Samsung STRONGV4P00 of S5E9945 with Specific IC Dedicated Software Revision 1.0

CSV information ?

Status active
Valid from 26.03.2024
Valid until 26.03.2029
Scheme 🇳🇱 NL
Manufacturer Samsung Electronics Co., Ltd.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL5+, ALC_FLR.2, ALC_DVS.2

Heuristics summary ?

Certificate ID: NSCIB-CC-2300085-01-CR

Certificate ?

Extracted keywords

Security level
EAL5, EAL2, EAL7, EAL5 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.2, ALC_FLR.3, ALC_FLR, AVA_VAN.5
Protection profiles
BSI-CC-PP-0117
Certificates
NSCIB-CC-2300085-01, NSCIB-2300085-01
Evaluation facilities
SGS, SGS Brightsight, Brightsight

Standards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008

File metadata

Title NSCIB Certificate
Author JM2
Creation date D:20240329105323+00'00'
Modification date D:20240329105323+00'00'
Pages 1
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, HMAC, CBC-MAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Post-quantum Algorithms
PQC
Hash functions
SHA2
Schemes
MAC
Randomness
TRNG, RNG
Block cipher modes
ECB, CBC

Vendor
Samsung

Security level
EAL4, EAL5, EAL5+, EAL 5, EAL5 augmented, EAL 5 augmented
Security Assurance Requirements (SAR)
ADV_IMP, ALC_DVS.2, ALC_FLR.2, AVA_VAN.5, AVA_VAN
Protection profiles
BSI-CC-PP-0117
Certificates
NSCIB-CC-2300085-01-CR, NSCIB-2300085-01
Evaluation facilities
SGS, SGS Brightsight, Brightsight

Side-channel analysis
side-channel, DFA, Fault Injection, JIL-AM, JIL-AAPS, JIL

File metadata

Title Certification Report
Author sjon
Creation date D:20240329105158+00'00'
Modification date D:20240329105158+00'00'
Pages 12
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Frontpage

Certificate ID NSCIB-CC-2300085-01-CR
Certified item STRONGV4P00 of S5E9945 with Specific IC Dedicated Software Revision 1.0
Certification lab SGS Brightsight B.V.
Developer SAMSUNG Electronics Co. Ltd

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, Triple-DES, TDEA, HMAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman, DSA
Post-quantum Algorithms
CRYSTALS, PQC
Hash functions
SHA1, SHA256, SHA384, SHA512, SHA-256, SHA-384, SHA-512, SHA2, SHA-2, SHA-3, SHA3
Schemes
Key Agreement
Protocols
PGP
Randomness
TRNG, RNG, RND
Elliptic Curves
P-224, P-256, P-384, P-521, secp224k1, secp224r1, secp256k1, secp256r1, secp384r1, secp521r1, brainpoolP224r1, brainpoolP224t1, brainpoolP256r1, brainpoolP256t1, brainpoolP320r1, brainpoolP320t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1, Curve25519
Block cipher modes
ECB, CBC, CTR, GCM

JavaCard API constants
PAD_SYSTEM
Vendor
Samsung

Security level
EAL5, EAL 4, EAL5 augmented
Claims
O.RSA, O.ECDSA, O.ECDH, O.RND, O.MEM_ACCESS, T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.4, ADV_TDS.3, ADV_ARC, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_DEL, ALC_CMS, ALC_CMC, ALC_DVS.1, ATE_DPT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_FUN, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_CKM, FCS_CKM.2, FDP_SDC, FDP_ACF, FDP_SDC.1, FDP_SDI, FDP_SDC.1.1, FDP_SDI.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_ITT, FDP_ACC.1, FDP_IFC, FDP_IFF.1, FDP_ACF.1, FDP_ACC, FDP_URC, FDP_URC.1, FDP_IRA.1, FDP_URC.1.2, FDP_IRA, FDP_IRA.1.1, FDP_IRA.1.2, FDP_IRA.1.3, FDP_DAU.2, FDP_DAU, FDP_DAU.1, FDP_UCT.1, FDP_UCT, FDP_UIT.1, FDP_UIT, FDP_ITC.1, FDP_ITC.2, FIA_UAU.1, FIA_UID.1, FIA_UID, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA, FMT_CKM.4, FPT_INI, FPT_INI.1, FPT_INI.1.1, FPT_INI.1.2, FPT_INI.1.3, FPT_FLS.1, FPT_FLS, FPT_PHP.3, FPT_PHP.3.1, FPT_ITT.1, FPT_ITT, FPT_FLT, FPT_RPL.1, FPT_RPL, FRU_FLT, FRU_FLT.1, FRU_FLT.2, FTP_ITC.1, FTP_ITC, FTP_TRP.1
Protection profiles
BSI-CC-PP-0117

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, side-channel, side channel, SPA, DPA, Timing Attacks, timing attacks, physical tampering, Malfunction, malfunction, DFA, Fault Injection, reverse engineering

Standards
FIPS PUB 180-3, FIPS 180-4, FIPS PUB 202, FIPS197, FIPS PUB 198-1, FIPS 197, NIST SP 800-90A, RFC7748, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title Delphinus2_Security_Tartget
Author Windows 사용자
Creation date D:20240312191619+09'00'
Modification date D:20240312191619+09'00'
Pages 116
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics ?

Certificate ID: NSCIB-CC-2300085-01-CR

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Scheme data ?

Cert Id NSCIB-CC-2300085-01-CR
Certification Date 26.03.2024
Status Issued
Product STRONGV4P00 of S5E9945 with Specific IC Dedicated Software version 1
Developer SAMSUNG Electronics Co. Ltd.
Evaluation Facility SGS Brightsight
Level EAL5+ AVA_VAN.5, ALC_DVS.2, ALC_FLR.2
Cert Link https://trustcb.com/download/?wpdmdl=3970
Report Link https://trustcb.com/download/?wpdmdl=3971
Target Link https://trustcb.com/download/?wpdmdl=3972

References ?

No references are available for this certificate.

Updates ?

  • 09.12.2024 The certificate became unavailable, either the certification report or the security target was unavailable during processing.
    Certificate removed

    A Common Criteria certificate for a product named Samsung STRONGV4P00 of S5E9945 with Specific IC Dedicated Software Revision 1.0 is not available. This means that its entry was removed from the Common Criteria portal (or that was replaced by a new entry).

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'cert_id': 'NSCIB-CC-2300085-01-CR', 'certification_date': '2024-03-26', 'status': 'Issued', 'product': 'STRONGV4P00 of S5E9945 with Specific IC Dedicated Software version 1', 'developer': 'SAMSUNG Electronics Co. Ltd.', 'evaluation_facility': 'SGS Brightsight', 'level': 'EAL5+ AVA_VAN.5, ALC_DVS.2, ALC_FLR.2', 'cert_link': 'https://trustcb.com/download/?wpdmdl=3970', 'report_link': 'https://trustcb.com/download/?wpdmdl=3971', 'target_link': 'https://trustcb.com/download/?wpdmdl=3972'}.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'pq_crypto': {'PQC': {'PQC': 1}}} data.
    • The st_keywords property was updated, with the {'pq_crypto': {'CRYSTALS': {'CRYSTALS': 1}, 'PQC': {'PQC': 3}}} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'eb0e661d5e92628d058171c755b9c966f0d91d74b111c64eade59c7fc92e5f47', 'txt_hash': '122faf9dc0a6f328adf96d2bdbbab9292244d92d7d2302e7fd692b5a5c964a01'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '93a8350f624966e3e0b20df17c9928a1f9ce37ce2e5d742cf282c464780de9cd', 'txt_hash': '2d1d5caca8905b2cb8dee571254e0c660b8534091cd887a37d05ff5ba6696015'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 3896073, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 116, '/Title': 'Delphinus2_Security_Tartget', '/Author': 'Windows 사용자', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20240312191619+09'00'", '/ModDate': "D:20240312191619+09'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/uploads/2015/01/RGS_v-2-0_B1.pdf']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 93112, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Title': 'NSCIB Certificate', '/Author': 'JM2', '/Creator': 'Microsoft® Word 2021', '/CreationDate': "D:20240329105323+00'00'", '/ModDate': "D:20240329105323+00'00'", '/Producer': 'Microsoft® Word 2021', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0117': 3}}, 'cc_security_level': {'EAL': {'EAL5': 6, 'EAL 4': 1, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 7, 'ADV_FSP.5': 1, 'ADV_IMP.1': 2, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1, 'ADV_ARC': 1}, 'AGD': {'AGD_OPE.1': 12, 'AGD_PRE.1': 8, 'AGD_OPE': 4, 'AGD_PRE': 5}, 'ALC': {'ALC_DVS.2': 9, 'ALC_FLR.2': 10, 'ALC_CMC.4': 16, 'ALC_CMS.5': 6, 'ALC_DEL.1': 6, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_DEL': 4, 'ALC_CMS': 5, 'ALC_CMC': 4, 'ALC_DVS.1': 1}, 'ATE': {'ATE_DPT.2': 1, 'ATE_COV.2': 5, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 4, 'ATE_FUN': 1}, 'AVA': {'AVA_VAN.5': 11}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 5, 'FAU_GEN': 2, 'FAU_SAS.1': 12, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RNG': 6, 'FCS_RNG.1': 12, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_COP.1': 31, 'FCS_CKM.4': 35, 'FCS_COP': 52, 'FCS_CKM.1': 57, 'FCS_CKM': 40, 'FCS_CKM.2': 4}, 'FDP': {'FDP_SDC': 17, 'FDP_ACF': 14, 'FDP_SDC.1': 5, 'FDP_SDI': 18, 'FDP_SDC.1.1': 1, 'FDP_SDI.1': 2, 'FDP_SDI.2': 5, 'FDP_ITT.1': 2, 'FDP_IFC.1': 11, 'FDP_ITT': 13, 'FDP_ACC.1': 14, 'FDP_IFC': 16, 'FDP_IFF.1': 4, 'FDP_ACF.1': 16, 'FDP_ACC': 14, 'FDP_URC': 7, 'FDP_URC.1': 6, 'FDP_IRA.1': 10, 'FDP_URC.1.2': 1, 'FDP_IRA': 13, 'FDP_IRA.1.1': 1, 'FDP_IRA.1.2': 1, 'FDP_IRA.1.3': 1, 'FDP_DAU.2': 3, 'FDP_DAU': 5, 'FDP_DAU.1': 1, 'FDP_UCT.1': 3, 'FDP_UCT': 5, 'FDP_UIT.1': 4, 'FDP_UIT': 5, 'FDP_ITC.1': 36, 'FDP_ITC.2': 36}, 'FIA': {'FIA_UAU.1': 3, 'FIA_UID.1': 5, 'FIA_UID': 6}, 'FMT': {'FMT_LIM': 32, 'FMT_LIM.1': 22, 'FMT_LIM.2': 21, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 1, 'FMT_MSA.3': 15, 'FMT_MSA.1': 12, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 7, 'FMT_MSA.1.1': 1, 'FMT_SMF.1': 7, 'FMT_SMF.1.1': 1, 'FMT_MSA': 1, 'FMT_CKM.4': 1}, 'FPT': {'FPT_INI': 5, 'FPT_INI.1': 13, 'FPT_INI.1.1': 2, 'FPT_INI.1.2': 2, 'FPT_INI.1.3': 2, 'FPT_FLS.1': 6, 'FPT_FLS': 35, 'FPT_PHP.3': 19, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 2, 'FPT_ITT': 11, 'FPT_FLT': 1, 'FPT_RPL.1': 4, 'FPT_RPL': 5}, 'FRU': {'FRU_FLT': 28, 'FRU_FLT.1': 2, 'FRU_FLT.2': 4}, 'FTP': {'FTP_ITC.1': 9, 'FTP_ITC': 7, 'FTP_TRP.1': 4}}, 'cc_claims': {'O': {'O.RSA': 1, 'O.ECDSA': 1, 'O.ECDH': 1, 'O.RND': 6, 'O.MEM_ACCESS': 1}, 'T': {'T.RND': 4}}, 'vendor': {'Samsung': {'Samsung': 43}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 19}}, 'DES': {'DES': {'DES': 7}, '3DES': {'TDES': 7, 'Triple-DES': 2, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 14}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 1}, 'ECC': {'ECDH': {'ECDH': 8}, 'ECDSA': {'ECDSA': 12}, 'ECC': {'ECC': 14}}, 'FF': {'DH': {'Diffie-Hellman': 2}, 'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2}, 'SHA2': {'SHA256': 4, 'SHA384': 4, 'SHA512': 2, 'SHA-256': 2, 'SHA-384': 2, 'SHA-512': 2, 'SHA2': 4, 'SHA-2': 1}, 'SHA3': {'SHA-3': 2, 'SHA3': 1}}}, 'crypto_scheme': {'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'PGP': {'PGP': 2}}, 'randomness': {'TRNG': {'TRNG': 18}, 'RNG': {'RNG': 9, 'RND': 10}}, 'cipher_mode': {'ECB': {'ECB': 6}, 'CBC': {'CBC': 3}, 'CTR': {'CTR': 3}, 'GCM': {'GCM': 3}}, 'ecc_curve': {'NIST': {'P-224': 8, 'P-256': 8, 'P-384': 8, 'P-521': 6, 'secp224k1': 4, 'secp224r1': 4, 'secp256k1': 4, 'secp256r1': 4, 'secp384r1': 4, 'secp521r1': 3}, 'Brainpool': {'brainpoolP224r1': 4, 'brainpoolP224t1': 4, 'brainpoolP256r1': 4, 'brainpoolP256t1': 4, 'brainpoolP320r1': 4, 'brainpoolP320t1': 4, 'brainpoolP384r1': 4, 'brainpoolP384t1': 4, 'brainpoolP512r1': 4, 'brainpoolP512t1': 4}, 'Curve': {'Curve25519': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 10, 'Physical Probing': 4, 'physical probing': 6, 'Physical probing': 2, 'side-channel': 1, 'side channel': 3, 'SPA': 3, 'DPA': 2, 'Timing Attacks': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 2, 'Malfunction': 20, 'malfunction': 11, 'DFA': 4, 'Fault Injection': 4}, 'other': {'reverse engineering': 4}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-3': 7, 'FIPS 180-4': 1, 'FIPS PUB 202': 3, 'FIPS197': 1, 'FIPS PUB 198-1': 2, 'FIPS 197': 1}, 'NIST': {'NIST SP 800-90A': 1}, 'RFC': {'RFC7748': 1}, 'CC': {'CCMB-2017-04-001': 5, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {'misc': {'PAD_SYSTEM': 1}}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'NL': {'NSCIB-CC-2300085-01': 1, 'NSCIB-2300085-01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0117': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1, 'EAL7': 1, 'EAL5 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'SGS': {'SGS': 1, 'SGS Brightsight': 1}, 'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408-1': 2, 'ISO/IEC 18045': 4, 'ISO/IEC 18045:2008': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to NSCIB-CC-2300085-01-ST_Lite_v0.1.pdf.
    • The cert_filename property was set to NSCIB-CC-2300085-01_CERT.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300085-01_CR.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300085-01-ST_Lite_v0.1.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Samsung STRONGV4P00 of S5E9945 with Specific IC Dedicated Software Revision 1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300085-01_CERT.pdf",
  "dgst": "54e6eb5c1bd57036",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-2300085-01-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "NSCIB-CC-2300085-01-CR",
      "cert_link": "https://trustcb.com/download/?wpdmdl=3970",
      "certification_date": "2024-03-26",
      "developer": "SAMSUNG Electronics Co. Ltd.",
      "evaluation_facility": "SGS Brightsight",
      "level": "EAL5+ AVA_VAN.5, ALC_DVS.2, ALC_FLR.2",
      "product": "STRONGV4P00 of S5E9945 with Specific IC Dedicated Software version 1",
      "report_link": "https://trustcb.com/download/?wpdmdl=3971",
      "status": "Issued",
      "target_link": "https://trustcb.com/download/?wpdmdl=3972"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Samsung Electronics Co., Ltd.",
  "manufacturer_web": "https://www.samsung.com",
  "name": "Samsung STRONGV4P00 of S5E9945 with Specific IC Dedicated Software Revision 1.0",
  "not_valid_after": "2029-03-26",
  "not_valid_before": "2024-03-26",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "NSCIB-CC-2300085-01_CERT.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "NSCIB-2300085-01": 1,
          "NSCIB-CC-2300085-01": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0117": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1,
          "EAL5 augmented": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        },
        "SGS": {
          "SGS": 1,
          "SGS Brightsight": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408-1": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 18045:2008": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "JM2",
      "/CreationDate": "D:20240329105323+00\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20240329105323+00\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "NSCIB Certificate",
      "pdf_file_size_bytes": 93112,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "NSCIB-CC-2300085-01_CR.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-2300085-01-CR",
        "cert_item": "STRONGV4P00 of S5E9945 with Specific IC Dedicated Software Revision 1.0",
        "cert_lab": " SGS Brightsight B.V.",
        "developer": "SAMSUNG Electronics Co. Ltd"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "NSCIB-2300085-01": 1,
          "NSCIB-CC-2300085-01-CR": 12
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0117": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_IMP": 1
        },
        "ALC": {
          "ALC_DVS.2": 2,
          "ALC_FLR.2": 2
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL4": 1,
          "EAL5": 1,
          "EAL5 augmented": 1,
          "EAL5+": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 2
        },
        "SGS": {
          "SGS": 2,
          "SGS Brightsight": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA2": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {
        "PQC": {
          "PQC": 1
        }
      },
      "randomness": {
        "RNG": {
          "RNG": 1
        },
        "TRNG": {
          "TRNG": 8
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Fault Injection": 1
        },
        "SCA": {
          "side-channel": 2
        },
        "other": {
          "JIL": 2,
          "JIL-AAPS": 2,
          "JIL-AM": 2
        }
      },
      "standard_id": {},
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1,
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "sjon",
      "/CreationDate": "D:20240329105158+00\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20240329105158+00\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 354378,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.sogis.eu/",
          "mailto:[email protected]",
          "https://nscib.nl/",
          "https://trustcb.com/common-criteria/nscib/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 12
    },
    "st_filename": "NSCIB-CC-2300085-01-ST_Lite_v0.1.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 14
          },
          "ECDH": {
            "ECDH": 8
          },
          "ECDSA": {
            "ECDSA": 12
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          },
          "DSA": {
            "DSA": 2
          }
        },
        "RSA": {
          "RSA-CRT": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.ECDH": 1,
          "O.ECDSA": 1,
          "O.MEM_ACCESS": 1,
          "O.RND": 6,
          "O.RSA": 1
        },
        "T": {
          "T.RND": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0117": 3
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 7,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 1,
          "ADV_IMP.1": 2,
          "ADV_INT.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE": 4,
          "AGD_OPE.1": 12,
          "AGD_PRE": 5,
          "AGD_PRE.1": 8
        },
        "ALC": {
          "ALC_CMC": 4,
          "ALC_CMC.4": 16,
          "ALC_CMS": 5,
          "ALC_CMS.5": 6,
          "ALC_DEL": 4,
          "ALC_DEL.1": 6,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 9,
          "ALC_FLR.2": 10,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 4,
          "ATE_COV.2": 5,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 11
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL5": 6,
          "EAL5 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 2,
          "FAU_SAS": 5,
          "FAU_SAS.1": 12,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 40,
          "FCS_CKM.1": 57,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 35,
          "FCS_COP": 52,
          "FCS_COP.1": 31,
          "FCS_RNG": 6,
          "FCS_RNG.1": 12,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1
        },
        "FDP": {
          "FDP_ACC": 14,
          "FDP_ACC.1": 14,
          "FDP_ACF": 14,
          "FDP_ACF.1": 16,
          "FDP_DAU": 5,
          "FDP_DAU.1": 1,
          "FDP_DAU.2": 3,
          "FDP_IFC": 16,
          "FDP_IFC.1": 11,
          "FDP_IFF.1": 4,
          "FDP_IRA": 13,
          "FDP_IRA.1": 10,
          "FDP_IRA.1.1": 1,
          "FDP_IRA.1.2": 1,
          "FDP_IRA.1.3": 1,
          "FDP_ITC.1": 36,
          "FDP_ITC.2": 36,
          "FDP_ITT": 13,
          "FDP_ITT.1": 2,
          "FDP_SDC": 17,
          "FDP_SDC.1": 5,
          "FDP_SDC.1.1": 1,
          "FDP_SDI": 18,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 5,
          "FDP_UCT": 5,
          "FDP_UCT.1": 3,
          "FDP_UIT": 5,
          "FDP_UIT.1": 4,
          "FDP_URC": 7,
          "FDP_URC.1": 6,
          "FDP_URC.1.2": 1
        },
        "FIA": {
          "FIA_UAU.1": 3,
          "FIA_UID": 6,
          "FIA_UID.1": 5
        },
        "FMT": {
          "FMT_CKM.4": 1,
          "FMT_LIM": 32,
          "FMT_LIM.1": 22,
          "FMT_LIM.1.1": 1,
          "FMT_LIM.2": 21,
          "FMT_LIM.2.1": 1,
          "FMT_MSA": 1,
          "FMT_MSA.1": 12,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 15,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 7,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 7
        },
        "FPT": {
          "FPT_FLS": 35,
          "FPT_FLS.1": 6,
          "FPT_FLT": 1,
          "FPT_INI": 5,
          "FPT_INI.1": 13,
          "FPT_INI.1.1": 2,
          "FPT_INI.1.2": 2,
          "FPT_INI.1.3": 2,
          "FPT_ITT": 11,
          "FPT_ITT.1": 2,
          "FPT_PHP.3": 19,
          "FPT_PHP.3.1": 1,
          "FPT_RPL": 5,
          "FPT_RPL.1": 4
        },
        "FRU": {
          "FRU_FLT": 28,
          "FRU_FLT.1": 2,
          "FRU_FLT.2": 4
        },
        "FTP": {
          "FTP_ITC": 7,
          "FTP_ITC.1": 9,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CTR": {
          "CTR": 3
        },
        "ECB": {
          "ECB": 6
        },
        "GCM": {
          "GCM": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PGP": {
          "PGP": 2
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP224r1": 4,
          "brainpoolP224t1": 4,
          "brainpoolP256r1": 4,
          "brainpoolP256t1": 4,
          "brainpoolP320r1": 4,
          "brainpoolP320t1": 4,
          "brainpoolP384r1": 4,
          "brainpoolP384t1": 4,
          "brainpoolP512r1": 4,
          "brainpoolP512t1": 4
        },
        "Curve": {
          "Curve25519": 1
        },
        "NIST": {
          "P-224": 8,
          "P-256": 8,
          "P-384": 8,
          "P-521": 6,
          "secp224k1": 4,
          "secp224r1": 4,
          "secp256k1": 4,
          "secp256r1": 4,
          "secp384r1": 4,
          "secp521r1": 3
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA1": 2
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-256": 2,
            "SHA-384": 2,
            "SHA-512": 2,
            "SHA2": 4,
            "SHA256": 4,
            "SHA384": 4,
            "SHA512": 2
          },
          "SHA3": {
            "SHA-3": 2,
            "SHA3": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "PAD_SYSTEM": 1
        }
      },
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {
        "CRYSTALS": {
          "CRYSTALS": 1
        },
        "PQC": {
          "PQC": 3
        }
      },
      "randomness": {
        "RNG": {
          "RND": 10,
          "RNG": 9
        },
        "TRNG": {
          "TRNG": 18
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 4,
          "Fault Injection": 4,
          "Malfunction": 20,
          "malfunction": 11,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 10,
          "Physical Probing": 4,
          "Physical probing": 2,
          "SPA": 3,
          "Timing Attacks": 1,
          "physical probing": 6,
          "side channel": 3,
          "side-channel": 1,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 4
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 5,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 197": 1,
          "FIPS PUB 180-3": 7,
          "FIPS PUB 198-1": 2,
          "FIPS PUB 202": 3,
          "FIPS197": 1
        },
        "NIST": {
          "NIST SP 800-90A": 1
        },
        "RFC": {
          "RFC7748": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 19
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 7,
            "Triple-DES": 2
          },
          "DES": {
            "DES": 7
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 14
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 43
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Windows \uc0ac\uc6a9\uc790",
      "/CreationDate": "D:20240312191619+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20240312191619+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "Delphinus2_Security_Tartget",
      "pdf_file_size_bytes": 3896073,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/uploads/2015/01/RGS_v-2-0_B1.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 116
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0117b_pdf.pdf",
        "pp_name": "Secure Sub-System in System-on-Chip (3S in SoC) Protection Profile"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300085-01_CR.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "AVA_VAN.5",
      "ALC_FLR.2",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300085-01-ST_Lite_v0.1.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "93a8350f624966e3e0b20df17c9928a1f9ce37ce2e5d742cf282c464780de9cd",
      "txt_hash": "2d1d5caca8905b2cb8dee571254e0c660b8534091cd887a37d05ff5ba6696015"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b166de6dcba5702d4c68cf8b5f5bdc00aa46af27863bf98c7ec58c18803f4534",
      "txt_hash": "b884759820a87ac4e59e28dfb9f93fe770e43dabbf88f3fc6c2f8bc1e82f2da0"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "eb0e661d5e92628d058171c755b9c966f0d91d74b111c64eade59c7fc92e5f47",
      "txt_hash": "122faf9dc0a6f328adf96d2bdbbab9292244d92d7d2302e7fd692b5a5c964a01"
    }
  },
  "status": "active"
}