Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43
CSV information ?
Status | archived |
---|---|
Valid from | 28.03.2006 |
Valid until | 01.09.2019 |
Scheme | 🇩🇪 DE |
Manufacturer | Renesas |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_MSU.3, ALC_DVS.2, EAL4+, AVA_VLA.4, ADV_IMP.2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DES, 3DES, Triple-DESHash functions
SHA-1, RIPEMD-160Randomness
TRNG, PRNG, RNGBlock cipher modes
ECBVendor
Infineon Technologies, PhilipsSecurity level
EAL4, EAL 4, EAL 1, EAL 7, EAL 4+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 4 augmented, EAL4 augmentedSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_COP.1, FCS_CKM.1, FCS_RND.1, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FMT_LIM.1, FMT_LIM.2, FPT_FLS.1, FPT_SEP.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2Protection profiles
BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0329-2006Side-channel analysis
Physical probing, physical probing, physical tampering, MalfunctionCertification process
HD65255C1) Version 02 with ACL version 1.43 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Protection Profile BSI-PP-0002-2001, Version v1.0, Smartcard IC platform Protection Profile, Technical Report, Version 1.0, March 22, 2006, Evaluation Technical Report BSI-DSC-CC-0329 (confidential document) [9] Renesas 32-bit Smart Card Microcomputer AE-5 Series User Guidance Manual, Rev. 4.40, Renesas, 27 January 2006 (confidential document) [10] FIPS PUB 46-3 Federal Information Processing Standards Publication Data Encryption Standard, Technical Report lite, Version 1.0, 22 March 2006, ETR-lite for composition according to AIS36 (confidential document) [17] Smartcard Integrated Circuit Platform Augmentations, v1.0, Atmel, Hitachi Europe, Infineon, HD65255C1) Version 02 with ACL version 1.43 Smartcard Security Target, Renesas Technology Corp. (confidential document)). The evaluators verified, that the threats and the security objectives for the life cycle phasesStandards
FIPS PUB 46-3, FIPS PUB 180-1, AIS 34, AIS 32, AIS31, AIS20, AIS 20, AIS 25, AIS 26, AIS 31, AIS36, ISO/IEC 15408:1999, ISO/IEC15408: 1999Technical reports
BSI 7125, BSI 7148, BSI 7149File metadata
Title | Certification Report BSI-DSZ-CC-0329-2006 |
---|---|
Keywords | Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43; BSI-DSZ-CC-0329-2006, CC, |
Author | BSI |
Creation date | D:20060329121735+02'00' |
Modification date | D:20060329121911+02'00' |
Pages | 44 |
Creator | Acrobat PDFMaker 7.0.7 für Word |
Producer | Acrobat Distiller 7.0.5 (Windows) |
Frontpage
Certificate ID | BSI-DSZ-CC-0329-2006 |
---|---|
Certified item | Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43 |
Certification lab | BSI |
Developer | Renesas Technology Corp |
References
Incoming- BSI-DSZ-CC-0353-2006 - archived - Renesas AE57C1 (HD65257C1)smartcard integrated circuit version 01
- BSI-DSZ-CC-0379-2006 - archived - Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43 and additional SHA-256 function
- BSI-DSZ-CC-0341-2006 - archived - ZKA SECCOS Sig v1.5.2
Security target ?
Extracted keywords
Symmetric Algorithms
DES, 3DES, Triple-DESHash functions
SHA-1, RIPEMD-160Randomness
TRNG, PRNG, RNG, RNDBlock cipher modes
ECB, CBCVendor
Infineon Technologies, PhilipsSecurity level
EAL4, EAL4 augmentedClaims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_IGS, ADO_DEL, ADV_SPM.1, ADV_IMP.2, ADV_SPM, ADV_FSP, ADV_RCR, ADV_HLD, ADV_LLD, ADV_IMP, AGD_USR, AGD_ADM, ALC_DVS.2, ALC_DVS, ALC_LCD, ALC_TAT, AVA_MSU.3, AVA_VLA.4, AVA_SOF, AVA_MSU, AVA_VLASecurity Functional Requirements (SFR)
FAU_SAS.1, FAU_GEN.1, FAU_SAS.1.1, FCS_RND.1, FCS_COP.1, FCS_CKM.1, FCS_RND, FCS_RND.1.1, FCS_COP.1.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.4.1, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FDP_ITT.1.1, FDP_IFC.1.1, FDP_IFF.1, FDP_ITC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_SDI.1, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.2, FMT_MSA.3, FMT_MSA.2.1, FMT_MSA.1, FMT_SMR.1, FPT_FLS.1, FPT_SEP.1, FPT_PHP.3, FPT_ITT.1, FPT_FLS.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_PHP.3.1, FPT_ITT.1.1, FPT_AMT.1, FRU_FLT.2, FRU_FLT.1Protection profiles
BSI-PP-0002, BSI-PP- 0002Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, DPA, physical tampering, Malfunction, malfunction, DFAStandards
FIPS PUB 46-3, FIPS PUB 180-1, AIS31, AIS 31, AIS20, AIS 20, ISO/IEC7816-3, ISO/IEC 9796-2, ISO/IEC 10118-File metadata
Creation date | D:20060202164233+09'00' |
---|---|
Modification date | D:20060202164431-08'00' |
Pages | 74 |
Creator | クセãƒPDF v1.12 Rev0480 |
Producer | Xelo PDF Library |
Heuristics ?
Extracted SARs
ADV_FSP.2, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4Similar certificates
Name | Certificate ID | |
---|---|---|
Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43 and additional SHA-256 function | BSI-DSZ-CC-0379-2006 | Compare |
Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 03 with ACL version 2.22 | BSI-DSZ-CC-0409-2007 | Compare |
References ?
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '967d61efb902f774af4441e4e9d89b01fb1c0a8b0f06d1f3ca5de622f3170dde', 'txt_hash': 'b72aa6ad0928531b3b480f07a971672bb9de4c6332396cdfaa314085fb8d6906'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'cb8e5ce17fb611fb6dc5eb69c6f92da06720f7b5fd5256d92c61fbcbaca5fbb3', 'txt_hash': '77c3ff277a9948e9af1df7d2997b38ba75a54f501f3b8640e330dc46f87836be'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 341601, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 44, '/CreationDate': "D:20060329121735+02'00'", '/Author': 'BSI', '/Creator': 'Acrobat PDFMaker 7.0.7 für Word', '/Keywords': 'Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43; BSI-DSZ-CC-0329-2006, CC, ', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20060329121911+02'00'", '/Company': 'BSI, Postfach 200363, 53133 Bonn', '/SourceModified': 'D:20060329101620', '/Category': 'Common Criteria Zertfikat', '/Title': 'Certification Report BSI-DSZ-CC-0329-2006', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1096866, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 74, '/CreationDate': "D:20060202164233+09'00'", '/Creator': 'クセãƒPDF v1.12 Rev0480', '/ModDate': "D:20060202164431-08'00'", '/Producer': 'Xelo PDF Library', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0329-2006', 'cert_item': 'Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43', 'developer': 'Renesas Technology Corp', 'cert_lab': 'BSI'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0329-2006': 30}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 4}}, 'cc_security_level': {'EAL': {'EAL4': 12, 'EAL 4': 3, 'EAL 1': 1, 'EAL 7': 1, 'EAL 4+': 1, 'EAL1': 5, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL 4 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 2, 'ACM_SCP.2': 2, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_DEL': 2, 'ADO_IGS': 2}, 'ADV': {'ADV_IMP.2': 5, 'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 6, 'AVA_SOF.1': 1, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 4, 'AVA_VLA': 4, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'ASE': {'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_PPC.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_COP.1': 4, 'FCS_CKM.1': 1, 'FCS_RND.1': 2}, 'FDP': {'FDP_ITT.1': 2, 'FDP_IFC.1': 2, 'FDP_ACC.1': 2, 'FDP_ACF.1': 2}, 'FMT': {'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_SEP.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 2}, 'FRU': {'FRU_FLT.2': 1}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 15}, '3DES': {'3DES': 4, 'Triple-DES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}}, 'RIPEMD': {'RIPEMD-160': 1}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'PRNG': 5}, 'RNG': {'RNG': 10}}, 'cipher_mode': {'ECB': {'ECB': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Physical probing': 1, 'physical probing': 1}, 'FI': {'physical tampering': 1, 'Malfunction': 1}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 180-1': 2}, 'BSI': {'AIS 34': 1, 'AIS 32': 1, 'AIS31': 1, 'AIS20': 1, 'AIS 20': 2, 'AIS 25': 2, 'AIS 26': 2, 'AIS 31': 2, 'AIS36': 1}, 'ISO': {'ISO/IEC 15408:1999': 1, 'ISO/IEC15408: 1999': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'HD65255C1) Version 02 with ACL version 1.43 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Protection Profile BSI-PP-0002-2001, Version v1.0, Smartcard IC platform Protection Profile': 1, 'Technical Report, Version 1.0, March 22, 2006, Evaluation Technical Report BSI-DSC-CC-0329 (confidential document) [9] Renesas 32-bit Smart Card Microcomputer AE-5 Series User Guidance Manual, Rev. 4.40, Renesas': 1, '27 January 2006 (confidential document) [10] FIPS PUB 46-3 Federal Information Processing Standards Publication Data Encryption Standard': 1, 'Technical Report lite, Version 1.0, 22 March 2006, ETR-lite for composition according to AIS36 (confidential document) [17] Smartcard Integrated Circuit Platform Augmentations, v1.0, Atmel, Hitachi Europe, Infineon': 1, 'HD65255C1) Version 02 with ACL version 1.43 Smartcard Security Target, Renesas Technology Corp. (confidential document)). The evaluators verified, that the threats and the security objectives for the life cycle phases': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002': 82, 'BSI-PP- 0002': 4}}, 'cc_security_level': {'EAL': {'EAL4': 6, 'EAL4 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_IGS': 2, 'ADO_DEL': 2}, 'ADV': {'ADV_SPM.1': 4, 'ADV_IMP.2': 2, 'ADV_SPM': 1, 'ADV_FSP': 2, 'ADV_RCR': 1, 'ADV_HLD': 1, 'ADV_LLD': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_USR': 3, 'AGD_ADM': 3}, 'ALC': {'ALC_DVS.2': 2, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'AVA': {'AVA_MSU.3': 2, 'AVA_VLA.4': 1, 'AVA_SOF': 7, 'AVA_MSU': 1, 'AVA_VLA': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 9, 'FAU_GEN.1': 1, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RND.1': 16, 'FCS_COP.1': 52, 'FCS_CKM.1': 32, 'FCS_RND': 1, 'FCS_RND.1.1': 2, 'FCS_COP.1.1': 5, 'FCS_CKM.4': 21, 'FCS_CKM.1.1': 2, 'FCS_CKM.2': 3, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ITT.1': 23, 'FDP_IFC.1': 30, 'FDP_ACC.1': 31, 'FDP_ACF.1': 27, 'FDP_ITT.1.1': 1, 'FDP_IFC.1.1': 2, 'FDP_IFF.1': 3, 'FDP_ITC.1': 18, 'FDP_ACC.1.1': 3, 'FDP_ACF.1.1': 4, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_SDI.1': 1}, 'FMT': {'FMT_LIM.1': 10, 'FMT_LIM.2': 10, 'FMT_LIM': 1, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 1, 'FMT_MSA.2': 22, 'FMT_MSA.3': 9, 'FMT_MSA.2.1': 1, 'FMT_MSA.1': 2, 'FMT_SMR.1': 1}, 'FPT': {'FPT_FLS.1': 31, 'FPT_SEP.1': 12, 'FPT_PHP.3': 12, 'FPT_ITT.1': 21, 'FPT_FLS.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_ITT.1.1': 2, 'FPT_AMT.1': 1}, 'FRU': {'FRU_FLT.2': 15, 'FRU_FLT.1': 1}}, 'cc_claims': {'O': {'O.RND': 5}, 'T': {'T.RND': 5}}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 51}, '3DES': {'3DES': 18, 'Triple-DES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 19}}, 'RIPEMD': {'RIPEMD-160': 11}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 8}, 'PRNG': {'PRNG': 13}, 'RNG': {'RNG': 21, 'RND': 10}}, 'cipher_mode': {'ECB': {'ECB': 3}, 'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 16, 'Physical Probing': 2, 'physical probing': 4, 'Physical probing': 1, 'DPA': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 15, 'malfunction': 5, 'DFA': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 4, 'FIPS PUB 180-1': 3}, 'BSI': {'AIS31': 6, 'AIS 31': 1, 'AIS20': 4, 'AIS 20': 1}, 'ISO': {'ISO/IEC7816-3': 1, 'ISO/IEC 9796-2': 5, 'ISO/IEC 10118-': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0329a.pdf
. - The st_filename property was set to
0329b.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0329-2006
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0379-2006', 'BSI-DSZ-CC-0353-2006', 'BSI-DSZ-CC-0341-2006']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0490-2008', 'BSI-DSZ-CC-0489-2008', 'BSI-DSZ-CC-0434-2007', 'BSI-DSZ-CC-0379-2006', 'BSI-DSZ-CC-0386-2006', 'BSI-DSZ-CC-0353-2006', 'BSI-DSZ-CC-0529-2010', 'BSI-DSZ-CC-0350-2007', 'BSI-DSZ-CC-0341-2006']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0329a.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0329b.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0341-2006']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0490-2008', 'BSI-DSZ-CC-0434-2007', 'BSI-DSZ-CC-0386-2006', 'BSI-DSZ-CC-0529-2010', 'BSI-DSZ-CC-0350-2007', 'BSI-DSZ-CC-0341-2006']}}}
data.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "b059b04aeee5dc3e",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0329-2006",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ENV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_PPC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_DES",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.43"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0353-2006",
"BSI-DSZ-CC-0341-2006",
"BSI-DSZ-CC-0379-2006"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0341-2006",
"BSI-DSZ-CC-0379-2006",
"BSI-DSZ-CC-0490-2008",
"BSI-DSZ-CC-0529-2010",
"BSI-DSZ-CC-0350-2007",
"BSI-DSZ-CC-0353-2006",
"BSI-DSZ-CC-0434-2007",
"BSI-DSZ-CC-0489-2008",
"BSI-DSZ-CC-0386-2006"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Renesas",
"manufacturer_web": "https://am.renesas.com/",
"name": "Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43",
"not_valid_after": "2019-09-01",
"not_valid_before": "2006-03-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0329a.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0329-2006",
"cert_item": "Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43",
"cert_lab": "BSI",
"developer": "Renesas Technology Corp",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0329-2006": 30
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 4
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 2,
"ACM_CAP": 2,
"ACM_CAP.4": 2,
"ACM_SCP": 2,
"ACM_SCP.2": 2
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 2,
"ADO_IGS": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP": 2,
"ADV_FSP.2": 1,
"ADV_HLD": 2,
"ADV_HLD.2": 1,
"ADV_IMP": 2,
"ADV_IMP.2": 5,
"ADV_INT": 2,
"ADV_LLD": 2,
"ADV_LLD.1": 1,
"ADV_RCR": 2,
"ADV_RCR.1": 1,
"ADV_SPM": 2,
"ADV_SPM.1": 1
},
"AGD": {
"AGD_ADM": 2,
"AGD_ADM.1": 1,
"AGD_USR": 2,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.2": 6,
"ALC_FLR": 2,
"ALC_LCD": 1,
"ALC_LCD.1": 2,
"ALC_TAT": 2,
"ALC_TAT.1": 2
},
"ASE": {
"ASE_DES.1": 1,
"ASE_ENV.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_PPC.1": 1,
"ASE_REQ.1": 1,
"ASE_SRE.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_COV.2": 1,
"ATE_DPT": 2,
"ATE_DPT.1": 1,
"ATE_FUN": 2,
"ATE_FUN.1": 1,
"ATE_IND": 2,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA": 2,
"AVA_MSU": 2,
"AVA_MSU.3": 5,
"AVA_SOF": 4,
"AVA_SOF.1": 1,
"AVA_VLA": 4,
"AVA_VLA.2": 1,
"AVA_VLA.3": 1,
"AVA_VLA.4": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 3,
"EAL 4 augmented": 2,
"EAL 4+": 1,
"EAL 7": 1,
"EAL1": 5,
"EAL2": 3,
"EAL3": 4,
"EAL4": 12,
"EAL4 augmented": 1,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_COP.1": 4,
"FCS_RND.1": 2
},
"FDP": {
"FDP_ACC.1": 2,
"FDP_ACF.1": 2,
"FDP_IFC.1": 2,
"FDP_ITT.1": 2
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_ITT.1": 2,
"FPT_PHP.3": 1,
"FPT_SEP.1": 1
},
"FRU": {
"FRU_FLT.2": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"27 January 2006 (confidential document) [10] FIPS PUB 46-3 Federal Information Processing Standards Publication Data Encryption Standard": 1,
"HD65255C1) Version 02 with ACL version 1.43 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Protection Profile BSI-PP-0002-2001, Version v1.0, Smartcard IC platform Protection Profile": 1,
"HD65255C1) Version 02 with ACL version 1.43 Smartcard Security Target, Renesas Technology Corp. (confidential document)). The evaluators verified, that the threats and the security objectives for the life cycle phases": 1,
"Technical Report lite, Version 1.0, 22 March 2006, ETR-lite for composition according to AIS36 (confidential document) [17] Smartcard Integrated Circuit Platform Augmentations, v1.0, Atmel, Hitachi Europe, Infineon": 1,
"Technical Report, Version 1.0, March 22, 2006, Evaluation Technical Report BSI-DSC-CC-0329 (confidential document) [9] Renesas 32-bit Smart Card Microcomputer AE-5 Series User Guidance Manual, Rev. 4.40, Renesas": 1
}
},
"cipher_mode": {
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"RIPEMD": {
"RIPEMD-160": 1
},
"SHA": {
"SHA1": {
"SHA-1": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 5
},
"RNG": {
"RNG": 10
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 1,
"physical tampering": 1
},
"SCA": {
"Physical probing": 1,
"physical probing": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 1,
"AIS20": 1,
"AIS31": 1,
"AIS36": 1
},
"FIPS": {
"FIPS PUB 180-1": 2,
"FIPS PUB 46-3": 3
},
"ISO": {
"ISO/IEC 15408:1999": 1,
"ISO/IEC15408: 1999": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 4,
"Triple-DES": 3
},
"DES": {
"DES": 15
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1
},
"Philips": {
"Philips": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "BSI",
"/Category": "Common Criteria Zertfikat",
"/Company": "BSI, Postfach 200363, 53133 Bonn",
"/CreationDate": "D:20060329121735+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0.7 f\u00fcr Word",
"/Keywords": "Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43; BSI-DSZ-CC-0329-2006, CC, ",
"/ModDate": "D:20060329121911+02\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0.5 (Windows)",
"/SourceModified": "D:20060329101620",
"/Title": "Certification Report BSI-DSZ-CC-0329-2006",
"pdf_file_size_bytes": 341601,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 44
},
"st_filename": "0329b.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.RND": 5
},
"T": {
"T.RND": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP- 0002": 4,
"BSI-PP-0002": 82
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_CAP": 1,
"ACM_SCP": 1
},
"ADO": {
"ADO_DEL": 2,
"ADO_IGS": 2
},
"ADV": {
"ADV_FSP": 2,
"ADV_HLD": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 2,
"ADV_LLD": 1,
"ADV_RCR": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 4
},
"AGD": {
"AGD_ADM": 3,
"AGD_USR": 3
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_LCD": 1,
"ALC_TAT": 1
},
"AVA": {
"AVA_MSU": 1,
"AVA_MSU.3": 2,
"AVA_SOF": 7,
"AVA_VLA": 1,
"AVA_VLA.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 6,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_SAS.1": 9,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 32,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 3,
"FCS_CKM.4": 21,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 52,
"FCS_COP.1.1": 5,
"FCS_RND": 1,
"FCS_RND.1": 16,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC.1": 31,
"FDP_ACC.1.1": 3,
"FDP_ACF.1": 27,
"FDP_ACF.1.1": 4,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 30,
"FDP_IFC.1.1": 2,
"FDP_IFF.1": 3,
"FDP_ITC.1": 18,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITT.1": 23,
"FDP_ITT.1.1": 1,
"FDP_SDI.1": 1
},
"FMT": {
"FMT_LIM": 1,
"FMT_LIM.1": 10,
"FMT_LIM.1.1": 1,
"FMT_LIM.2": 10,
"FMT_LIM.2.1": 1,
"FMT_MSA.1": 2,
"FMT_MSA.2": 22,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 9,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS.1": 31,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 21,
"FPT_ITT.1.1": 2,
"FPT_PHP.3": 12,
"FPT_PHP.3.1": 1,
"FPT_SEP.1": 12,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1
},
"FRU": {
"FRU_FLT.1": 1,
"FRU_FLT.2": 15
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"ECB": {
"ECB": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"RIPEMD": {
"RIPEMD-160": 11
},
"SHA": {
"SHA1": {
"SHA-1": 19
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 13
},
"RNG": {
"RND": 10,
"RNG": 21
},
"TRNG": {
"TRNG": 8
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"Malfunction": 15,
"malfunction": 5,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 16,
"Physical Probing": 2,
"Physical probing": 1,
"physical probing": 4
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 31": 1,
"AIS20": 4,
"AIS31": 6
},
"FIPS": {
"FIPS PUB 180-1": 3,
"FIPS PUB 46-3": 4
},
"ISO": {
"ISO/IEC 10118-": 1,
"ISO/IEC 9796-2": 5,
"ISO/IEC7816-3": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 18,
"Triple-DES": 3
},
"DES": {
"DES": 51
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1
},
"Philips": {
"Philips": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20060202164233+09\u002700\u0027",
"/Creator": "\u30af\u30bb\u30edPDF v1.12 Rev0480",
"/ModDate": "D:20060202164431-08\u002700\u0027",
"/Producer": "Xelo PDF Library",
"pdf_file_size_bytes": 1096866,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 74
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0329a.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ADV_IMP.2",
"AVA_MSU.3",
"AVA_VLA.4",
"EAL4+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0329b.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "967d61efb902f774af4441e4e9d89b01fb1c0a8b0f06d1f3ca5de622f3170dde",
"txt_hash": "b72aa6ad0928531b3b480f07a971672bb9de4c6332396cdfaa314085fb8d6906"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "cb8e5ce17fb611fb6dc5eb69c6f92da06720f7b5fd5256d92c61fbcbaca5fbb3",
"txt_hash": "77c3ff277a9948e9af1df7d2997b38ba75a54f501f3b8640e330dc46f87836be"
}
},
"status": "archived"
}