Samsung STRONGV4P00 of S5E9945 with Specific IC Dedicated Software Revision 1.0
CSV information ?
Status | active |
---|---|
Valid from | 26.03.2024 |
Valid until | 26.03.2029 |
Scheme | 🇳🇱 NL |
Manufacturer | Samsung Electronics Co., Ltd. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, EAL5+, ALC_FLR.2, ALC_DVS.2 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL5, EAL2, EAL7, EAL5 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.2, ALC_FLR.3, ALC_FLR, AVA_VAN.5Protection profiles
BSI-CC-PP-0117Certificates
NSCIB-CC-2300085-01, NSCIB-2300085-01Evaluation facilities
SGS, SGS Brightsight, BrightsightStandards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008File metadata
Title | NSCIB Certificate |
---|---|
Author | JM2 |
Creation date | D:20240329105323+00'00' |
Modification date | D:20240329105323+00'00' |
Pages | 1 |
Creator | Microsoft® Word 2021 |
Producer | Microsoft® Word 2021 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, HMAC, CBC-MACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-HellmanPost-quantum Algorithms
PQCHash functions
SHA2Schemes
MACRandomness
TRNG, RNGBlock cipher modes
ECB, CBCVendor
SamsungSecurity level
EAL4, EAL5, EAL5+, EAL 5, EAL5 augmented, EAL 5 augmentedSecurity Assurance Requirements (SAR)
ADV_IMP, ALC_DVS.2, ALC_FLR.2, AVA_VAN.5, AVA_VANProtection profiles
BSI-CC-PP-0117Certificates
NSCIB-CC-2300085-01-CR, NSCIB-2300085-01Evaluation facilities
SGS, SGS Brightsight, BrightsightSide-channel analysis
side-channel, DFA, Fault Injection, JIL-AM, JIL-AAPS, JILFile metadata
Title | Certification Report |
---|---|
Author | sjon |
Creation date | D:20240329105158+00'00' |
Modification date | D:20240329105158+00'00' |
Pages | 12 |
Creator | Microsoft® Word 2021 |
Producer | Microsoft® Word 2021 |
Frontpage
Certificate ID | NSCIB-CC-2300085-01-CR |
---|---|
Certified item | STRONGV4P00 of S5E9945 with Specific IC Dedicated Software Revision 1.0 |
Certification lab | SGS Brightsight B.V. |
Developer | SAMSUNG Electronics Co. Ltd |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, Triple-DES, TDEA, HMACAsymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman, DSAPost-quantum Algorithms
CRYSTALS, PQCHash functions
SHA1, SHA256, SHA384, SHA512, SHA-256, SHA-384, SHA-512, SHA2, SHA-2, SHA-3, SHA3Schemes
Key AgreementProtocols
PGPRandomness
TRNG, RNG, RNDElliptic Curves
P-224, P-256, P-384, P-521, secp224k1, secp224r1, secp256k1, secp256r1, secp384r1, secp521r1, brainpoolP224r1, brainpoolP224t1, brainpoolP256r1, brainpoolP256t1, brainpoolP320r1, brainpoolP320t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1, Curve25519Block cipher modes
ECB, CBC, CTR, GCMJavaCard API constants
PAD_SYSTEMVendor
SamsungSecurity level
EAL5, EAL 4, EAL5 augmentedClaims
O.RSA, O.ECDSA, O.ECDH, O.RND, O.MEM_ACCESS, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.4, ADV_TDS.3, ADV_ARC, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_DEL, ALC_CMS, ALC_CMC, ALC_DVS.1, ATE_DPT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_FUN, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_CKM, FCS_CKM.2, FDP_SDC, FDP_ACF, FDP_SDC.1, FDP_SDI, FDP_SDC.1.1, FDP_SDI.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_ITT, FDP_ACC.1, FDP_IFC, FDP_IFF.1, FDP_ACF.1, FDP_ACC, FDP_URC, FDP_URC.1, FDP_IRA.1, FDP_URC.1.2, FDP_IRA, FDP_IRA.1.1, FDP_IRA.1.2, FDP_IRA.1.3, FDP_DAU.2, FDP_DAU, FDP_DAU.1, FDP_UCT.1, FDP_UCT, FDP_UIT.1, FDP_UIT, FDP_ITC.1, FDP_ITC.2, FIA_UAU.1, FIA_UID.1, FIA_UID, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA, FMT_CKM.4, FPT_INI, FPT_INI.1, FPT_INI.1.1, FPT_INI.1.2, FPT_INI.1.3, FPT_FLS.1, FPT_FLS, FPT_PHP.3, FPT_PHP.3.1, FPT_ITT.1, FPT_ITT, FPT_FLT, FPT_RPL.1, FPT_RPL, FRU_FLT, FRU_FLT.1, FRU_FLT.2, FTP_ITC.1, FTP_ITC, FTP_TRP.1Protection profiles
BSI-CC-PP-0117Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, side-channel, side channel, SPA, DPA, Timing Attacks, timing attacks, physical tampering, Malfunction, malfunction, DFA, Fault Injection, reverse engineeringStandards
FIPS PUB 180-3, FIPS 180-4, FIPS PUB 202, FIPS197, FIPS PUB 198-1, FIPS 197, NIST SP 800-90A, RFC7748, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title | Delphinus2_Security_Tartget |
---|---|
Author | Windows 사용자 |
Creation date | D:20240312191619+09'00' |
Modification date | D:20240312191619+09'00' |
Pages | 116 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
Scheme data ?
Cert Id | NSCIB-CC-2300085-01-CR | |
---|---|---|
Certification Date | 26.03.2024 | |
Status | Issued | |
Product | STRONGV4P00 of S5E9945 with Specific IC Dedicated Software version 1 | |
Developer | SAMSUNG Electronics Co. Ltd. | |
Evaluation Facility | SGS Brightsight | |
Level | EAL5+ AVA_VAN.5, ALC_DVS.2, ALC_FLR.2 | |
Cert Link | https://trustcb.com/download/?wpdmdl=3970 | |
Report Link | https://trustcb.com/download/?wpdmdl=3971 | |
Target Link | https://trustcb.com/download/?wpdmdl=3972 |
References ?
No references are available for this certificate.
Updates ?
-
09.12.2024 The certificate became unavailable,
either the certification report or the security target was unavailable during
processing.
Certificate removed
A Common Criteria certificate for a product named Samsung STRONGV4P00 of S5E9945 with Specific IC Dedicated Software Revision 1.0 is not available. This means that its entry was removed from the Common Criteria portal (or that was replaced by a new entry).
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'NSCIB-CC-2300085-01-CR', 'certification_date': '2024-03-26', 'status': 'Issued', 'product': 'STRONGV4P00 of S5E9945 with Specific IC Dedicated Software version 1', 'developer': 'SAMSUNG Electronics Co. Ltd.', 'evaluation_facility': 'SGS Brightsight', 'level': 'EAL5+ AVA_VAN.5, ALC_DVS.2, ALC_FLR.2', 'cert_link': 'https://trustcb.com/download/?wpdmdl=3970', 'report_link': 'https://trustcb.com/download/?wpdmdl=3971', 'target_link': 'https://trustcb.com/download/?wpdmdl=3972'}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'pq_crypto': {'PQC': {'PQC': 1}}}
data. - The st_keywords property was updated, with the
{'pq_crypto': {'CRYSTALS': {'CRYSTALS': 1}, 'PQC': {'PQC': 3}}}
data.
- The report_keywords property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'eb0e661d5e92628d058171c755b9c966f0d91d74b111c64eade59c7fc92e5f47', 'txt_hash': '122faf9dc0a6f328adf96d2bdbbab9292244d92d7d2302e7fd692b5a5c964a01'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '93a8350f624966e3e0b20df17c9928a1f9ce37ce2e5d742cf282c464780de9cd', 'txt_hash': '2d1d5caca8905b2cb8dee571254e0c660b8534091cd887a37d05ff5ba6696015'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 3896073, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 116, '/Title': 'Delphinus2_Security_Tartget', '/Author': 'Windows 사용자', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20240312191619+09'00'", '/ModDate': "D:20240312191619+09'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/uploads/2015/01/RGS_v-2-0_B1.pdf']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 93112, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Title': 'NSCIB Certificate', '/Author': 'JM2', '/Creator': 'Microsoft® Word 2021', '/CreationDate': "D:20240329105323+00'00'", '/ModDate': "D:20240329105323+00'00'", '/Producer': 'Microsoft® Word 2021', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0117': 3}}, 'cc_security_level': {'EAL': {'EAL5': 6, 'EAL 4': 1, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 7, 'ADV_FSP.5': 1, 'ADV_IMP.1': 2, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1, 'ADV_ARC': 1}, 'AGD': {'AGD_OPE.1': 12, 'AGD_PRE.1': 8, 'AGD_OPE': 4, 'AGD_PRE': 5}, 'ALC': {'ALC_DVS.2': 9, 'ALC_FLR.2': 10, 'ALC_CMC.4': 16, 'ALC_CMS.5': 6, 'ALC_DEL.1': 6, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_DEL': 4, 'ALC_CMS': 5, 'ALC_CMC': 4, 'ALC_DVS.1': 1}, 'ATE': {'ATE_DPT.2': 1, 'ATE_COV.2': 5, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 4, 'ATE_FUN': 1}, 'AVA': {'AVA_VAN.5': 11}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 5, 'FAU_GEN': 2, 'FAU_SAS.1': 12, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RNG': 6, 'FCS_RNG.1': 12, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_COP.1': 31, 'FCS_CKM.4': 35, 'FCS_COP': 52, 'FCS_CKM.1': 57, 'FCS_CKM': 40, 'FCS_CKM.2': 4}, 'FDP': {'FDP_SDC': 17, 'FDP_ACF': 14, 'FDP_SDC.1': 5, 'FDP_SDI': 18, 'FDP_SDC.1.1': 1, 'FDP_SDI.1': 2, 'FDP_SDI.2': 5, 'FDP_ITT.1': 2, 'FDP_IFC.1': 11, 'FDP_ITT': 13, 'FDP_ACC.1': 14, 'FDP_IFC': 16, 'FDP_IFF.1': 4, 'FDP_ACF.1': 16, 'FDP_ACC': 14, 'FDP_URC': 7, 'FDP_URC.1': 6, 'FDP_IRA.1': 10, 'FDP_URC.1.2': 1, 'FDP_IRA': 13, 'FDP_IRA.1.1': 1, 'FDP_IRA.1.2': 1, 'FDP_IRA.1.3': 1, 'FDP_DAU.2': 3, 'FDP_DAU': 5, 'FDP_DAU.1': 1, 'FDP_UCT.1': 3, 'FDP_UCT': 5, 'FDP_UIT.1': 4, 'FDP_UIT': 5, 'FDP_ITC.1': 36, 'FDP_ITC.2': 36}, 'FIA': {'FIA_UAU.1': 3, 'FIA_UID.1': 5, 'FIA_UID': 6}, 'FMT': {'FMT_LIM': 32, 'FMT_LIM.1': 22, 'FMT_LIM.2': 21, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 1, 'FMT_MSA.3': 15, 'FMT_MSA.1': 12, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 7, 'FMT_MSA.1.1': 1, 'FMT_SMF.1': 7, 'FMT_SMF.1.1': 1, 'FMT_MSA': 1, 'FMT_CKM.4': 1}, 'FPT': {'FPT_INI': 5, 'FPT_INI.1': 13, 'FPT_INI.1.1': 2, 'FPT_INI.1.2': 2, 'FPT_INI.1.3': 2, 'FPT_FLS.1': 6, 'FPT_FLS': 35, 'FPT_PHP.3': 19, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 2, 'FPT_ITT': 11, 'FPT_FLT': 1, 'FPT_RPL.1': 4, 'FPT_RPL': 5}, 'FRU': {'FRU_FLT': 28, 'FRU_FLT.1': 2, 'FRU_FLT.2': 4}, 'FTP': {'FTP_ITC.1': 9, 'FTP_ITC': 7, 'FTP_TRP.1': 4}}, 'cc_claims': {'O': {'O.RSA': 1, 'O.ECDSA': 1, 'O.ECDH': 1, 'O.RND': 6, 'O.MEM_ACCESS': 1}, 'T': {'T.RND': 4}}, 'vendor': {'Samsung': {'Samsung': 43}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 19}}, 'DES': {'DES': {'DES': 7}, '3DES': {'TDES': 7, 'Triple-DES': 2, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 14}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 1}, 'ECC': {'ECDH': {'ECDH': 8}, 'ECDSA': {'ECDSA': 12}, 'ECC': {'ECC': 14}}, 'FF': {'DH': {'Diffie-Hellman': 2}, 'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2}, 'SHA2': {'SHA256': 4, 'SHA384': 4, 'SHA512': 2, 'SHA-256': 2, 'SHA-384': 2, 'SHA-512': 2, 'SHA2': 4, 'SHA-2': 1}, 'SHA3': {'SHA-3': 2, 'SHA3': 1}}}, 'crypto_scheme': {'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'PGP': {'PGP': 2}}, 'randomness': {'TRNG': {'TRNG': 18}, 'RNG': {'RNG': 9, 'RND': 10}}, 'cipher_mode': {'ECB': {'ECB': 6}, 'CBC': {'CBC': 3}, 'CTR': {'CTR': 3}, 'GCM': {'GCM': 3}}, 'ecc_curve': {'NIST': {'P-224': 8, 'P-256': 8, 'P-384': 8, 'P-521': 6, 'secp224k1': 4, 'secp224r1': 4, 'secp256k1': 4, 'secp256r1': 4, 'secp384r1': 4, 'secp521r1': 3}, 'Brainpool': {'brainpoolP224r1': 4, 'brainpoolP224t1': 4, 'brainpoolP256r1': 4, 'brainpoolP256t1': 4, 'brainpoolP320r1': 4, 'brainpoolP320t1': 4, 'brainpoolP384r1': 4, 'brainpoolP384t1': 4, 'brainpoolP512r1': 4, 'brainpoolP512t1': 4}, 'Curve': {'Curve25519': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 10, 'Physical Probing': 4, 'physical probing': 6, 'Physical probing': 2, 'side-channel': 1, 'side channel': 3, 'SPA': 3, 'DPA': 2, 'Timing Attacks': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 2, 'Malfunction': 20, 'malfunction': 11, 'DFA': 4, 'Fault Injection': 4}, 'other': {'reverse engineering': 4}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-3': 7, 'FIPS 180-4': 1, 'FIPS PUB 202': 3, 'FIPS197': 1, 'FIPS PUB 198-1': 2, 'FIPS 197': 1}, 'NIST': {'NIST SP 800-90A': 1}, 'RFC': {'RFC7748': 1}, 'CC': {'CCMB-2017-04-001': 5, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {'misc': {'PAD_SYSTEM': 1}}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'NL': {'NSCIB-CC-2300085-01': 1, 'NSCIB-2300085-01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0117': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1, 'EAL7': 1, 'EAL5 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'SGS': {'SGS': 1, 'SGS Brightsight': 1}, 'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408-1': 2, 'ISO/IEC 18045': 4, 'ISO/IEC 18045:2008': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
NSCIB-CC-2300085-01-ST_Lite_v0.1.pdf
. - The cert_filename property was set to
NSCIB-CC-2300085-01_CERT.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}]}
values added.
- The st property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300085-01_CR.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300085-01-ST_Lite_v0.1.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Samsung STRONGV4P00 of S5E9945 with Specific IC Dedicated Software Revision 1.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300085-01_CERT.pdf",
"dgst": "54e6eb5c1bd57036",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-2300085-01-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "NSCIB-CC-2300085-01-CR",
"cert_link": "https://trustcb.com/download/?wpdmdl=3970",
"certification_date": "2024-03-26",
"developer": "SAMSUNG Electronics Co. Ltd.",
"evaluation_facility": "SGS Brightsight",
"level": "EAL5+ AVA_VAN.5, ALC_DVS.2, ALC_FLR.2",
"product": "STRONGV4P00 of S5E9945 with Specific IC Dedicated Software version 1",
"report_link": "https://trustcb.com/download/?wpdmdl=3971",
"status": "Issued",
"target_link": "https://trustcb.com/download/?wpdmdl=3972"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Samsung Electronics Co., Ltd.",
"manufacturer_web": "https://www.samsung.com",
"name": "Samsung STRONGV4P00 of S5E9945 with Specific IC Dedicated Software Revision 1.0",
"not_valid_after": "2029-03-26",
"not_valid_before": "2024-03-26",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "NSCIB-CC-2300085-01_CERT.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"NSCIB-2300085-01": 1,
"NSCIB-CC-2300085-01": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0117": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL5": 1,
"EAL5 augmented": 1,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
},
"SGS": {
"SGS": 1,
"SGS Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408-1": 2,
"ISO/IEC 18045": 4,
"ISO/IEC 18045:2008": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "JM2",
"/CreationDate": "D:20240329105323+00\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20240329105323+00\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"/Title": "NSCIB Certificate",
"pdf_file_size_bytes": 93112,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "NSCIB-CC-2300085-01_CR.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-2300085-01-CR",
"cert_item": "STRONGV4P00 of S5E9945 with Specific IC Dedicated Software Revision 1.0",
"cert_lab": " SGS Brightsight B.V.",
"developer": "SAMSUNG Electronics Co. Ltd"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"NL": {
"NSCIB-2300085-01": 1,
"NSCIB-CC-2300085-01-CR": 12
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0117": 1
}
},
"cc_sar": {
"ADV": {
"ADV_IMP": 1
},
"ALC": {
"ALC_DVS.2": 2,
"ALC_FLR.2": 2
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL 5 augmented": 1,
"EAL4": 1,
"EAL5": 1,
"EAL5 augmented": 1,
"EAL5+": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 2
},
"SGS": {
"SGS": 2,
"SGS Brightsight": 2
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {
"PQC": {
"PQC": 1
}
},
"randomness": {
"RNG": {
"RNG": 1
},
"TRNG": {
"TRNG": 8
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Fault Injection": 1
},
"SCA": {
"side-channel": 2
},
"other": {
"JIL": 2,
"JIL-AAPS": 2,
"JIL-AM": 2
}
},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"3DES": {
"TDES": 1
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1,
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "sjon",
"/CreationDate": "D:20240329105158+00\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20240329105158+00\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"/Title": "Certification Report",
"pdf_file_size_bytes": 354378,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.sogis.eu/",
"mailto:[email protected]",
"https://nscib.nl/",
"https://trustcb.com/common-criteria/nscib/",
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
},
"st_filename": "NSCIB-CC-2300085-01-ST_Lite_v0.1.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 14
},
"ECDH": {
"ECDH": 8
},
"ECDSA": {
"ECDSA": 12
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 2
}
},
"RSA": {
"RSA-CRT": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.ECDH": 1,
"O.ECDSA": 1,
"O.MEM_ACCESS": 1,
"O.RND": 6,
"O.RSA": 1
},
"T": {
"T.RND": 4
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0117": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 7,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_IMP.1": 2,
"ADV_INT.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE": 4,
"AGD_OPE.1": 12,
"AGD_PRE": 5,
"AGD_PRE.1": 8
},
"ALC": {
"ALC_CMC": 4,
"ALC_CMC.4": 16,
"ALC_CMS": 5,
"ALC_CMS.5": 6,
"ALC_DEL": 4,
"ALC_DEL.1": 6,
"ALC_DVS.1": 1,
"ALC_DVS.2": 9,
"ALC_FLR.2": 10,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 4,
"ATE_COV.2": 5,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 11
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL5": 6,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_SAS": 5,
"FAU_SAS.1": 12,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 40,
"FCS_CKM.1": 57,
"FCS_CKM.2": 4,
"FCS_CKM.4": 35,
"FCS_COP": 52,
"FCS_COP.1": 31,
"FCS_RNG": 6,
"FCS_RNG.1": 12,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC": 14,
"FDP_ACC.1": 14,
"FDP_ACF": 14,
"FDP_ACF.1": 16,
"FDP_DAU": 5,
"FDP_DAU.1": 1,
"FDP_DAU.2": 3,
"FDP_IFC": 16,
"FDP_IFC.1": 11,
"FDP_IFF.1": 4,
"FDP_IRA": 13,
"FDP_IRA.1": 10,
"FDP_IRA.1.1": 1,
"FDP_IRA.1.2": 1,
"FDP_IRA.1.3": 1,
"FDP_ITC.1": 36,
"FDP_ITC.2": 36,
"FDP_ITT": 13,
"FDP_ITT.1": 2,
"FDP_SDC": 17,
"FDP_SDC.1": 5,
"FDP_SDC.1.1": 1,
"FDP_SDI": 18,
"FDP_SDI.1": 2,
"FDP_SDI.2": 5,
"FDP_UCT": 5,
"FDP_UCT.1": 3,
"FDP_UIT": 5,
"FDP_UIT.1": 4,
"FDP_URC": 7,
"FDP_URC.1": 6,
"FDP_URC.1.2": 1
},
"FIA": {
"FIA_UAU.1": 3,
"FIA_UID": 6,
"FIA_UID.1": 5
},
"FMT": {
"FMT_CKM.4": 1,
"FMT_LIM": 32,
"FMT_LIM.1": 22,
"FMT_LIM.1.1": 1,
"FMT_LIM.2": 21,
"FMT_LIM.2.1": 1,
"FMT_MSA": 1,
"FMT_MSA.1": 12,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 15,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 7
},
"FPT": {
"FPT_FLS": 35,
"FPT_FLS.1": 6,
"FPT_FLT": 1,
"FPT_INI": 5,
"FPT_INI.1": 13,
"FPT_INI.1.1": 2,
"FPT_INI.1.2": 2,
"FPT_INI.1.3": 2,
"FPT_ITT": 11,
"FPT_ITT.1": 2,
"FPT_PHP.3": 19,
"FPT_PHP.3.1": 1,
"FPT_RPL": 5,
"FPT_RPL.1": 4
},
"FRU": {
"FRU_FLT": 28,
"FRU_FLT.1": 2,
"FRU_FLT.2": 4
},
"FTP": {
"FTP_ITC": 7,
"FTP_ITC.1": 9,
"FTP_TRP.1": 4
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CTR": {
"CTR": 3
},
"ECB": {
"ECB": 6
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PGP": {
"PGP": 2
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP224r1": 4,
"brainpoolP224t1": 4,
"brainpoolP256r1": 4,
"brainpoolP256t1": 4,
"brainpoolP320r1": 4,
"brainpoolP320t1": 4,
"brainpoolP384r1": 4,
"brainpoolP384t1": 4,
"brainpoolP512r1": 4,
"brainpoolP512t1": 4
},
"Curve": {
"Curve25519": 1
},
"NIST": {
"P-224": 8,
"P-256": 8,
"P-384": 8,
"P-521": 6,
"secp224k1": 4,
"secp224r1": 4,
"secp256k1": 4,
"secp256r1": 4,
"secp384r1": 4,
"secp521r1": 3
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA1": 2
},
"SHA2": {
"SHA-2": 1,
"SHA-256": 2,
"SHA-384": 2,
"SHA-512": 2,
"SHA2": 4,
"SHA256": 4,
"SHA384": 4,
"SHA512": 2
},
"SHA3": {
"SHA-3": 2,
"SHA3": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"PAD_SYSTEM": 1
}
},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {
"CRYSTALS": {
"CRYSTALS": 1
},
"PQC": {
"PQC": 3
}
},
"randomness": {
"RNG": {
"RND": 10,
"RNG": 9
},
"TRNG": {
"TRNG": 18
}
},
"side_channel_analysis": {
"FI": {
"DFA": 4,
"Fault Injection": 4,
"Malfunction": 20,
"malfunction": 11,
"physical tampering": 2
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 10,
"Physical Probing": 4,
"Physical probing": 2,
"SPA": 3,
"Timing Attacks": 1,
"physical probing": 6,
"side channel": 3,
"side-channel": 1,
"timing attacks": 1
},
"other": {
"reverse engineering": 4
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 5,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 180-4": 1,
"FIPS 197": 1,
"FIPS PUB 180-3": 7,
"FIPS PUB 198-1": 2,
"FIPS PUB 202": 3,
"FIPS197": 1
},
"NIST": {
"NIST SP 800-90A": 1
},
"RFC": {
"RFC7748": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 19
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 7,
"Triple-DES": 2
},
"DES": {
"DES": 7
}
},
"constructions": {
"MAC": {
"HMAC": 14
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 43
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Windows \uc0ac\uc6a9\uc790",
"/CreationDate": "D:20240312191619+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20240312191619+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "Delphinus2_Security_Tartget",
"pdf_file_size_bytes": 3896073,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/uploads/2015/01/RGS_v-2-0_B1.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 116
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0117b_pdf.pdf",
"pp_name": "Secure Sub-System in System-on-Chip (3S in SoC) Protection Profile"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300085-01_CR.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"AVA_VAN.5",
"ALC_FLR.2",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300085-01-ST_Lite_v0.1.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "93a8350f624966e3e0b20df17c9928a1f9ce37ce2e5d742cf282c464780de9cd",
"txt_hash": "2d1d5caca8905b2cb8dee571254e0c660b8534091cd887a37d05ff5ba6696015"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b166de6dcba5702d4c68cf8b5f5bdc00aa46af27863bf98c7ec58c18803f4534",
"txt_hash": "b884759820a87ac4e59e28dfb9f93fe770e43dabbf88f3fc6c2f8bc1e82f2da0"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "eb0e661d5e92628d058171c755b9c966f0d91d74b111c64eade59c7fc92e5f47",
"txt_hash": "122faf9dc0a6f328adf96d2bdbbab9292244d92d7d2302e7fd692b5a5c964a01"
}
},
"status": "active"
}