Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43 and additional SHA-256 function

CSV information

Status archived
Valid from 15.05.2006
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer Renesas Technology Corporation
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, AVA_VLA.4, AVA_MSU.3, ADV_IMP.2, EAL4+
Maintenance updates Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 03 with ACL version 1.43 and additional SHA-256 function (12.06.2006) Certification report Security target

Heuristics summary

Certificate ID: BSI-DSZ-CC-0379-2006

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Symmetric Algorithms
DES, 3DES, Triple-DES
Hash functions
SHA-1, SHA-256, RIPEMD-160
Randomness
TRNG, PRNG, RNG
Block cipher modes
ECB

Vendor
Infineon Technologies, Philips

Security level
EAL4, EAL 4, EAL 1, EAL 7, EAL 4+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 4 augmented, EAL4 augmented
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_COP.1, FCS_CKM.1, FCS_RND.1, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FMT_LIM.1, FMT_LIM.2, FPT_FLS.1, FPT_SEP.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2
Protection profiles
BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0379-2006, BSI-DSZ-CC-0329-2006

Side-channel analysis
Physical probing, physical probing, physical tampering, Malfunction
Certification process
HD65255C1) Version 02 with ACL version 1.43 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Protection Profile BSI-PP-0002-2001, Version v1.0, Smartcard IC platform Protection Profile, Technical Report, Version 1.0, April 25, 2006, Evaluation Technical Report BSI-DSC-CC-0379 (confidential document) [10] Renesas 32-bit Smart Card Microcomputer AE-5 Series User Guidance Manual, Rev. 4.40, Renesas, 27 January 2006 (confidential document) [11] Option List for Smart Card Microcomputer (for HD65255C1 [AE55C1]), v.1.3, Renesas Technology, Technical Report lite, Version 1.0, 10 May 2006, ETR-lite for composition according to AIS36 (confidential document) [19] Certification Report BSI-DSZ-CC-0329-2006 for Renesas AE55C1 (HD65255C1) smartcard integrated, version 1.43 and additional SHA-256 function Smartcard Security Target, Renesas Technology Corp. (confidential document)). The evaluators verified, that the threats and the security objectives for the life cycle phases

Standards
FIPS PUB 46-3, FIPS PUB 180-2, AIS 34, AIS 32, AIS31, AIS20, AIS 20, AIS 25, AIS 26, AIS 31, AIS36, ISO/IEC 15408:1999, ISO/IEC15408: 1999
Technical reports
BSI 7125, BSI 7148, BSI 7149

File metadata

Title Certification Report BSI-DSZ-CC-0379-2006
Subject Certification Report
Keywords BSI, Renesas, AE55C1, smartcard, HD65255C1
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20060607165231+02'00'
Modification date D:20060607171436+02'00'
Pages 44
Creator Acrobat PDFMaker 7.0.7 für Word
Producer Acrobat Distiller 7.0.5 (Windows)

Frontpage

Certificate ID BSI-DSZ-CC-0379-2006
Certified item Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43 and additional SHA-256 function
Certification lab BSI
Developer Renesas Technology Corp. Certification Report V1.0 ZS-01-01-F-330 V3.23 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 228 9582-0, Fax +49 228 9582-455, Infoline +49 228 9582-111

References

Outgoing
  • BSI-DSZ-CC-0329-2006 - archived - Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43
Incoming

Security target

Extracted keywords

Symmetric Algorithms
DES, 3DES, Triple-DES
Hash functions
SHA-1, SHA256, SHA-256, RIPEMD-160
Randomness
TRNG, PRNG, RNG, RND
Block cipher modes
ECB, CBC

Vendor
Infineon Technologies, Philips

Security level
EAL4, EAL4 augmented
Claims
O.RND, T.RND
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_IGS, ADO_DEL, ADV_SPM.1, ADV_IMP.2, ADV_SPM, ADV_FSP, ADV_RCR, ADV_HLD, ADV_LLD, ADV_IMP, AGD_USR, AGD_ADM, ALC_DVS.2, ALC_DVS, ALC_LCD, ALC_TAT, AVA_MSU.3, AVA_VLA.4, AVA_SOF, AVA_MSU, AVA_VLA
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_GEN.1, FAU_SAS.1.1, FCS_RND.1.1, FCS_COP.1, FCS_RND.1, FCS_CKM.1, FCS_RND, FCS_COP.1.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.4.1, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FDP_ITT.1.1, FDP_IFC.1.1, FDP_IFF.1, FDP_ITC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_SDI.1, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.2, FMT_MSA.3, FMT_MSA.2.1, FMT_MSA.1, FMT_SMR.1, FPT_FLS.1, FPT_SEP.1, FPT_PHP.3, FPT_ITT.1, FPT_FLS.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_PHP.3.1, FPT_ITT.1.1, FPT_AMT.1, FRU_FLT.2, FRU_FLT.1
Protection profiles
BSI-PP-0002, BSI-PP- 0002

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, DPA, physical tampering, Malfunction, malfunction, DFA

Standards
FIPS PUB 46-3, AIS31, AIS 31, AIS20, AIS 20, ISO/IEC7816-3, ISO/IEC 9796-2

File metadata

Creation date D:20060407165421+09'00'
Modification date D:20060607171320+02'00'
Pages 74
Creator クセロPDF v1.12 Rev0480
Producer Xelo PDF Library

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

BSI-DSZ-CC-0379-2006

Extracted SARs

ADV_FSP.2, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "8e62904f811d99df",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0379-2006",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ENV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_PPC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_DES",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.43"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0386-2006"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0329-2006"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0386-2006"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0329-2006"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2006-06-12",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0379-ma1.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0379-ma1b.pdf",
        "maintenance_title": "Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 03 with ACL version 1.43 and additional SHA-256 function"
      }
    ]
  },
  "manufacturer": "Renesas Technology Corporation",
  "manufacturer_web": "https://am.renesas.com/",
  "name": "Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43 and additional SHA-256 function",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2006-05-15",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0379a.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0379-2006",
        "cert_item": "Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43 and additional SHA-256 function",
        "cert_lab": "BSI",
        "developer": "Renesas Technology Corp. Certification Report V1.0 ZS-01-01-F-330 V3.23 BSI - Bundesamt f\u00fcr Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 228 9582-0, Fax +49 228 9582-455, Infoline +49 228 9582-111",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0329-2006": 3,
          "BSI-DSZ-CC-0379-2006": 21
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 4
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 2,
          "ACM_AUT.1": 2,
          "ACM_CAP": 2,
          "ACM_CAP.4": 2,
          "ACM_SCP": 2,
          "ACM_SCP.2": 2
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.2": 2,
          "ADO_IGS": 2,
          "ADO_IGS.1": 2
        },
        "ADV": {
          "ADV_FSP": 2,
          "ADV_FSP.2": 1,
          "ADV_HLD": 2,
          "ADV_HLD.2": 1,
          "ADV_IMP": 2,
          "ADV_IMP.2": 5,
          "ADV_INT": 2,
          "ADV_LLD": 2,
          "ADV_LLD.1": 1,
          "ADV_RCR": 2,
          "ADV_RCR.1": 1,
          "ADV_SPM": 2,
          "ADV_SPM.1": 1
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_ADM.1": 1,
          "AGD_USR": 2,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.2": 6,
          "ALC_FLR": 2,
          "ALC_LCD": 1,
          "ALC_LCD.1": 2,
          "ALC_TAT": 2,
          "ALC_TAT.1": 2
        },
        "ASE": {
          "ASE_DES.1": 1,
          "ASE_ENV.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_PPC.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SRE.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_COV.2": 1,
          "ATE_DPT": 2,
          "ATE_DPT.1": 1,
          "ATE_FUN": 2,
          "ATE_FUN.1": 1,
          "ATE_IND": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_MSU": 2,
          "AVA_MSU.3": 5,
          "AVA_SOF": 4,
          "AVA_SOF.1": 1,
          "AVA_VLA": 4,
          "AVA_VLA.2": 1,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 3,
          "EAL 4 augmented": 2,
          "EAL 4+": 1,
          "EAL 7": 1,
          "EAL1": 5,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 12,
          "EAL4 augmented": 1,
          "EAL5": 6,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 1,
          "FCS_COP.1": 5,
          "FCS_RND.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 2,
          "FDP_ACF.1": 2,
          "FDP_IFC.1": 2,
          "FDP_ITT.1": 2
        },
        "FMT": {
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_ITT.1": 2,
          "FPT_PHP.3": 1,
          "FPT_SEP.1": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "27 January 2006 (confidential document) [11] Option List for Smart Card Microcomputer (for HD65255C1 [AE55C1]), v.1.3, Renesas Technology": 1,
          "HD65255C1) Version 02 with ACL version 1.43 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Protection Profile BSI-PP-0002-2001, Version v1.0, Smartcard IC platform Protection Profile": 1,
          "Technical Report lite, Version 1.0, 10 May 2006, ETR-lite for composition according to AIS36 (confidential document) [19] Certification Report BSI-DSZ-CC-0329-2006 for Renesas AE55C1 (HD65255C1) smartcard integrated": 1,
          "Technical Report, Version 1.0, April 25, 2006, Evaluation Technical Report BSI-DSC-CC-0379 (confidential document) [10] Renesas 32-bit Smart Card Microcomputer AE-5 Series User Guidance Manual, Rev. 4.40, Renesas": 1,
          "version 1.43 and additional SHA-256 function Smartcard Security Target, Renesas Technology Corp. (confidential document)). The evaluators verified, that the threats and the security objectives for the life cycle phases": 1
        }
      },
      "cipher_mode": {
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "RIPEMD": {
          "RIPEMD-160": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-256": 23
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 5
        },
        "RNG": {
          "RNG": 10
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 1,
          "physical tampering": 1
        },
        "SCA": {
          "Physical probing": 1,
          "physical probing": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS 25": 2,
          "AIS 26": 2,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 1,
          "AIS20": 1,
          "AIS31": 1,
          "AIS36": 1
        },
        "FIPS": {
          "FIPS PUB 180-2": 2,
          "FIPS PUB 46-3": 3
        },
        "ISO": {
          "ISO/IEC 15408:1999": 1,
          "ISO/IEC15408: 1999": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "3DES": 4,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 15
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies": 1
        },
        "Philips": {
          "Philips": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Company": "BSI, Postfach 200363, 53133 Bonn",
      "/CreationDate": "D:20060607165231+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0.7 f\u00fcr Word",
      "/Keywords": "BSI, Renesas, AE55C1, smartcard, HD65255C1",
      "/ModDate": "D:20060607171436+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/SourceModified": "D:20060607145224",
      "/Subject": "Certification Report",
      "/Title": "Certification Report BSI-DSZ-CC-0379-2006",
      "pdf_file_size_bytes": 304411,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 44
    },
    "st_filename": "0379b.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.RND": 5
        },
        "T": {
          "T.RND": 5
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0002": 4,
          "BSI-PP-0002": 82
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_CAP": 1,
          "ACM_SCP": 1
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_IGS": 2
        },
        "ADV": {
          "ADV_FSP": 2,
          "ADV_HLD": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 2,
          "ADV_LLD": 1,
          "ADV_RCR": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 4
        },
        "AGD": {
          "AGD_ADM": 3,
          "AGD_USR": 3
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_LCD": 1,
          "ALC_TAT": 1
        },
        "AVA": {
          "AVA_MSU": 1,
          "AVA_MSU.3": 2,
          "AVA_SOF": 8,
          "AVA_VLA": 1,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 6,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_SAS.1": 9,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 34,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 3,
          "FCS_CKM.4": 23,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 64,
          "FCS_COP.1.1": 6,
          "FCS_RND": 1,
          "FCS_RND.1": 16,
          "FCS_RND.1.1": 3
        },
        "FDP": {
          "FDP_ACC.1": 31,
          "FDP_ACC.1.1": 3,
          "FDP_ACF.1": 27,
          "FDP_ACF.1.1": 4,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 30,
          "FDP_IFC.1.1": 2,
          "FDP_IFF.1": 3,
          "FDP_ITC.1": 20,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITT.1": 23,
          "FDP_ITT.1.1": 1,
          "FDP_SDI.1": 1
        },
        "FMT": {
          "FMT_LIM": 1,
          "FMT_LIM.1": 10,
          "FMT_LIM.1.1": 1,
          "FMT_LIM.2": 10,
          "FMT_LIM.2.1": 1,
          "FMT_MSA.1": 2,
          "FMT_MSA.2": 24,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 9,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_AMT.1": 1,
          "FPT_FLS.1": 31,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 21,
          "FPT_ITT.1.1": 2,
          "FPT_PHP.3": 12,
          "FPT_PHP.3.1": 1,
          "FPT_SEP.1": 12,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1
        },
        "FRU": {
          "FRU_FLT.1": 1,
          "FRU_FLT.2": 15
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "ECB": {
          "ECB": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "RIPEMD": {
          "RIPEMD-160": 13
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 20
          },
          "SHA2": {
            "SHA-256": 30,
            "SHA256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 14
        },
        "RNG": {
          "RND": 10,
          "RNG": 22
        },
        "TRNG": {
          "TRNG": 9
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 2,
          "Malfunction": 15,
          "malfunction": 5,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 16,
          "Physical Probing": 2,
          "Physical probing": 1,
          "physical probing": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 31": 1,
          "AIS20": 4,
          "AIS31": 6
        },
        "FIPS": {
          "FIPS PUB 46-3": 4
        },
        "ISO": {
          "ISO/IEC 9796-2": 5,
          "ISO/IEC7816-3": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "3DES": 18,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 51
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies": 1
        },
        "Philips": {
          "Philips": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20060407165421+09\u002700\u0027",
      "/Creator": "\u30af\u30bb\u30edPDF v1.12 Rev0480",
      "/ModDate": "D:20060607171320+02\u002700\u0027",
      "/Producer": "Xelo PDF Library",
      "pdf_file_size_bytes": 1109011,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 74
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0379a.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ADV_IMP.2",
      "EAL4+",
      "AVA_VLA.4",
      "ALC_DVS.2",
      "AVA_MSU.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0379b.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9a53776808262147fb38ae45e09e639b60f17b884a8dc84b73db57ff689b154c",
      "txt_hash": "78a062c5cbeb64bb3dbe3bee29345af1e1f7761c967a2672658d9fddaa322fe6"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ecb306689b8ec70c8348d99eeff3ee624bee1207d8a736d3d5ea4917afca7aac",
      "txt_hash": "c0f6ffc27624ad35c1beec0ff5f7b905ba24c4d0c512efed39ac26d8c2c0c5e2"
    }
  },
  "status": "archived"
}