SAM 5000 build 4.12, BOS-V1 and RMS firmware with ID 80001141 CL97 Asymmetric Crypto Library for Crypto@2304T RSA/ECC/Toolbox v2.07.003, and Infineon Technologies Smart Card IC Security Controller M9900, design step A22 and G11, of the SLE97 family (smart card), or the SLI97 family (VQFN chip)
CSV information ?
Status | archived |
---|---|
Valid from | 28.08.2018 |
Valid until | 28.08.2023 |
Scheme | 🇸🇪 SE |
Manufacturer | Kapsch TrafficCom S.r.l. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL5 |
Heuristics summary ?
Certificate ?
Extracted keywords
Vendor
Infineon TechnologiesSecurity level
EAL 2, EAL 5Security Assurance Requirements (SAR)
ALC_FLREvaluation facilities
Combitech ABFile metadata
Creation date | D:20180828085843+02'00' |
---|---|
Modification date | D:20180828093024+02'00' |
Pages | 1 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DESAsymmetric Algorithms
ECC, DHHash functions
SHA-1, SHA-256Schemes
MACRandomness
RNG, RNDVendor
Infineon Technologies, InfineonSecurity level
EAL 5, EAL 2, EAL 4Claims
T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.5, ADV_COMP.1, ADV_ARC, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.2, ALC_COMP.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_COMP.1, AVA_VAN.4, AVA_COMP.1, AVA_VAN, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_COMP.1Protection profiles
BSI-PP-0035Certificates
BSI-DSZ-CC-0827-V7-2017, CSEC2017020Evaluation facilities
Combitech ABSide-channel analysis
Leak-Inherent, Physical Probing, Malfunction, JILStandards
ISO/IEC 17025, CCMB-2017-04-001, CCMB-2017-04-004File metadata
Title | Microsoft Word - Certification Report - SAM5000 |
---|---|
Author | hesve |
Creation date | D:20180828085420+02'00' |
Modification date | D:20180828104437+02'00' |
Pages | 17 |
Producer | Microsoft: Print To PDF |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, Triple-DES, TDES, CMACAsymmetric Algorithms
RSA 2048, RSA 1024, RSA 4096, ECDH, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-256, SHA256Schemes
MACRandomness
TRNG, DRBG, RNG, RNDElliptic Curves
P-256, P-521, NIST P-256, NIST P-521Block cipher modes
ECB, CBCVendor
Infineon Technologies, Infineon, Infineon Technologies AGSecurity level
EAL5Claims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.4, ADV_TDS.3, ADV_ARC, ADV_INT, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.2, ALC_CMS.4, ALC_TAT.1, ALC_CMC, ALC_DEL, ALC_LCD, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.2, AVA_VAN.5, AVA_VAN.4, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_CKM, FCS_CKM.3, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_COP.1, FCS_CKM.2, FCS_RNG.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_ETC.2, FDP_ITC.2, FDP_ITC.2.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ITC.1, FDP_ITT.1, FDP_SDI.1, FDP_SDI.2, FIA_AFL, FIA_SOS.1, FIA_UAU.1, FIA_UAU.5, FIA_UAU.6, FIA_AFL.1, FIA_UAU.1.2, FIA_UAU.5.2, FMT_MSA.3, FMT_SMF.1, FMT_MSA.3.2, FMT_SMR.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FPT_RPL.1, FPT_TEE.1, FPT_RPL.1.2, FPT_TEE.1.2, FPT_TDC.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_TST.2, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-035, BSI-PP-0035, BSI-PP- 0035Certificates
BSI-DSZ-CC-0827-V6-2017Evaluation facilities
Combitech ABSide-channel analysis
Leak-Inherent, Physical Probing, physical probing, Malfunction, malfunctionStandards
FIPS 140-2, FIPS PUB 180-4, FIPS PUB 186-2, PKCS #1, RFC 5639, ISO/IEC 15446, ISO/IEC 10116:2006, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003File metadata
Title | Microsoft Word - 902390D.docx |
---|---|
Author | stgran |
Creation date | D:20180321144633+01'00' |
Modification date | D:20180828105702+02'00' |
Pages | 73 |
Producer | Microsoft: Print To PDF |
References
Outgoing- BSI-DSZ-CC-0827-V6-2017 - archived - Infineon Technologies Smart Card IC (Security Controller) M9900 A22/G11/C22/D22, M9905 A11, M9906 A11 with optional RSA v1.03.006/v2.05.005/v2.07.003, EC v1.03.006/v2.05.005/v2.07.003, Toolbox v1.03.006/v2.05.005/v2.07.003, Flash Translation Layer V1.01.0008, SCL v2.01.011/v2.02.010 and PSL v4.00.09 libraries with specific IC dedicated software
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, AVA_COMP.1, ALC_CMS.5, ATE_COMP.1, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ALC_TAT.2, ADV_ARC.1, ALC_COMP.1, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ADV_COMP.1, ASE_ECD.1, ASE_COMP.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2Similar certificates
References ?
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'db08081085060c85cb23d2c597880562ffd4aa705874b93d435cf9476345454f', 'txt_hash': 'e3542744e01ae7e3be4b57e954bc29ac642262dae7ef92f8265b1f4db2739b89'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4e776525afd1088624c1b11aea368090679ea61933043c0eb98958d43b1ba311', 'txt_hash': '9fef3691df64d0fe4620d98a76ce3ae5db27aca945d51ba4727cd3064b05c15e'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4e9d9f14b64e48452c5a2ee5eb8fbd98e98d5105e9a7141696846f07ad81cd96', 'txt_hash': '534eb2bb06d7fc7125e0c49386e29ba765de1c4a6e7150ec0f654cbf2ef4a502'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 859066, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 17, '/Author': 'hesve', '/CreationDate': "D:20180828085420+02'00'", '/ModDate': "D:20180828104437+02'00'", '/Producer': 'Microsoft: Print To PDF', '/Title': 'Microsoft Word - Certification Report - SAM5000', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1184710, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 73, '/Author': 'stgran', '/CreationDate': "D:20180321144633+01'00'", '/ModDate': "D:20180828105702+02'00'", '/Producer': 'Microsoft: Print To PDF', '/Title': 'Microsoft Word - 902390D.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 278986, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20180828085843+02'00'", '/ModDate': "D:20180828093024+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0827-V7-2017': 1}, 'SE': {'CSEC2017020': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 2}}, 'cc_security_level': {'EAL': {'EAL 5': 2, 'EAL 2': 1, 'EAL 4': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 1, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.5': 1, 'ADV_COMP.1': 1, 'ADV_ARC': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_COMP.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COMP.1': 1}, 'AVA': {'AVA_VAN.4': 1, 'AVA_COMP.1': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_COMP.1': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.RND': 1}}, 'vendor': {'Infineon': {'Infineon Technologies': 4, 'Infineon': 1}}, 'eval_facility': {'Combitech': {'Combitech AB': 5}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 6}, '3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 4}}, 'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1, 'RND': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'Physical Probing': 1}, 'FI': {'Malfunction': 2}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0827-V6-2017': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-035': 11, 'BSI-PP-0035': 3, 'BSI-PP- 0035': 1}}, 'cc_security_level': {'EAL': {'EAL5': 6}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.5': 2, 'ADV_IMP.1': 3, 'ADV_INT.2': 2, 'ADV_TDS.4': 2, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1, 'ADV_ARC': 1, 'ADV_INT': 1}, 'AGD': {'AGD_OPE.1': 3, 'AGD_PRE.1': 3}, 'ALC': {'ALC_DVS.2': 2, 'ALC_CMC.4': 3, 'ALC_CMS.5': 2, 'ALC_DEL.1': 3, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_TAT.2': 2, 'ALC_CMS.4': 1, 'ALC_TAT.1': 1, 'ALC_CMC': 1, 'ALC_DEL': 1, 'ALC_LCD': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_DPT.3': 2, 'ATE_FUN.1': 3, 'ATE_IND.2': 3, 'ATE_DPT.2': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN.4': 3}, 'ASE': {'ASE_CCL.1': 3, 'ASE_ECD.1': 3, 'ASE_INT.1': 3, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 3}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_CKM': 42, 'FCS_CKM.3': 7, 'FCS_CKM.4': 42, 'FCS_COP': 117, 'FCS_CKM.1': 19, 'FCS_COP.1': 17, 'FCS_CKM.2': 5, 'FCS_RNG.1': 1}, 'FDP': {'FDP_ACC.1': 13, 'FDP_ACF.1': 9, 'FDP_IFC.1': 15, 'FDP_IFF.1': 8, 'FDP_ETC.2': 12, 'FDP_ITC.2': 31, 'FDP_ITC.2.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_ITC.2.2': 1, 'FDP_ITC.2.3': 1, 'FDP_ITC.2.4': 1, 'FDP_ITC.2.5': 1, 'FDP_ITC.1': 15, 'FDP_ITT.1': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_AFL': 16, 'FIA_SOS.1': 8, 'FIA_UAU.1': 9, 'FIA_UAU.5': 8, 'FIA_UAU.6': 7, 'FIA_AFL.1': 4, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.2': 1}, 'FMT': {'FMT_MSA.3': 14, 'FMT_SMF.1': 8, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_MSA.1': 1}, 'FPT': {'FPT_RPL.1': 8, 'FPT_TEE.1': 8, 'FPT_RPL.1.2': 1, 'FPT_TEE.1.2': 1, 'FPT_TDC.1': 2, 'FPT_FLS.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1}}, 'cc_claims': {'O': {'O.RND': 2}, 'T': {'T.RND': 1}}, 'vendor': {'Infineon': {'Infineon Technologies': 3, 'Infineon': 8, 'Infineon Technologies AG': 3}}, 'eval_facility': {'Combitech': {'Combitech AB': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 51}}, 'DES': {'DES': {'DES': 44}, '3DES': {'3DES': 2, 'Triple-DES': 1, 'TDES': 1}}, 'constructions': {'MAC': {'CMAC': 6}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 6, 'RSA 1024': 1, 'RSA 4096': 1}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECC': {'ECC': 22}}, 'FF': {'DH': {'DH': 7, 'Diffie-Hellman': 7}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-256': 7, 'SHA256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 36}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'DRBG': 1}, 'RNG': {'RNG': 4, 'RND': 3}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 20}}, 'ecc_curve': {'NIST': {'P-256': 6, 'P-521': 2, 'NIST P-256': 2, 'NIST P-521': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 5, 'Physical Probing': 2, 'physical probing': 1}, 'FI': {'Malfunction': 5, 'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 2, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-2': 1}, 'PKCS': {'PKCS #1': 2}, 'RFC': {'RFC 5639': 1}, 'ISO': {'ISO/IEC 15446': 2, 'ISO/IEC 10116:2006': 1}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL 5': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies': 1}}, 'eval_facility': {'Combitech': {'Combitech AB': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
Certification Report - SAM5000.pdf
. - The st_filename property was set to
SecurityTargetLite-KapschSAM5000-B.pdf
. - The cert_filename property was set to
Certifikat SAM 5000 - CCRA.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
CSEC2017020
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0827-V6-2017']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0827-V6-2017']}}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20SAM5000.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecurityTargetLite-KapschSAM5000-B.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
None
. - The cert_keywords property was set to
None
. - The cert_filename property was set to
None
.
- The cert property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name SAM 5000 build 4.12, BOS-V1 and RMS firmware with ID 80001141 CL97 Asymmetric Crypto Library for Crypto@2304T RSA/ECC/Toolbox v2.07.003, and Infineon Technologies Smart Card IC Security Controller M9900, design step A22 and G11, of the SLE97 family (smart card), or the SLI97 family (VQFN chip) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certifikat%20SAM%205000%20-%20CCRA.pdf",
"dgst": "471a372b97a0b9f4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CSEC2017020",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.07.003",
"4.12"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V6-2017"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V6-2017"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Kapsch TrafficCom S.r.l.",
"manufacturer_web": "https://www.kapsch.net/",
"name": "SAM 5000 build 4.12, BOS-V1 and RMS firmware with ID 80001141 CL97 Asymmetric Crypto Library for Crypto@2304T RSA/ECC/Toolbox v2.07.003, and Infineon Technologies Smart Card IC Security Controller M9900, design step A22 and G11, of the SLE97 family (smart card), or the SLI97 family (VQFN chip)",
"not_valid_after": "2023-08-28",
"not_valid_before": "2018-08-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "Certifikat SAM 5000 - CCRA.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Combitech": {
"Combitech AB": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20180828085843+02\u002700\u0027",
"/ModDate": "D:20180828093024+02\u002700\u0027",
"pdf_file_size_bytes": 278986,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "Certification Report - SAM5000.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
}
},
"FF": {
"DH": {
"DH": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0827-V7-2017": 1
},
"SE": {
"CSEC2017020": 1
}
},
"cc_claims": {
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_COMP.1": 1,
"ADV_FSP.5": 1,
"ADV_IMP.1": 1,
"ADV_INT.2": 1,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_COMP.1": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_COMP.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COMP.1": 1,
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_COMP.1": 1,
"AVA_VAN": 1,
"AVA_VAN.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 5": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Combitech": {
"Combitech AB": 5
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 1,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 2
},
"SCA": {
"Leak-Inherent": 1,
"Physical Probing": 1
},
"other": {
"JIL": 2
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-004": 1
},
"ISO": {
"ISO/IEC 17025": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"DES": {
"3DES": {
"3DES": 1
},
"DES": {
"DES": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 1,
"Infineon Technologies": 4
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "hesve",
"/CreationDate": "D:20180828085420+02\u002700\u0027",
"/ModDate": "D:20180828104437+02\u002700\u0027",
"/Producer": "Microsoft: Print To PDF",
"/Title": "Microsoft Word - Certification Report - SAM5000",
"pdf_file_size_bytes": 859066,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "SecurityTargetLite-KapschSAM5000-B.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 22
},
"ECDH": {
"ECDH": 1
}
},
"FF": {
"DH": {
"DH": 7,
"Diffie-Hellman": 7
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA 1024": 1,
"RSA 2048": 6,
"RSA 4096": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0827-V6-2017": 1
}
},
"cc_claims": {
"O": {
"O.RND": 2
},
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP- 0035": 1,
"BSI-PP-0035": 3,
"BSI-PP-035": 11
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 3,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_IMP.1": 3,
"ADV_INT": 1,
"ADV_INT.2": 2,
"ADV_TDS.3": 1,
"ADV_TDS.4": 2
},
"AGD": {
"AGD_OPE.1": 3,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 3,
"ALC_CMS.4": 1,
"ALC_CMS.5": 2,
"ALC_DEL": 1,
"ALC_DEL.1": 3,
"ALC_DVS.1": 2,
"ALC_DVS.2": 2,
"ALC_LCD": 1,
"ALC_LCD.1": 3,
"ALC_TAT.1": 1,
"ALC_TAT.2": 2
},
"ASE": {
"ASE_CCL.1": 3,
"ASE_ECD.1": 3,
"ASE_INT.1": 3,
"ASE_OBJ.2": 3,
"ASE_REQ.2": 3,
"ASE_SPD.1": 3,
"ASE_TSS.1": 3
},
"ATE": {
"ATE_COV.2": 3,
"ATE_DPT.2": 1,
"ATE_DPT.3": 2,
"ATE_FUN.1": 3,
"ATE_IND.2": 3
},
"AVA": {
"AVA_VAN.4": 3,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL5": 6
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 1
},
"FCS": {
"FCS_CKM": 42,
"FCS_CKM.1": 19,
"FCS_CKM.2": 5,
"FCS_CKM.3": 7,
"FCS_CKM.4": 42,
"FCS_COP": 117,
"FCS_COP.1": 17,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC.1": 13,
"FDP_ACF.1": 9,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_ETC.2": 12,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC.1": 15,
"FDP_IFF.1": 8,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC.1": 15,
"FDP_ITC.2": 31,
"FDP_ITC.2.1": 1,
"FDP_ITC.2.2": 1,
"FDP_ITC.2.3": 1,
"FDP_ITC.2.4": 1,
"FDP_ITC.2.5": 1,
"FDP_ITT.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 1
},
"FIA": {
"FIA_AFL": 16,
"FIA_AFL.1": 4,
"FIA_SOS.1": 8,
"FIA_UAU.1": 9,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 8,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 7
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MSA.1": 1,
"FMT_MSA.3": 14,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 8,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1,
"FPT_RPL.1": 8,
"FPT_RPL.1.2": 1,
"FPT_TDC.1": 2,
"FPT_TEE.1": 8,
"FPT_TEE.1.2": 1,
"FPT_TST.2": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC.1": 1,
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 20
},
"ECB": {
"ECB": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 36
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"NIST P-256": 2,
"NIST P-521": 2,
"P-256": 6,
"P-521": 2
}
},
"eval_facility": {
"Combitech": {
"Combitech AB": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 8
},
"SHA2": {
"SHA-256": 7,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
},
"RNG": {
"RND": 3,
"RNG": 4
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 5,
"malfunction": 2
},
"SCA": {
"Leak-Inherent": 5,
"Physical Probing": 2,
"physical probing": 1
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1
},
"FIPS": {
"FIPS 140-2": 2,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-2": 1
},
"ISO": {
"ISO/IEC 10116:2006": 1,
"ISO/IEC 15446": 2
},
"PKCS": {
"PKCS #1": 2
},
"RFC": {
"RFC 5639": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 51
}
},
"DES": {
"3DES": {
"3DES": 2,
"TDES": 1,
"Triple-DES": 1
},
"DES": {
"DES": 44
}
},
"constructions": {
"MAC": {
"CMAC": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 8,
"Infineon Technologies": 3,
"Infineon Technologies AG": 3
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "stgran",
"/CreationDate": "D:20180321144633+01\u002700\u0027",
"/ModDate": "D:20180828105702+02\u002700\u0027",
"/Producer": "Microsoft: Print To PDF",
"/Title": "Microsoft Word - 902390D.docx",
"pdf_file_size_bytes": 1184710,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 73
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20SAM5000.pdf",
"scheme": "SE",
"security_level": {
"_type": "Set",
"elements": [
"EAL5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecurityTargetLite-KapschSAM5000-B.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4e9d9f14b64e48452c5a2ee5eb8fbd98e98d5105e9a7141696846f07ad81cd96",
"txt_hash": "534eb2bb06d7fc7125e0c49386e29ba765de1c4a6e7150ec0f654cbf2ef4a502"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "db08081085060c85cb23d2c597880562ffd4aa705874b93d435cf9476345454f",
"txt_hash": "e3542744e01ae7e3be4b57e954bc29ac642262dae7ef92f8265b1f4db2739b89"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4e776525afd1088624c1b11aea368090679ea61933043c0eb98958d43b1ba311",
"txt_hash": "9fef3691df64d0fe4620d98a76ce3ae5db27aca945d51ba4727cd3064b05c15e"
}
},
"status": "archived"
}