Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 9 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software
CSV information ?
Status | archived |
---|---|
Valid from | 29.01.2010 |
Valid until | 01.09.2019 |
Scheme | 🇩🇪 DE |
Manufacturer | Samsung Electronics Co., Ltd. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL5+ |
Maintenance updates | Samsung S3CC9L5 16-bit RISC Microcontroller for Smart Card, Revision 2 with optional secure RSA3.7S and ECC 2.4S Libraries including specific IC Dedicated Software (30.06.2010) Certification report Security target |
Samsung S3CC9LA 16-bit RISC Microcontroller for Smart Card, Revision 2 with optional secure RSA3.7S and ECC 2.4S Libraries including specific IC Dedicated Software (30.06.2010) Certification report Security target | |
Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 11 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software (16.03.2010) Certification report Security target |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, HMACAsymmetric Algorithms
ECCHash functions
SHA1, SHA224, SHA256Randomness
RNGBlock cipher modes
ECB, CBCCPLC
IC Fabricator, IC VersionVendor
Infineon Technologies AG, Samsung, PhilipsSecurity level
EAL 5, EAL 4, EAL4, EAL 1, EAL 7, EAL5+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 5 augmentedSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_LCD.2, ALC_TAT.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, APE_DES, APE_ENV, APE_INT, APE_OBJ, APE_REQ, APE_SRE, ASE_DES, ASE_ENV, ASE_INT, ASE_OBJ, ASE_PPC, ASE_REQ, ASE_SRE, ASE_TSSProtection profiles
BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0624-2010, BSI-DSZ-CC-0501-2008, BSI-DSZ-CC-0624-2009, CC-0624Evaluation facilities
TĂśViTSide-channel analysis
physical probing, side-channel, DPA, physical tampering, JILCertification process
including specific IC Dedicated Software, Version 2.1, 20th November 2009 Samsung Electronics (confidential document) [7] Evaluation Technical Report Summary (ETR SUMMARY), 8105621102 / BSI-DSZ- CC-0624, S3CC9LC, 2, 2010-01-28, TÜViT (confidential document) [8] Configuration Management Documentation (Class ACM_AUT/CAP/SCP) – Project Cheyenne II Site, 1.6, 2009-08-05, Samsung (confidential document) [9] Security Target Lite of S3CC9LC 16-bit RISC Microcontroller for Smart Cards – Project Cheyenne, Evaluation (ETR-COMP), 8104953923 / BSI-DSZ-CC- 0624, S3CC9LC, Version 2, 2010-01-28, TÜViT (confidential document) 8 specifically • AIS 20, Version 1, 2 December 1999, Funktionalitätsklassen undStandards
AIS 34, AIS20, AIS 20, AIS 25, AIS 26, AIS 35, AIS 31, AIS 32, AIS 36, AIS 38, ISO/IEC 15408:2005Technical reports
BSI 7125, BSI 7148, BSI 7149File metadata
Title | Certificationreport BSI-DSZ-CC-0624-2010 |
---|---|
Subject | Common Criteria Certification |
Keywords | "Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 9 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software, Samsung Electronics Co, Ltd." |
Author | Bundesamt fĂĽr Sicherheit in der Informationstechnik |
Creation date | D:20100208102410+01'00' |
Modification date | D:20100210110815+01'00' |
Pages | 38 |
Creator | Writer |
Producer | StarOffice 9 |
Frontpage
Certificate ID | BSI-DSZ-CC-0624-2010 |
---|---|
Certified item | Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 9 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software |
Certification lab | BSI |
Developer | Samsung Electronics Co., Ltd |
References
Outgoing- BSI-DSZ-CC-0501-2008 - archived - S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 2
- ANSSI-CC-2012/09 - archived - eTravel EAC v1.2 masquée sur le composant S3CC9LC
- KECS-ISIS-0378-2012 - archived - SSCOS V1.0 on S3CC9LC
Security target ?
Extracted keywords
Symmetric Algorithms
DES, T-DES, 3DES, Triple-DES, TDEA, SEED, HMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DSAHash functions
SHA1, SHA-1, SHA224, SHA256, SHA-224, SHA-256Schemes
Key AgreementRandomness
RNG, RNDEngines
TORNADOElliptic Curves
P-192, P-224, P-256, P-384, brainpoolP224r1, brainpoolP256r1, brainpoolP320r1, brainpoolP384r1, brainpoolP512r1, brainpoolP192r1Block cipher modes
ECBVendor
SamsungSecurity level
EAL5, EAL4, EAL5 augmentedClaims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ACM_CAP.4, ACM_AUT.1, ACM_SCP.3, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_SPM.1, ADV_FSP.3, ADV_SPM.3, ADV_HLD.3, ADV_LLD.1, ADV_IMP.2, ADV_INT.1, ADV_RCR.2, ADV_FSP, ADV_HLD, ADV_INT, ADV_LLD, ADV_IMP, ADV_RCR, ADV_SPM, ADV_FSP.1, ADV_HLD.2, ADV_IMP.1, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_LCD, ALC_TAT, ALC_DVS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, AVA_MSU.3, AVA_VLA.4, AVA_CCA.1, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_MSU.2Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FAU_SAS, FAU_GEN.1, FAU_GEN, FCS_RND.1, FCS_RND.1.1, FCS_COP, FCS_COP.1, FCS_CKM.1, FCS_CKM.4, FCS_CKM, FCS_CKM.2, FCS_RND, FCS_CKM.1.1, FCS_CKM.4.1, FDP_ITT.1, FDP_ITT.1.1, FDP_ACC.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_CKM.2, FDP_ACC, FDP_ACF, FDP_IFC, FDP_ITT, FDP_SDI.1, FMT_LIM.1, FMT_LIM.1.1, FMT_LIM.2, FMT_LIM.2.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.2, FMT_LIM, FMT_MSA.2.1, FMT_MSA, FMT_SMF, FPT_FLS.1, FPT_FLS.1.1, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_ITT.1, FPT_ITT.1.1, FPT_TDC.1, FPT_FLS, FPT_SEP, FPT_PHP, FPT_ITT, FPT_AMT.1, FRU_FLT.2, FRU_FLT.1, FRU_FLT, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0002Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, side-channel, side channel, DPA, SPA, timing attacks, physical tampering, Malfunction, malfunction, DFA, reverse engineeringStandards
FIPS PUB 180-3, AIS20, AIS 20, ISO/IEC 15408-2005, ISO/IEC 7816File metadata
Title | Security Target Lite of Samsung S3CC9LC 16-bit Secure RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software |
---|---|
Subject | Security Target Lite |
Keywords | Security Target of Samsung S3CC9LC 16-bit Secure RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software |
Author | KyungSuk YI (Bryant) |
Creation date | D:20091216150432+09'00' |
Modification date | D:20100128181239+09'00' |
Pages | 70 |
Creator | Worděš© Acrobat PDFMaker 9.1 |
Producer | Acrobat Distiller 9.2.0 (Windows) |
References
Incoming- KECS-ISIS-0378-2012 - archived - SSCOS V1.0 on S3CC9LC
Heuristics ?
Extracted SARs
ADV_LLD.1, AVA_VLA.4, ALC_DVS.2, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ADV_INT.1, ADV_IMP.2, ADV_SPM.3, ALC_LCD.2, ATE_COV.2, AVA_SOF.1, ADV_HLD.3, AGD_USR.1, AVA_MSU.3, AGD_ADM.1, ADV_RCR.2, AVA_CCA.1, ATE_DPT.2, ADV_FSP.3Similar certificates
References ?
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '47888df7d2fcf546f9fdd9dba25805a96d29af5a3d9ca8df2e7674d214bd9885', 'txt_hash': '025d866a26cc415141f9fe528c97b80774f047a2eae7909c1ed083aa02fa266a'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3b679ff648a507d0fe29e77a750803b7aa2e1e9843e529d1e4f752ab7bf24765', 'txt_hash': '9a707a636cfa03bc1a38f99e680e2eb7702499c7eab779c41d18cc705fcab4e7'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 815194, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/CreationDate': "D:20100208102410+01'00'", '/Subject': 'Common Criteria Certification', '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/Creator': 'Writer', '/Keywords': '"Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 9 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software, Samsung Electronics Co, Ltd."', '/Producer': 'StarOffice 9', '/ModDate': "D:20100210110815+01'00'", '/Title': 'Certificationreport BSI-DSZ-CC-0624-2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.bsi.bund.de/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 518043, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 70, '/Author': 'KyungSuk YI (Bryant)', '/Baustein': 'SLE66C82P/SLE66C42P', '/BausteinVersion': 'a15', '/Classification': 'Public', '/Comments': '', '/Company': '', '/CreationDate': "D:20091216150432+09'00'", '/Creator': ' Word용 Acrobat PDFMaker 9.1', '/Datum': '23-10-2003', '/Dokument': 'Security Target', '/EEPROM': '8 kBytes', '/Jahr': '2003', '/Keywords': 'Security Target of Samsung S3CC9LC 16-bit Secure RISC Microcontroller \r\nfor Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software', '/ModDate': "D:20100128181239+09'00'", '/PP_Augmentations': 'Smartcard Integrated Circuit Platform Augmentations V0.98', '/PP_Date': 'July 2001', '/PP_Short': 'BSI-PP-0002; Version 1.0, July 2001', '/PP_Version': '1.0', '/Producer': 'Acrobat Distiller 9.2.0 (Windows)', '/Protection Profile': 'Smartcard IC Platform Protection Profile', '/ROM': '64 kBytes', '/SourceModified': 'D:20091216060245', '/Subject': 'Security Target Lite', '/Technologie': '0,22 µm', '/Title': 'Security Target Lite of Samsung S3CC9LC 16-bit Secure RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software', '/Version': '1.2', '/XRAM': '2 kBytes', '/m-Nummer': 'm1474/m1495', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0624-2010', 'cert_item': 'Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 9 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software', 'developer': 'Samsung Electronics Co., Ltd', 'cert_lab': 'BSI'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0624-2010': 19, 'BSI-DSZ-CC-0501-2008': 2, 'BSI-DSZ-CC-0624-2009': 1}, 'NL': {'CC-0624': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 4}}, 'cc_security_level': {'EAL': {'EAL 5': 4, 'EAL 4': 5, 'EAL4': 6, 'EAL 1': 1, 'EAL 7': 1, 'EAL5+': 1, 'EAL1': 5, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL 5 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2, 'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.3': 1}, 'ADO': {'ADO_DEL': 2, 'ADO_IGS': 2, 'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_IMP.2': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2, 'ALC_LCD.2': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 6, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 3, 'AVA_VLA': 3, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'APE': {'APE_DES': 1, 'APE_ENV': 1, 'APE_INT': 1, 'APE_OBJ': 1, 'APE_REQ': 1, 'APE_SRE': 1}, 'ASE': {'ASE_DES': 1, 'ASE_ENV': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_PPC': 1, 'ASE_REQ': 1, 'ASE_SRE': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1}, 'Samsung': {'Samsung': 30}, 'Philips': {'Philips': 1}}, 'eval_facility': {'TUV': {'TÜViT': 2}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 7}, '3DES': {'Triple-DES': 5}}, 'constructions': {'MAC': {'HMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 39}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2}, 'SHA2': {'SHA224': 4, 'SHA256': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side-channel': 1, 'DPA': 3}, 'FI': {'physical tampering': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICFab': {'IC Fabricator': 1}, 'ICVersion': {'IC Version': 1}}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 3, 'AIS20': 1, 'AIS 20': 3, 'AIS 25': 3, 'AIS 26': 3, 'AIS 35': 2, 'AIS 31': 1, 'AIS 32': 1, 'AIS 36': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408:2005': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'including specific IC Dedicated Software, Version 2.1, 20th November 2009 Samsung Electronics (confidential document) [7] Evaluation Technical Report Summary (ETR SUMMARY), 8105621102 / BSI-DSZ- CC-0624, S3CC9LC': 1, '2, 2010-01-28, TÜViT (confidential document) [8] Configuration Management Documentation (Class ACM_AUT/CAP/SCP) – Project Cheyenne II Site': 1, '1.6, 2009-08-05, Samsung (confidential document) [9] Security Target Lite of S3CC9LC 16-bit RISC Microcontroller for Smart Cards – Project Cheyenne': 1, 'Evaluation (ETR-COMP), 8104953923 / BSI-DSZ-CC- 0624, S3CC9LC, Version 2, 2010-01-28, TÜViT (confidential document) 8 specifically • AIS 20, Version 1, 2 December 1999, Funktionalitätsklassen und': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002': 10}}, 'cc_security_level': {'EAL': {'EAL5': 8, 'EAL4': 1, 'EAL5 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.4': 2, 'ACM_AUT.1': 1, 'ACM_SCP.3': 1, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 3, 'ADO_DEL': 2, 'ADO_IGS': 2}, 'ADV': {'ADV_SPM.1': 5, 'ADV_FSP.3': 1, 'ADV_SPM.3': 1, 'ADV_HLD.3': 1, 'ADV_LLD.1': 2, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_RCR.2': 1, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_INT': 1, 'ADV_LLD': 1, 'ADV_IMP': 1, 'ADV_RCR': 1, 'ADV_SPM': 1, 'ADV_FSP.1': 2, 'ADV_HLD.2': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_ADM.1': 4, 'AGD_USR.1': 4, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.2': 1, 'ALC_TAT.2': 1, 'ALC_DVS': 2, 'ALC_LCD': 2, 'ALC_TAT': 2, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1}, 'AVA': {'AVA_MSU.3': 6, 'AVA_VLA.4': 7, 'AVA_CCA.1': 1, 'AVA_SOF.1': 1, 'AVA_CCA': 1, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1, 'AVA_MSU.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 8, 'FAU_SAS.1.1': 1, 'FAU_SAS': 3, 'FAU_GEN.1': 1, 'FAU_GEN': 1}, 'FCS': {'FCS_RND.1': 8, 'FCS_RND.1.1': 1, 'FCS_COP': 17, 'FCS_COP.1': 35, 'FCS_CKM.1': 41, 'FCS_CKM.4': 29, 'FCS_CKM': 5, 'FCS_CKM.2': 4, 'FCS_RND': 2, 'FCS_CKM.1.1': 3, 'FCS_CKM.4.1': 3}, 'FDP': {'FDP_ITT.1': 17, 'FDP_ITT.1.1': 1, 'FDP_ACC.1': 24, 'FDP_IFC.1': 25, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 3, 'FDP_ACF.1': 12, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC.1': 23, 'FDP_ITC.2': 26, 'FDP_ITC.1.1': 3, 'FDP_ITC.1.2': 3, 'FDP_ITC.1.3': 3, 'FDP_ITC.2.1': 3, 'FDP_ITC.2.2': 3, 'FDP_ITC.2.3': 3, 'FDP_ITC.2.4': 3, 'FDP_ITC.2.5': 3, 'FDP_CKM.2': 2, 'FDP_ACC': 1, 'FDP_ACF': 1, 'FDP_IFC': 2, 'FDP_ITT': 1, 'FDP_SDI.1': 2}, 'FMT': {'FMT_LIM.1': 14, 'FMT_LIM.1.1': 1, 'FMT_LIM.2': 19, 'FMT_LIM.2.1': 1, 'FMT_MSA.3': 14, 'FMT_MSA.1': 13, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 9, 'FMT_MSA.1.1': 1, 'FMT_SMF.1': 7, 'FMT_SMF.1.1': 1, 'FMT_MSA.2': 29, 'FMT_LIM': 4, 'FMT_MSA.2.1': 3, 'FMT_MSA': 2, 'FMT_SMF': 1}, 'FPT': {'FPT_FLS.1': 22, 'FPT_FLS.1.1': 1, 'FPT_SEP.1': 10, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_PHP.3': 18, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 15, 'FPT_ITT.1.1': 1, 'FPT_TDC.1': 3, 'FPT_FLS': 1, 'FPT_SEP': 2, 'FPT_PHP': 2, 'FPT_ITT': 1, 'FPT_AMT.1': 1}, 'FRU': {'FRU_FLT.2': 18, 'FRU_FLT.1': 1, 'FRU_FLT': 1}, 'FTP': {'FTP_ITC.1': 3, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.RND': 5}, 'T': {'T.RND': 4}}, 'vendor': {'Samsung': {'Samsung': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 10}, '3DES': {'T-DES': 1, '3DES': 13, 'Triple-DES': 1, 'TDEA': 2}}, 'miscellaneous': {'SEED': {'SEED': 1}}, 'constructions': {'MAC': {'HMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 10}, 'ECDSA': {'ECDSA': 25}, 'ECC': {'ECC': 83}}, 'FF': {'DH': {'Diffie-Hellman': 2}, 'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 5, 'SHA-1': 1}, 'SHA2': {'SHA224': 8, 'SHA256': 8, 'SHA-224': 2, 'SHA-256': 1}}}, 'crypto_scheme': {'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 3, 'RND': 10}}, 'cipher_mode': {'ECB': {'ECB': 2}}, 'ecc_curve': {'NIST': {'P-192': 10, 'P-224': 10, 'P-256': 10, 'P-384': 10}, 'Brainpool': {'brainpoolP224r1': 5, 'brainpoolP256r1': 5, 'brainpoolP320r1': 1, 'brainpoolP384r1': 5, 'brainpoolP512r1': 1, 'brainpoolP192r1': 4}}, 'crypto_engine': {'TORNADO': {'TORNADO': 17}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 20, 'Physical Probing': 4, 'physical probing': 6, 'Physical probing': 2, 'side-channel': 2, 'side channel': 2, 'DPA': 10, 'SPA': 6, 'timing attacks': 1}, 'FI': {'physical tampering': 2, 'Malfunction': 24, 'malfunction': 12, 'DFA': 4}, 'other': {'reverse engineering': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-3': 6}, 'BSI': {'AIS20': 3, 'AIS 20': 2}, 'ISO': {'ISO/IEC 15408-2005': 1, 'ISO/IEC 7816': 6}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0624a_pdf.pdf
. - The st_filename property was set to
0624b_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0624-2010
. - The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['KECS-ISIS-0378-2012']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['KECS-ISIS-0378-2012']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/09', 'KECS-ISIS-0378-2012']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/09', 'KECS-ISIS-0378-2012']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0501-2008']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0400-2007', 'BSI-DSZ-CC-0452-2007', 'BSI-DSZ-CC-0501-2008', 'BSI-DSZ-CC-0438-2007']}}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624b_pdf.pdf
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 9 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "164184f3ca5502fb",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0624-2010",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_CCA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.4",
"3.7"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2012/09",
"KECS-ISIS-0378-2012"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0501-2008"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2012/09",
"KECS-ISIS-0378-2012"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0400-2007",
"BSI-DSZ-CC-0452-2007",
"BSI-DSZ-CC-0438-2007",
"BSI-DSZ-CC-0501-2008"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"KECS-ISIS-0378-2012"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"KECS-ISIS-0378-2012"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2010-03-16",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624_ma1a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624_ma1b_pdf.pdf",
"maintenance_title": "Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 11 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2010-06-30",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624_ma3a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624_ma3b_pdf.pdf",
"maintenance_title": "Samsung S3CC9LA 16-bit RISC Microcontroller for Smart Card, Revision 2 with optional secure RSA3.7S and ECC 2.4S Libraries including specific IC Dedicated Software"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2010-06-30",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624_ma2a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624_ma2b_pdf.pdf",
"maintenance_title": "Samsung S3CC9L5 16-bit RISC Microcontroller for Smart Card, Revision 2 with optional secure RSA3.7S and ECC 2.4S Libraries including specific IC Dedicated Software"
}
]
},
"manufacturer": "Samsung Electronics Co., Ltd.",
"manufacturer_web": "https://www.samsung.com",
"name": "Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 9 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software",
"not_valid_after": "2019-09-01",
"not_valid_before": "2010-01-29",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0624a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0624-2010",
"cert_item": "Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 9 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software",
"cert_lab": "BSI",
"developer": "Samsung Electronics Co., Ltd",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 39
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0501-2008": 2,
"BSI-DSZ-CC-0624-2009": 1,
"BSI-DSZ-CC-0624-2010": 19
},
"NL": {
"CC-0624": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 4
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 1,
"ACM_CAP": 2,
"ACM_CAP.4": 1,
"ACM_SCP": 2,
"ACM_SCP.3": 1
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 1,
"ADO_IGS": 2,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP": 2,
"ADV_HLD": 2,
"ADV_IMP": 2,
"ADV_IMP.2": 1,
"ADV_INT": 2,
"ADV_LLD": 2,
"ADV_RCR": 2,
"ADV_SPM": 2
},
"AGD": {
"AGD_ADM": 2,
"AGD_USR": 2
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.2": 6,
"ALC_FLR": 2,
"ALC_LCD": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 2,
"ALC_TAT.2": 1
},
"APE": {
"APE_DES": 1,
"APE_ENV": 1,
"APE_INT": 1,
"APE_OBJ": 1,
"APE_REQ": 1,
"APE_SRE": 1
},
"ASE": {
"ASE_DES": 1,
"ASE_ENV": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_PPC": 1,
"ASE_REQ": 1,
"ASE_SRE": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_DPT": 2,
"ATE_FUN": 2,
"ATE_IND": 2
},
"AVA": {
"AVA_CCA": 2,
"AVA_MSU": 2,
"AVA_MSU.3": 5,
"AVA_SOF": 3,
"AVA_VLA": 3,
"AVA_VLA.2": 1,
"AVA_VLA.3": 1,
"AVA_VLA.4": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 5,
"EAL 5": 4,
"EAL 5 augmented": 3,
"EAL 7": 1,
"EAL1": 5,
"EAL2": 3,
"EAL3": 4,
"EAL4": 6,
"EAL5": 6,
"EAL5+": 1,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"1.6, 2009-08-05, Samsung (confidential document) [9] Security Target Lite of S3CC9LC 16-bit RISC Microcontroller for Smart Cards \u2013 Project Cheyenne": 1,
"2, 2010-01-28, T\u00dcViT (confidential document) [8] Configuration Management Documentation (Class ACM_AUT/CAP/SCP) \u2013 Project Cheyenne II Site": 1,
"Evaluation (ETR-COMP), 8104953923 / BSI-DSZ-CC- 0624, S3CC9LC, Version 2, 2010-01-28, T\u00dcViT (confidential document) 8 specifically \u2022 AIS 20, Version 1, 2 December 1999, Funktionalit\u00e4tsklassen und": 1,
"including specific IC Dedicated Software, Version 2.1, 20th November 2009 Samsung Electronics (confidential document) [7] Evaluation Technical Report Summary (ETR SUMMARY), 8105621102 / BSI-DSZ- CC-0624, S3CC9LC": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {
"ICFab": {
"IC Fabricator": 1
},
"ICVersion": {
"IC Version": 1
}
},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcViT": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA1": 2
},
"SHA2": {
"SHA224": 4,
"SHA256": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
},
"SCA": {
"DPA": 3,
"physical probing": 1,
"side-channel": 1
},
"other": {
"JIL": 4
}
},
"standard_id": {
"BSI": {
"AIS 20": 3,
"AIS 25": 3,
"AIS 26": 3,
"AIS 31": 1,
"AIS 32": 1,
"AIS 34": 3,
"AIS 35": 2,
"AIS 36": 1,
"AIS 38": 1,
"AIS20": 1
},
"ISO": {
"ISO/IEC 15408:2005": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"Triple-DES": 5
},
"DES": {
"DES": 7
}
},
"constructions": {
"MAC": {
"HMAC": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies AG": 1
},
"Philips": {
"Philips": 1
},
"Samsung": {
"Samsung": 30
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20100208102410+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 9 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software, Samsung Electronics Co, Ltd.\"",
"/ModDate": "D:20100210110815+01\u002700\u0027",
"/Producer": "StarOffice 9",
"/Subject": "Common Criteria Certification",
"/Title": "Certificationreport BSI-DSZ-CC-0624-2010",
"pdf_file_size_bytes": 815194,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "0624b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 83
},
"ECDH": {
"ECDH": 10
},
"ECDSA": {
"ECDSA": 25
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.RND": 5
},
"T": {
"T.RND": 4
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002": 10
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 1,
"ACM_CAP": 2,
"ACM_CAP.4": 2,
"ACM_SCP": 2,
"ACM_SCP.3": 1
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 2,
"ADO_IGS": 2,
"ADO_IGS.1": 3
},
"ADV": {
"ADV_FSP": 1,
"ADV_FSP.1": 2,
"ADV_FSP.3": 1,
"ADV_HLD": 1,
"ADV_HLD.2": 1,
"ADV_HLD.3": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_LLD": 1,
"ADV_LLD.1": 2,
"ADV_RCR": 1,
"ADV_RCR.2": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 5,
"ADV_SPM.3": 1
},
"AGD": {
"AGD_ADM": 2,
"AGD_ADM.1": 4,
"AGD_USR": 2,
"AGD_USR.1": 4
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.1": 1,
"ALC_DVS.2": 6,
"ALC_LCD": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 2,
"ALC_TAT.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 2,
"ATE_DPT": 1,
"ATE_DPT.2": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA": 1,
"AVA_CCA.1": 1,
"AVA_MSU": 1,
"AVA_MSU.2": 1,
"AVA_MSU.3": 6,
"AVA_SOF": 1,
"AVA_SOF.1": 1,
"AVA_VLA": 1,
"AVA_VLA.4": 7
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1,
"EAL5": 8,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 1,
"FAU_SAS": 3,
"FAU_SAS.1": 8,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM": 5,
"FCS_CKM.1": 41,
"FCS_CKM.1.1": 3,
"FCS_CKM.2": 4,
"FCS_CKM.4": 29,
"FCS_CKM.4.1": 3,
"FCS_COP": 17,
"FCS_COP.1": 35,
"FCS_RND": 2,
"FCS_RND.1": 8,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 24,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_CKM.2": 2,
"FDP_IFC": 2,
"FDP_IFC.1": 25,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 3,
"FDP_ITC.1": 23,
"FDP_ITC.1.1": 3,
"FDP_ITC.1.2": 3,
"FDP_ITC.1.3": 3,
"FDP_ITC.2": 26,
"FDP_ITC.2.1": 3,
"FDP_ITC.2.2": 3,
"FDP_ITC.2.3": 3,
"FDP_ITC.2.4": 3,
"FDP_ITC.2.5": 3,
"FDP_ITT": 1,
"FDP_ITT.1": 17,
"FDP_ITT.1.1": 1,
"FDP_SDI.1": 2
},
"FMT": {
"FMT_LIM": 4,
"FMT_LIM.1": 14,
"FMT_LIM.1.1": 1,
"FMT_LIM.2": 19,
"FMT_LIM.2.1": 1,
"FMT_MSA": 2,
"FMT_MSA.1": 13,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 29,
"FMT_MSA.2.1": 3,
"FMT_MSA.3": 14,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 9
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS": 1,
"FPT_FLS.1": 22,
"FPT_FLS.1.1": 1,
"FPT_ITT": 1,
"FPT_ITT.1": 15,
"FPT_ITT.1.1": 1,
"FPT_PHP": 2,
"FPT_PHP.3": 18,
"FPT_PHP.3.1": 1,
"FPT_SEP": 2,
"FPT_SEP.1": 10,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_TDC.1": 3
},
"FRU": {
"FRU_FLT": 1,
"FRU_FLT.1": 1,
"FRU_FLT.2": 18
},
"FTP": {
"FTP_ITC.1": 3,
"FTP_TRP.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {
"TORNADO": {
"TORNADO": 17
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP192r1": 4,
"brainpoolP224r1": 5,
"brainpoolP256r1": 5,
"brainpoolP320r1": 1,
"brainpoolP384r1": 5,
"brainpoolP512r1": 1
},
"NIST": {
"P-192": 10,
"P-224": 10,
"P-256": 10,
"P-384": 10
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1,
"SHA1": 5
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 1,
"SHA224": 8,
"SHA256": 8
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 10,
"RNG": 3
}
},
"side_channel_analysis": {
"FI": {
"DFA": 4,
"Malfunction": 24,
"malfunction": 12,
"physical tampering": 2
},
"SCA": {
"DPA": 10,
"Leak-Inherent": 20,
"Physical Probing": 4,
"Physical probing": 2,
"SPA": 6,
"physical probing": 6,
"side channel": 2,
"side-channel": 2,
"timing attacks": 1
},
"other": {
"reverse engineering": 3
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS20": 3
},
"FIPS": {
"FIPS PUB 180-3": 6
},
"ISO": {
"ISO/IEC 15408-2005": 1,
"ISO/IEC 7816": 6
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 13,
"T-DES": 1,
"TDEA": 2,
"Triple-DES": 1
},
"DES": {
"DES": 10
}
},
"constructions": {
"MAC": {
"HMAC": 3
}
},
"miscellaneous": {
"SEED": {
"SEED": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 3
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "KyungSuk YI (Bryant)",
"/Baustein": "SLE66C82P/SLE66C42P",
"/BausteinVersion": "a15",
"/Classification": "Public",
"/Comments": "",
"/Company": "",
"/CreationDate": "D:20091216150432+09\u002700\u0027",
"/Creator": " Word\uc6a9 Acrobat PDFMaker 9.1",
"/Datum": "23-10-2003",
"/Dokument": "Security Target",
"/EEPROM": "8 kBytes",
"/Jahr": "2003",
"/Keywords": "Security Target of Samsung S3CC9LC 16-bit Secure RISC Microcontroller \r\nfor Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software",
"/ModDate": "D:20100128181239+09\u002700\u0027",
"/PP_Augmentations": "Smartcard Integrated Circuit Platform Augmentations V0.98",
"/PP_Date": "July 2001",
"/PP_Short": "BSI-PP-0002; Version 1.0, July 2001",
"/PP_Version": "1.0",
"/Producer": "Acrobat Distiller 9.2.0 (Windows)",
"/Protection Profile": "Smartcard IC Platform Protection Profile",
"/ROM": "64 kBytes",
"/SourceModified": "D:20091216060245",
"/Subject": "Security Target Lite",
"/Technologie": "0,22 \u00b5m",
"/Title": "Security Target Lite of Samsung S3CC9LC 16-bit Secure RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software",
"/Version": "1.2",
"/XRAM": "2 kBytes",
"/m-Nummer": "m1474/m1495",
"pdf_file_size_bytes": 518043,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 70
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "47888df7d2fcf546f9fdd9dba25805a96d29af5a3d9ca8df2e7674d214bd9885",
"txt_hash": "025d866a26cc415141f9fe528c97b80774f047a2eae7909c1ed083aa02fa266a"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3b679ff648a507d0fe29e77a750803b7aa2e1e9843e529d1e4f752ab7bf24765",
"txt_hash": "9a707a636cfa03bc1a38f99e680e2eb7702499c7eab779c41d18cc705fcab4e7"
}
},
"status": "archived"
}