This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
S3FV5RP, S3FV5RK, S3FV5RJ, S3FV5RH 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with optional Secure ECC Library (Version 1.01) including specific IC Dedicated Software BSI-DSZ-CC-0910-2016 |
S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure/CM1 RSA and ECC Library including specific IC Dedicated Software ANSSI-CC-2016/65 |
|
---|---|---|
name | S3FV5RP, S3FV5RK, S3FV5RJ, S3FV5RH 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with optional Secure ECC Library (Version 1.01) including specific IC Dedicated Software | S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure/CM1 RSA and ECC Library including specific IC Dedicated Software |
not_valid_before | 2016-11-30 | 2016-10-14 |
not_valid_after | 2021-11-30 | 2021-10-14 |
scheme | DE | FR |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0910b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2016_65en.pdf |
security_level | EAL5+, AVA_VAN.5, ALC_DVS.2 | ASE_TSS.2, EAL6+ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0910a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_65fr.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2018, 12, 20), 'maintenance_title': 'Reassessment - S3FV5RP, S3FV5RK, S3FV5RJ, S3FV5RH 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with optional Secure ECC Library (Version 1.01) including specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0910ra1a_pdf.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2018, 12, 20), 'maintenance_title': 'S3FV5RP, S3FV5RK, S3FV5RJ, S3FV5RH 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with optional Secure ECC Library (Version 1.01) including specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0910ma1a_pdf.pdf', 'maintenance_st_link': None}) | |
state/report/pdf_hash | 200870bf0bb791cfadb4e399114a9a529ccc9d212213078ba644a9a802f5e7a1 | 4142b381bf5d47200a795afc1b6b76e31e83d58eb1c579bc4333b08d6ec7bf6d |
state/report/txt_hash | 56175c58ab9e2e12c07ce95a251f9bd5820337df113d6ba92e31c72364f94d09 | 0e4b4edef6fbe14bd85aaa4b1f4625a9d05f9ec5d5468751a82e6ea889d44f5d |
state/st/pdf_hash | 8274080fb1ed65d3877d570cdab7a09c79ad1b1e0afcd6b64245f1493f580581 | bff4be87513b4d2aa406b982dc11a1a07361377aaa1d6a857cceef4e79d0bf93 |
state/st/txt_hash | a744cb55847d1dbde41fa9f58a681a3a75bf45c1d1808af4d3f93e8f5049af0b | 855a7beeeaaae835bcd5792c7e87e75d0f164d6941fe7fcbaff1a7a0928580bf |
heuristics/cert_id | BSI-DSZ-CC-0910-2016 | ANSSI-CC-2016/65 |
heuristics/cert_lab | BSI | CEA |
heuristics/extracted_versions | 1.01 | 16 |
heuristics/report_references/directly_referenced_by | None | ANSSI-CC-2017/18, ANSSI-CC-2017/17, ANSSI-CC-2017/42, ANSSI-CC-2018/31 |
heuristics/report_references/directly_referencing | None | ANSSI-CC-2016/01 |
heuristics/report_references/indirectly_referenced_by | None | ANSSI-CC-2019/22, ANSSI-CC-2017/42, ANSSI-CC-2017/18, ANSSI-CC-2017/17v2, ANSSI-CC-2020/06, ANSSI-CC-2018/31, ANSSI-CC-2017/18v2, ANSSI-CC-2017/17 |
heuristics/report_references/indirectly_referencing | None | ANSSI-CC-2016/01, ANSSI-CC-2014/84, ANSSI-CC-2014/20, ANSSI-CC-2015/60 |
heuristics/scheme_data | None |
|
pdf_data/report_filename | 0910a_pdf.pdf | ANSSI-CC-2016_65fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 19 | 27 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 3 | 2 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE |
|
|
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE/ATE_IND | 2 | 1 |
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN | 3 | 2 |
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 6 | 1 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 | 4 | 1 |
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/crypto_engine | |
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/TRNG/DTRNG | 8 | 14 |
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 31 | 4 | 2 |
pdf_data/report_keywords/standard_id/BSI/AIS31 | 3 | 2 |
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 4 | 1 |
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 1 | 2 |
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/vendor/Samsung/Samsung | 20 | 18 |
pdf_data/report_metadata//Author | Bundesamt für Sicherheit in der Informationstechnik | |
pdf_data/report_metadata//CreationDate | D:20170103094609+01'00' | |
pdf_data/report_metadata//Creator | Writer | PDFCreator Version 1.2.1 |
pdf_data/report_metadata//Keywords | "Common Criteria, Certification, Zertifizierung, EAL5, S3FV5RP, S3FV5RK, S3FV5RJ, S3FV5RH" | |
pdf_data/report_metadata//ModDate | D:20170103132209+01'00' | |
pdf_data/report_metadata//Producer | LibreOffice 4.2 | GPL Ghostscript 9.02 |
pdf_data/report_metadata//Subject | Common Criteria Certification | |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0910-2016 | ANSSI-CC-2016_65fr |
pdf_data/report_metadata/pdf_file_size_bytes | 741597 | 300121 |
pdf_data/report_metadata/pdf_hyperlinks | https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, http://www.ecc-brainpool.org/ecc-standard.htm, https://www.bsi.bund.de/, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte | |
pdf_data/report_metadata/pdf_number_of_pages | 38 | 19 |
pdf_data/st_filename | 0910b_pdf.pdf | ANSSI_cible2016_65en.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 58 | 32 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 7 | 15 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 14 | 21 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 2 | 4 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 2 | 6 |
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 | 7 | 5 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 | 2 | 1 |
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 8 | 1 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 13 | 5 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 5 | 13 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 23 | 25 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 2 | 4 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 11 | 18 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 27 | 51 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 22 | 21 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 6 | 25 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 12 | 18 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 8 | 20 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF | 8 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 10 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 18 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 9 | 11 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 9 | 11 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 17 | 18 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 20 | 22 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 13 | 16 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 21 | 22 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 15 | 16 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 11 | 3 |
pdf_data/st_keywords/cplc_data | |
|
pdf_data/st_keywords/crypto_engine | |
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 2 | 3 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP192r1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP192t1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP224r1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP224t1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP256r1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP256t1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP320r1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP320t1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP384r1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP384t1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP512r1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP512t1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/NIST |
|
|
pdf_data/st_keywords/ecc_curve/NIST/P-192 | 8 | 6 |
pdf_data/st_keywords/ecc_curve/NIST/P-224 | 8 | 6 |
pdf_data/st_keywords/ecc_curve/NIST/P-256 | 8 | 6 |
pdf_data/st_keywords/ecc_curve/NIST/P-384 | 8 | 6 |
pdf_data/st_keywords/ecc_curve/NIST/secp192k1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/NIST/secp192r1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/NIST/secp224k1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/NIST/secp224r1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/NIST/secp256k1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/NIST/secp256r1 | 4 | 3 |
pdf_data/st_keywords/ecc_curve/NIST/secp384r1 | 4 | 3 |
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/randomness/TRNG/DTRNG | 28 | 42 |
pdf_data/st_keywords/randomness/TRNG/TRNG | 4 | 1 |
pdf_data/st_keywords/side_channel_analysis/FI/DFA | 2 | 5 |
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 27 | 26 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 11 | 13 |
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering | 2 | 3 |
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 7 | 6 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 23 | 24 |
pdf_data/st_keywords/side_channel_analysis/SCA/side-channel | 1 | 3 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 2 | 4 |
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 1 | 10 |
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 180-3 | 6 | 7 |
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 16 | 28 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 1 | 6 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 9 | 10 |
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/HMAC | 7 | 2 |
pdf_data/st_keywords/vendor/Samsung/Samsung | 2 | 17 |
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Sunggeun Park | Windows 사용자 |
pdf_data/st_metadata//CreationDate | D:20161122184902+09'00' | D:20160727220054+09'00' |
pdf_data/st_metadata//Creator | Word용 Acrobat PDFMaker 10.1 | Microsoft® Word 2010 |
pdf_data/st_metadata//ModDate | D:20170201195503+09'00' | D:20160727220054+09'00' |
pdf_data/st_metadata//Producer | Adobe PDF Library 10.0 | Microsoft® Word 2010 |
pdf_data/st_metadata//Title | Security Target of Samsung S3FV5RP, S3FV5RK, S3FV5RJ, S3FV5RH 32-bit RISC Microcontroller for Smart Card with optional Secure ECC Library including specific IC Dedicated Software | ST_Klallam7_Ver1.1 |
pdf_data/st_metadata/pdf_file_size_bytes | 1425901 | 1234608 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/, mailto:[email protected] | |
pdf_data/st_metadata/pdf_is_encrypted | True | False |
pdf_data/st_metadata/pdf_number_of_pages | 71 | 110 |
dgst | 444c4b57afd7eb38 | 1e772dbed6523cee |