{"_id": "6b5578ec176b7a52", "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "6b5578ec176b7a52", "status": "archived", "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems", "name": "Renesas HD65256D version 01 smartcard integrated circuit", "manufacturer": "Renesas Technology Corporation", "scheme": "DE", "security_level": {"_type": "Set", "elements": ["AVA_VLA.4", "EAL4+", "AVA_MSU.3", "ALC_DVS.2", "ADV_IMP.2"]}, "not_valid_before": "2007-03-08", "not_valid_after": "2019-09-01", "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0350a.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0350b.pdf", "cert_link": null, "manufacturer_web": "https://am.renesas.com/", "protection_profile_links": {"_type": "Set", "elements": []}, "maintenance_updates": {"_type": "Set", "elements": []}, "state": {"_type": "sec_certs.sample.cc_eucc_common.InternalState", "report": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "173cfdc47884512962fe40dc5d1371a3d7a61b0deb590b1186c8dd25b9478952", "txt_hash": "3127953e98e218177c62e41d09c6567ab0c13ad94cdacc8bdde603a129e3535d", "json_hash": null}, "st": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "2817c64ac50fe8ca6247548b9084e28bd7aa264cb3a38fcfcccc971e9f1cbfb3", "txt_hash": "4b147bb8d23646d3783e1b24e47b5d051e8628ee4e744fae320875d66735f4f0", "json_hash": null}, "cert": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null, "json_hash": null}}, "pdf_data": {"_type": "sec_certs.sample.cc_eucc_common.PdfData", "report_metadata": {"pdf_file_size_bytes": 284920, "pdf_is_encrypted": false, "pdf_number_of_pages": 40, "/CreationDate": "D:20070309104506+01'00'", "/Subject": "Certification Report 0350-2007", "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "/Creator": "Acrobat PDFMaker 7.0.7 f\u00fcr Word", "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Renesas\"", "/Producer": "Acrobat Distiller 7.0.5 (Windows)", "/ModDate": "D:20070315140405+01'00'", "/Company": "BSI, Postfach 200363, 53133 Bonn", "/SourceModified": "D:20070309090100", "/Title": "Certification Report BSI-DSZ-CC-0350-2007", "pdf_hyperlinks": {"_type": "Set", "elements": []}}, "st_metadata": {"pdf_file_size_bytes": 1057451, "pdf_is_encrypted": true, "pdf_number_of_pages": 67, "/CreationDate": "D:20070301165612+09'00'", "/Creator": "\u30af\u30bb\u30edPDF v1.12 Rev0480", "/ModDate": "D:20070315150947+01'00'", "/Producer": "Xelo PDF Library", "pdf_hyperlinks": {"_type": "Set", "elements": []}}, "cert_metadata": null, "report_frontpage": {"DE": {"match_rules": ["(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"], "cert_id": "BSI-DSZ-CC-0350-2007", "cert_item": "Renesas HD65256D version 01 smartcard integrated circuit", "developer": "Renesas Technology Corp", "cert_lab": "BSI"}}, "st_frontpage": null, "cert_frontpage": null, "report_keywords": {"cc_cert_id": {"DE": {"BSI-DSZ-CC-0350-2007": 21, "BSI-DSZ-CC-0353-2006": 2, "BSI-DSZ-CC-0350": 3}}, "cc_protection_profile_id": {"BSI": {"BSI-PP-0002-2001": 4}}, "cc_security_level": {"EAL": {"EAL4": 10, "EAL 4": 2, "EAL 1": 1, "EAL 7": 1, "EAL4+": 2, "EAL1": 5, "EAL3": 4, "EAL5": 6, "EAL7": 4, "EAL2": 3, "EAL6": 3, "EAL 4 augmented": 1, "EAL4 augmented": 1}}, "cc_sar": {"ACM": {"ACM_AUT.1": 2, "ACM_CAP.4": 2, "ACM_SCP.2": 2, "ACM_AUT": 2, "ACM_CAP": 2, "ACM_SCP": 2}, "ADO": {"ADO_DEL.2": 2, "ADO_IGS.1": 2, "ADO_DEL": 2, "ADO_IGS": 2}, "ADV": {"ADV_IMP.2": 5, "ADV_FSP.2": 1, "ADV_HLD.2": 1, "ADV_LLD.1": 1, "ADV_RCR.1": 1, "ADV_SPM.1": 1, "ADV_FSP": 2, "ADV_HLD": 2, "ADV_IMP": 2, "ADV_INT": 2, "ADV_LLD": 2, "ADV_RCR": 2, "ADV_SPM": 2}, "AGD": {"AGD_ADM.1": 1, "AGD_USR.1": 1, "AGD_ADM": 2, "AGD_USR": 2}, "ALC": {"ALC_DVS.2": 6, "ALC_LCD.1": 2, "ALC_TAT.1": 2, "ALC_DVS": 2, "ALC_FLR": 2, "ALC_LCD": 1, "ALC_TAT": 2}, "ATE": {"ATE_COV.2": 1, "ATE_DPT.1": 1, "ATE_FUN.1": 1, "ATE_IND.2": 1, "ATE_COV": 2, "ATE_DPT": 2, "ATE_FUN": 2, "ATE_IND": 2}, "AVA": {"AVA_MSU.3": 5, "AVA_VLA.4": 6, "AVA_SOF.1": 1, "AVA_CCA": 2, "AVA_MSU": 2, "AVA_SOF": 3, "AVA_VLA": 3, "AVA_VLA.2": 1, "AVA_VLA.3": 1}, "ASE": {"ASE_DES.1": 1, "ASE_ENV.1": 1, "ASE_INT.1": 1, "ASE_OBJ.1": 1, "ASE_PPC.1": 1, "ASE_REQ.1": 1, "ASE_SRE.1": 1, "ASE_TSS.1": 1}}, "cc_sfr": {"FAU": {"FAU_SAS.1": 1}, "FCS": {"FCS_COP.1": 1, "FCS_RND.1": 1}, "FDP": {"FDP_IFC.1": 1, "FDP_ITT.1": 1, "FDP_ACC.1": 2, "FDP_ACF.1": 2}, "FMT": {"FMT_LIM.1": 1, "FMT_LIM.2": 1}, "FPT": {"FPT_FLS.1": 1, "FPT_ITT.1": 1, "FPT_PHP.3": 1, "FPT_SEP.1": 1}, "FRU": {"FRU_FLT.2": 1}}, "cc_claims": {}, "vendor": {"Infineon": {"Infineon Technologies AG": 1}, "Philips": {"Philips": 1}}, "eval_facility": {"BrightSight": {"Brightsight": 4}}, "symmetric_crypto": {"DES": {"DES": {"DES": 7}}}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {"RNG": {"RNG": 6}}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {"SCA": {"Physical Probing": 1, "physical probing": 1}, "FI": {"physical tampering": 1, "Malfunction": 1}}, "technical_report_id": {"BSI": {"BSI 7125": 2, "BSI 7148": 1, "BSI 7149": 1}}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"BSI": {"AIS 34": 1, "AIS 25": 1, "AIS 26": 1, "AIS 31": 1}, "ISO": {"ISO/IEC 15408:2005": 3, "ISO/IEC15408: 2005": 1}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {"ConfidentialDocument": {"BSI-DSZ-CC-0350, Revision 4.0, 23 August 2006, HD65256D version 01, Renesas Technology Corp. (confidential document) [7] Security Target BSI-DSZ-CC-0350, Revsion 2.0, 23 February, 2007, HD65256D version 01, Renesas": 1, "public document) [8] Evaluation Technical Report, 1.0, 29 January 2007 HD65256D version 01 (confidential document) [9] Smartcard IC Platform Protection Profile, version 1.0, July, 2001, BSI registration ID": 1, "Secure Microcomputer AE-5 Series HD65256D (AE56D), Renesas Technology Corp., 10 August, 2006, (confidential document) [11] HD65256D User Guidance Manual \u2013 Information for software developers using the HD65256D in": 1, "applications, Revision 1.10, Renesas Technology Corp., 20 July, 2006, (confidential document) [12] KURA Chip User Guidance Manual for Chip User - Information for users of the security chip": 1, "1.00, Renesas Technology Corp., 7 June 2006, (confidential document) [13] Option List for Mask EEPROM Write (for HD6525D [AE56D]), Revision 1.10R, Renesas Technology": 1, "May 9, 2006, (confidential document) [14] Option List for Mask ROM Data (for HD6525D [AE56D]), Revision 1.0R, Renesas Technology Corp": 1, "9, 2006, (confidential document) B-17 Certification Report BSI-DSZ-CC-0350-2007 This page is intentionally left blank. B-18": 1}}}, "st_keywords": {"cc_cert_id": {}, "cc_protection_profile_id": {"BSI": {"BSI-PP-0002": 82, "BSI-PP- 0002": 4}}, "cc_security_level": {"EAL": {"EAL4": 6, "EAL4 augmented": 2}}, "cc_sar": {"ACM": {"ACM_AUT": 1, "ACM_CAP": 1, "ACM_SCP": 1}, "ADO": {"ADO_IGS": 2, "ADO_DEL": 2}, "ADV": {"ADV_SPM.1": 4, "ADV_IMP.2": 2, "ADV_SPM": 1, "ADV_FSP": 2, "ADV_RCR": 1, "ADV_HLD": 1, "ADV_LLD": 1, "ADV_IMP": 1}, "AGD": {"AGD_USR": 3, "AGD_ADM": 3}, "ALC": {"ALC_DVS.2": 2, "ALC_DVS": 1, "ALC_LCD": 1, "ALC_TAT": 1}, "AVA": {"AVA_MSU.3": 2, "AVA_VLA.4": 1, "AVA_SOF": 6, "AVA_MSU": 1, "AVA_VLA": 1}}, "cc_sfr": {"FAU": {"FAU_SAS.1": 9, "FAU_GEN.1": 1, "FAU_SAS.1.1": 1}, "FCS": {"FCS_RND.1": 9, "FCS_COP.1": 19, "FCS_RND": 1, "FCS_RND.1.1": 1, "FCS_COP.1.1": 2, "FCS_CKM.1": 11, "FCS_CKM.4": 11, "FCS_CKM.1.1": 1, "FCS_CKM.2": 1, "FCS_CKM.4.1": 1}, "FDP": {"FDP_ITT.1": 10, "FDP_IFC.1": 17, "FDP_ACC.1": 29, "FDP_ACF.1": 27, "FDP_ITT.1.1": 1, "FDP_IFC.1.1": 1, "FDP_IFF.1": 1, "FDP_ITC.1": 12, "FDP_ACC.1.1": 3, "FDP_ACF.1.1": 4, "FDP_ACF.1.2": 2, "FDP_ACF.1.3": 2, "FDP_ACF.1.4": 2, "FDP_ITC.1.1": 1, "FDP_ITC.1.2": 1, "FDP_ITC.1.3": 1, "FDP_SDI.1": 1}, "FMT": {"FMT_LIM.1": 10, "FMT_LIM.2": 10, "FMT_LIM": 1, "FMT_LIM.1.1": 1, "FMT_LIM.2.1": 1, "FMT_MSA.2": 14, "FMT_MSA.3": 9, "FMT_MSA.2.1": 1, "FMT_MSA.1": 2, "FMT_SMR.1": 1}, "FPT": {"FPT_FLS.1": 31, "FPT_SEP.1": 12, "FPT_PHP.3": 12, "FPT_ITT.1": 9, "FPT_FLS.1.1": 1, "FPT_SEP.1.1": 1, "FPT_SEP.1.2": 1, "FPT_PHP.3.1": 1, "FPT_ITT.1.1": 1, "FPT_AMT.1": 1}, "FRU": {"FRU_FLT.2": 15, "FRU_FLT.1": 1}}, "cc_claims": {"O": {"O.RND": 4}, "T": {"T.RND": 4}}, "vendor": {"Infineon": {"Infineon Technologies": 1}, "Philips": {"Philips": 1}}, "eval_facility": {}, "symmetric_crypto": {"DES": {"DES": {"DES": 53}}}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {"RNG": {"RNG": 20, "RND": 8}}, "cipher_mode": {"ECB": {"ECB": 4}, "CBC": {"CBC": 2}}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {"SCA": {"Leak-Inherent": 16, "Physical Probing": 2, "physical probing": 4, "Physical probing": 1, "DPA": 2}, "FI": {"physical tampering": 1, "Malfunction": 15, "malfunction": 5, "DFA": 2}}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"FIPS": {"FIPS PUB 46-3": 3}, "BSI": {"AIS31": 7, "AIS 31": 1, "AIS20": 1, "AIS 20": 1}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {}}, "cert_keywords": null, "report_filename": "0350a.pdf", "st_filename": "0350b.pdf", "cert_filename": null}, "heuristics": {"_type": "sec_certs.sample.cc_eucc_common.Heuristics", "extracted_versions": {"_type": "Set", "elements": ["01"]}, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": ["BSI"], "cert_id": "BSI-DSZ-CC-0350-2007", "prev_certificates": null, "next_certificates": null, "st_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null}, "report_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": {"_type": "Set", "elements": ["BSI-DSZ-CC-0490-2008", "BSI-DSZ-CC-0434-2007"]}, "indirectly_referenced_by": {"_type": "Set", "elements": ["BSI-DSZ-CC-0529-2010", "BSI-DSZ-CC-0490-2008", "BSI-DSZ-CC-0434-2007"]}, "directly_referencing": {"_type": "Set", "elements": ["BSI-DSZ-CC-0353-2006"]}, "indirectly_referencing": {"_type": "Set", "elements": ["BSI-DSZ-CC-0353-2006", "BSI-DSZ-CC-0329-2006"]}}, "annotated_references": null, "extracted_sars": {"_type": "Set", "elements": [{"_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AVA_VLA", "level": 4}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_SRE", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_LLD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_DVS", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_PPC", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_USR", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_ENV", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_IMP", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "AVA_MSU", "level": 3}, {"_type": "sec_certs.sample.sar.SAR", "family": "AVA_SOF", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_HLD", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_ADM", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_DES", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_DPT", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_SPM", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_RCR", "level": 1}]}, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": null, "protection_profiles": null, "eal": "EAL4+"}}