Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
TrustWare 3.0 (v3.0.5)
NSCIB-CC-234008-CR
Plateforme Java Card MultiApp V5.0.A - version 5.0.A
ANSSI-CC-2022/52
name TrustWare 3.0 (v3.0.5) Plateforme Java Card MultiApp V5.0.A - version 5.0.A
category Trusted Computing ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme NL FR
status archived active
not_valid_after 11.10.2024 14.11.2027
not_valid_before 11.10.2019 14.11.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-19-234008.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2022_52.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-234008-CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_52fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TrustWare%203.0%20Security%20Target%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_52en.pdf
manufacturer Samsung Electronics Co., Ltd. THALES DIS FRANCE SA
manufacturer_web https://www.samsung.com https://www.thalesgroup.com/en/europe/france
security_level EAL2+, AVA_TEE.2 EAL6+, ALC_FLR.1
dgst 455e10571eb0cf1c 70c176a3a9ae4afe
heuristics/cert_id NSCIB-CC-234008-CR ANSSI-CC-2022/52
heuristics/cert_lab []
heuristics/extracted_sars ASE_INT.1, AVA_TEE.2, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 3.0.5, 3.0 5.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2022/57, ANSSI-CC-2022/56, ANSSI-CC-2022/54, ANSSI-CC-2022/55
heuristics/report_references/directly_referencing {} ANSSI-CC-2022/10, BSI-DSZ-CC-1107-V2-2021
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2022/57, ANSSI-CC-2022/56, ANSSI-CC-2022/54, ANSSI-CC-2022/55
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2021/42, BSI-DSZ-CC-1107-2020, ANSSI-CC-2022/10, BSI-DSZ-CC-1107-V2-2021
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-V2-2021
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-V2-2021
heuristics/protection_profiles {} 94167fd161e87d71
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf
pdf_data/cert_filename Signed certificate CC-19-234008.pdf certificat-cc-2022_52.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-19-234008: 1
  • FR:
    • ANSSI-CC-2022/52: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL4: 1
  • EAL:
    • EAL6: 1
pdf_data/cert_keywords/cc_sar
  • AVA:
    • AVA_TEE.2: 1
  • ALC:
    • ALC_FLR.1: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20191011155832+01'00'
  • /Creator: C458-M&S
  • /ModDate: D:20191011155832+01'00'
  • /Producer: KONICA MINOLTA bizhub C458
  • /Title: C458-M&S19101115580
  • pdf_file_size_bytes: 184548
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: DUCLOS Charlene
  • /CreationDate: D:20221117141107+01'00'
  • /Creator: Microsoft® Word 2019
  • /Keywords: version x.x, révision x
  • /ModDate: D:20221117141107+01'00'
  • /Producer: Microsoft® Word 2019
  • /Title: ANSSI-CC-2022/52
  • pdf_file_size_bytes: 290196
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename Certification Report NSCIB-CC-234008-CR.pdf anssi-cc-2022_52fr.pdf
pdf_data/report_frontpage
  • FR:
  • NL:
    • cert_id: NSCIB-CC-234008-CR
    • cert_item: TrustWare 3.0 (v3.0.5
    • cert_lab: Brightsight
    • developer: Samsung Electronics Co., Ltd
  • FR:
  • NL:
pdf_data/report_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-234008-CR: 12
  • DE:
    • BSI-DSZ-CC-1107-V2-2021: 1
  • FR:
    • ANSSI-CC-2022/10: 2
    • ANSSI-CC-2022/52: 19
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-V2-2020: 2
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 2
    • EAL2 augmented: 1
    • EAL4: 1
  • EAL:
    • EAL 6: 1
    • EAL2: 2
    • EAL6+: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • AVA:
    • AVA_TEE.2: 2
  • AGD:
    • AGD_OPE: 4
    • AGD_PRE: 6
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.SECURE_ENVIORNMENT: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 5
  • Gemalto:
    • Gemalto: 1
  • Infineon:
    • Infineon Technologies AG: 1
  • Thales:
    • Thales: 4
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 2
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 1
    • DSA:
      • DSA: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA1: 4
    • SHA2:
      • SHA224: 4
      • SHA256: 2
      • SHA384: 4
      • SHA512: 2
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 4
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 4
  • GCM:
    • GCM: 2
  • XTS:
    • XTS: 3
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
    • Reverse engineering: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 22
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 2
    • FIPS 197: 1
    • FIPS 46: 1
    • FIPS 81: 1
  • PKCS:
    • PKCS #3: 1
    • PKCS#1: 4
    • PKCS5: 1
  • RFC:
    • RFC 1321: 1
    • RFC 2202: 1
    • RFC 3610: 1
    • RFC 4231: 1
    • RFC 7748: 1
    • RFC 8032: 1
    • RFC1423: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 3
pdf_data/report_keywords/javacard_api_const
  • curves:
    • ED25519: 1
    • X25519: 1
pdf_data/report_metadata
pdf_data/st_filename TrustWare 3.0 Security Target v1.0.pdf anssi-cible-cc-2022_52en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-V2-2021: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 4
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0099-V2-2020: 1
    • BSI-PP-0055-: 1
    • BSI-PP-0056-V2-MA-2012: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 3
    • EAL2 augmented: 1
  • EAL:
    • EAL 6+: 1
    • EAL6: 31
    • EAL6 augmented: 1
    • EAL6+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.2: 3
    • ADV_TDS.1: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 6
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_TEE: 4
    • AVA_TEE.2: 17
    • AVA_VAN: 2
    • AVA_VAN.2: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 8
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 5
    • ADV_IMP.1: 6
    • ADV_IMP.2: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 8
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 7
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 7
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 3
    • ALC_FLR.1: 5
    • ALC_LCD.1: 4
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 6
    • ATE_FUN.2: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 12
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 3
    • FAU_SAA.1: 2
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 21
    • FCS_COP.1.1: 1
    • FCS_RNG: 3
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 28
    • FDP_ACC.1: 8
    • FDP_ACF: 24
    • FDP_ACF.1: 11
    • FDP_IFC: 17
    • FDP_IFC.1: 5
    • FDP_IFC.2: 2
    • FDP_IFF: 18
    • FDP_IFF.1: 7
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ITT: 9
    • FDP_ITT.1: 2
    • FDP_RIP: 8
    • FDP_RIP.1: 1
    • FDP_ROL: 8
    • FDP_ROL.1: 3
    • FDP_SDI.2: 17
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_UID.1: 1
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 47
    • FMT_MSA.1: 4
    • FMT_MSA.3: 9
    • FMT_SMF: 1
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_INI: 3
    • FPT_INI.1: 12
    • FPT_INI.1.1: 2
    • FPT_INI.1.2: 2
    • FPT_INI.1.3: 2
    • FPT_ITT: 11
    • FPT_ITT.1: 1
    • FPT_STM: 1
    • FPT_TEE.1: 7
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
  • FAU:
    • FAU_ARP.1: 16
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
    • FAU_SAS.1: 2
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 66
    • FCS_CKM.1: 30
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 11
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 6
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 29
    • FCS_CKM.4.1: 2
    • FCS_CMK.4: 2
    • FCS_COP: 74
    • FCS_COP.1: 32
    • FCS_COP.1.1: 5
    • FCS_RNG: 27
    • FCS_RNG.1: 15
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
  • FDP:
    • FDP_ACC: 59
    • FDP_ACC.1: 23
    • FDP_ACC.2: 6
    • FDP_ACF: 53
    • FDP_ACF.1: 30
    • FDP_IFC: 26
    • FDP_IFC.1: 14
    • FDP_IFC.2: 2
    • FDP_IFF: 18
    • FDP_IFF.1: 14
    • FDP_ITC: 12
    • FDP_ITC.1: 12
    • FDP_ITC.2: 17
    • FDP_ITT.1: 2
    • FDP_RIP: 109
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_ROL: 14
    • FDP_ROL.1: 5
    • FDP_SDC.1: 2
    • FDP_SDI: 9
    • FDP_SDI.2: 4
    • FDP_UCT.1: 2
    • FDP_UIT: 7
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 27
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 1
    • FIA_API.1: 2
    • FIA_ATD: 20
    • FIA_ATD.1: 4
    • FIA_UAU: 82
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 3
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
    • FIA_UID: 61
    • FIA_UID.1: 21
    • FIA_UID.1.1: 3
    • FIA_UID.1.2: 3
    • FIA_UID.2: 1
    • FIA_USB: 7
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 42
    • FMT_LIM.1: 17
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 16
    • FMT_LIM.2.1: 3
    • FMT_MSA: 127
    • FMT_MSA.1: 15
    • FMT_MSA.2: 2
    • FMT_MSA.3: 24
    • FMT_MTD: 73
    • FMT_MTD.1: 13
    • FMT_MTD.3: 1
    • FMT_SMF: 94
    • FMT_SMF.1: 31
    • FMT_SMF.1.1: 2
    • FMT_SMR: 108
    • FMT_SMR.1: 42
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO: 6
    • FPR_UNO.1: 9
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 16
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 63
    • FPT_FLS.1: 19
    • FPT_FLS.1.1: 2
    • FPT_ITT: 7
    • FPT_ITT.1: 2
    • FPT_PHP: 8
    • FPT_PHP.3: 19
    • FPT_PHP.3.1: 1
    • FPT_RCV: 14
    • FPT_RCV.3: 4
    • FPT_RCV.4: 2
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 10
    • FPT_TST.1: 17
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT.2: 2
  • FTP:
    • FTP_ITC: 20
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 12
    • FTP_TRP.1: 10
pdf_data/st_keywords/cc_claims
  • A:
    • A.PROTECTION_AFTER_DELIVERY: 5
    • A.ROLLBACK: 5
    • A.SECURE_INITIALISATION: 1
    • A.SECURE_INITIALIZATION: 4
    • A.SECURE_PLATFORM: 6
    • A.TA_DEVELOPMENT: 5
  • O:
    • O.CA_TA_IDENTIFICATION: 8
    • O.INITIALIZATION: 22
    • O.INSTANCE_TIME: 1
    • O.KEYS_USAGE: 16
    • O.OPERATION: 24
    • O.RNG: 10
    • O.RUNTIME_CONFIDENTIALITY: 21
    • O.RUNTIME_INTEGRITY: 24
    • O.TA_AUTHENTICITY: 15
    • O.TA_ISOLATION: 14
    • O.TEE_DATA_PROTECTION: 18
    • O.TEE_ID: 9
    • O.TEE_ISOLATION: 15
    • O.TRUSTED_STORAGE: 23
  • OE:
    • OE.INITALIZATION: 1
    • OE.INITIALIZATION: 24
    • OE.INSTANCE_TIME: 3
    • OE.INTEGRATION_CONFIGURATION: 9
    • OE.PROTECTION_AFTER_DELIVERY: 9
    • OE.ROLLBACK: 7
    • OE.SECRETS: 5
    • OE.SECURE_HARDWARE_PLATFORM: 1
    • OE.SECURE_PLATFORM: 20
    • OE.TA_DEVELOPMENT: 7
  • OP:
    • OP.EXTRACT_KEY: 4
    • OP.LOAD: 3
    • OP.STORE: 4
    • OP.USE_KEY: 4
  • OSP:
    • OSP.INTEGRATION_CONFIGURATION: 5
    • OSP.SECRETS: 5
  • T:
    • T.ABUSE_FUNCT: 14
    • T.CLONE: 9
    • T.FLASH_DUMP: 4
    • T.IMPERSONATION: 6
    • T.PERTURBATION: 7
    • T.RAM: 8
    • T.RNG: 5
    • T.ROGUE_CODE_EXECUTION: 12
    • T.SPY: 6
    • T.STORAGE_CORRUPTION: 9
    • T.TEE_FIRMWARE_DOWNGRADE: 5
  • A:
    • A.CAP_FILE: 3
    • A.DELETION: 3
    • A.OS-UPDATE-EVIDENCE: 3
    • A.SECURE_ACODE_MANAGEMENT: 3
    • A.VERIFICATION: 3
  • D:
    • D.AAS_ID: 1
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.APP_KEYS: 1
    • D.CRYPTO: 5
    • D.JCS_CODE: 6
    • D.JCS_DATA: 8
    • D.OS-: 1
    • D.OS-UPDATE-CODE-ID: 3
    • D.OS-UPDATE_ADDITIONALCODE: 5
    • D.OS-UPDATE_DEC-KEY: 2
    • D.OS-UPDATE_SGNVER-KEY: 2
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.AES: 1
    • O.ALARM: 15
    • O.APPLET: 28
    • O.ARRAY_VIEWS_CONFID: 7
    • O.ARRAY_VIEWS_INTEG: 3
    • O.CARD-MANAGEMENT: 5
    • O.CARD_MANAGEMENT: 18
    • O.CIPHER: 10
    • O.CODE_CAP_FILE: 23
    • O.CONFID-OS-UPDATE: 4
    • O.DELETION: 4
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 9
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.INSTALL: 8
    • O.JAVAOBJECT: 68
    • O.KEY-MNGT: 6
    • O.LOAD: 11
    • O.NATIVE: 12
    • O.OBJ-DELETION: 4
    • O.OBJ_DELETION: 4
    • O.OPERATE: 15
    • O.PIN-MNGT: 6
    • O.PIN_MNGT: 4
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.RND: 2
    • O.RNG: 11
    • O.SCP: 37
    • O.SECURE_AC_ACTIVATION: 10
    • O.SECURE_LOAD_ACODE: 14
    • O.SID: 13
    • O.TDES: 1
    • O.TOE_IDENTIFICATION: 7
    • O.TRANSACTION: 6
  • OE:
    • OE.CAP_FILE: 5
    • OE.CARD-: 1
    • OE.CARD-MANAGEMENT: 2
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 10
    • OE.NATIVE: 1
    • OE.OS-UPDATE-ENCRYPTION: 5
    • OE.OS-UPDATE-EVIDENCE: 2
    • OE.SCP: 8
    • OE.SECURE_ACODE_MANAGEMENT: 2
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_T_ALOAD: 3
    • OP.ARRAY_T_ASTORE: 3
    • OP.CREATE: 11
    • OP.DELETE_APPLET: 6
    • OP.DELETE_CAP_FILE: 4
    • OP.DELETE_CAP_FILE_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 7
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP: 1
    • OSP.ADDITIONAL_CODE_ENCRYPTION: 3
    • OSP.ADDITIONAL_CODE_SIGNING: 3
    • OSP.ATOMIC_ACTIVATION: 6
    • OSP.RNG: 3
    • OSP.TOE_IDENTIFICATION: 6
    • OSP.VERIFICATION: 3
  • OT:
    • OT.X: 1
  • R:
    • R.JAVA: 12
  • T:
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.CONFID-OS-UPDATE_LOAD: 3
    • T.CONFID_INTEG_SERVICE_DEPLOYEMENT: 3
    • T.DELETION: 3
    • T.EXE-CODE: 6
    • T.FAKE-SGNVER-KEY: 3
    • T.INSTALL: 3
    • T.INTEG-APPLI-CODE: 6
    • T.INTEG-APPLI-DATA: 6
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 3
    • T.INTEG-OS-UPDATE_LOAD: 3
    • T.NATIVE: 3
    • T.OBJ-DELETION: 3
    • T.PHYSICAL: 3
    • T.RESOURCES: 3
    • T.SID: 6
    • T.UNAUTHORIZED_TOE_CODE_UPDATE: 3
    • T.WRONG-UPDATE-STATE: 3
    • T.WRONG_SERVICE_DEPLOYEMENT_STATE: 3
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 3
  • Gemalto:
    • Gemalto: 2
  • Infineon:
    • Infineon: 14
  • Thales:
    • Thales: 47
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 2
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 2
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 29
      • AES-256: 2
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 1
      • TDES: 14
      • Triple-DES: 3
    • DES:
      • DES: 20
  • constructions:
    • MAC:
      • CMAC: 3
      • HMAC: 3
      • KMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 1
    • DSA:
      • DSA: 1
  • RSA:
    • RSA-2048: 1
  • ECC:
    • ECC:
      • ECC: 12
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 13
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA1: 4
    • SHA2:
      • SHA-256: 1
      • SHA224: 4
      • SHA256: 2
      • SHA384: 4
      • SHA512: 2
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
      • SHA2: 1
      • SHA224: 1
    • SHA3:
      • SHA3: 2
      • SHA3-384: 1
      • SHA3-512: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 6
  • KA:
    • Key Agreement: 6
    • Key agreement: 2
  • MAC:
    • MAC: 14
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 169
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 37
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 5
    • RNG: 44
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 9
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 4
  • GCM:
    • GCM: 2
  • XTS:
    • XTS: 3
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • side-channel: 3
    • side-channels: 1
  • FI:
    • Malfunction: 5
    • Physical Tampering: 3
    • fault induction: 2
    • malfunction: 8
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 6
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 1
    • TrustZone: 5
  • other:
    • TEE: 349
  • IBM:
    • SE: 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 6
    • EF.DG16: 6
    • EF.DG3: 1
    • EF.DG4: 1
    • EF.SOD: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 2
    • FIPS 197: 1
    • FIPS 46: 1
    • FIPS 81: 1
  • PKCS:
    • PKCS #3: 1
    • PKCS#1: 4
    • PKCS5: 1
  • RFC:
    • RFC 1321: 1
    • RFC 2202: 1
    • RFC 3610: 1
    • RFC 4231: 1
    • RFC 7748: 1
    • RFC 8032: 1
    • RFC1423: 1
  • BSI:
    • AIS20: 1
    • AIS31: 6
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 197: 1
    • FIPS180-2: 1
    • FIPS197: 5
  • ICAO:
    • ICAO: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 7
    • PKCS#5: 5
  • SCP:
    • SCP01: 4
    • SCP02: 4
    • SCP03: 9
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 8
pdf_data/st_keywords/javacard_api_const
  • curves:
    • ED25519: 1
    • X25519: 1
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes MultiApp V5.0.A JCS platform public Security Target ST: 1
    • Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start 8.1.1.1.2 Application: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 4
    • the scope because done before the JCVM entering (selection of the applet) Note: The Array View is out of scope of this modelisation ADV_SPM.1.2D For each policy covered by the formal security policy model, the: 1
pdf_data/st_metadata
  • /Author: brightsight
  • /CreationDate: D:20190906104654+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20190906104654+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1398540
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/convert_garbage False True
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different