This page was not yet optimized for use on mobile
devices.
KOMSCO JK11
CSV information
| Status | archived |
|---|---|
| Valid from | 12.10.2010 |
| Valid until | 01.06.2019 |
| Scheme | 🇰🇷 KR |
| Manufacturer | KOMSCO |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ATE_DPT.2, EAL4+, AVA_VAN.4 |
Heuristics summary
Certificate ID: KECS-ISIS-0272-2010
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
TDES, ARIA, SEEDAsymmetric Algorithms
ECDH, ECCHash functions
SHA-1, SHA-256Vendor
SamsungSecurity level
EAL4+Claims
A.TOE, A.TSFSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV, ATE_DPT, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Certificates
KECS-ISIS-0272-2010Evaluation facilities
KISAStandards
SCP02File metadata
| Title | KECS-ISIS-0272-2010(KOMSCO JK11)_e.hwp |
|---|---|
| Author | ITSCC |
| Creation date | D:20110729144857+09'00' |
| Modification date | D:20110729144857+09'00' |
| Pages | 25 |
| Creator | PDFCreator Version 1.2.0 |
| Producer | GPL Ghostscript 9.0 |
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, ARIA, SEEDAsymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1Schemes
MAC, Key agreement, Key AgreementEngines
TORNADOJavaCard versions
GlobalPlatform 2.1.1JavaCard API constants
TYPE_ACCESSVendor
SamsungSecurity level
EAL4+, EAL5+, EAL 4+, EAL4Claims
D.APP_CODE, D.APP_DATA, D.PIN, D.TS_CODE, D.TS_DATA, D.SEC_DATA, D.CRYPTO, O.IDENTIFICATI, O.JAVAOBJECT, A.TOE, A.TSF, OP.LOAD, OP.INSTALL, OP.DELETE, OP.ARRAY_ACCESS, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.THROW, OP.TYPE_ACCESS, OP.JAVA, OP.CREATE, OE.TSFSecurity Assurance Requirements (SAR)
ADV_IMP.2, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_CMS.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.4, AVA_MSU.2, AVA_VLA.4, AVA_VAN.3, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FAU_ARP.1.1, FAU_GEN.1, FAU_SAA.1.1, FAU_SAA.1.2, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC.2, FDP_ACF.1, FDP_RIP.1, FDP_SDI.2, FDP_UCT.1, FDP_UIT.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.4, FIA_UAU.6, FIA_UID.1, FIA_ATD.1, FIA_UAU.1, FIA_USB.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.2, FIA_UAU.1.1, FIA_UAU.4.1, FIA_UAU.6.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MOF.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.1.1, FMT_MOF.1.1, FMT_SMR.1.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_SMF.1.1, FMT_SMR.1.2, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_RCV.3, FPT_TST.1, FPT_RCV.4, FPT_FLS.1.1, FPT_RCV.2, FPT_RCV.3.1, FPT_RCV.3.2, FPT_RCV.3.3, FPT_RCV.3.4, FPT_RCV.4.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC.1, FTP_TRP.1Certificates
BSI-DSZ-CC-0438-2007, BSI-DSZ-CC-0501-2008-MA-04, BSI-DSZ-CC-0624-2010-MA-04Side-channel analysis
DPA, SPA, timing attack, Physical tampering, Malfunction, malfunction, DFACertification process
out of scope, the application although it is possible that load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE TOE is the JavaCard Platform that supports the analysis ofStandards
PKCS#2, AIS20, SCP02, SCP 02, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003File metadata
| Title | [????] Security Target Lite_e |
|---|---|
| Author | ITSCC |
| Creation date | D:20110729101020+09'00' |
| Modification date | D:20110729101020+09'00' |
| Pages | 90 |
| Creator | PDFCreator Version 1.2.0 |
| Producer | GPL Ghostscript 9.0 |
References
Outgoing- BSI-DSZ-CC-0438-2007 - archived - S3CC9GC 16-Bit RISC Microcontroller for Smart Card, Version 11
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
KECS-ISIS-0272-2010Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_VAN.4, AVA_VLA.4References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "794dbdddfa49f688",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "KECS-ISIS-0272-2010",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0438-2007"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0438-2007"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "KOMSCO",
"manufacturer_web": "https://www.komsco.com",
"name": "KOMSCO JK11",
"not_valid_after": "2019-06-01",
"not_valid_before": "2010-10-12",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "KECS-ISIS-0272-2010(KOMSCO JK11)_e.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 1
}
}
},
"cc_cert_id": {
"KR": {
"KECS-ISIS-0272-2010": 1
}
},
"cc_claims": {
"A": {
"A.TOE": 1,
"A.TSF": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 1,
"ATE_DPT": 1,
"ATE_DPT.2": 2,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL4+": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"KISA": {
"KISA": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"SCP": {
"SCP02": 4
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 1
}
},
"miscellaneous": {
"ARIA": {
"ARIA": 3
},
"SEED": {
"SEED": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 6
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "ITSCC",
"/CreationDate": "D:20110729144857+09\u002700\u0027",
"/Creator": "PDFCreator Version 1.2.0",
"/Keywords": "",
"/ModDate": "D:20110729144857+09\u002700\u0027",
"/Producer": "GPL Ghostscript 9.0",
"/Subject": "",
"/Title": "KECS-ISIS-0272-2010(KOMSCO JK11)_e.hwp",
"pdf_file_size_bytes": 306165,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
},
"st_filename": "KOMSCO JK11 Security Target Lite_e.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 6
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
},
"RSA": {
"RSA 1024": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0438-2007": 1,
"BSI-DSZ-CC-0501-2008-MA-04": 1,
"BSI-DSZ-CC-0624-2010-MA-04": 1
}
},
"cc_claims": {
"A": {
"A.TOE": 2,
"A.TSF": 2
},
"D": {
"D.APP_CODE": 1,
"D.APP_DATA": 1,
"D.CRYPTO": 1,
"D.PIN": 1,
"D.SEC_DATA": 1,
"D.TS_CODE": 1,
"D.TS_DATA": 1
},
"O": {
"O.IDENTIFICATI": 1,
"O.JAVAOBJECT": 2
},
"OE": {
"OE.TSF": 3
},
"OP": {
"OP.ARRAY_ACCESS": 5,
"OP.CREATE": 3,
"OP.DELETE": 10,
"OP.INSTALL": 10,
"OP.INSTANCE_FIELD": 5,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 5,
"OP.JAVA": 3,
"OP.LOAD": 10,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 7
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 16,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 15,
"ADV_IMP.1": 11,
"ADV_IMP.2": 1,
"ADV_TDS.1": 2,
"ADV_TDS.3": 21
},
"AGD": {
"AGD_OPE.1": 17,
"AGD_PRE.1": 10
},
"ALC": {
"ALC_CMC.4": 17,
"ALC_CMS.1": 1,
"ALC_CMS.4": 8,
"ALC_DEL.1": 7,
"ALC_DVS.1": 8,
"ALC_DVS.2": 1,
"ALC_LCD.1": 9,
"ALC_TAT.1": 10
},
"ASE": {
"ASE_CCL.1": 16,
"ASE_ECD.1": 14,
"ASE_INT.1": 16,
"ASE_OBJ.2": 13,
"ASE_REQ.1": 2,
"ASE_REQ.2": 15,
"ASE_SPD.1": 10,
"ASE_TSS.1": 7
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 7,
"ATE_DPT.1": 1,
"ATE_DPT.2": 14,
"ATE_FUN.1": 14,
"ATE_IND.2": 9
},
"AVA": {
"AVA_MSU.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 15,
"AVA_VLA.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4+": 1,
"EAL4": 12,
"EAL4+": 6,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 7,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 3,
"FAU_SAA.1": 10,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 1
},
"FCS": {
"FCS_CKM.1": 13,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 13,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 18,
"FCS_COP.1.1": 3
},
"FDP": {
"FDP_ACC.1": 15,
"FDP_ACC.2": 15,
"FDP_ACC.2.1": 2,
"FDP_ACC.2.2": 2,
"FDP_ACF.1": 20,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 8,
"FDP_ITC.1": 6,
"FDP_ITC.2": 6,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 6,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UCT.1": 9,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 8,
"FDP_UIT.1.1": 2
},
"FIA": {
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 13,
"FIA_ATD.1.1": 2,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 22,
"FIA_UAU.1.1": 7,
"FIA_UAU.1.2": 3,
"FIA_UAU.4": 7,
"FIA_UAU.4.1": 1,
"FIA_UAU.6": 6,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 13,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 1,
"FIA_USB.1": 6,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 15,
"FMT_MSA.1.1": 3,
"FMT_MSA.3": 10,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 1,
"FMT_MTD.2": 7,
"FMT_MTD.2.1": 1,
"FMT_MTD.2.2": 1,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 18,
"FMT_SMR.1.1": 5,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 6,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_RCV.2": 1,
"FPT_RCV.3": 6,
"FPT_RCV.3.1": 1,
"FPT_RCV.3.2": 1,
"FPT_RCV.3.3": 1,
"FPT_RCV.3.4": 1,
"FPT_RCV.4": 5,
"FPT_RCV.4.1": 1,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC.1": 6,
"FTP_TRP.1": 5
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"the application although it is possible that load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE TOE is the JavaCard Platform that supports the analysis of": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"TORNADO": {
"TORNADO": 1
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1,
"Key agreement": 1
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 8
}
},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Malfunction": 7,
"Physical tampering": 2,
"malfunction": 2
},
"SCA": {
"DPA": 1,
"SPA": 1,
"timing attack": 1
}
},
"standard_id": {
"BSI": {
"AIS20": 1
},
"CC": {
"CCMB-2009-07-001": 2,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2
},
"PKCS": {
"PKCS#2": 1
},
"SCP": {
"SCP 02": 1,
"SCP02": 20
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"3DES": {
"TDES": 8
},
"DES": {
"DES": 1
}
},
"miscellaneous": {
"ARIA": {
"ARIA": 4
},
"SEED": {
"SEED": 5
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 12
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "ITSCC",
"/CreationDate": "D:20110729101020+09\u002700\u0027",
"/Creator": "PDFCreator Version 1.2.0",
"/Keywords": "",
"/ModDate": "D:20110729101020+09\u002700\u0027",
"/Producer": "GPL Ghostscript 9.0",
"/Subject": "",
"/Title": "[????] Security Target Lite_e",
"pdf_file_size_bytes": 1626173,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 90
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-ISIS-0272-2010(KOMSCO%20JK11)_e.pdf",
"scheme": "KR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.4",
"EAL4+",
"ATE_DPT.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KOMSCO%20JK11%20Security%20Target%20Lite_e.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ab59294fa0998b0c8f235974085aa38914f67cc96fa4287a47035cb96eb4c397",
"txt_hash": "7e4d2b3496132c30e3628a7f6a76e188ca72414f1d8d9cd42ff9fd1705c50a28"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8d54ef21e6a713964de8d940cd07a4830ce50843c6e995ceb2b20b6f97a59935",
"txt_hash": "4d8fa92cd3448838189c54fbd5b7760e8ff978d372a421184857d12feef9759d"
}
},
"status": "archived"
}