This page was not yet optimized for use on mobile
devices.
Samsung S3CT9P3 16-Bit RISC Microcontroller for Smart Cards, Revision 0 with optional Secure RSA and ECC Library (Version 2.0) including specific IC Dedicated Software
CSV information
| Status | archived |
|---|---|
| Valid from | 13.08.2012 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Samsung Electronics Co., Ltd. |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_VAN.5, EAL5+, ALC_DVS.2 |
| Protection profiles | |
| Maintenance updates | Reassessment - Samsung S3CT9P3 16-bit SecuCalm RISC Microcontroller for Smart Card with optional Secure RSA and ECC library including specific IC Dedicated Software (09.05.2018) Certification report Security target |
| Samsung S3CT9P3 16-Bit RISC Microcontroller for Smart Cards, Revision 0 with optional Secure RSA and ECC Library (Version 2.0) including specific IC Dedicated Software (19.01.2017) Certification report |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0801-2012
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, 3DES, HMACAsymmetric Algorithms
ECCHash functions
SHA1, SHA-224, SHA-256, SHA-384, SHA-512Randomness
DTRNG, TRNG, RNGBlock cipher modes
ECB, CBCCPLC
IC Fabricator, IC VersionVendor
SamsungSecurity level
EAL 5, EAL 4, EAL1, EAL4, EAL5, EAL5+, EAL6, EAL3, EAL7, EAL2, EAL 5 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMS.5, ALC_TAT.2, ALC_CMC, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.3, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_DPT.3, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0035-2007, BSI-CC-PP- 0035-2007Certificates
BSI-DSZ-CC-0801-2012, BSI-DSZ-CC-0720-2011, BSI-DSZ-CC-0801Evaluation facilities
TÜV Informationstechnik, TÜViTSide-channel analysis
physical probing, side-channel, DPA, SPA, physical tampering, DFACertification process
specific IC Dedicated Software – Project Crow V, Version 1.3, 2012-03-22, Samsung Electronics (confidential document) [7] Evaluation Technical Report Summary (ETR Summary), BSI-DSZ-CC-0801, S3CT9P3 Revision 0, 1, 2012-04-30, TÜViT (confidential document) [8] Life Cycle Definition (Class ALC_CMC.4/CMS.5) – Project Crow V, Version 1.1, 2012-03-06, Electronics (confidential document) [9] Security Target Lite of S3CT9P3 16-bit RISC Microcontroller for Smart Card with optional, evaluation according to AIS 36 for the Product S3CT9P3 Revision 0, Version 1.0, 2012-04-30, TÜViT (confidential document) [12] User’s manual S3CT9XX 16-Bit CMOS Microcontroller for Smart Card, Supported DeviceStandards
AIS31, AIS 34, AIS 25, AIS 26, AIS 31, AIS 36, AIS 35, AIS25, AIS 32, AIS32, AIS34, AIS35, AIS 38, AIS38Technical reports
BSI TR-02102, BSI 7125, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-0801-2012 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, Samsung S3CT9P3 16-Bit RISC Microcontroller for Smart Cards, Revision 0 with optional Secure RSA and ECC Library (Version 2.0) including specific IC Dedicated Software, Samsung Electronics" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20121105112000+01'00' |
| Modification date | D:20121105153229+01'00' |
| Pages | 38 |
| Creator | Writer |
| Producer | LibreOffice 3.5 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0801-2012 |
|---|---|
| Certified item | Samsung S3CT9P3 16-Bit RISC Microcontroller for Smart Cards, Revision 0 with optional Secure RSA and ECC Library (Version 2.0) including specific IC Dedicated Software |
| Certification lab | BSI |
| Developer | Samsung Electronics |
References
Outgoing- BSI-DSZ-CC-0720-2011 - archived - Samsung S3CT9PC / S3CT9PA / S3CT9P7 16-bit RISC Microcontroller for Smart Card, Revision 1 with optional Secure RSA/ECC Library Version 2.0 including specific IC Dedicated Software
- BSI-DSZ-CC-0882-2013 - archived - S3CS9AB 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with specific IC Dedicated Software
Security target
Extracted keywords
Symmetric Algorithms
DES, 3DES, Triple-DES, TDEA, HMACAsymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman, DSAHash functions
SHA1, SHA-1, SHA224, SHA256, SHA384, SHA-224, SHA-256, SHA-384, SHA-512, SHA512Schemes
Key AgreementRandomness
DTRNG, TRNG, RNDEngines
TORNADOElliptic Curves
P-192, P-224, P-256, P-384, secp192k1, secp192r1, secp224k1, secp224r1, secp256k1, secp256r1, secp384r1, brainpoolP192r1, brainpoolP192t1, brainpoolP224r1, brainpoolP224t1, brainpoolP256r1, brainpoolP256t1, brainpoolP320r1, brainpoolP320t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1Block cipher modes
ECBVendor
SamsungSecurity level
EAL5, EAL 4, EAL 5, EAL5 augmented, EAL 4 augmented, EAL 5 augmentedClaims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARV, ADV_FSP, ADV_IMP, ADV_VAN, ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.2, ADV_TDS.3, ADV_FSP.4, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_DVS.1, ALC_CMS.4, ATE_COV, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FAU_GEN.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_COP, FCS_CKM.1, FCS_CKM.4, FCS_CKM, FCS_CKM.2, FDP_ACF, FDP_ITT.1, FDP_ITT.1.1, FDP_ACC.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_SDI.1, FDP_ACC, FDP_IFC, FDP_ITT, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.2, FMT_MSA, FMT_SMF, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_PHP, FPT_ITT.1, FPT_ITT.1.1, FPT_FLS, FPT_ITT, FRU_FLT.2, FRU_FLT.1, FRU_FLTProtection profiles
BSI-PP-0035Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, side-channel, side channel, DPA, SPA, timing attacks, timing attack, physical tampering, Malfunction, malfunction, DFA, fault injection, reverse engineeringStandards
FIPS PUB 186-3, BSI-AIS31, AIS31, AIS 31, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004Technical reports
BSI TR-02102File metadata
| Title | Microsoft Word - ST Lite Crow5 v1.0.docx |
|---|---|
| Author | yoojin.baek |
| Creation date | D:20120323175925 |
| Modification date | D:20120323175925 |
| Pages | 63 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | GPL Ghostscript 8.15 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0801-2012Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_SPM.1, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.3, ALC_LCD.1, ALC_TAT.2, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
Showing 5 out of 165.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "42f1037b2b7195ff",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0801-2012",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"f6d23054061d72ba"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0882-2013"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0720-2011"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0882-2013",
"BSI-DSZ-CC-0882-V2-2019"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0547-2009",
"BSI-DSZ-CC-0720-2011",
"BSI-DSZ-CC-0639-2010",
"BSI-DSZ-CC-0719-2011"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2018-05-09",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0801ra3a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0801ra3b_pdf.pdf",
"maintenance_title": "Reassessment - Samsung S3CT9P3 16-bit SecuCalm RISC Microcontroller for Smart Card with optional Secure RSA and ECC library including specific IC Dedicated Software"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2017-01-19",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0801ma1a_pdf.pdf",
"maintenance_st_link": null,
"maintenance_title": "Samsung S3CT9P3 16-Bit RISC Microcontroller for Smart Cards, Revision 0 with optional Secure RSA and ECC Library (Version 2.0) including specific IC Dedicated Software"
}
]
},
"manufacturer": "Samsung Electronics Co., Ltd.",
"manufacturer_web": "https://www.samsung.com",
"name": "Samsung S3CT9P3 16-Bit RISC Microcontroller for Smart Cards, Revision 0 with optional Secure RSA and ECC Library (Version 2.0) including specific IC Dedicated Software",
"not_valid_after": "2019-09-01",
"not_valid_before": "2012-08-13",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0801a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0801-2012",
"cert_item": "Samsung S3CT9P3 16-Bit RISC Microcontroller for Smart Cards, Revision 0 with optional Secure RSA and ECC Library (Version 2.0) including specific IC Dedicated Software",
"cert_lab": "BSI",
"developer": "Samsung Electronics",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 19
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0720-2011": 2,
"BSI-DSZ-CC-0801": 1,
"BSI-DSZ-CC-0801-2012": 20
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0035-2007": 1,
"BSI-CC-PP-0035-2007": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 2,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 2,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 2,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 7,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 3,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 2,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 3,
"EAL 5": 6,
"EAL 5 augmented": 3,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 7,
"EAL5": 8,
"EAL5+": 1,
"EAL6": 4,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"1, 2012-04-30, T\u00dcViT (confidential document) [8] Life Cycle Definition (Class ALC_CMC.4/CMS.5) \u2013 Project Crow V, Version 1.1, 2012-03-06": 1,
"Electronics (confidential document) [9] Security Target Lite of S3CT9P3 16-bit RISC Microcontroller for Smart Card with optional": 1,
"evaluation according to AIS 36 for the Product S3CT9P3 Revision 0, Version 1.0, 2012-04-30, T\u00dcViT (confidential document) [12] User\u2019s manual S3CT9XX 16-Bit CMOS Microcontroller for Smart Card, Supported Device": 1,
"specific IC Dedicated Software \u2013 Project Crow V, Version 1.3, 2012-03-22, Samsung Electronics (confidential document) [7] Evaluation Technical Report Summary (ETR Summary), BSI-DSZ-CC-0801, S3CT9P3 Revision 0": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {
"ICFab": {
"IC Fabricator": 1
},
"ICVersion": {
"IC Version": 1
}
},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 2,
"T\u00dcViT": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA1": 1
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
},
"TRNG": {
"DTRNG": 10,
"TRNG": 2
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"physical tampering": 1
},
"SCA": {
"DPA": 3,
"SPA": 2,
"physical probing": 1,
"side-channel": 1
}
},
"standard_id": {
"BSI": {
"AIS 25": 2,
"AIS 26": 3,
"AIS 31": 4,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 4,
"AIS 38": 1,
"AIS25": 1,
"AIS31": 2,
"AIS32": 1,
"AIS34": 1,
"AIS35": 1,
"AIS38": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"3DES": 2,
"Triple-DES": 2
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"HMAC": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 26
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20121105112000+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Samsung S3CT9P3 16-Bit RISC Microcontroller for Smart Cards, Revision 0 with optional Secure RSA and ECC Library (Version 2.0) including specific IC Dedicated Software, Samsung Electronics\"",
"/ModDate": "D:20121105153229+01\u002700\u0027",
"/Producer": "LibreOffice 3.5",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0801-2012",
"pdf_file_size_bytes": 1066087,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.dea/",
"https://www.bsi.bund.de/zertifizierung"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "0801b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 28
},
"ECDH": {
"ECDH": 8
},
"ECDSA": {
"ECDSA": 14
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 2
}
},
"RSA": {
"RSA-CRT": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.RND": 5
},
"T": {
"T.RND": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 7,
"ADV_ARV": 1,
"ADV_FSP": 2,
"ADV_FSP.2": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 3,
"ADV_IMP": 1,
"ADV_IMP.1": 2,
"ADV_INT.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_VAN": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 2,
"AGD_PRE": 1,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 1,
"ALC_CMS": 2,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 7,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 13
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 5": 2,
"EAL 5 augmented": 2,
"EAL5": 6,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 1,
"FAU_SAS": 8,
"FAU_SAS.1": 12,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 9,
"FCS_CKM.1": 18,
"FCS_CKM.2": 4,
"FCS_CKM.4": 10,
"FCS_COP": 16,
"FCS_COP.1": 23,
"FCS_RNG": 6,
"FCS_RNG.1": 15,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 13,
"FDP_ACC.1.1": 1,
"FDP_ACF": 4,
"FDP_ACF.1": 9,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 18,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 3,
"FDP_ITC.1": 8,
"FDP_ITC.2": 8,
"FDP_ITT": 1,
"FDP_ITT.1": 17,
"FDP_ITT.1.1": 1,
"FDP_SDI.1": 1
},
"FMT": {
"FMT_LIM": 13,
"FMT_LIM.1": 29,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 31,
"FMT_LIM.2.1": 2,
"FMT_MSA": 2,
"FMT_MSA.1": 9,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 4,
"FMT_MSA.3": 10,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 6
},
"FPT": {
"FPT_FLS": 1,
"FPT_FLS.1": 21,
"FPT_FLS.1.1": 1,
"FPT_ITT": 1,
"FPT_ITT.1": 15,
"FPT_ITT.1.1": 1,
"FPT_PHP": 3,
"FPT_PHP.3": 20,
"FPT_PHP.3.1": 1
},
"FRU": {
"FRU_FLT": 1,
"FRU_FLT.1": 1,
"FRU_FLT.2": 17
}
},
"certification_process": {},
"cipher_mode": {
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {
"TORNADO": {
"TORNADO": 1
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP192r1": 4,
"brainpoolP192t1": 4,
"brainpoolP224r1": 4,
"brainpoolP224t1": 4,
"brainpoolP256r1": 4,
"brainpoolP256t1": 4,
"brainpoolP320r1": 4,
"brainpoolP320t1": 4,
"brainpoolP384r1": 4,
"brainpoolP384t1": 4,
"brainpoolP512r1": 4,
"brainpoolP512t1": 4
},
"NIST": {
"P-192": 8,
"P-224": 8,
"P-256": 8,
"P-384": 8,
"secp192k1": 4,
"secp192r1": 4,
"secp224k1": 4,
"secp224r1": 4,
"secp256k1": 4,
"secp256r1": 4,
"secp384r1": 3
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1,
"SHA1": 2
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 2,
"SHA-384": 2,
"SHA-512": 2,
"SHA224": 6,
"SHA256": 6,
"SHA384": 6,
"SHA512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 10
},
"TRNG": {
"DTRNG": 18,
"TRNG": 2
}
},
"side_channel_analysis": {
"FI": {
"DFA": 5,
"Malfunction": 24,
"fault injection": 2,
"malfunction": 11,
"physical tampering": 2
},
"SCA": {
"DPA": 11,
"Leak-Inherent": 21,
"Physical Probing": 4,
"Physical probing": 2,
"SPA": 10,
"physical probing": 9,
"side channel": 2,
"side-channel": 4,
"timing attack": 6,
"timing attacks": 1
},
"other": {
"reverse engineering": 6
}
},
"standard_id": {
"BSI": {
"AIS 31": 2,
"AIS31": 1,
"BSI-AIS31": 3
},
"CC": {
"CCMB-2009-07-001": 3,
"CCMB-2009-07-002": 3,
"CCMB-2009-07-003": 3,
"CCMB-2009-07-004": 3
},
"FIPS": {
"FIPS PUB 186-3": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 6,
"TDEA": 1,
"Triple-DES": 2
},
"DES": {
"DES": 9
}
},
"constructions": {
"MAC": {
"HMAC": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "yoojin.baek",
"/CreationDate": "D:20120323175925",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20120323175925",
"/Producer": "GPL Ghostscript 8.15",
"/Title": "Microsoft Word - ST Lite Crow5 v1.0.docx",
"pdf_file_size_bytes": 924978,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 63
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0801a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"AVA_VAN.5",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0801b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d669e3f634547c8eac5348a909cf42ef6271118f86eca393c01c30f84ffa0d12",
"txt_hash": "c40c4d00fb17a2c251cd6fa7d93cc7600e201732f8cc1a9ce5c18b8864d171d8"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "1a9451e7785792799166fc4df3f524799a42c48d4e84c5939858e67c7a6d6fdb",
"txt_hash": "f25dacfb39c37e63cb4da99571d99393d03a6fdb145cf20a54eb9bff8c4dedab"
}
},
"status": "archived"
}