This page was not yet optimized for use on mobile
devices.
CIU9872b_01 C12
CSV information
| Status | archived |
|---|---|
| Valid from | 06.11.2017 |
| Valid until | 06.11.2022 |
| Scheme | 🇳🇴 NO |
| Manufacturer | CEC Huada Electronic Design Co., Ltd. |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL5+, ALC_DVS.2, AVA_VAN.5 |
Heuristics summary
Certificate ID: SERTIT-078
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 5, EAL 2, EAL 4Security Assurance Requirements (SAR)
ALC_FLR, AVA_VAN.5Certificates
SERTIT-078Evaluation facilities
BrightsightCertification report
Extracted keywords
Symmetric Algorithms
AES, DES, TDESRandomness
RNGSecurity level
EAL 5+, EAL2, EAL4, EAL5+, EAL1, EAL7, EAL5Security Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_IND, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.2, ASE_SPD.1, ASE_OBJ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RNG.1, FCS_COP.1, FDP_SDC.1, FDP_ITT.1, FDP_IFC.1, FDP_SDI.2, FDP_ACC.1, FDP_ACF.1, FMT_LIM.1, FMT_LIM.2, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2Protection profiles
BSI-CC-PP-0084-2014Certificates
SERTIT-078, SERTIT-090Evaluation facilities
BrightsightSide-channel analysis
DPA, SPA, Fault Injection, JILStandards
ISO/IEC 15408, ISO/IEC 7816, ISO/IEC 14443, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
| Title | tittel |
|---|---|
| Keywords | ugradert |
| Author | Ulrich Isachsen |
| Creation date | D:20171108130541Z00'00' |
| Modification date | D:20171108130541Z00'00' |
| Pages | 20 |
| Creator | Microsoft® Word 2010 |
| Producer | Mac OS X 10.12.6 Quartz PDFContext |
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, TDEASchemes
PKERandomness
TRNG, RND, RNGBlock cipher modes
ECB, CBCSecurity level
EAL5, EAL4, EAL5+, EAL5 augmented, EAL4 augmentedClaims
O.RND, O.TDES, O.AES, O.RSA, O.MEM-ACCESS, O.ASE, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_DVS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RNG, FCS_RNG.1, FCS_COP.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_COP.1.1, FCS_COP, FDP_SDC, FDP_SDI.2, FDP_SDC.1, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDC.1.1, FDP_IFC, FDP_ITT, FDP_SDI, FDP_ACC, FDP_ACF, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_FLS, FPT_ITT, FPT_PHP, FRU_FLT.2, FRU_FLTProtection profiles
BSI-CC-PP-0084-2014, BSI-PP-0084Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, DPA, SPA, physical tampering, Malfunction, malfunction, DFA, reverse engineeringStandards
FIPS PUB 197, FIPS PUB 46-3, AIS20, ISO/IEC14443, ISO/IEC 14443, ISO/IEC 7816, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
| Author | 刘剑峰 |
|---|---|
| Creation date | D:20171108130912+00'00' |
| Modification date | D:20171108130912+00'00' |
| Pages | 42 |
| Creator | Microsoft Word |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
SERTIT-078Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Scheme data
| Product | HED Secure Chip CIU9872B_01 | |
|---|---|---|
| Url | https://sertit.no/certified-products/product-archive/hed-secure-chip-ciu9872b-01 | |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems | |
| Developer | CEC Huada Electronic Design Co., Ltd. | |
| Certification Date | 06.11.2017 | |
| Enhanced | ||
| Description | The TOE is a high-end secure integrated circuit suitable for financial or governmental applications. The TOE consists of the IC hardware, IC dedicated test software and IC dedicated support software providing cryptographic functions. The hardware is based on a 32-bit CPU with volatile, non-volatile and read-only memory. The microcontroller incorporates cryptographic coprocessors for acceleration of symmetric and asymmetric encryption algorithms. The IC dedicated support software, also known as Crypto Library, provides DES, AES, RSA and random number generation functions. | |
| Cert Id | SERTIT-078 | |
| Mutual Recognition | CCRA, SOG-IS | |
| Product | C12 | |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems | |
| Developer | CEC Huada Electronic Design Co., Ltd. | |
| Evaluation Facility | Brightsight B.V. | |
| Certification Date | 06.11.2017 | |
| Level | EAL 5, ALC_DVS.2, AVA_VAN.5 | |
| Documents | frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135154-1607953116/SERTIT/Sertifikater/2017/78/Sertit-078%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135151-1607953112/SERTIT/Sertifikater/2017/78/Security%20Target%20Lite%20of%20CIU9872B_01%20C12%20Secure%20Chip%20v1.2.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135157-1607953118/SERTIT/Sertifikater/2017/78/20171106_SERTIT-078_CR_v1.pdf'})]}) | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Sertit-078%20C.pdf",
"dgst": "c68ca11f19996307",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "SERTIT-078",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"certification_date": "2017-11-06",
"developer": "CEC Huada Electronic Design Co., Ltd.",
"enhanced": {
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_id": "SERTIT-078",
"certification_date": "2017-11-06",
"description": "The TOE is a high-end secure integrated circuit suitable for financial or governmental applications. The TOE consists of the IC hardware, IC dedicated test software and IC dedicated support software providing cryptographic functions. The hardware is based on a 32-bit CPU with volatile, non-volatile and read-only memory. The microcontroller incorporates cryptographic coprocessors for acceleration of symmetric and asymmetric encryption algorithms. The IC dedicated support software, also known as Crypto Library, provides DES, AES, RSA and random number generation functions.",
"developer": "CEC Huada Electronic Design Co., Ltd.",
"documents": {
"cert": [
{
"href": "https://sertit.no/getfile.php/135154-1607953116/SERTIT/Sertifikater/2017/78/Sertit-078%20C.pdf"
}
],
"report": [
{
"href": "https://sertit.no/getfile.php/135157-1607953118/SERTIT/Sertifikater/2017/78/20171106_SERTIT-078_CR_v1.pdf"
}
],
"target": [
{
"href": "https://sertit.no/getfile.php/135151-1607953112/SERTIT/Sertifikater/2017/78/Security%20Target%20Lite%20of%20CIU9872B_01%20C12%20Secure%20Chip%20v1.2.pdf"
}
]
},
"evaluation_facility": "Brightsight B.V.",
"level": "EAL 5, ALC_DVS.2, AVA_VAN.5",
"mutual_recognition": "CCRA, SOG-IS",
"product": "C12"
},
"product": "HED Secure Chip CIU9872B_01",
"url": "https://sertit.no/certified-products/product-archive/hed-secure-chip-ciu9872b-01"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "CEC Huada Electronic Design Co., Ltd.",
"manufacturer_web": "https://www.hed.com.cn/en/",
"name": "CIU9872b_01 C12",
"not_valid_after": "2022-11-06",
"not_valid_before": "2017-11-06",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "Sertit-078 C.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NO": {
"SERTIT-078": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "20171106_SERTIT-078_CR_v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NO": {
"SERTIT-078": 19,
"SERTIT-090": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 20
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP.5": 1,
"ADV_IMP.1": 1,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 4,
"ALC_FLR": 1,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 5+": 20,
"EAL1": 1,
"EAL2": 1,
"EAL4": 1,
"EAL5": 1,
"EAL5+": 1,
"EAL7": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 3
},
"FCS": {
"FCS_COP.1": 4,
"FCS_RNG.1": 4
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_ACF.1": 1,
"FDP_IFC.1": 1,
"FDP_ITT.1": 1,
"FDP_SDC.1": 3,
"FDP_SDI.2": 2
},
"FMT": {
"FMT_LIM.1": 2,
"FMT_LIM.2": 2
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1
},
"FRU": {
"FRU_FLT.2": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Fault Injection": 1
},
"SCA": {
"DPA": 1,
"SPA": 1
},
"other": {
"JIL": 2
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 15408": 2,
"ISO/IEC 7816": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
}
},
"DES": {
"3DES": {
"TDES": 2
},
"DES": {
"DES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/AAPL:Keywords": "[\u0027ugradert\u0027]",
"/Author": "Ulrich Isachsen",
"/CreationDate": "D:20171108130541Z00\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "ugradert",
"/ModDate": "D:20171108130541Z00\u002700\u0027",
"/Producer": "Mac OS X 10.12.6 Quartz PDFContext",
"/Title": "tittel",
"pdf_file_size_bytes": 615019,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 20
},
"st_filename": "Security Target Lite of CIU9872B_01 C12 Secure Chip v1.2.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.AES": 3,
"O.ASE": 1,
"O.MEM-ACCESS": 1,
"O.RND": 2,
"O.RSA": 5,
"O.TDES": 5
},
"T": {
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1,
"BSI-PP-0084": 26
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.5": 2,
"ADV_IMP.1": 2,
"ADV_INT.2": 1,
"ADV_TDS.4": 2
},
"AGD": {
"AGD_OPE": 4,
"AGD_OPE.1": 2,
"AGD_PRE": 4,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 7,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 9
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1,
"EAL4 augmented": 1,
"EAL5": 8,
"EAL5 augmented": 3,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 5,
"FAU_SAS.1": 6,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 16,
"FCS_CKM.4": 12,
"FCS_COP": 1,
"FCS_COP.1": 27,
"FCS_COP.1.1": 3,
"FCS_RNG": 3,
"FCS_RNG.1": 11,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 12,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 4,
"FDP_ITC.1": 11,
"FDP_ITC.2": 11,
"FDP_ITT": 1,
"FDP_ITT.1": 4,
"FDP_SDC": 3,
"FDP_SDC.1": 4,
"FDP_SDC.1.1": 1,
"FDP_SDI": 1,
"FDP_SDI.1": 3,
"FDP_SDI.2": 5,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FMT": {
"FMT_LIM": 5,
"FMT_LIM.1": 5,
"FMT_LIM.2": 5,
"FMT_MSA.3": 4
},
"FPT": {
"FPT_FLS": 1,
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_ITT": 1,
"FPT_ITT.1": 4,
"FPT_PHP": 1,
"FPT_PHP.3": 5,
"FPT_PHP.3.1": 1
},
"FRU": {
"FRU_FLT": 1,
"FRU_FLT.2": 6
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"ECB": {
"ECB": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"PKE": {
"PKE": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 4,
"RNG": 11
},
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {
"FI": {
"DFA": 3,
"Malfunction": 6,
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"DPA": 4,
"Leak-Inherent": 5,
"Physical Probing": 2,
"SPA": 4,
"physical probing": 4
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS20": 5
},
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
},
"FIPS": {
"FIPS PUB 197": 3,
"FIPS PUB 46-3": 1
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816": 2,
"ISO/IEC14443": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 27
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 29
},
"DES": {
"DES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "\u5218\u5251\u5cf0",
"/CreationDate": "D:20171108130912+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/ModDate": "D:20171108130912+00\u002700\u0027",
"pdf_file_size_bytes": 1040021,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 42
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20171106_SERTIT-078_CR_v1.pdf",
"scheme": "NO",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL5+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Security%20Target%20Lite%20of%20CIU9872B_01%20C12%20Secure%20Chip%20v1.2.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "605aa1b2fdfb000905d1fef965d4ec1e7287d841b8340603fd2572f2234c1f25",
"txt_hash": "2da51d3042afc0d3a1157f42da3e80b7b1550de77c99f25f2a5ac0740b6fa1c8"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "698b50842c52f93f39411f0e6ff0664616d2da5fe76954f864bb370622a72e7c",
"txt_hash": "f128dd9cb8723fc292db02706da0372a8bf1394275bfbde20920d462ed582607"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "1b965771311568c68a7abbfeaa3f941c6b20553f1292448956ce05e5fd6f0984",
"txt_hash": "8e427a45e19de853ef0d289bc6e40eb70522a8989e981dea047a41a8ef85face"
}
},
"status": "archived"
}