.1': 4}}, 'FCS': {'__insert__': {'FCS_COP': 135}, '__update__': {'FCS_CKM.5': 16, 'FCS_RNG.1': 13, 'FCS_CKM': 85, 'FCS_CKM.1': 30, 'FCS_COP.1': 38, 'FCS_CKM.4': 28}}, 'FDP': {'__insert__': {'FDP_DAU': 18, 'FDP_ACC': 13, 'FDP_ACF': 11, 'FDP_DAU.2': 6, 'FDP_RIP': 4, 'FDP_RIP.1': 1}, '__update__': {'FDP_ACC.1': 29, 'FDP_ITC': 19, 'FDP_ETC': 4, 'FDP_SDC.1.1': 3, 'FDP_ACF.1': 19, 'FDP_ITC.1': 21, 'FDP_ITC.2': 31, 'FDP_ETC.2': 8, 'FDP_SDI.2': 2}}, 'FIA': {'__update__': {'FIA_API': 14, 'FIA_API.1': 7, 'FIA_UID.1': 11, 'FIA_UAU.1': 6}}, 'FMT': {'__insert__': {'FMT_MTD': 21, 'FMT_MOF': 5, 'FMT_SMF': 4, 'FMT_SMR': 4, 'FMT_MSA': 10, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, '__update__': {'FMT_MTD.1': 17, 'FMT_MTD.3': 13, 'FMT_MSA.1': 9, 'FMT_SMR.1': 17, 'FMT_SMF.1': 11, 'FMT_SAE.1': 6, 'FMT_MSA.3': 6, 'FMT_MOF.1': 7}}, 'FPT': {'__insert__': {'FPT_TDC': 9}, '__update__': {'FPT_TCT': 10, 'FPT_TIT': 15, 'FPT_ISA': 12, 'FPT_ESA': 8, 'FPT_TCT.1': 5, 'FPT_TIT.1': 10, 'FPT_TIT.1.1': 2, 'FPT_ISA.1': 14, 'FPT_TDC.1': 16, 'FPT_ESA.1': 9, 'FPT_STM.1': 11, 'FPT_TST.1.3': 2, 'FPT_TST': 2}}, 'FTP': {'__update__': {'FTP_ITC.1': 16}}}}, 'cc_claims': {'__delete__': ['D']}, 'vendor': {'__update__': {'STMicroelectronics': {'__update__': {'STM': 1}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 24}}}}, 'DES': {'__delete__': ['DES']}, 'constructions': {'__update__': {'MAC': {'__update__': {'HMAC': 8}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDSA': {'__update__': {'ECDSA': 3}}, 'ECC': {'__update__': {'ECC': 14}}}, '__delete__': ['ECDH']}, 'FF': {'__update__': {'DH': {'__delete__': ['DHE']}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 1}}, 'SHA2': {'__delete__': ['SHA256']}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 46}}, 'KA': {'__delete__': ['KA']}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 14}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 10}}}, '__delete__': ['TRNG']}, 'cipher_mode': {'__delete__': ['CTR']}, 'tee_name': {'__update__': {'IBM': {'__update__': {'SE': 3}}}}} data.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}]} values added.
  • 02.09.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 33577e27adbf3806e359f7add39a179eb479f75fb9d4658c397b6ce880fd4f26.
    • The st_txt_hash property was set to 582d73cb8c17211a156f6e17039b72b7a7a532cd7ff246a3a44bac4b9905594a.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1352317, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 102, '/Title': 'TCOS CSP Module 1.0 Release 1/P6022y', '/Author': 'T-Systems International GmbH', '/Subject': 'TCOS Cryptographic Service Provider', '/Keywords': 'Crypto Service Provider, TCOS, Electronic Cash Register, TSE', '/Creator': 'Microsoft® Word fĂĽr Office 365', '/CreationDate': "D:20200228103153+01'00'", '/ModDate': "D:20200228103153+01'00'", '/Producer': 'Microsoft® Word fĂĽr Office 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz', 'http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1059-2018': 2, 'BSI-DSZ-CC-1059-V2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0104-2019': 1, 'BSI-CC-PP-0107-2019': 2, 'BSI-CC-PP0035': 1, 'BSI-CC-PP0104': 1, 'BSI-CC-PP-0104-': 1}}, 'cc_security_level': {'EAL': {'EAL4': 8, 'EAL 4': 1, 'EAL 6': 1, 'EAL4 augmented': 2, 'EAL 4 augmented': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.4': 2, 'ADV_TDS.3': 2, 'ADV_IMP.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 8, 'ALC_FLR.1': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 5}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 6, 'FAU_STG.1': 5, 'FAU_STG.3': 5, 'FAU_STG.3.1': 4, 'FAU_GEN.1.1': 3, 'FAU_GEN.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_RNG': 6, 'FCS_CKM.5': 9, 'FCS_RNG.1': 12, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 1, 'FCS_CKM.1': 22, 'FCS_CKM.2': 14, 'FCS_COP.1': 16, 'FCS_CKM.4': 25, 'FCS_CKM.5.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_SDC': 3, 'FDP_UCT': 1, 'FDP_ACC.1': 26, 'FDP_IFC.1': 19, 'FDP_UIT': 1, 'FDP_ITC': 1, 'FDP_ETC': 1, 'FDP_SDC.1': 11, 'FDP_SDI': 1, 'FDP_SDC.1.1': 2, 'FDP_ACF.1': 6, 'FDP_ITC.1': 19, 'FDP_ITC.2': 18, 'FDP_DAU.1': 3, 'FDP_ETC.2': 4, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_ETC.1': 4, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_SDI.2': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_API': 5, 'FIA_API.1': 4, 'FIA_API.1.1': 1, 'FIA_UAU.5.1': 11, 'FIA_UID.1': 9, 'FIA_UAU.5': 5, 'FIA_ATD.1': 4, 'FIA_ATD.1.1': 1, 'FIA_AFL.1': 5, 'FIA_UAU.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_USB.1': 3, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 4, 'FIA_UAU.6.1': 1}, 'FMT': {'FMT_MTD.1': 12, 'FMT_MTD.3': 16, 'FMT_MSA.1': 8, 'FMT_MSA.4': 5, 'FMT_SMR.1': 15, 'FMT_SMF.1': 10, 'FMT_MOF.1.1': 7, 'FMT_SAE.1': 5, 'FMT_MTD.3.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_MSA.3': 4, 'FMT_SMF.1.1': 1, 'FMT_MOF.1': 5, 'FMT_MSA.2': 5, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.2.1': 1}, 'FPT': {'FPT_TCT': 5, 'FPT_TIT': 3, 'FPT_ISA': 4, 'FPT_ESA': 4, 'FPT_SDC': 1, 'FPT_TCT.1': 4, 'FPT_TCT.1.1': 1, 'FPT_TIT.1': 4, 'FPT_TIT.1.1': 1, 'FPT_TIT.1.2': 1, 'FPT_ISA.1': 4, 'FPT_TDC.1': 10, 'FPT_ISA.1.1': 1, 'FPT_ISA.1.2': 1, 'FPT_ISA.1.3': 1, 'FPT_ISA.1.4': 1, 'FPT_ISA.1.5': 1, 'FPT_ESA.1': 4, 'FPT_ESA.1.1': 1, 'FPT_ESA.1.2': 1, 'FPT_ESA.1.3': 1, 'FPT_ESA.1.4': 1, 'FPT_STM.1': 10, 'FPT_TST.1': 5, 'FPT_STM.1.1': 4, 'FPT_FLS.1': 9, 'FPT_TST.1.2': 2, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 5, 'FPT_TST.1.1': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3.1': 1, 'FPT_EMS.1': 1, 'FPT_FLS': 1, 'FPT_PHP': 1, 'FPT_TST': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT.1': 1, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 15, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 3}}, 'cc_claims': {'D': {'D.TCOS.ASE': 1}, 'O': {'O.RBGS': 6, 'O.TST': 6, 'O.PUF': 1, 'O.RND': 1, 'O.AES': 1, 'O.CUST_RECONF_PLAIN': 1, 'O.EEPROM_INTEGRITY': 1, 'O.FM_FW': 1, 'O.MEM_ACCESS': 1, 'O.SFR_ACCESS': 1, 'O.TDES': 1}, 'OE': {'OE.SUCP': 3}, 'OSP': {'OSP.TC': 3}}, 'vendor': {'NXP': {'NXP': 3, 'NXP Semiconductors': 1}, 'STMicroelectronics': {'STM': 16}}, 'eval_facility': {'TSystems': {'T-Systems International': 107}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 33, 'AES-128': 9, 'AES-256': 11, 'AES-': 2}}, 'DES': {'DES': {'DES': 5, 'DEA': 1}, '3DES': {'Triple-DES': 1, 'TDES': 4, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 15, 'CMAC': 13}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDHE': 6}, 'ECDSA': {'ECDSA': 19}, 'ECC': {'ECC': 27}}, 'FF': {'DH': {'Diffie-Hellman': 4, 'DHE': 6, 'DH': 2}, 'DSA': {'DSA': 21}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}, 'SHA2': {'SHA-256': 4, 'SHA-384': 2, 'SHA256': 1, 'SHA384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 80}, 'KEX': {'Key Exchange': 1}, 'KA': {'KA': 26, 'Key agreement': 5, 'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 26}, 'IKE': {'IKE': 1, 'IKEv2': 2}}, 'randomness': {'TRNG': {'TRNG': 2}, 'RNG': {'RNG': 16, 'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 8}, 'CTR': {'CTR': 20}, 'CFB': {'CFB': 1}, 'OFB': {'OFB': 2}, 'GCM': {'GCM': 5}, 'CCM': {'CCM': 4}}, 'ecc_curve': {'NIST': {'Curve P-192': 1, 'Curve P-256': 1, 'Curve P-384': 1, 'Curve P-521': 1, 'P-192': 1, 'P-256': 1, 'P-384': 1, 'P-521': 1}, 'Brainpool': {'brainpoolP192r1': 1, 'brainpoolP224r1': 1, 'brainpoolP256r1': 4, 'brainpoolP320r1': 1, 'brainpoolP384r1': 2, 'brainpoolP512r1': 2, 'brainpoolP192t1': 1, 'brainpoolP224t1': 1, 'brainpoolP256t1': 1, 'brainpoolP320t1': 1, 'brainpoolP384t1': 1, 'brainpoolP512t1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'physical probing': 5, 'side channels': 1}, 'FI': {'physical tampering': 1, 'malfunction': 2, 'Malfunction': 1}, 'other': {'JIL': 8}}, 'technical_report_id': {'BSI': {'BSI TR-03151': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 5}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 4, 'FIPS186': 4, 'FIPS 180-4': 1, 'FIPS180': 2, 'FIPS197': 11, 'FIPS PUB 180-4': 1}, 'NIST': {'NIST SP 800-108': 2}, 'PKCS': {'PKCS #1': 4, 'PKCS#1': 2}, 'BSI': {'AIS36': 2, 'AIS31': 4, 'AIS 31': 1, 'AIS 36': 1}, 'RFC': {'RFC5639': 13, 'RFC5903': 3, 'RFC6954': 4, 'RFC8017': 5, 'RFC2104': 2, 'RFC 2104': 1, 'RFC 5639': 1, 'RFC 5903': 1, 'RFC 6954': 1, 'RFC 8017': 1}, 'ISO': {'ISO/IEC 19790': 6, 'ISO/IEC 10116:2017': 1}, 'ICAO': {'ICAO': 1}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2012-09-004': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-2018', 'BSI-DSZ-CC-1059-V2']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-2018', 'BSI-DSZ-CC-1059-V2']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values added.
  • 01.09.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1118a_pdf.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values discarded.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Cryptographic Service Provider (CSP)', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0104b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BSI-PP-0104']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile Configuration Cryptographic Service Provider – Time Stamp Service and Audit ...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0107b_pdf.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.sogis.eu/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/AIS']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz', 'http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1118-2020': 64, 'BSI-DSZ-CC-1059-V2-2019': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0104-2019': 3, 'BSI-CC-PP-0107-2019': 2, 'BSI-CC-PP-0107-': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 4, 'EAL 5': 1, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL5+': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC': 1}, 'ALC': {'ALC_DVS.2': 5, 'ALC_FLR': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'AVA': {'AVA_VAN.5': 3}}, 'cc_sfr': {}, 'cc_claims': {'OE': {'OE.SUCP': 1}}, 'vendor': {'NXP': {'NXP': 4, 'NXP Semiconductors': 1}}, 'eval_facility': {'SRC': {'SRC Security Research & Consulting': 3}, 'TSystems': {'T-Systems International': 13}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 15, 'AES-128': 6, 'AES-': 4, 'AES-256': 4}}, 'DES': {'DES': {'DES': 1, 'DEA': 1}, '3DES': {'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 6}}, 'FF': {'DSA': {'DSA': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-512': 1, 'SHA-256': 1, 'SHA256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 13}, 'KA': {'KA': 8, 'Key agreement': 1, 'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 5}}, 'randomness': {'RNG': {'RNG': 3}}, 'cipher_mode': {'CBC': {'CBC': 2}, 'CTR': {'CTR': 8}, 'OFB': {'OFB': 1}, 'GCM': {'GCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1}, 'FI': {'malfunction': 1, 'fault injection': 1}, 'other': {'JIL': 1}}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS186': 9, 'FIPS 180-4': 3, 'FIPS197': 9, 'FIPS186-4': 2, 'FIPS46': 1, 'FIPS PUB 46-3': 1, 'FIPS180': 2, 'FIPS PUB 180-4': 1, 'FIPS180-4': 1, 'FIPS PUB 186-4': 1}, 'NIST': {'SP 800-108': 1}, 'BSI': {'AIS 34': 1, 'AIS 1': 1, 'AIS14': 1, 'AIS19': 1, 'AIS20': 1, 'AIS25': 1, 'AIS26': 1, 'AIS31': 1, 'AIS32': 1, 'AIS34': 1, 'AIS35': 1, 'AIS36': 1, 'AIS37': 1, 'AIS38': 1, 'AIS46': 1, 'AIS47': 1, 'AIS 36': 1, 'AIS 28': 1}, 'RFC': {'RFC 5639': 9, 'RFC8017': 4, 'RFC5639': 4, 'RFC2104': 2, 'RFC 2104': 1, 'RFC 8017': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2, 'ISO/IEC 18045': 2, 'ISO/IEC 10116:2017': 1}, 'ICAO': {'ICAO': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Update im Feld unter TCOS CSP Module 1.0 R1, T-Systems International GmbH, Version 0.2, 11.10.2019 (confidential document) [RNG] Zufallszahlengenerierung in TCOS,Version 1.01, 21.02.2019 (confidential document) [HWST] NXP': 1, 'Report (ETR) - TCOS CSP Module Version 1.0 Release 1/P6022y”, SRC Security Research & Consulting, (confidential document) [8] Protection Profile (PP-0104) and Protection Profile-Module (PP-0107): Cryptographic Service': 1, 'CSP Module Version 1.0 Release 1/NXP P60D145 VB”, 24.03.2020, v1.0.1, T-Systems International GmbH (confidential document) [11] “TCOS Cryptographic Service Provider Version 2.0 Release 1/P6022yTCOS Cryptographic Service': 1, '.0 Release 1/P6022y User guidance manual”, Version 1.0.4, 24.03.2020, T-Systems International GmbH (confidential document) [12] “TCOS CSP Module Personalization Guidance”, Version 1.4, 04.03.2020, T- Systems International': 1, 'GmbH (confidential document) [13] “Update im Feld unter TCOS CSP Module 1.0 R1”, T-Systems International GmbH, Version 0.2': 1, '11.10.2019 (confidential document) 7 See secton 9.1 for list of used AIS 28 / 31 BSI-DSZ-CC-1118-2020 Certification Report C': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1059-2018': 2, 'BSI-DSZ-CC-1059-V2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0104-2019': 1, 'BSI-CC-PP-0107-2019': 2, 'BSI-CC-PP0035': 1, 'BSI-CC-PP0104': 1, 'BSI-CC-PP-0104-': 1}}, 'cc_security_level': {'EAL': {'EAL4': 8, 'EAL 4': 1, 'EAL 6': 1, 'EAL4 augmented': 2, 'EAL 4 augmented': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.4': 2, 'ADV_TDS.3': 2, 'ADV_IMP.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 8, 'ALC_FLR.1': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.5': 5}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 6, 'FAU_STG.1': 5, 'FAU_STG.3': 5, 'FAU_STG.3.1': 4, 'FAU_GEN.1.1': 3, 'FAU_GEN.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_RNG': 6, 'FCS_CKM.5': 9, 'FCS_RNG.1': 12, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 1, 'FCS_CKM.1': 22, 'FCS_CKM.2': 14, 'FCS_COP.1': 16, 'FCS_CKM.4': 25, 'FCS_CKM.5.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_SDC': 3, 'FDP_UCT': 1, 'FDP_ACC.1': 26, 'FDP_IFC.1': 19, 'FDP_UIT': 1, 'FDP_ITC': 1, 'FDP_ETC': 1, 'FDP_SDC.1': 11, 'FDP_SDI': 1, 'FDP_SDC.1.1': 2, 'FDP_ACF.1': 6, 'FDP_ITC.1': 19, 'FDP_ITC.2': 18, 'FDP_DAU.1': 3, 'FDP_ETC.2': 4, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_ETC.1': 4, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_SDI.2': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_API': 5, 'FIA_API.1': 4, 'FIA_API.1.1': 1, 'FIA_UAU.5.1': 11, 'FIA_UID.1': 9, 'FIA_UAU.5': 5, 'FIA_ATD.1': 4, 'FIA_ATD.1.1': 1, 'FIA_AFL.1': 5, 'FIA_UAU.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_USB.1': 3, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 4, 'FIA_UAU.6.1': 1}, 'FMT': {'FMT_MTD.1': 12, 'FMT_MTD.3': 16, 'FMT_MSA.1': 8, 'FMT_MSA.4': 5, 'FMT_SMR.1': 15, 'FMT_SMF.1': 10, 'FMT_MOF.1.1': 7, 'FMT_SAE.1': 5, 'FMT_MTD.3.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_MSA.3': 4, 'FMT_SMF.1.1': 1, 'FMT_MOF.1': 5, 'FMT_MSA.2': 5, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.2.1': 1}, 'FPT': {'FPT_TCT': 5, 'FPT_TIT': 3, 'FPT_ISA': 4, 'FPT_ESA': 4, 'FPT_SDC': 1, 'FPT_TCT.1': 4, 'FPT_TCT.1.1': 1, 'FPT_TIT.1': 4, 'FPT_TIT.1.1': 1, 'FPT_TIT.1.2': 1, 'FPT_ISA.1': 4, 'FPT_TDC.1': 10, 'FPT_ISA.1.1': 1, 'FPT_ISA.1.2': 1, 'FPT_ISA.1.3': 1, 'FPT_ISA.1.4': 1, 'FPT_ISA.1.5': 1, 'FPT_ESA.1': 4, 'FPT_ESA.1.1': 1, 'FPT_ESA.1.2': 1, 'FPT_ESA.1.3': 1, 'FPT_ESA.1.4': 1, 'FPT_STM.1': 10, 'FPT_TST.1': 5, 'FPT_STM.1.1': 4, 'FPT_FLS.1': 9, 'FPT_TST.1.2': 2, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 5, 'FPT_TST.1.1': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3.1': 1, 'FPT_EMS.1': 1, 'FPT_FLS': 1, 'FPT_PHP': 1, 'FPT_TST': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT.1': 1, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 15, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 3}}, 'cc_claims': {'D': {'D.TCOS.ASE': 1}, 'O': {'O.RBGS': 6, 'O.TST': 6, 'O.PUF': 1, 'O.RND': 1, 'O.AES': 1, 'O.CUST_RECONF_PLAIN': 1, 'O.EEPROM_INTEGRITY': 1, 'O.FM_FW': 1, 'O.MEM_ACCESS': 1, 'O.SFR_ACCESS': 1, 'O.TDES': 1}, 'OE': {'OE.SUCP': 3}, 'OSP': {'OSP.TC': 3}}, 'vendor': {'NXP': {'NXP': 3, 'NXP Semiconductors': 1}, 'STMicroelectronics': {'STM': 16}}, 'eval_facility': {'TSystems': {'T-Systems International': 107}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 33, 'AES-128': 9, 'AES-256': 11, 'AES-': 2}}, 'DES': {'DES': {'DES': 5, 'DEA': 1}, '3DES': {'Triple-DES': 1, 'TDES': 4, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 15, 'CMAC': 13}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDHE': 6}, 'ECDSA': {'ECDSA': 19}, 'ECC': {'ECC': 27}}, 'FF': {'DH': {'Diffie-Hellman': 4, 'DHE': 6, 'DH': 2}, 'DSA': {'DSA': 21}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}, 'SHA2': {'SHA-256': 4, 'SHA-384': 2, 'SHA256': 1, 'SHA384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 80}, 'KEX': {'Key Exchange': 1}, 'KA': {'KA': 26, 'Key agreement': 5, 'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 26}, 'IKE': {'IKE': 1, 'IKEv2': 2}}, 'randomness': {'TRNG': {'TRNG': 2}, 'RNG': {'RNG': 16, 'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 8}, 'CTR': {'CTR': 20}, 'CFB': {'CFB': 1}, 'OFB': {'OFB': 2}, 'GCM': {'GCM': 5}, 'CCM': {'CCM': 4}}, 'ecc_curve': {'NIST': {'Curve P-192': 1, 'Curve P-256': 1, 'Curve P-384': 1, 'Curve P-521': 1, 'P-192': 1, 'P-256': 1, 'P-384': 1, 'P-521': 1}, 'Brainpool': {'brainpoolP192r1': 1, 'brainpoolP224r1': 1, 'brainpoolP256r1': 4, 'brainpoolP320r1': 1, 'brainpoolP384r1': 2, 'brainpoolP512r1': 2, 'brainpoolP192t1': 1, 'brainpoolP224t1': 1, 'brainpoolP256t1': 1, 'brainpoolP320t1': 1, 'brainpoolP384t1': 1, 'brainpoolP512t1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'physical probing': 5, 'side channels': 1}, 'FI': {'physical tampering': 1, 'malfunction': 2, 'Malfunction': 1}, 'other': {'JIL': 8}}, 'technical_report_id': {'BSI': {'BSI TR-03151': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 5}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 4, 'FIPS186': 4, 'FIPS 180-4': 1, 'FIPS180': 2, 'FIPS197': 11, 'FIPS PUB 180-4': 1}, 'NIST': {'NIST SP 800-108': 2}, 'PKCS': {'PKCS #1': 4, 'PKCS#1': 2}, 'BSI': {'AIS36': 2, 'AIS31': 4, 'AIS 31': 1, 'AIS 36': 1}, 'RFC': {'RFC5639': 13, 'RFC5903': 3, 'RFC6954': 4, 'RFC8017': 5, 'RFC2104': 2, 'RFC 2104': 1, 'RFC 5639': 1, 'RFC 5903': 1, 'RFC 6954': 1, 'RFC 8017': 1}, 'ISO': {'ISO/IEC 19790': 6, 'ISO/IEC 10116:2017': 1}, 'ICAO': {'ICAO': 1}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2012-09-004': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '50e91985d5e93a030ffb340fe91c72781eac7378372afc930122cf5be4fc4491', 'st_pdf_hash': '33577e27adbf3806e359f7add39a179eb479f75fb9d4658c397b6ce880fd4f26', 'report_txt_hash': '7fadb5ab9d450a488d564f4107fd1b641888560e6ae7eb07394414f9efe13ee1', 'st_txt_hash': '582d73cb8c17211a156f6e17039b72b7a7a532cd7ff246a3a44bac4b9905594a'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 15, 'AES-128': 6, 'AES-': 4, 'AES-256': 4, 'DES': 1, 'TDEA': 1, 'HMAC': 3}, 'rules_asymmetric_crypto': {'ECDSA': 4, 'ECC': 6, 'DSA': 4}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-512': 1, 'SHA-256': 1, 'SHA256': 1}, 'rules_crypto_schemes': {'PACE': 5, 'MAC': 13}, 'rules_randomness': {'RNG': 3}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'malfunction': 1, 'side channel': 1, 'fault injection': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_block_cipher_modes': {'__insert__': {'CCM': 4}}, 'rules_ecc_curves': {'__insert__': {'P-192': 1, 'P-256': 1, 'P-384': 1, 'P-521': 1}}} data.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-2018', 'BSI-DSZ-CC-1059-V2']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-2018', 'BSI-DSZ-CC-1059-V2']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1121-V2-2021']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1121-V2-2021']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-V2-2019', 'BSI-DSZ-CC-0973-V2-2016', 'BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-1059-2018', 'BSI-DSZ-CC-1059-V2']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.0']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1121-V2-2021']}.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The following values were removed: {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Cryptographic Service Provider (CSP)', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0104b_pdf.pdf', 'pp_ids': None}]}.
    • The following values were added: {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Cryptographic Service Provider (CSP)', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0104b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BSI-PP-0104']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name TCOS CSP Module Version 1.0 Release 1/P6022y was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/1118c_pdf.pdf",
  "dgst": "24363a67840112f4",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1118-2020",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1121-V2-2021"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1059-V2-2019"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1121-V2-2021"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0973-2016",
          "BSI-DSZ-CC-0973-V2-2016",
          "BSI-DSZ-CC-1059-V2-2019",
          "BSI-DSZ-CC-1059-2018"
        ]
      }
    },
    "scheme_data": {
      "category": "Smart Cards and similar devices",
      "cert_id": "BSI-DSZ-CC-1118-2020",
      "certification_date": "07.04.2020",
      "enhanced": {
        "applicant": "T-Systems International GmbH\nUntere Industriestra\u00dfe 20\n57250 Netphen",
        "assurance_level": "EAL4+,ALC_DVS.2,AVA_VAN.5",
        "cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118c_pdf.pdf?__blob=publicationFile\u0026v=1",
        "certification_date": "07.04.2020",
        "description": "The Target of Evaluation (TOE) is a Cryptographic Service Provider (CSP) representing a smart card with contact based interfaces programmed according to the Protection Profile BSI-CC-PP-0104-2019 in conjunction with the Timestamp and Audit functionality Protection Profile BSI-CC-PP-0107-2019.",
        "entries": [
          {
            "description": ") Version 0.9.8, 19 February 2019",
            "id": "Cryptographic Service Provider ("
          },
          {
            "description": "-Au) Version 0.9.5, 8 April 2019",
            "id": "Protection Profile Configuration Cryptographic Service Provider \u2013 Time Stamp Service and Audit (PPC-"
          }
        ],
        "evaluation_facility": "SRC Security Research \u0026 Consulting GmbH",
        "expiration_date": "06.04.2025",
        "product": "TCOS CSP Module Version 1.0 Release 1/P6022y",
        "protection_profile": "Cryptographic Service Provider (CSP) Version 0.9.8, 19 February 2019, BSI-CC-PP-0104-2019Protection Profile Configuration Cryptographic Service Provider \u2013 Time Stamp Service and Audit (PPC-CSP-TS-Au) Version 0.9.5, 8 April 2019, BSI-CC-PP-0107-2019",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118a_pdf.pdf?__blob=publicationFile\u0026v=1",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1118b_pdf.pdf?__blob=publicationFile\u0026v=1"
      },
      "product": "TCOS CSP Module Version 1.0 Release 1/P6022y",
      "subcategory": "Operating systems and applications",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_Betriebssysteme_Anwendungen/1118.html",
      "vendor": "T-Systems International GmbH"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1059-2018"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1059-2018"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "T-Systems International GMBH",
  "manufacturer_web": "https://www.t-systems.de/",
  "name": "TCOS CSP Module Version 1.0 Release 1/P6022y",
  "not_valid_after": "2025-04-07",
  "not_valid_before": "2020-04-07",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1118c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1118-2020": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0104-2019": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL 5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TSystems": {
          "T-Systems International": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20200409141124+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP\"",
      "/ModDate": "D:20200409141414+02\u002700\u0027",
      "/Producer": "LibreOffice 6.2",
      "/Subject": "TCOS CSP Module Version 1.0 Release 1/P6022y",
      "/Title": "Certificate BSI-DSZ-CC-1118-2020",
      "pdf_file_size_bytes": 889220,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1118a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant / extended EAL 4 augmented by ALC_DVS.2 and AVA_VAN.5 SOGIS Recognition Agreement",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1118-2020",
        "cert_item": "TCOS CSP Module Version 1.0 Release 1/P6022y",
        "cert_lab": "BSI",
        "developer": "T-Systems International GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Cryptographic Service Provider (CSP) Version 0.9.8, 19 February 2019, BSI-CC-PP-0104-2019, Protection Profile Configuration Cryptographic Service Provider \u2013 Time Stamp Service and Audit (PPC-CSP-TS-Au) Version 0.9.5, 8 April 2019, BSI- CC-PP-0107-2019"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDSA": {
            "ECDSA": 4
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1059-": 1,
          "BSI-DSZ-CC-1059-V2-2019": 1,
          "BSI-DSZ-CC-1078": 2,
          "BSI-DSZ-CC-1118-2020": 17
        }
      },
      "cc_claims": {
        "OE": {
          "OE.SUCP": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0104-2019": 3,
          "BSI-CC-PP-0107-": 1,
          "BSI-CC-PP-0107-2019": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 5,
          "ALC_FLR": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 5,
          "EAL 4 augmented": 3,
          "EAL 5": 1,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 24,
          "FCS_COP": 18
        },
        "FIA": {
          "FIA_API": 3
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "0 Release 1/P6022y User guidance manual\u201d, Version 1.0.4, 24.03.2020, T-Systems International GmbH (confidential document) [12] \u201cTCOS CSP Module Personalization Guidance\u201d, Version 1.4, 04.03.2020, T- Systems International": 1,
          "2019 (confidential document) 7 See secton 9.1 for list of used AIS 28 / 31 BSI-DSZ-CC-1118-2020 Certification Report C": 1,
          "CSP Module Version 1.0 Release 1/NXP P60D145 VB\u201d, 24.03.2020, v1.0.1, T-Systems International GmbH (confidential document) [11] \u201cTCOS Cryptographic Service Provider Version 2.0 Release 1/P6022yTCOS Cryptographic Service": 1,
          "Report (ETR) - TCOS CSP Module Version 1.0 Release 1/P6022y\u201d, SRC Security Research \u0026 Consulting, (confidential document) [8] Protection Profile (PP-0104) and Protection Profile-Module (PP-0107): Cryptographic Service": 1,
          "Update im Feld unter TCOS CSP Module 1.0 R1, T-Systems International GmbH, Version 0.2, 11.10.2019 (confidential document) [RNG] Zufallszahlengenerierung in TCOS,Version 1.01, 21.02.2019 (confidential document) [HWST] NXP": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "confidential document) [13] \u201cUpdate im Feld unter TCOS CSP Module 1.0 R1\u201d, T-Systems International GmbH, Version 0.2, 11": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "GCM": {
          "GCM": 1
        },
        "OFB": {
          "OFB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 4
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 5
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "SRC": {
          "SRC Security Research \u0026 Consulting": 3
        },
        "TSystems": {
          "T-Systems International": 13
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 1,
          "malfunction": 1
        },
        "SCA": {
          "side channel": 1
        },
        "other": {
          "JIL": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 28": 1,
          "AIS 34": 1,
          "AIS 36": 1,
          "AIS14": 1,
          "AIS19": 1,
          "AIS20": 1,
          "AIS25": 1,
          "AIS26": 1,
          "AIS31": 1,
          "AIS32": 1,
          "AIS34": 1,
          "AIS35": 1,
          "AIS36": 1,
          "AIS37": 1,
          "AIS38": 1,
          "AIS46": 1,
          "AIS47": 1
        },
        "FIPS": {
          "FIPS 180-4": 3,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-4": 1,
          "FIPS PUB 46-3": 1,
          "FIPS180": 2,
          "FIPS180-4": 1,
          "FIPS186": 9,
          "FIPS186-4": 2,
          "FIPS197": 9,
          "FIPS46": 1
        },
        "ICAO": {
          "ICAO": 1
        },
        "ISO": {
          "ISO/IEC 10116:2017": 1,
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "NIST": {
          "SP 800-108": 1
        },
        "RFC": {
          "RFC 2104": 1,
          "RFC 5639": 9,
          "RFC 8017": 1,
          "RFC2104": 2,
          "RFC5639": 4,
          "RFC8017": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 12,
            "AES-": 4,
            "AES-128": 6,
            "AES-256": 4
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 3,
            "HMAC": 3
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 4,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20200409135722+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, CSP, Crypto Service Provider, EAL4, T-Systems International, SMAERS, Coordinated PP\"",
      "/ModDate": "D:20200409141001+02\u002700\u0027",
      "/Producer": "LibreOffice 6.2",
      "/Subject": "TCOS CSP Module Version 1.0 Release 1/P6022y",
      "/Title": "Certification Report BSI-DSZ-CC-1118-2020",
      "pdf_file_size_bytes": 1420347,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 31
    },
    "st_filename": "1118b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 14
          },
          "ECDSA": {
            "ECDSA": 3
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 4
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1059-2018": 1,
          "BSI-DSZ-CC-1118": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.AES": 1,
          "O.CUST_RECONF_PLAIN": 1,
          "O.EEPROM_INTEGRITY": 1,
          "O.FM_FW": 1,
          "O.MEM_ACCESS": 1,
          "O.PUF": 1,
          "O.RBGS": 6,
          "O.RND": 1,
          "O.SFR_ACCESS": 1,
          "O.TDES": 1,
          "O.TST": 6
        },
        "OE": {
          "OE.SUCP": 3
        },
        "OSP": {
          "OSP.TC": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0104-": 1,
          "BSI-CC-PP-0104-2019": 1,
          "BSI-CC-PP-0107-2019": 2,
          "BSI-CC-PP0035": 1,
          "BSI-CC-PP0104": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 4,
          "ADV_FSP.4": 2,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 8,
          "ALC_FLR.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL 6+": 1,
          "EAL4": 8,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 2,
          "FAU_GEN.1": 7,
          "FAU_GEN.1.1": 4,
          "FAU_GEN.1.2": 1,
          "FAU_SAS.1": 1,
          "FAU_STG.1": 5,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 5,
          "FAU_STG.3.1": 4
        },
        "FCS": {
          "FCS_CKM": 85,
          "FCS_CKM.1": 30,
          "FCS_CKM.2": 14,
          "FCS_CKM.4": 28,
          "FCS_CKM.4.1": 1,
          "FCS_CKM.5": 16,
          "FCS_CKM.5.1": 1,
          "FCS_COP": 135,
          "FCS_COP.1": 38,
          "FCS_RNG": 6,
          "FCS_RNG.1": 13,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 13,
          "FDP_ACC.1": 29,
          "FDP_ACF": 11,
          "FDP_ACF.1": 19,
          "FDP_DAU": 18,
          "FDP_DAU.1": 3,
          "FDP_DAU.2": 6,
          "FDP_ETC": 4,
          "FDP_ETC.1": 4,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 1,
          "FDP_ETC.2": 8,
          "FDP_ETC.2.1": 1,
          "FDP_ETC.2.2": 1,
          "FDP_ETC.2.3": 1,
          "FDP_ETC.2.4": 1,
          "FDP_IFC.1": 19,
          "FDP_ITC": 19,
          "FDP_ITC.1": 21,
          "FDP_ITC.2": 31,
          "FDP_ITT.1": 1,
          "FDP_RIP": 4,
          "FDP_RIP.1": 1,
          "FDP_SDC": 3,
          "FDP_SDC.1": 11,
          "FDP_SDC.1.1": 3,
          "FDP_SDI": 1,
          "FDP_SDI.2": 2,
          "FDP_UCT": 1,
          "FDP_UIT": 1
        },
        "FIA": {
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 14,
          "FIA_API.1": 7,
          "FIA_API.1.1": 1,
          "FIA_ATD.1": 4,
          "FIA_ATD.1.1": 1,
          "FIA_UAU.1": 6,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 5,
          "FIA_UAU.5.1": 11,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 4,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 11,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 3,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MOF": 5,
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 7,
          "FMT_MSA": 10,
          "FMT_MSA.1": 9,
          "FMT_MSA.2": 5,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 6,
          "FMT_MSA.4": 5,
          "FMT_MTD": 21,
          "FMT_MTD.1": 17,
          "FMT_MTD.3": 13,
          "FMT_MTD.3.1": 1,
          "FMT_SAE.1": 6,
          "FMT_SAE.1.1": 1,
          "FMT_SAE.1.2": 1,
          "FMT_SMF": 4,
          "FMT_SMF.1": 11,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 4,
          "FMT_SMR.1": 17,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS.1": 1,
          "FPT_ESA": 8,
          "FPT_ESA.1": 9,
          "FPT_ESA.1.1": 1,
          "FPT_ESA.1.2": 1,
          "FPT_ESA.1.3": 1,
          "FPT_ESA.1.4": 1,
          "FPT_FLS": 1,
          "FPT_FLS.1": 9,
          "FPT_FLS.1.1": 1,
          "FPT_ISA": 12,
          "FPT_ISA.1": 14,
          "FPT_ISA.1.1": 1,
          "FPT_ISA.1.2": 1,
          "FPT_ISA.1.3": 1,
          "FPT_ISA.1.4": 1,
          "FPT_ISA.1.5": 1,
          "FPT_ITT.1": 1,
          "FPT_PHP": 1,
          "FPT_PHP.3": 5,
          "FPT_PHP.3.1": 1,
          "FPT_SDC": 1,
          "FPT_STM.1": 11,
          "FPT_STM.1.1": 4,
          "FPT_TCT": 10,
          "FPT_TCT.1": 5,
          "FPT_TCT.1.1": 1,
          "FPT_TDC": 9,
          "FPT_TDC.1": 16,
          "FPT_TIT": 15,
          "FPT_TIT.1": 10,
          "FPT_TIT.1.1": 2,
          "FPT_TIT.1.2": 1,
          "FPT_TST": 2,
          "FPT_TST.1": 5,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 2,
          "FPT_TST.1.3": 2
        },
        "FRU": {
          "FRU_FLT.1": 1,
          "FRU_FLT.2": 6,
          "FRU_FLT.2.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 16,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 8
        },
        "CCM": {
          "CCM": 4
        },
        "CFB": {
          "CFB": 1
        },
        "GCM": {
          "GCM": 5
        },
        "OFB": {
          "OFB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1,
          "IKEv2": 2
        },
        "PACE": {
          "PACE": 14
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 5
        },
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 46
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP192r1": 1,
          "brainpoolP192t1": 1,
          "brainpoolP224r1": 1,
          "brainpoolP224t1": 1,
          "brainpoolP256r1": 4,
          "brainpoolP256t1": 1,
          "brainpoolP320r1": 1,
          "brainpoolP320t1": 1,
          "brainpoolP384r1": 2,
          "brainpoolP384t1": 1,
          "brainpoolP512r1": 2,
          "brainpoolP512t1": 1
        },
        "NIST": {
          "Curve P-192": 1,
          "Curve P-256": 1,
          "Curve P-384": 1,
          "Curve P-521": 1,
          "P-192": 1,
          "P-256": 1,
          "P-384": 1,
          "P-521": 1
        }
      },
      "eval_facility": {
        "TSystems": {
          "T-Systems International": 107
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-256": 4,
            "SHA-384": 2,
            "SHA-512": 1,
            "SHA384": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1,
          "RNG": 10
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 1,
          "malfunction": 2,
          "physical tampering": 1
        },
        "SCA": {
          "Leak-Inherent": 1,
          "physical probing": 5,
          "side channels": 1
        },
        "other": {
          "JIL": 8
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 1,
          "AIS 36": 1,
          "AIS31": 4,
          "AIS36": 2
        },
        "CC": {
          "CCMB-2012-09-004": 1,
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-4": 4,
          "FIPS180": 2,
          "FIPS186": 4,
          "FIPS197": 11
        },
        "ICAO": {
          "ICAO": 1
        },
        "ISO": {
          "ISO/IEC 10116:2017": 1,
          "ISO/IEC 19790": 6
        },
        "NIST": {
          "NIST SP 800-108": 2
        },
        "PKCS": {
          "PKCS #1": 4,
          "PKCS#1": 2
        },
        "RFC": {
          "RFC 2104": 1,
          "RFC 5639": 1,
          "RFC 5903": 1,
          "RFC 6954": 1,
          "RFC 8017": 1,
          "RFC2104": 2,
          "RFC5639": 13,
          "RFC5903": 3,
          "RFC6954": 4,
          "RFC8017": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 24,
            "AES-": 2,
            "AES-128": 9,
            "AES-256": 11
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 4,
            "Triple-DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 13,
            "HMAC": 8
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03151": 1
        }
      },
      "tee_name": {
        "IBM": {
          "SE": 3
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 3,
          "NXP Semiconductors": 1
        },
        "STMicroelectronics": {
          "STM": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "T-Systems International GmbH",
      "/CreationDate": "D:20200228103153+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word f\u00fcr Office 365",
      "/Keywords": "Crypto Service Provider, TCOS, Electronic Cash Register, TSE",
      "/ModDate": "D:20200228103153+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word f\u00fcr Office 365",
      "/Subject": "TCOS Cryptographic Service Provider",
      "/Title": "TCOS CSP Module 1.0 Release 1/P6022y",
      "pdf_file_size_bytes": 1352317,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip",
          "http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 102
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0107b_pdf.pdf",
        "pp_name": "Protection Profile Configuration Cryptographic Service Provider \u2013 Time Stamp Service and Audit ..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "BSI-PP-0104"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0104b_pdf.pdf",
        "pp_name": "Cryptographic Service Provider (CSP)"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/1118a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_DVS.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/1118b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ea378ad3793cea56ef641ec4a1dbfaf1b0a49d147ed00587aaa73c71c1fabe3e",
      "txt_hash": "8383a3dc90eb03c4a8262fb1fe1ba69251c6c279c87975f4534b7f41cea863ff"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "50e91985d5e93a030ffb340fe91c72781eac7378372afc930122cf5be4fc4491",
      "txt_hash": "7fadb5ab9d450a488d564f4107fd1b641888560e6ae7eb07394414f9efe13ee1"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "33577e27adbf3806e359f7add39a179eb479f75fb9d4658c397b6ce880fd4f26",
      "txt_hash": "582d73cb8c17211a156f6e17039b72b7a7a532cd7ff246a3a44bac4b9905594a"
    }
  },
  "status": "active"
}