Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software
BSI-DSZ-CC-0719-2011
Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
BSI-DSZ-CC-0827-V3-2015
name Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
not_valid_before 2011-05-19 2015-11-03
not_valid_after 2019-09-01 2020-11-03
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0719b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V3b_pdf.pdf
manufacturer Samsung Electronics Co., Ltd. Infineon Technologies AG
manufacturer_web https://www.samsung.com https://www.infineon.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0719a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V3a_pdf.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2013, 9, 10), 'maintenance_title': 'Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 1 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0719_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0719_ma1b_pdf.pdf'})
state/report/pdf_hash 36850d51a46d0640a93d071e4e783bd7eee1ba0fb5c7271b01b57723b3aeda1b 152859bde53573b0dcd40d97470caeeb8c1bc4bc01f5ced60ba24571bf766b3d
state/report/txt_hash 48b117ee84c9d160531e0a576e3d052edb07f09e3f0eed1dbc53c90816264072 8048dbf6fd04ed99921cfd83fe85f5fbfca11a46f5b78ec2a85f46c1aeb8e4f6
state/st/pdf_hash 2126fa77d32a45fc4b30a967c2d23f920370938a2fede157f95c35ec35cf2dad 9797219f438a56fd4c679c17ca6a01dff54b960ce15f215a786eb744d62263e3
state/st/txt_hash 8aaa493430efdff36740d04af76ec6bfc6438b20d2e17c2a0ec2a4312eb60a1b 91961c6ffe33466532822f8dc8282cb967d030154d1ee4dbefe5cbb99ee5e71a
heuristics/cert_id BSI-DSZ-CC-0719-2011 BSI-DSZ-CC-0827-V3-2015
heuristics/extracted_versions 1.0 1.01.0008, 1.03.006
heuristics/report_references/directly_referenced_by KECS-ISIS-0468-2013, BSI-DSZ-CC-0719-V2-2016, BSI-DSZ-CC-0720-2011 BSI-DSZ-CC-0827-V4-2016
heuristics/report_references/directly_referencing BSI-DSZ-CC-0639-2010 BSI-DSZ-CC-0827-V2-2014
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0801-2012, BSI-DSZ-CC-0882-2013, BSI-DSZ-CC-0720-V2-2016, KECS-ISIS-0468-2013, BSI-DSZ-CC-0720-2011, BSI-DSZ-CC-0719-V2-2016, BSI-DSZ-CC-0802-2012, BSI-DSZ-CC-0882-V2-2019 CSEC2014007, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V5-2017
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0639-2010, BSI-DSZ-CC-0547-2009 BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0791-2012
heuristics/st_references/directly_referenced_by KECS-ISIS-0468-2013 None
heuristics/st_references/indirectly_referenced_by KECS-ISIS-0468-2013 None
pdf_data/report_filename 0719a_pdf.pdf 0827V3a_pdf.pdf
pdf_data/report_frontpage/DE
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0719-2011
  • cert_item: Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software
  • developer: Samsung Electronics
  • cert_lab: BSI
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0827-V3-2015
  • cert_item: Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
  • developer: Infineon Technologies AG
  • cert_lab: BSI
  • ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
  • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
  • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 SOGIS Recognition Agreement
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0719-2011 BSI-DSZ-CC-0827-V3-2015
pdf_data/report_frontpage/DE/cert_item Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
pdf_data/report_frontpage/DE/developer Samsung Electronics Infineon Technologies AG
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
  • RSA:
    • RSA-2048: 1
    • RSA2048: 2
    • RSA4096: 2
  • ECC:
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 7
    • ECC:
      • ECC: 5
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/asymmetric_crypto/ECC
  • ECC:
    • ECC: 4
  • ECDH:
    • ECDH: 3
  • ECDSA:
    • ECDSA: 7
  • ECC:
    • ECC: 5
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC 4 5
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0719-2011: 21
  • BSI-DSZ-CC-0639-2010: 3
  • BSI-DSZ-CC-0719: 2
  • BSI-DSZ-CC-0827-V3-2015: 25
  • BSI-DSZ-CC-0827-V2-2014: 3
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 2
  • R:
    • R.O: 2
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0035-2007: 2
  • BSI-CC-PP- 0035-2007: 1
  • BSI-CC-PP-0035-2007: 4
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0035-2007 2 4
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 1 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 6
  • EAL 4: 2
  • EAL1: 7
  • EAL4: 7
  • EAL5: 8
  • EAL5+: 1
  • EAL6: 4
  • EAL3: 4
  • EAL7: 4
  • EAL2: 3
  • EAL 5 augmented: 3
  • EAL 5: 14
  • EAL 4: 9
  • EAL 1: 7
  • EAL 2: 4
  • EAL 5+: 1
  • EAL 6: 4
  • EAL 3: 4
  • EAL 7: 4
  • EAL 5 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 2 9
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 6 14
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • Secure RSA and ECC Library – Project Crow II, Version 1.3, 2011-04-20, Samsung Electronics (confidential document) [7] Evaluation Technical Report Summary (ETR SUMMARY), BSI-DSZ-CC-0719, S3CT9KA / S3CT9K7 : 1
  • Version 1, 2011-04-29, TÜViT (confidential document) [8] Life Cycle Definition (Class ALC_CMC.4/CMS.5) – Project Crow II, Version 1.0, 2011-03-21: 1
  • Electronics (confidential document) [9] Security Target Lite of S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart: 1
  • Evaluation (ETR-COMP), BSI-DSZ-CC-0719, S3CT9KA / S3CT9K7 / S3CT9K3, Version 1, 2011-04-29, TÜViT (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • Software Libraries RSA - EC – Toolbox – FTL, Version 1.8, 2015-09-30, Infineon Technologies AG (confidential document) [7] Security Target Lite M9900, M9905, M9906 including optional Software Libraries RSA – EC –: 1
  • the M9900 A22 and G11, M9905 A11, M9906 A11, version 6, 2015-10-09, TÜV Informationstechnik GmbH, (confidential document) 11 specifically • AIS 19, Version 9, Anwendungshinweise und Interpretationen zum Schema (AIS) •: 1
  • to AIS 36 for the Product M9900 A22 and G11, Version 6, 2015-10-09, TÜV Informationstechnik GmbH (confidential document) [11] Configuration Management Scope M9900 A22 and G11 including optional Software Libraries RSA -: 1
  • – Toolbox – FTL, Version 0.7, 2015-06-09, Document Title (confidential document) [12] SLE97 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.03.006), 2012-08-16: 1
pdf_data/report_keywords/cipher_mode/CBC/CBC 1 3
pdf_data/report_keywords/cipher_mode/ECB/ECB 1 2
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICVersion:
    • IC Version: 1
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-192: 4
    • K-163: 2
pdf_data/report_keywords/eval_facility/TUV
  • TÜV Informationstechnik: 2
  • TÜViT: 2
  • TÜV Informationstechnik: 4
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik 2 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 9
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 3
pdf_data/report_keywords/randomness/RNG/RNG 1 3
pdf_data/report_keywords/randomness/TRNG/TRNG 9 1
pdf_data/report_keywords/side_channel_analysis/FI/DFA 1 6
pdf_data/report_keywords/side_channel_analysis/SCA
  • physical probing: 1
  • side-channel: 1
  • DPA: 3
  • SPA: 1
  • physical probing: 1
  • SPA: 5
  • DPA: 6
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 3 6
pdf_data/report_keywords/side_channel_analysis/SCA/SPA 1 5
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS20: 2
    • AIS31: 2
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 36: 2
    • AIS 35: 2
    • AIS 20: 1
    • AIS 32: 1
    • AIS 38: 1
  • FIPS:
    • FIPS186-4: 4
    • FIPS197: 3
    • FIPS 186-4: 1
    • FIPS PUB 186-4: 1
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
  • BSI:
    • AIS32: 1
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 36: 3
    • AIS31: 2
    • AIS 35: 2
    • AIS 19: 1
    • AIS 32: 1
    • AIS 38: 1
    • AIS47: 1
  • RFC:
    • RFC5639: 5
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
pdf_data/report_keywords/standard_id/BSI
  • AIS20: 2
  • AIS31: 2
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 2
  • AIS 36: 2
  • AIS 35: 2
  • AIS 20: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS32: 1
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 3
  • AIS 36: 3
  • AIS31: 2
  • AIS 35: 2
  • AIS 19: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS47: 1
pdf_data/report_keywords/standard_id/BSI/AIS 31 2 3
pdf_data/report_keywords/standard_id/BSI/AIS 36 2 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • Triple-DES: 2
      • 3DES: 2
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 8
  • DES:
    • DES:
      • DES: 3
    • 3DES:
      • Triple-DES: 3
      • TDES: 3
      • TDEA: 1
      • 3DES: 1
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 4 8
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 2
  • 3DES: 2
  • Triple-DES: 3
  • TDES: 3
  • TDEA: 1
  • 3DES: 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/3DES 2 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 2 3
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 5 3
pdf_data/report_keywords/technical_report_id/BSI
  • BSI TR-02102: 1
  • BSI 7125: 2
  • BSI 7148: 1
  • BSI TR-02102: 1
  • BSI 7138: 2
  • BSI 7125: 2
  • BSI 7148: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 31
  • Infineon:
    • Infineon: 13
    • Infineon Technologies AG: 21
    • Infineon Technologies: 9
pdf_data/report_metadata
  • pdf_file_size_bytes: 972498
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20110715095208+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software, Samsung Electronics"
  • /ModDate: D:20110715095543+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0719-2011
  • pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
  • pdf_file_size_bytes: 1387317
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20151120082832+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software"
  • /ModDate: D:20151120121430+01'00'
  • /Producer: LibreOffice 4.2
  • /Title: Certification Report BSI-DSZ-CC-xxxx-200x
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
pdf_data/report_metadata//CreationDate D:20110715095208+02'00' D:20151120082832+01'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software, Samsung Electronics" "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software"
pdf_data/report_metadata//ModDate D:20110715095543+02'00' D:20151120121430+01'00'
pdf_data/report_metadata//Producer OpenOffice.org 3.2 LibreOffice 4.2
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0719-2011 Certification Report BSI-DSZ-CC-xxxx-200x
pdf_data/report_metadata/pdf_file_size_bytes 972498 1387317
pdf_data/report_metadata/pdf_number_of_pages 40 46
pdf_data/st_filename 0719b_pdf.pdf 0827V3b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 27 20
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 9 6
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 15 14
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 2 5
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA 2 1
pdf_data/st_keywords/asymmetric_crypto/RSA
  • RSA-CRT: 1
  • RSA2048: 2
  • RSA4096: 2
  • RSA-2048: 1
pdf_data/st_keywords/cc_claims/O/O.RND 5 1
pdf_data/st_keywords/cc_claims/T/T.RND 5 1
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0035 5 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARV: 1
  • ADV_FSP: 2
  • ADV_IMP: 1
  • ADV_VAN: 1
  • ADV_ARC.1: 7
  • ADV_FSP.5: 3
  • ADV_IMP.1: 2
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP.2: 1
  • ADV_TDS.3: 1
  • ADV_FSP.4: 1
  • ADV_ARC.1: 2
  • ADV_FSP.5: 3
  • ADV_IMP.1: 2
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP: 1
  • ADV_FSP.4: 1
  • ADV_FSP.2: 1
  • ADV_TDS.3: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 7 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP 2 1
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE: 1
  • AGD_PRE: 1
  • AGD_OPE.1: 2
  • AGD_PRE.1: 2
  • AGD_OPE.1: 2
  • AGD_PRE.1: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 7
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_CMS: 2
  • ALC_CMC: 1
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
  • ALC_DVS.1: 1
  • ALC_CMS.4: 1
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 3
  • ALC_CMS: 1
  • ALC_TAT: 1
  • ALC_CMS.4: 1
  • ALC_TAT.1: 1
  • ALC_DVS.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 7 9
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 1 3
pdf_data/st_keywords/cc_sar/ASE
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_TSS.1: 1
  • ASE_INT: 2
  • ASE_CCL: 2
  • ASE_SPD: 2
  • ASE_OBJ: 2
  • ASE_ECD: 2
  • ASE_REQ: 2
  • ASE_TSS: 2
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV: 1
  • ATE_COV.2: 1
  • ATE_DPT.3: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.2: 1
  • ATE_DPT.3: 4
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_DPT.2: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 1 4
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 13
  • AVA_VAN: 1
  • AVA_VAN.5: 11
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 13 11
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 6
  • EAL 4: 1
  • EAL 5: 2
  • EAL5 augmented: 1
  • EAL 4 augmented: 1
  • EAL 5 augmented: 2
  • EAL5: 7
  • EAL5+: 1
  • EAL 5: 4
  • EAL5 augmented: 3
  • EAL 5 augmented: 3
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 2 4
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented 2 3
pdf_data/st_keywords/cc_security_level/EAL/EAL5 6 7
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 8
    • FAU_GEN: 2
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
    • FAU_GEN.1: 1
  • FCS:
    • FCS_RNG: 11
    • FCS_RNG.1: 19
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
    • FCS_COP.1: 23
    • FCS_COP: 19
    • FCS_CKM.1: 21
    • FCS_CKM.4: 11
    • FCS_CKM: 4
    • FCS_CKM.2: 2
  • FDP:
    • FDP_ACC: 2
    • FDP_ACF: 2
    • FDP_ITT.1: 17
    • FDP_ITT.1.1: 1
    • FDP_ACC.1: 13
    • FDP_IFC.1: 18
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ACF.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 10
    • FDP_ITC.2: 10
    • FDP_SDI.1: 1
    • FDP_IFC: 1
    • FDP_ITT: 1
  • FMT:
    • FMT_LIM: 8
    • FMT_LIM.1: 24
    • FMT_LIM.2: 28
    • FMT_LIM.1.1: 2
    • FMT_LIM.2.1: 2
    • FMT_MSA.3: 10
    • FMT_MSA.1: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMR.1: 6
    • FMT_MSA.1.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 3
    • FMT_MSA: 2
    • FMT_SMF: 1
  • FPT:
    • FPT_FLS.1: 21
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_PHP: 3
    • FPT_ITT.1: 15
    • FPT_ITT.1.1: 1
    • FPT_FLS: 1
    • FPT_ITT: 1
  • FRU:
    • FRU_FLT.2: 17
    • FRU_FLT.1: 1
    • FRU_FLT: 1
  • FAU:
    • FAU_SAS.1: 10
    • FAU_SAS: 4
    • FAU_GEN: 1
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG: 12
    • FCS_RNG.1: 30
    • FCS_COP.1: 27
    • FCS_CKM.1: 31
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_COP: 47
    • FCS_CKM.4: 23
    • FCS_CKM: 23
    • FCS_CKM.2: 5
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACF.1: 20
    • FDP_SDI.1: 17
    • FDP_SDI.2: 15
    • FDP_ITT.1: 13
    • FDP_IFC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 17
    • FDP_ITC.2: 17
    • FDP_SDI.1.1: 1
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_PHP.3: 1
  • FIA:
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 2
  • FMT:
    • FMT_MSA.1: 18
    • FMT_MSA.3: 19
    • FMT_SMF.1: 15
    • FMT_LIM: 3
    • FMT_LIM.1: 7
    • FMT_LIM.2: 7
    • FMT_SMR.1: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
  • FPT:
    • FPT_TST: 7
    • FPT_TST.2: 36
    • FPT_TST.1: 11
    • FPT_FLS.1: 16
    • FPT_PHP.3: 14
    • FPT_ITT.1: 13
    • FPT_TST.2.1: 1
    • FPT_AMT.1: 1
    • FPT_LIM.2: 1
    • FPT_FLS: 1
  • FRU:
    • FRU_FLT.2: 8
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS: 8
  • FAU_GEN: 2
  • FAU_SAS.1: 12
  • FAU_SAS.1.1: 2
  • FAU_GEN.1: 1
  • FAU_SAS.1: 10
  • FAU_SAS: 4
  • FAU_GEN: 1
  • FAU_SAS.1.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN 2 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS 8 4
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 12 10
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1.1 2 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 4 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 21 31
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 2 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 11 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 19 47
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 23 27
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 11 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 19 30
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 2 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 2 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 2
  • FDP_ACF: 2
  • FDP_ITT.1: 17
  • FDP_ITT.1.1: 1
  • FDP_ACC.1: 13
  • FDP_IFC.1: 18
  • FDP_IFC.1.1: 1
  • FDP_IFF.1: 3
  • FDP_ACF.1: 9
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 10
  • FDP_ITC.2: 10
  • FDP_SDI.1: 1
  • FDP_IFC: 1
  • FDP_ITT: 1
  • FDP_ACC.1: 23
  • FDP_ACF.1: 20
  • FDP_SDI.1: 17
  • FDP_SDI.2: 15
  • FDP_ITT.1: 13
  • FDP_IFC.1: 10
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 17
  • FDP_ITC.2: 17
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_PHP.3: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 13 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 9 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 18 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 10 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 10 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 17 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 1 17
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 8
  • FMT_LIM.1: 24
  • FMT_LIM.2: 28
  • FMT_LIM.1.1: 2
  • FMT_LIM.2.1: 2
  • FMT_MSA.3: 10
  • FMT_MSA.1: 9
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_SMR.1: 6
  • FMT_MSA.1.1: 1
  • FMT_SMF.1: 6
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 3
  • FMT_MSA: 2
  • FMT_SMF: 1
  • FMT_MSA.1: 18
  • FMT_MSA.3: 19
  • FMT_SMF.1: 15
  • FMT_LIM: 3
  • FMT_LIM.1: 7
  • FMT_LIM.2: 7
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 8 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 24 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 28 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 9 18
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 10 19
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 15
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 21
  • FPT_FLS.1.1: 1
  • FPT_PHP.3: 20
  • FPT_PHP.3.1: 1
  • FPT_PHP: 3
  • FPT_ITT.1: 15
  • FPT_ITT.1.1: 1
  • FPT_FLS: 1
  • FPT_ITT: 1
  • FPT_TST: 7
  • FPT_TST.2: 36
  • FPT_TST.1: 11
  • FPT_FLS.1: 16
  • FPT_PHP.3: 14
  • FPT_ITT.1: 13
  • FPT_TST.2.1: 1
  • FPT_AMT.1: 1
  • FPT_LIM.2: 1
  • FPT_FLS: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 21 16
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 15 13
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 20 14
pdf_data/st_keywords/cc_sfr/FRU
  • FRU_FLT.2: 17
  • FRU_FLT.1: 1
  • FRU_FLT: 1
  • FRU_FLT.2: 8
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 17 8
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 3
  • ECB:
    • ECB: 7
  • CBC:
    • CBC: 7
pdf_data/st_keywords/cipher_mode/ECB/ECB 3 7
pdf_data/st_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 1
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement 1 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-192: 8
    • P-224: 8
    • P-256: 8
    • P-384: 8
    • secp192k1: 4
    • secp192r1: 4
    • secp224k1: 4
    • secp224r1: 4
    • secp256k1: 4
    • secp256r1: 4
    • secp384r1: 4
  • Brainpool:
    • brainpoolP192r1: 4
    • brainpoolP192t1: 4
    • brainpoolP224r1: 4
    • brainpoolP224t1: 4
    • brainpoolP256r1: 4
    • brainpoolP256t1: 4
    • brainpoolP320r1: 4
    • brainpoolP320t1: 4
    • brainpoolP384r1: 4
    • brainpoolP384t1: 4
    • brainpoolP512r1: 4
    • brainpoolP512t1: 4
  • NIST:
    • P-192: 4
    • K-163: 2
pdf_data/st_keywords/ecc_curve/NIST
  • P-192: 8
  • P-224: 8
  • P-256: 8
  • P-384: 8
  • secp192k1: 4
  • secp192r1: 4
  • secp224k1: 4
  • secp224r1: 4
  • secp256k1: 4
  • secp256r1: 4
  • secp384r1: 4
  • P-192: 4
  • K-163: 2
pdf_data/st_keywords/ecc_curve/NIST/P-192 8 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 2
      • SHA-1: 1
    • SHA2:
      • SHA224: 6
      • SHA256: 6
      • SHA384: 6
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
      • SHA512: 2
  • SHA:
    • SHA1:
      • SHA1: 47
    • SHA2:
      • SHA256: 47
  • MD:
    • MD5:
      • MD5: 47
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA1: 2
  • SHA-1: 1
  • SHA1: 47
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 2 47
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA224: 6
  • SHA256: 6
  • SHA384: 6
  • SHA-224: 2
  • SHA-256: 2
  • SHA-384: 2
  • SHA-512: 2
  • SHA512: 2
  • SHA256: 47
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 6 47
pdf_data/st_keywords/randomness/RNG/RND 10 2
pdf_data/st_keywords/randomness/RNG/RNG 1 11
pdf_data/st_keywords/randomness/TRNG
  • TRNG: 16
  • DTRNG: 2
  • TRNG: 14
pdf_data/st_keywords/randomness/TRNG/TRNG 16 14
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 2
  • Malfunction: 24
  • malfunction: 11
  • DFA: 4
  • fault injection: 2
  • Malfunction: 12
  • malfunction: 1
  • DFA: 7
pdf_data/st_keywords/side_channel_analysis/FI/DFA 4 7
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 24 12
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 11 1
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 21
  • Physical Probing: 4
  • physical probing: 9
  • Physical probing: 2
  • side-channel: 4
  • side channel: 2
  • DPA: 12
  • SPA: 10
  • timing attacks: 1
  • timing attack: 5
  • Leak-Inherent: 10
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 6
  • Side-channel: 1
  • SPA: 6
  • DPA: 7
  • Timing Attack: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 12 7
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 21 10
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing 4 2
pdf_data/st_keywords/side_channel_analysis/SCA/SPA 10 6
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing 9 1
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 2 6
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering 5 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-3: 6
    • FIPS 197: 1
  • BSI:
    • AIS20: 3
    • AIS31: 2
    • AIS 20: 1
    • AIS 31: 2
  • CC:
    • CCMB-2009-07-001: 3
    • CCMB-2009-07-002: 3
    • CCMB-2009-07-003: 3
    • CCMB-2009-07-004: 3
  • FIPS:
    • FIPS PUB 197: 2
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 5
    • AIS32: 4
  • RFC:
    • RFC3447: 11
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 7816-3: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/BSI
  • AIS20: 3
  • AIS31: 2
  • AIS 20: 1
  • AIS 31: 2
  • AIS31: 5
  • AIS32: 4
pdf_data/st_keywords/standard_id/BSI/AIS31 2 5
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 3
  • CCMB-2009-07-002: 3
  • CCMB-2009-07-003: 3
  • CCMB-2009-07-004: 3
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 180-3: 6
  • FIPS 197: 1
  • FIPS PUB 197: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • DES:
      • DES: 9
    • 3DES:
      • 3DES: 6
      • Triple-DES: 1
      • TDEA: 1
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 27
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • 3DES: 17
      • Triple-DES: 2
      • TDES: 4
      • TDEA: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 14 27
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3DES: 6
  • Triple-DES: 1
  • TDEA: 1
  • 3DES: 17
  • Triple-DES: 2
  • TDES: 4
  • TDEA: 2
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 6 17
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA 1 2
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 2
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 9 5
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 4
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 3
  • Infineon:
    • Infineon Technologies AG: 21
    • Infineon Technologies: 7
    • Infineon: 7
pdf_data/st_metadata//Author SungGeun Park Jürgen Noller
pdf_data/st_metadata//CreationDate D:20110516173531+09'00' D:20150930134010
pdf_data/st_metadata//Creator PScript5.dll Version 5.2.2 Microsoft® Office Word 2007
pdf_data/st_metadata//Keywords Security Target of S3CT9KA/K7/K3 16-bit Secure RISC Microcontroller For Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software, CC EAL5+, Samsung Electroncis, SmartCard IC, Common Criteria version 3.1 Dresden, TSMC, Infineon, RSA, Eliptic Curve, Library, multi interface, high end security controler, ARM CPU, ARM Core, robust, CCv3.1, EAL5+, secure controller, EAL5+, augmented, high attack potential, AVA_VAN.5, PP0035
pdf_data/st_metadata//ModDate D:20110516174952+09'00' D:20150930134010
pdf_data/st_metadata//Producer Acrobat Distiller 9.0.0 (Windows) Microsoft® Office Word 2007
pdf_data/st_metadata//Subject S3CT9KA/K7/K3 Common Criteria(version 3.1) EAL5+ Evaluation Security Target Lite M9900, M9905, M9906
pdf_data/st_metadata//Title Security Target Lite of S3CT9KA/K7/K3 16-bit RISC Microcontroller For Smart Cards Security Target Lite
pdf_data/st_metadata/pdf_file_size_bytes 753587 921413
pdf_data/st_metadata/pdf_hyperlinks http://www.bsi.bund.de/, http://www.infineon.com/
pdf_data/st_metadata/pdf_is_encrypted True False
pdf_data/st_metadata/pdf_number_of_pages 67 85
dgst 200fa846782ecbb5 ce8e09d43878d381