{"_id": "9162f1531b31493f", "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "9162f1531b31493f", "status": "archived", "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems", "name": "Renesas RS46X integrated circuit version 01", "manufacturer": "Renesas Electronics Corporation", "scheme": "DE", "security_level": {"_type": "Set", "elements": ["AVA_VAN.5", "EAL5+", "ALC_DVS.2"]}, "not_valid_before": "2011-04-07", "not_valid_after": "2019-09-01", "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0697a_pdf.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0697b_pdf.pdf", "cert_link": null, "manufacturer_web": "https://am.renesas.com/", "protection_profile_links": {"_type": "Set", "elements": ["https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf"]}, "maintenance_updates": {"_type": "Set", "elements": [{"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport", "maintenance_date": "2011-11-10", "maintenance_title": "Renesas RS46X smartcard integrated circuit version 02", "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0697_ma1a_pdf.pdf", "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0697_ma1b_pdf.pdf"}]}, "state": {"_type": "sec_certs.sample.cc_eucc_common.InternalState", "report": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "dcc1c00f0942854153eebf5ed36d93c5a2db4898384c3d404feb74c8e9b40c87", "txt_hash": "4b2dae4b920cbf8a2937f457978c917f7d9f963df85fd8187443bcd85bd5bf44", "json_hash": null}, "st": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "f9e26ffe96f28831c36a5e92de1349e0042662f4df6566423a334b27a550f4e6", "txt_hash": "78749807e86ea530e9f49a2b0a14ca3ec6d3392b8ee59e8f602879c56691e3bd", "json_hash": null}, "cert": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": false, "convert_ok": false, "extract_ok": false, "pdf_hash": null, "txt_hash": null, "json_hash": null}}, "pdf_data": {"_type": "sec_certs.sample.cc_eucc_common.PdfData", "report_metadata": {"pdf_file_size_bytes": 873814, "pdf_is_encrypted": false, "pdf_number_of_pages": 36, "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "/CreationDate": "D:20110421135942+02'00'", "/Creator": "Writer", "/Keywords": "\"Common Criteria, Certification, Zertifizierung, security chip, Renesas, EAL5\"", "/ModDate": "D:20110421140146+02'00'", "/Producer": "OpenOffice.org 3.2", "/Subject": "Security controller", "/Title": "Certification Report BSI-DSZ-CC-0697-2011", "pdf_hyperlinks": {"_type": "Set", "elements": ["http://www.commoncriteriaportal.org/", "https://www.bsi.bund.de/"]}}, "st_metadata": {"pdf_file_size_bytes": 572335, "pdf_is_encrypted": true, "pdf_number_of_pages": 59, "/Author": "Renesas Electronics Corporation", "/CreationDate": "D:20110310173744Z", "/Creator": "PrimoPDF http://www.primopdf.com/", "/Keywords": "Renesas; RS46X; Security Target; CC; EAL5; EAL5+; secure MCU; Renesas Electronics; smartcard; smart card; contactless; dual way", "/ModDate": "D:20110421141034+01'00'", "/Producer": "PrimoPDF", "/Subject": "Public version of Security Target for RS46X", "/Title": "RS46X-CC-ST-0002.doc", "pdf_hyperlinks": {"_type": "Set", "elements": []}}, "cert_metadata": null, "report_frontpage": {"DE": {"match_rules": ["(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"], "cert_id": "BSI-DSZ-CC-0697-2011", "cert_item": "Renesas RS46X integrated circuit version 01", "developer": "Renesas Electronics Corporation", "cert_lab": "BSI"}}, "st_frontpage": null, "cert_frontpage": null, "report_keywords": {"cc_cert_id": {"DE": {"BSI-DSZ-CC-0697-2011": 19, "BSI-DSZ-CC-0541-2010": 3, "BSI-DSZ-CC-0697": 2}}, "cc_protection_profile_id": {"BSI": {"BSI-CC-PP-0035-2007": 2, "BSI-CC-PP- 0035-2007": 1}}, "cc_security_level": {"EAL": {"EAL 5": 7, "EAL 4": 2, "EAL1": 7, "EAL4": 7, "EAL5": 7, "EAL5+": 1, "EAL6": 4, "EAL3": 4, "EAL7": 4, "EAL2": 3, "EAL 5 augmented": 3}, "ITSEC": {"ITSEC Evaluation": 1}}, "cc_sar": {"ADV": {"ADV_FSP.5": 2, "ADV_INT.2": 2, "ADV_TDS.4": 2, "ADV_ARC.1": 1, "ADV_FSP.1": 1, "ADV_FSP.2": 1, "ADV_FSP.3": 1, "ADV_FSP.4": 1, "ADV_FSP.6": 1, "ADV_IMP.1": 1, "ADV_IMP.2": 1, "ADV_INT.1": 1, "ADV_INT.3": 1, "ADV_SPM.1": 1, "ADV_TDS.1": 1, "ADV_TDS.2": 1, "ADV_TDS.3": 1, "ADV_TDS.5": 1, "ADV_TDS.6": 1, "ADV_ARC": 1, "ADV_FSP": 1, "ADV_IMP": 1, "ADV_INT": 1, "ADV_SPM": 1, "ADV_TDS": 1}, "AGD": {"AGD_OPE.1": 1, "AGD_PRE.1": 1, "AGD_OPE": 1, "AGD_PRE": 1}, "ALC": {"ALC_DVS.2": 7, "ALC_CMS.5": 3, "ALC_TAT.2": 3, "ALC_CMC.1": 1, "ALC_CMC.2": 1, "ALC_CMC.3": 1, "ALC_CMC.4": 2, "ALC_CMC.5": 1, "ALC_CMS.1": 1, "ALC_CMS.2": 1, "ALC_CMS.3": 1, "ALC_CMS.4": 1, "ALC_DEL.1": 2, "ALC_DVS.1": 1, "ALC_FLR.1": 1, "ALC_FLR.2": 1, "ALC_FLR.3": 1, "ALC_LCD.1": 2, "ALC_LCD.2": 1, "ALC_TAT.1": 1, "ALC_TAT.3": 1, "ALC_CMC": 1, "ALC_CMS": 1, "ALC_DEL": 1, "ALC_DVS": 1, "ALC_FLR": 1, "ALC_TAT": 1}, "ATE": {"ATE_DPT.3": 2, "ATE_COV.1": 1, "ATE_COV.2": 1, "ATE_COV.3": 1, "ATE_DPT.1": 1, "ATE_DPT.2": 1, "ATE_DPT.4": 1, "ATE_FUN.1": 1, "ATE_FUN.2": 1, "ATE_IND.1": 1, "ATE_IND.2": 1, "ATE_IND.3": 1, "ATE_COV": 1, "ATE_DPT": 1, "ATE_FUN": 1, "ATE_IND": 1}, "AVA": {"AVA_VAN.5": 6, "AVA_VAN.1": 1, "AVA_VAN.2": 1, "AVA_VAN.3": 1, "AVA_VAN.4": 1, "AVA_VAN": 2}, "APE": {"APE_INT.1": 1, "APE_CCL.1": 1, "APE_SPD.1": 1, "APE_OBJ.1": 1, "APE_OBJ.2": 1, "APE_ECD.1": 1, "APE_REQ.1": 1, "APE_REQ.2": 1}, "ASE": {"ASE_INT.1": 1, "ASE_CCL.1": 1, "ASE_SPD.1": 1, "ASE_OBJ.1": 1, "ASE_OBJ.2": 1, "ASE_ECD.1": 1, "ASE_REQ.1": 1, "ASE_REQ.2": 1, "ASE_TSS.1": 1, "ASE_TSS.2": 1, "ASE_CCL": 1, "ASE_ECD": 1, "ASE_INT": 1, "ASE_OBJ": 1, "ASE_SPD": 1, "ASE_TSS": 1}}, "cc_sfr": {}, "cc_claims": {}, "vendor": {}, "eval_facility": {}, "symmetric_crypto": {"AES_competition": {"AES": {"AES": 6}}, "DES": {"DES": {"DES": 4}, "3DES": {"3DES": 1}}}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {"RNG": {"RNG": 3}}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {"SCA": {"physical probing": 1, "side-channel": 1, "side channel": 1}, "FI": {"physical tampering": 1}, "other": {"reverse engineering": 1, "JIL": 3}}, "technical_report_id": {"BSI": {"BSI TR-02102": 1, "BSI 7125": 2, "BSI 7148": 1}}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"BSI": {"AIS 34": 2, "AIS 25": 2, "AIS 26": 2, "AIS 37": 1, "AIS 31": 2, "AIS 36": 2, "AIS 35": 2, "AIS 20": 1, "AIS 32": 1, "AIS 38": 1}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {"ConfidentialDocument": {"Version 1.0, 17 March 2011, Renesas RS46X integrated circuit version 01, T-Systems GEI GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product Renesas RS46X integrated": 1, "Version 01, BSI-DSZ-CC-0697, 11 March 2011, Version 1.0, T- Systems GEI GmbH (confidential document) [11] RS-4 dual-way Series User Guidance Manual, Revision 1.3, Renesas Electronics Corporation": 1}}}, "st_keywords": {"cc_cert_id": {}, "cc_protection_profile_id": {"BSI": {"BSI-PP- 0035": 4, "BSI-PP-0035": 78, "BSI-CC-PP-0035-2007": 1}}, "cc_security_level": {"EAL": {"EAL5": 24, "EAL4": 4, "EAL 5": 1, "EAL5 augmented": 3, "EAL4 augmented": 1, "EAL 5 augmented": 1}}, "cc_sar": {"ADV": {"ADV_FSP": 4, "ADV_ARC.1": 3, "ADV_FSP.5": 4, "ADV_IMP.1": 3, "ADV_INT.2": 1, "ADV_TDS.4": 1, "ADV_FSP.4": 4, "ADV_FSP.2": 1, "ADV_TDS.3": 1}, "AGD": {"AGD_OPE.1": 3, "AGD_PRE.1": 3}, "ALC": {"ALC_CMS": 3, "ALC_DVS.2": 7, "ALC_CMC.4": 2, "ALC_CMS.5": 5, "ALC_DEL.1": 2, "ALC_LCD.1": 1, "ALC_TAT.2": 1, "ALC_CMS.4": 4, "ALC_DVS.1": 1}, "ATE": {"ATE_COV.2": 2, "ATE_DPT.3": 1, "ATE_FUN.1": 1, "ATE_IND.2": 1}, "AVA": {"AVA_VAN.5": 10}}, "cc_sfr": {"FAU": {"FAU_SAS": 3, "FAU_SAS.1": 11, "FAU_GEN": 1, "FAU_GEN.1": 1, "FAU_SAS.1.1": 1}, "FCS": {"FCS_RNG": 5, "FCS_RNG.1": 8, "FCS_COP.1": 22, "FCS_RNG.1.1": 1, "FCS_RNG.1.2": 1, "FCS_COP.1.1": 3, "FCS_CKM.1": 8, "FCS_CKM.4": 7, "FCS_COP": 1}, "FDP": {"FDP_ACF": 1, "FDP_ITT.1": 11, "FDP_IFC.1": 18, "FDP_ITT.1.1": 1, "FDP_ACC.1": 3, "FDP_IFC.1.1": 1, "FDP_IFF.1": 3, "FDP_ITC.1": 8, "FDP_ITC.2": 7}, "FMT": {"FMT_LIM": 4, "FMT_LIM.1": 10, "FMT_LIM.2": 10, "FMT_LIM.1.1": 1, "FMT_LIM.2.1": 1, "FMT_MSA.3": 1, "FMT_MSA.2": 2}, "FPT": {"FPT_FLS.1": 24, "FPT_PHP.3": 11, "FPT_ITT.1": 9, "FPT_FLS.1.1": 1, "FPT_PHP.3.1": 1, "FPT_ITT.1.1": 1, "FPT_TDC": 1}, "FRU": {"FRU_FLT.2": 14, "FRU_FLT.1": 1, "FRU_FLT.2.1": 1}, "FTP": {"FTP_ITC": 1, "FTP_TRP.1": 1}}, "cc_claims": {"O": {"O.RND": 4}, "T": {"T.RND": 4}}, "vendor": {"Infineon": {"Infineon Technologies": 1}, "Philips": {"Philips": 1}}, "eval_facility": {}, "symmetric_crypto": {"AES_competition": {"AES": {"AES": 48}}, "DES": {"DES": {"DES": 33}, "3DES": {"3DES": 21}}}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {}, "randomness": {"PRNG": {"PRNG": 2}, "RNG": {"RNG": 17, "RND": 8}}, "cipher_mode": {"ECB": {"ECB": 12}, "CBC": {"CBC": 4}, "CTR": {"CTR": 1}, "OFB": {"OFB": 2}}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {"SCA": {"Leak-Inherent": 17, "Physical Probing": 2, "physical probing": 4, "Physical probing": 1}, "FI": {"Malfunction": 18, "malfunction": 4, "DFA": 2}, "other": {"reverse engineering": 1}}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"FIPS": {"FIPS PUB 46-3": 4, "FIPS PUB 197": 3}, "BSI": {"AIS31": 5, "AIS 31": 1, "AIS20": 1, "AIS 20": 1}, "ISO": {"ISO/IEC 14443": 4, "ISO/IEC 18092": 4, "ISO/IEC7816-3": 1}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {}}, "cert_keywords": null, "report_filename": "0697a_pdf.pdf", "st_filename": "0697b_pdf.pdf", "cert_filename": null}, "heuristics": {"_type": "sec_certs.sample.cc_eucc_common.Heuristics", "extracted_versions": {"_type": "Set", "elements": ["01"]}, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": ["BSI"], "cert_id": "BSI-DSZ-CC-0697-2011", "prev_certificates": null, "next_certificates": null, "st_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null}, "report_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": {"_type": "Set", "elements": ["BSI-DSZ-CC-0705-2011", "BSI-DSZ-CC-0735-2011"]}, "indirectly_referenced_by": {"_type": "Set", "elements": ["BSI-DSZ-CC-0705-2011", "BSI-DSZ-CC-0735-2011", "BSI-DSZ-CC-0774-2011"]}, "directly_referencing": {"_type": "Set", "elements": ["BSI-DSZ-CC-0541-2010"]}, "indirectly_referencing": {"_type": "Set", "elements": ["BSI-DSZ-CC-0541-2010"]}}, "annotated_references": null, "extracted_sars": {"_type": "Set", "elements": [{"_type": "sec_certs.sample.sar.SAR", "family": "APE_OBJ", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 5}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_SPD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "APE_CCL", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_ECD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_INT", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_DVS", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_FUN", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 5}, {"_type": "sec_certs.sample.sar.SAR", "family": "APE_SPD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_TDS", "level": 4}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 4}, {"_type": "sec_certs.sample.sar.SAR", "family": "APE_ECD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_DPT", "level": 3}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_REQ", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_OBJ", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_DEL", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_LCD", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_CCL", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_TAT", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 5}, {"_type": "sec_certs.sample.sar.SAR", "family": "ASE_TSS", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_ARC", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_SPM", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_COV", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_FLR", "level": 3}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_IMP", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_INT", "level": 2}, {"_type": "sec_certs.sample.sar.SAR", "family": "APE_INT", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "APE_REQ", "level": 2}]}, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": null, "protection_profiles": {"_type": "Set", "elements": ["f6d23054061d72ba"]}, "eal": "EAL5+"}}