name |
SAMSUNG S3FT9KF/S3FT9KT/S3FT9KS, revision 0 |
Cybertrust UniCERT v5.2.1 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Products for Digital Signatures |
scheme |
FR |
AU |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
13.07.2017 |
not_valid_before |
14.06.2012 |
25.10.2006 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-27fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFAT028_Certification_Report_V1.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-27en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cybertrust_UniCERT_5.2.1_ST.pdf |
manufacturer |
Samsung Electronics Co., Ltd. |
Cybertrust |
manufacturer_web |
https://www.samsung.com |
https://www.cybertrust.com/ |
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL4+, ALC_FLR.2 |
dgst |
37092e59c3c50ced |
6780328fff5788c0 |
heuristics/cert_id |
ANSSI-CC-2012/27 |
Certificate Number: 2006/39 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_INT.2, ATE_IND.2, AGD_PRE.1, ADV_TDS.4, ALC_CMC.4, ALC_TAT.2, AGD_OPE.1, ASE_REQ.2, ASE_ECD.1, ALC_DVS.2, ATE_COV.2, ASE_SPD.1, ASE_OBJ.2, ALC_CMS.5, ATE_DPT.3, ADV_FSP.5, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1 |
ADV_IMP.1, ASE_REQ.1, ASE_ENV.1, ATE_IND.2, ASE_DES.1, ATE_FUN.1, ADV_HLD.2, AVA_SOF.1, AVA_VLA.2, ADV_RCR.1, ADV_LLD.1, ATE_COV.2, AGD_AGD.1, ASE_OBJ.1, AGD_USR.1, AVA_MSU.2, ADV_SPM.1, ASE_SRE.1, ASE_INT.1, ADV_FSP.2, ASE_TSS.1, AGD_ADM.1, ATE_DPT.1, ALC_DVS.1, ALC_TAT.1, ALC_LCD.1, ALC_FLR.2, ASE_PPC.1 |
heuristics/extracted_versions |
0 |
5.2.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2013/12 |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2013/12 |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
f6d23054061d72ba |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC_2012-27fr.pdf |
EFAT028_Certification_Report_V1.0.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- AU:
- Certificate Number: 2006/39: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL7: 1
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 2
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- CEA-LETI:
- CEA - LETI: 1
- CEA-LETI: 2
- CESTI:
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- PKCS:
- PKCS#11: 3
- PKCS#12: 2
- PKCS#7: 1
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Comments: Developpeur
- /Company: SGDSN/ANSSI
- /CreationDate: D:20120614135638+02'00'
- /Creator: Acrobat PDFMaker 8.1 pour Word
- /Keywords: ANSSI-CC-CER-F-07.009
- /ModDate: D:20120618200156+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20120614115616
- /Subject:
- /Title:
- pdf_file_size_bytes: 264345
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /CreationDate: D:20061222014212+11'00'
- /Creator: AdobePS5.dll Version 5.2
- /ModDate: D:20061222014212+11'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Microsoft Word - EFAT028 Certification Report V1.0.doc
- pdf_file_size_bytes: 184977
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
pdf_data/st_filename |
ANSSI-CC-cible_2012-27en.pdf |
Cybertrust_UniCERT_5.2.1_ST.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 2
- EAL 5 augmented: 2
- EAL5: 6
- EAL5 augmented: 1
|
- EAL:
- EAL 4: 6
- EAL 4 augmented: 1
- EAL 4+: 1
- EAL4: 8
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 7
- ADV_ARV: 1
- ADV_FSP: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_VAN: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 2
- AGD_PRE: 1
- AGD_PRE.1: 2
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 10
- ACM_CAP: 1
- ACM_CAP.4: 18
- ACM_SCP: 1
- ACM_SCP.2: 6
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 9
- ADO_IGS.1: 8
- ADV:
- ADV_FSP.2: 9
- ADV_HLD: 1
- ADV_HLD.2: 12
- ADV_IMP.1: 6
- ADV_LLD: 1
- ADV_LLD.1: 13
- ADV_RCR: 1
- ADV_RCR.1: 4
- ADV_SPM: 1
- ADV_SPM.1: 10
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 15
- AGD_AGD.1: 1
- AGD_USR: 1
- AGD_USR.1: 13
- ALC:
- ALC_DVS.1: 7
- ALC_FLR: 2
- ALC_FLR.2: 19
- ALC_LCD.1: 8
- ALC_TAT.1: 9
- ASE:
- ASE_DES.1: 2
- ASE_ENV.1: 2
- ASE_INT.1: 2
- ASE_OBJ.1: 2
- ASE_PPC.1: 2
- ASE_REQ.1: 2
- ASE_SRE.1: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.2: 7
- ATE_DPT.1: 6
- ATE_FUN.1: 11
- ATE_IND.2: 7
- AVA:
- AVA_MSU: 1
- AVA_MSU.2: 9
- AVA_SOF.1: 6
- AVA_VLA: 1
- AVA_VLA.2: 10
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 1
- FAU_SAS: 8
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 30
- FCS_CKM.2: 4
- FCS_CKM.4: 14
- FCS_COP: 33
- FCS_COP.1: 27
- FCS_RNG: 11
- FCS_RNG.1: 19
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 18
- FDP_IFC.1.1: 1
- FDP_IFF.1: 3
- FDP_ITC.1: 11
- FDP_ITC.2: 11
- FDP_ITT: 1
- FDP_ITT.1: 17
- FDP_ITT.1.1: 1
- FDP_SDI.1: 1
- FMT:
- FMT_CKM.4: 1
- FMT_LIM: 8
- FMT_LIM.1: 24
- FMT_LIM.1.1: 2
- FMT_LIM.2: 28
- FMT_LIM.2.1: 2
- FMT_MSA: 2
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 21
- FPT_FLS.1.1: 1
- FPT_ITT: 1
- FPT_ITT.1: 15
- FPT_ITT.1.1: 1
- FPT_PHP: 3
- FPT_PHP.3: 20
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT: 1
- FRU_FLT.1: 1
- FRU_FLT.2: 17
|
- FAU:
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCO:
- FCO_NRO.2: 9
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 22
- FCS_CKM.1.1: 1
- FCS_CKM.2: 9
- FCS_CKM.2.1: 2
- FCS_CKM.3: 12
- FCS_CKM.3.1: 1
- FCS_CKM.4: 28
- FCS_CKM.4.1: 1
- FCS_COP: 90
- FCS_COP.1: 10
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 1
- FDP_ACF.1: 23
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU: 24
- FDP_DAU.2: 16
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_IFC.1: 23
- FDP_IFC.1.1: 1
- FDP_IFF.1: 21
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.1: 16
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 12
- FDP_ITT.1.1: 1
- FDP_ITT.3: 12
- FDP_ITT.3.1: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 13
- FIA_SOS.1.1: 1
- FIA_UAU: 45
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 2
- FIA_UID: 47
- FIA_UID.1: 32
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 2
- FIA_USB.1: 11
- FIA_USB.1.1: 1
- FMT:
- FMT_MOF.1: 19
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 17
- FMT_MSA.1.1: 1
- FMT_MSA.2: 32
- FMT_MSA.2.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 18
- FMT_MTD.1.1: 1
- FMT_MTD.2: 6
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_REV.1: 11
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SAE: 1
- FMT_SAE.1: 12
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITC: 10
- FPT_ITC.1: 1
- FPT_ITI.1: 12
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_ITT: 10
- FPT_ITT.1: 12
- FPT_ITT.1.1: 1
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_SAE: 1
- FPT_SSP: 2
- FPT_SSP.1: 5
- FPT_SSP.1.1: 1
- FPT_STM.1: 5
- FTP:
|
pdf_data/st_keywords/cc_claims |
- O:
- O.MEM_ACCESS: 1
- O.RND: 5
- O.RNG: 1
- T:
|
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Microsoft:
- Oberthur:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 6
- TDEA: 1
- TDES: 1
- Triple-DES: 1
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
- SHA224: 6
- SHA256: 6
- SHA384: 6
- SHA512: 5
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- Brainpool:
- brainpoolP192r1: 4
- brainpoolP192t1: 4
- brainpoolP224r1: 4
- brainpoolP224t1: 4
- brainpoolP256r1: 4
- brainpoolP256t1: 4
- brainpoolP320r1: 4
- brainpoolP320t1: 4
- brainpoolP384r1: 4
- brainpoolP384t1: 4
- brainpoolP512r1: 4
- brainpoolP512t1: 4
- NIST:
- P-192: 8
- P-224: 8
- P-256: 8
- P-384: 8
- P-521: 6
- secp192k1: 4
- secp192r1: 4
- secp224k1: 4
- secp224r1: 4
- secp256k1: 4
- secp256r1: 4
- secp384r1: 4
- secp521r1: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 4
- Malfunction: 27
- fault injection: 2
- malfunction: 11
- physical tampering: 2
- SCA:
- DPA: 11
- Leak-Inherent: 23
- Physical Probing: 4
- Physical probing: 2
- SPA: 10
- physical probing: 9
- side channel: 2
- side-channel: 4
- timing attack: 5
- timing attacks: 1
- other:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- AIS 20: 1
- AIS 31: 2
- AIS20: 2
- AIS31: 3
- BSI-AIS31: 3
- CC:
- CCMB-2009-07-001: 3
- CCMB-2009-07-002: 3
- CCMB-2009-07-003: 3
- CCMB-2009-07-004: 3
- FIPS:
- FIPS 197: 1
- FIPS PUB 180-3: 6
|
- FIPS:
- FIPS 180: 1
- FIPS 186: 1
- FIPS 46-3: 1
- ISO:
- PKCS:
- PKCS #11: 1
- PKCS #7: 1
- PKCS 1: 1
- PKCS#11: 4
- PKCS#12: 5
- PKCS#7: 3
- PKCS11: 4
- PKCS12: 3
- PKCS7: 3
- RFC:
- RFC 13: 1
- RFC1321: 6
- RFC3280: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- java.dll: 1
- java.exe: 1
- java.js: 4
- java.policy: 1
- java.security: 1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- The assessment of the algorithmic strength used by these functions is out of scope of the evaluation, being assessed by the National Authority: 1
- are cryptographic in nature and therefore the assessment of their algorithmic strength is out of scope of the evaluation, being assessed by the National Authority. However one mechanism does require a: 1
- out of scope: 4
- protocol handlers: Web Handler, email Handler, SCEP Handler, and CMP Handler (the CMP Handler is out of scope of the evaluation.) · Web RA Operator (WebRAO) The relationship between these components is shown: 1
- the CMP Handler is out of scope of the evaluation: 1
- to cryptographic SFRs). The assessment of the algorithmic strength used by these functions is out of scope of the evaluation, being assessed by the National Authority. However one mechanism does require a: 1
- users who have no role in the PKI, but have certificates issued by the PKI. Their activities are out of scope of the evaluation. 9.3 Information Flow Control Policy This ST contains one information flow: 1
|
pdf_data/st_metadata |
- /Author: SungGeun Park
- /CreationDate: D:20111219142740+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /Keywords: Security Target of S3FT9KF/KT/KS 16-bit Secure RISC Microcontroller For Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software, CC EAL5+, Samsung Electroncis, SmartCard IC, Common Criteria version 3.1
- /ModDate: D:20111219144759+09'00'
- /Producer: Acrobat Distiller 9.3.0 (Windows)
- /Subject: S3FT9KF/KT/KS Common Criteria(version 3.1) EAL5+ Evaluation
- /Title: Security Target Lite of S3FT9KF/KT/KS 16-bit RISC Microcontroller For Smart Cards
- pdf_file_size_bytes: 849260
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 72
|
- /CreationDate: D:20061222014648+11'00'
- /Creator: AdobePS5.dll Version 5.2
- /ModDate: D:20061222014648+11'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Microsoft Word - Baltimore UniCERT 5 Security Target v5.0ab2.doc
- pdf_file_size_bytes: 1406278
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 266
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |