name |
FM1280 V05 |
RC-SA08/01et RC-SA08/02 version 1.00 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
FR |
status |
archived |
archived |
not_valid_after |
02.07.2023 |
21.08.2022 |
not_valid_before |
02.07.2018 |
21.08.2017 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-109%20C%20v%202.0.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-109%20Certification%20Report%20Fudan%20EAL5plus%20v2.0_rev.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_44fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FM1280%20EAL5plus%20ST%20lite%20v2.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible2017_44en.pdf |
manufacturer |
Shanghai Fudan Microelectronics Group Co., Ltd. |
Sony Corporation |
manufacturer_web |
https://eng.fmsh.com |
https://www.sony.com/ |
security_level |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
EAL5+, ASE_TSS.2, ALC_DVS.2, AVA_VAN.5 |
dgst |
29eab60d2793d1a1 |
549050cd6694b982 |
heuristics/cert_id |
SERTIT-109 |
ANSSI-CC-2017/44 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3 |
heuristics/extracted_versions |
- |
1.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2016/58 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2016/58 |
heuristics/scheme_data |
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 02.07.2018
- developer: Shanghai Fudan Microelectronics Group Co., Ltd.
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-109
- certification_date: 02.07.2018
- description: The TOE is a Dual Interface Smart Card Chip with IC Dedicated Software. It provides TDES, RSA, AES, ECC,True Random Number Generator and other security features. It can be widely and easily applied in various security fields such as banking and financial market, social security card, transport card, small-amount payment and security identification, etc. The TOE supports the following communication interfaces: - ISO/IEC 14443 TYPE A contactless interface - ISO/IEC 7816 contact interface - GPIO - SPI - I2C - UART
- developer: Shanghai Fudan Microelectronics Group Co., Ltd.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135331-1607953855/SERTIT/Sertifikater/2018/109/SERTIT-109%20C%20v%202.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135325-1607953847/SERTIT/Sertifikater/2018/109/FM1280%20EAL5%2B%20ST%20lite.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135328-1607953852/SERTIT/Sertifikater/2018/109/SERTIT-109%20Certification%20Report%20Fudan%20EAL5%2B%20v2.0_rev.pdf'})], 'maintenance': [frozendict({'href': 'https://sertit.no/getfile.php/135322-1607953843/SERTIT/Sertifikater/2018/109/SERTIT-109%20MR%20Maintenance%20Report%20v1.0-.pdf'})]})
- evaluation_facility: Brightsight B.V.
- expiration_date: 02.07.2023
- level: EAL 5, ALC_DVS.2, ATE_DPT.2, AVA_VAN.5
- mutual_recognition: CCRA, SOG-IS
- product: V05
- protection_profile: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, BSI-CC-PP-0084-2014
- sponsor: Shanghai Fudan Microelectronics Group Co., Ltd.
- product: FM1280
- url: https://sertit.no/certified-products/product-archive/fm1280
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
cf0f01bcd7be3e9c |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
SERTIT-109 C v 2.0.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes: 2830569
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
SERTIT-109 Certification Report Fudan EAL5plus v2.0_rev.pdf |
anssi-cc-2017_44fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ASE_TSS.2, ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2017/44
- cert_item: RC-SA08/01 et RC-SA08/02
- cert_item_version: Version 1.00
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa- ku Tokyo, 141-86-10 Japan STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa-ku Tokyo, 141-86-10 Japan
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP 0084], version 1.0 Security IC Platform Protection Profile with Augmentation Packages
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2016/58: 2
- ANSSI-CC-2017/44: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 5: 22
- EAL 5 augmented: 1
- EAL1: 1
- EAL4: 1
- EAL5: 1
- EAL5+: 1
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.5: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 3
- ATE:
- ATE_COV: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_COP.1: 8
- FCS_RNG.1: 4
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_SDC.1: 4
- FDP_SDI.2: 3
- FMT:
- FMT_LIM.1: 2
- FMT_LIM.2: 2
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FRU:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- SERMA: 1
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408: 8
- ISO/IEC 7816: 2
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Ulrich Isachsen
- /CreationDate: D:20190319130354+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: ugradert
- /ModDate: D:20190319130354+01'00'
- /Producer: Microsoft® Word 2013
- /Title: tittel
- pdf_file_size_bytes: 423796
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /CreationDate: D:20170904143302+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.024
- /ModDate: D:20170911160750+02'00'
- /Producer: Microsoft® Word 2010
- /Subject:
- /Title:
- pdf_file_size_bytes: 531170
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
FM1280 EAL5plus ST lite v2.0.pdf |
anssi_cible2017_44en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0084-2014: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 1
|
- EAL:
- EAL5: 9
- EAL5 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 3
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP: 1
- ADV_FSP.5: 6
- ADV_IMP.1: 3
- ADV_IMP.2: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.5: 5
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 10
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 3
- ASE_OBJ.2: 1
- ASE_REQ.2: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 9
- ATE:
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.4: 9
- FCS_COP.1: 28
- FCS_COP.1.1: 4
- FCS_RNG.1: 6
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 13
- FDP_ITC.2: 5
- FDP_ITT.1: 6
- FDP_SDC.1: 7
- FDP_SDC.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 2
- FMT_MSA.3: 3
- FPT:
- FPT_FLS.1: 6
- FPT_ITT.1: 6
- FPT_PHP.3: 5
- FRU:
|
- FAU:
- FAU_SAS: 1
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 2
- FCS_RNG: 1
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACC.2: 1
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 10
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 2
- FDP_ITT.1: 8
- FDP_ITT.1.1: 1
- FDP_RIP.1: 2
- FDP_ROL.1: 1
- FDP_SDC: 1
- FDP_SDC.1: 5
- FDP_SDC.1.1: 1
- FDP_SDI: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_TDC.1: 1
- FIA:
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 2
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UAU.5: 2
- FIA_UID.1: 7
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 2
- FMT:
- FMT_LIM.1: 9
- FMT_LIM.1.1: 1
- FMT_LIM.2: 9
- FMT_LIM.2.1: 1
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MTD.1: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNL.1: 7
- FPR_UNL.1.1: 1
- FPT:
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_RPL.1: 2
- FPT_TDC.1: 1
- FPT_TRP.1: 2
- FRU:
- FRU_FLT.2: 9
- FRU_FLT.2.1: 1
- FRU_RSA.2: 2
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AES: 5
- O.ECC: 5
- O.MEM_ACCCESS: 1
- O.MEM_ACCESS: 4
- O.RND: 3
- O.RSA: 5
- O.TDES: 6
- T:
|
- O:
- O.AC: 18
- O.RND: 5
- O.SC: 12
- T:
|
pdf_data/st_keywords/vendor |
|
- STMicroelectronics:
- STM: 7
- STMicroelectronics: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDEA: 1
- TDES: 16
- Triple-DES: 7
- DES:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 5
- fault injection: 1
- malfunction: 4
- SCA:
- Leak-Inherent: 5
- Physical Probing: 2
- physical probing: 2
|
- FI:
- Malfunction: 13
- malfunction: 3
- SCA:
- Leak-Inherent: 13
- Physical Probing: 2
- Side-channel: 1
- physical probing: 4
- side-channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 4
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-67: 1
- PKCS:
|
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 18092: 2
- ISO/IEC 7816: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- FeliCa OS, and APDU commands, which are processed by the Java Card System. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. The Java Card System and Java Applets are: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: FMSH
- /CreationDate: D:20180606084137+08'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180606084137+08'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 677458
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |