This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
RSA Archer Suite v6.7 ISCB-5-RPT-C113-CR-v1 |
TL ICAO LDS smart card: electronic passport applet loaded on JCLX80jTOP20ID platform masked on SLE66CLX800PE component ANSSI-CC-2009/21 |
|
---|---|---|
name | RSA Archer Suite v6.7 | TL ICAO LDS smart card: electronic passport applet loaded on JCLX80jTOP20ID platform masked on SLE66CLX800PE component |
category | Other Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | MY | FR |
status | active | archived |
not_valid_after | 15.10.2025 | 01.09.2019 |
not_valid_before | 15.10.2020 | 17.07.2009 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C113-CERTIFICATE-v1%20signed.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C113-CR-V1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-2009_21en.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RSA%20Archer%206.7_ST_v1.0_09-29-2020.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible2009_21en.pdf |
manufacturer | RSA Security LLC | Trusted Logic / Infineon |
manufacturer_web | https://rsa.com | https://www.trusted-logic.com/ |
security_level | EAL2+, ALC_FLR.2 | EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst | 15b820d1481c0d81 | 19e2260a7e413f6d |
heuristics/cert_id | ISCB-5-RPT-C113-CR-v1 | ANSSI-CC-2009/21 |
heuristics/cert_lab | [] | SERMA |
heuristics/cpe_matches | cpe:2.3:a:rsa:archer:6.7:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2022-30585, CVE-2020-5335, CVE-2020-29537, CVE-2020-29538, CVE-2022-26951, CVE-2020-5337, CVE-2020-5333, CVE-2020-5334, CVE-2022-26947, CVE-2022-26950, CVE-2020-5331, CVE-2022-37317, CVE-2022-26949, CVE-2020-5332, CVE-2021-33615, CVE-2020-5336, CVE-2020-29536, CVE-2020-29535, CVE-2021-38362, CVE-2021-29253, CVE-2021-29252, CVE-2021-33616, CVE-2021-41594, CVE-2022-30584, CVE-2022-26948 | {} |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 | ADV_SPM.1, ALC_DVS.2, AVA_VLA.4, AVA_VAN.5 |
heuristics/extracted_versions | 6.7 | - |
pdf_data/cert_filename | ISCB-5-CERT-C113-CERTIFICATE-v1 signed.pdf | |
pdf_data/cert_keywords/cc_cert_id | ||
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | ISCB-5-RPT-C113-CR-V1.pdf | anssi-2009_21en.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | RSA Archer 6.7_ST_v1.0_09-29-2020.pdf | anssi-cible2009_21en.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |