Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CENTAGATE v3.010-build13
ISCB-3-RPT-C072-CR-v1
Plateforme jTOP INFv#46 masquée sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM avec fonctionnalités MRTD
ANSSI-CC-2013/42
name CENTAGATE v3.010-build13 Plateforme jTOP INFv#46 masquée sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM avec fonctionnalités MRTD
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme MY FR
not_valid_after 06.06.2022 01.09.2019
not_valid_before 06.06.2017 27.06.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C072-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-42fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-05-08-CTG-ST-3.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-42en.pdf
manufacturer SecureMetric Technology Sdn Bhd Trusted Logic / Infineon
manufacturer_web https://www.securemetric.com/ https://www.trusted-logic.com/
security_level ALC_FLR.2, EAL4+ ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 4149b933ed4230dd ac1e7ac251e9255c
heuristics/cert_id ISCB-3-RPT-C072-CR-v1 ANSSI-CC-2013/42
heuristics/cert_lab [] SERMA
heuristics/extracted_sars ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ALC_FLR.2, ALC_DVS.1, ASE_REQ.2, ALC_TAT.1, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ALC_CMS.4, ASE_ECD.1, ADV_TDS.3, ALC_DEL.1, ASE_OBJ.2, AVA_VAN.3, ALC_FRL.2, ADV_FSP.4, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_CMC.4, ALC_LCD.1 AVA_VAN.5, ALC_DVS.2
heuristics/extracted_versions 3.010 46
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2015/25, BSI-DSZ-CC-0898-2014
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0829-2012
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2015/25, BSI-DSZ-CC-0898-2014
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0898-2014
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0898-2014
heuristics/protection_profiles {} 9399bd94f9925b16
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf
pdf_data/report_filename ISCB-5-RPT-C072-CR-v1.pdf ANSSI-CC_2013-42fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 3
    • cert_id: ANSSI-CC-2013/42
    • cert_item: Plateforme jTOP INFv#46 masquée sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM avec fonctionnalités MRTD
    • cert_item_version: Version 46.03
    • cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, FRANCE
    • developer: Trusted Logic SAS 6, rue de la Verrerie, 92197 Meudon, FRANCE Infineon Technologies AG AIM CC SM PS - Am Campeon 1-12 - 85579 Neubiberg, GERMANY Commanditaire Trusted Logic SAS 6, rue de la Verrerie, 92197 Meudon, FRANCE
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: JCSPP], version 3.0 Java CardTM System Open Configuration Protection Profile
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-3-RPT-C072-CR-v1: 28
  • DE:
    • BSI-DSZ-CC-0829-2012: 3
  • FR:
    • ANSSI-CC-2013/42: 19
    • Rapport de certification 2013/42: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL4: 5
    • EAL4 augmented: 1
    • EAL4+: 4
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 7
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.5: 4
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 23
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
  • TrustedLabs:
    • Trusted Labs: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • VPN:
    • VPN: 1
  • PACE:
    • PACE: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • OTP Hardware token, where this is out of the evaluation. SMS service to register the device is also out of scope. 18 Potential consumers of the TOE are advised that some functions and services may not have been: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: ISCB Department
  • /CreationDate: D:20170720054033+00'00'
  • /Creator: Microsoft Word
  • /Keywords: MyCB_TMP_002
  • /ModDate: D:20170720054033+00'00'
  • /Subject: CENTAGATE v3.0.10-build13
  • /Title: C072 Certification Report
  • pdf_file_size_bytes: 649341
  • pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
  • /CreationDate: D:20130731165216+02'00'
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate: D:20130801102813+02'00'
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 231283
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename 2017-05-08-CTG-ST-3.0.pdf ANSSI-CC-cible_2013-42en.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0017: 1
    • BSI-PP-0035: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 3
    • EAL4 augmented: 1
  • EAL:
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 2
    • ALC_FRL.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP: 3
    • FAU_ARP.1: 5
    • FAU_ARP.1.1: 1
    • FAU_GEN: 2
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_SAA: 1
    • FAU_SAA.1: 8
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAA.2: 6
    • FAU_SAA.2.1: 1
    • FAU_SAA.2.2: 1
    • FAU_SAA.2.3: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 3
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 5
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
  • FTA:
    • FTA_TAH: 3
    • FTA_TAH.1: 5
  • FAU:
    • FAU_ARP: 3
    • FAU_ARP.1: 3
    • FAU_SAS: 1
  • FCO:
    • FCO_NRO: 7
    • FCO_NRO.2: 8
    • FCO_NRR: 2
    • FCO_NRR.1: 3
  • FCS:
    • FCS_CKM: 19
    • FCS_CKM.1: 3
    • FCS_CKM.2: 2
    • FCS_CKM.3: 1
    • FCS_CKM.4: 2
    • FCS_COP: 30
    • FCS_COP.1: 5
    • FCS_RND: 4
    • FCS_RND.1: 5
    • FCS_RND.1.1: 1
    • FCS_RNG: 1
    • FCS_TST.1: 1
  • FDP:
    • FDP_ACC: 12
    • FDP_ACC.1: 3
    • FDP_ACC.2: 5
    • FDP_ACF: 13
    • FDP_ACF.1: 23
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_IFC: 6
    • FDP_IFC.1: 1
    • FDP_IFC.2: 2
    • FDP_IFF: 5
    • FDP_IFF.1: 16
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.4: 1
    • FDP_ITC: 5
    • FDP_ITC.1: 3
    • FDP_ITC.2: 9
    • FDP_ITT: 1
    • FDP_RIP: 23
    • FDP_RIP.1: 9
    • FDP_ROL: 6
    • FDP_ROL.1: 7
    • FDP_SDI: 2
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT: 2
    • FDP_UCT.1: 1
    • FDP_UIT: 6
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 9
    • FIA_AFL.1: 8
    • FIA_ATD: 2
    • FIA_ATD.1: 1
    • FIA_UAU: 14
    • FIA_UAU.1: 4
    • FIA_UAU.4: 2
    • FIA_UAU.5: 2
    • FIA_UAU.6: 1
    • FIA_UID: 9
    • FIA_UID.1: 4
    • FIA_UID.2: 1
    • FIA_USB: 2
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 9
    • FMT_LIM.1: 9
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 8
    • FMT_LIM.2.1: 2
    • FMT_MSA: 40
    • FMT_MSA.1: 10
    • FMT_MSA.2: 3
    • FMT_MSA.3: 14
    • FMT_MTD: 9
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_SMF: 11
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR: 15
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 4
    • FPR_UNO.1: 2
  • FPT:
    • FPT_FLS: 14
    • FPT_FLS.1: 5
    • FPT_ITT: 1
    • FPT_PHP: 1
    • FPT_RCV: 10
    • FPT_RCV.3: 18
    • FPT_RCV.4: 1
    • FPT_TDC: 2
    • FPT_TDC.1: 4
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 4
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT: 1
    • FRU_RSA: 2
    • FRU_RSA.1: 1
  • FTP:
    • FTP_ITC: 7
    • FTP_ITC.1: 7
pdf_data/st_keywords/cc_claims
  • A:
    • A.COMPENT_ADMIN: 1
    • A.COMPENT_ADMINSTRATORS: 1
    • A.FIREWALL: 2
    • A.MAIL_SERVER: 2
    • A.MALICIOUS_CODE: 1
    • A.NO_EVIL: 2
    • A.OPERATING_SYSTEM: 1
    • A.PORT_PROTECT: 2
    • A.TIME_STAMP: 2
  • D:
    • D: 1
  • O:
    • O.ALERT: 6
    • O.AUDIT: 7
    • O.AUTH_MECH: 8
    • O.MOBILE_SENSITVE: 2
    • O.MOBILE_SENSITVE_: 1
    • O.MOBILE_SENSITVE_PROTECTION: 5
    • O.TRAFFIC_PROTECTION: 23
    • O.USER_ACC: 1
    • O.USER_ACC_CONTROL: 19
  • OE:
    • OE.COMPENT_: 1
    • OE.COMPENT_ADMINSTRATORS: 1
    • OE.FIREWALL: 2
    • OE.MAIL_SERVER: 2
    • OE.MALICIOUS_CODE_N: 1
    • OE.MALICIOUS_CODE_NOT_SIGN: 1
    • OE.NO_EVIL: 2
    • OE.OPERATING_SYSTEM: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.PORT_PROTECT: 2
    • OE.TIME_STAMP: 2
  • T:
    • T.CUMMUNICATION: 1
    • T.CUMMUNICATION_ATTACK: 1
    • T.DATA_ACCESS: 2
    • T.MOBILE: 1
    • T.MOBILE_ATTACK: 1
    • T.USER_ACC_CONTROL: 1
    • T.WEB_ATTACK: 2
  • A:
    • A.APPLET: 2
    • A.CARD-MANAGEMENT: 1
    • A.DELETION: 1
    • A.NATIVE: 3
    • A.VERIFICATION: 2
  • D:
    • D.API_DATA: 4
    • D.APP-CODE: 3
    • D.APP-INST: 2
    • D.APP_CODE: 5
    • D.APP_C_DATA: 4
    • D.APP_I_DATA: 6
    • D.COMMAND: 2
    • D.CRYPTO: 5
    • D.CVM: 2
    • D.GP-REGISTRY: 2
    • D.JCS_CODE: 5
    • D.JCS_DATA: 6
    • D.PIN: 5
    • D.SD-PERSO: 2
    • D.SD-SESSION-KEYS: 2
    • D.SEC_DATA: 8
    • D.SOFTWARE: 2
  • O:
    • O.ALARM: 2
    • O.APPLET: 16
    • O.CARD-: 1
    • O.CARD-MANAGEMENT: 2
    • O.CIPHER: 3
    • O.CODE_PKG: 14
    • O.CVM-BLOCK: 2
    • O.DELETION: 2
    • O.ERROR-COUNTERS: 2
    • O.FIREWALL: 2
    • O.GLOBAL-CVM: 2
    • O.GLOBAL_ARRAYS_CONFID: 2
    • O.GLOBAL_ARRAYS_INTEG: 2
    • O.INFO-CONFIDENTIALITY: 2
    • O.INFO-INTEGRITY: 3
    • O.INFO-ORIGIN: 2
    • O.INSTALL: 4
    • O.JAVAOBJECT: 41
    • O.KEY-MNGT: 3
    • O.LIFE-CYCLE: 2
    • O.LOAD: 4
    • O.LOCK: 2
    • O.NATIVE: 2
    • O.NO-KEY-REUSE: 2
    • O.OBJ-DELETION: 2
    • O.OPERATE: 2
    • O.OS-SUPPORT: 2
    • O.PIN-MNGT: 3
    • O.REALLOCATION: 2
    • O.RECEIPT: 2
    • O.RECOVERY: 2
    • O.REQUEST: 2
    • O.RESOURCES: 2
    • O.RND: 1
    • O.SID: 2
    • O.TRANSACTION: 3
    • O.VERIFICATION: 3
  • OE:
    • OE.APPLET: 2
    • OE.BAC_PP: 2
    • OE.CARD-MANAGEMENT: 2
    • OE.CODE-EVIDENCE: 2
    • OE.KEY-LENGTH: 2
    • OE.MRTD_: 1
    • OE.NATIVE: 2
    • OE.NO-RMI-APPLETS: 2
    • OE.SCP: 6
    • OE.SECRETS: 2
    • OE.VERIFICATION: 5
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 2
    • OP.DELETE_PKG_APPLET: 1
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.PUT: 6
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.BAC-PP: 2
    • OSP.FILE-ORIGIN: 2
    • OSP.KEY-LENGTH: 2
    • OSP.NO-RMI-APPLETS: 2
    • OSP.PERSONALIZATION: 2
    • OSP.PROCESS-TOE: 1
    • OSP.SECRETS: 3
    • OSP.VERIFICATION: 2
  • R:
    • R.JAVA: 10
  • T:
    • T.BRUTE-FORCE: 2
    • T.CONFID-APPLI-DATA: 2
    • T.CONFID-JCS-CODE: 2
    • T.CONFID-JCS-DATA: 2
    • T.CRYPTO: 2
    • T.DELETION: 4
    • T.EXE-CODE: 4
    • T.FORCED-RESET: 2
    • T.IMPERSONATE: 2
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 4
    • T.INTEG-APPLI-DATA: 4
    • T.INTEG-JCS-CODE: 2
    • T.INTEG-JCS-DATA: 2
    • T.INVALID-INPUT: 2
    • T.INVALID-ORDER: 2
    • T.LIFE-CYCLE: 2
    • T.MALFUNCTION: 1
    • T.MEM_ACCESS: 1
    • T.NATIVE: 2
    • T.OBJ-DELETION: 2
    • T.PHYSICAL: 2
    • T.PHYS_MANIPULATION: 1
    • T.PHYS_PROBING: 1
    • T.RECEIPT: 2
    • T.REPLAY: 2
    • T.RESOURCES: 2
    • T.RND: 1
    • T.SID: 4
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 2
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
  • AES_competition:
    • AES:
      • AES: 25
      • AES128: 6
  • DES:
    • 3DES:
      • TDES: 1
      • Triple-DES: 3
    • DES:
      • DES: 35
  • constructions:
    • MAC:
      • CMAC: 2
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
  • ECC:
    • ECDH:
      • ECDH: 7
    • ECDSA:
      • ECDSA: 11
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 9
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 1536: 1
    • RSA-CRT: 3
    • RSA1024: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-2: 1
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 16
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
  • PACE:
    • PACE: 105
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • CCM:
    • CCM: 1
  • ECB:
    • ECB: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 2
    • Malfunction: 3
    • Physical Tampering: 1
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 7
    • physical tampering: 2
  • SCA:
    • DPA: 4
    • Leak-Inherent: 1
    • SPA: 2
    • physical probing: 3
  • other:
    • reverse engineering: 2
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 2
    • EF.DG1: 2
    • EF.DG14: 1
    • EF.DG16: 2
    • EF.DG2: 2
    • EF.DG3: 2
    • EF.DG4: 2
    • EF.DG5: 2
    • EF.SOD: 2
pdf_data/st_keywords/standard_id
  • PKCS:
    • PKCS#11: 2
    • PKCS#12: 3
  • BSI:
    • AIS34: 4
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS 180-2: 2
    • FIPS 197: 2
    • FIPS 46-2: 1
    • FIPS 46-3: 2
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 6
    • FIPS PUB 81: 1
  • ICAO:
    • ICAO: 14
  • ISO:
    • ISO/IEC 15408:2005: 3
    • ISO/IEC 15946-: 2
    • ISO/IEC 15946-3: 3
  • NIST:
    • NIST SP 800-38B: 6
  • PKCS:
    • PKCS#1: 5
    • PKCS#3: 3
  • SCP:
    • SCP02: 8
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.2.1: 1
  • JavaCard:
    • Java Card 3.0.4: 4
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 3
    • javacard.internalservices: 1
    • javacard.lds.filesystem: 1
    • javacard.pace: 1
    • javacard.security: 5
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Out of Scope: 1
    • issuer certificate validity, certificate status, and the certificate owner Mobile audio pass (Out of Scope) TOE will generate challenge and PKI certificate will be used to sign the challenge. The signature: 1
    • out of scope: 5
    • procedure. Table 21: Authentication Components Authentication Method of authentication PKI token (out of scope) The user prompted to select the valid certificate from the list, and then TOE will verify the: 1
    • serial number / fingerprint that stored in the DB. Hardware CR OTP (out of scope) User needs to have CR OTP token to use this feature. User will request for a challenge from the: 1
    • then be sent back to the TOE by the mobile application and verified for its validity. FIDO (out of scope) User need to plugged in the token then click on the button of the token to submit the validation: 1
    • token. This is out of the scope of the evaluation. Also, using SMS to register the device is also out of scope of evaluation. SecureMetric Technology Sdn Bhd 2016 Page 17 of 76 For QR code registration: 1
    • which will then be used by the user to generate the OTP. Hardware OTP (out of scope) User needs to have OTP token to use this feature. User will generate an OTP from the OTP token and: 1
pdf_data/st_metadata
  • /Author: Rajiv;Biau
  • /CreationDate: D:20170523024954+00'00'
  • /Creator: Microsoft Word
  • /Keywords: ST
  • /ModDate: D:20170720134505+08'00'
  • /Title: Centagat Security Target
  • pdf_file_size_bytes: 1592329
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 76
  • /CreationDate: D:20130519162311+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20130801102846+02'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title:
  • pdf_file_size_bytes: 3935958
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 162
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different