name |
Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A |
Akis Gezgin_N SAC&EAC Configuration v1.0.1.0 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
TR |
status |
active |
archived |
not_valid_after |
07.06.2027 |
22.03.2024 |
not_valid_before |
07.06.2022 |
22.03.2021 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48_Certificado.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS_GEZGiN_N_SAC&EAC_cc.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20INF-3811.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS_GEZGiN_N_SAC&EAC_CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20ST_lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS%20GEZGiN_N%20SAC%20&%20EAC%20Security%20Target%20Lite.pdf |
manufacturer |
Winbond Electonics Corporation |
TÜBİTAK BİLGEM UEKAE |
manufacturer_web |
https://www.winbond.com/ |
https://www.uekae.tubitak.gov.tr |
security_level |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
51a1149f945dea23 |
6cb9f17e70d5dc02 |
heuristics/cert_id |
2019-48-INF-3811 |
21.0.03/TSE-CCCS-72 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, AVA_VAN.5, ATE_COV.2, ADV_FSP.5, ASE_TSS.1, AGD_OPE.1, ADV_IMP.1, ATE_DPT.3, ADV_TDS.4, ASE_REQ.2, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ASE_ECD.1, ALC_DEL.1, ASE_OBJ.2, ASE_INT.1, ADV_INT.2, ALC_TAT.2, ASE_SPD.1, ATE_FUN.1, ALC_CMS.5, ALC_CMC.4, ALC_LCD.1 |
ADV_ARC.1, AVA_VAN.5, ATE_COV.2, AGD_OPE.1, ATE_DPT.3, ADV_IMP.1, ASE_COMP.1, ASE_REQ.2, ASE_TSS.2, AVA_COMP.1, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ALC_LCD.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.3, ALC_DEL.1, ASE_OBJ.2, ALC_FLR.1, AGD_COMP.1, ATE_COMP.1, ADV_FSP.4, ALC_COMP.1, ASE_INT.1, ADV_INT.2, ALC_TAT.2, ASE_SPD.1, ATE_FUN.1, ALC_CMS.5, ALC_CMC.4, ADV_COMP.1 |
heuristics/extracted_versions |
- |
1.0.1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Smart Cards and similiar devices
- certification_date: 07.06.2022
- enhanced:
- category: Smart Cards and similiar devices
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1478
- certification_date: 07.06.2022
- description: The TOE is a memory flash IC designed to be embedded into highly critical hardware devices such as smart card, secure element, USB token, secure micro SD, etc. These devices will embed secure applications such as financial, telecommunication, identity (e-Government), etc. and will be working in a hostile environment. In particular, the TOE main function is the secure storage of the code and data of critical applications. The security needs for the TOE consist in: Maintaining the integrity of the content of the memories and the confidentiality of the content of protected memory areas as required by the critical HW products (e.g. Security IC) the Memory Flash is built for. Providing a secure communication with the Host device that will embed the TOE in a secure HW product such as Security IC.
- evaluation_facility: Applus Laboratories
- level: EAL5 + ALC_DVS.2 + AVA_VAN.5
- manufacturer: Winbond Electronics Corporation
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1479
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1477
- type: Product
- manufacturer: Winbond Electronics Corporation
- product: Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/826-winbond-spiflash-trustme-secure-flash-memory-w75f40wbyjeg-version-a
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
heuristics/protection_profiles |
{} |
a33327d40f253f46 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
pdf_data/cert_filename |
2019-48_Certificado.pdf |
AKiS_GEZGiN_N_SAC&EAC_cc.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 880365
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: Cem ERDİVAN
- /CreationDate: D:20210330120805+03'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20210330120805+03'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 152539
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
2019-48 INF-3811.pdf |
AKiS_GEZGiN_N_SAC&EAC_CR.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0035: 1
- BSI-PP-0056-V2-2012: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL5: 8
- ITSEC:
|
- EAL:
- EAL 4+: 1
- EAL 5: 1
- EAL 5+: 4
- EAL2: 1
- EAL5+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_COMP.1: 1
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COMP.1: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_COMP.1: 1
- AVA_VAN.5: 7
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_IFC.1: 1
- FDP_RIP.1: 1
- FDP_SDI.2: 1
- FDP_UIT.1: 1
- FMT:
- FPT:
- FPT_FLS: 2
- FPT_ITT.1: 1
- FPT_TRP.1: 1
- FRU:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 964023
- pdf_hyperlinks: http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
- /Author: TSE KSDB
- /CreationDate: D:20210330120917+03'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20210330120917+03'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 649800
- pdf_hyperlinks: http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
2019-48 ST_lite.pdf |
AKiS GEZGiN_N SAC & EAC Security Target Lite.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1136-V3-2022: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0084-2014: 2
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0056-V2-2012: 5
- BSI-CC-PP-0068-: 1
- BSI-CC-PP-0068-V2-2011: 2
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 6
- EAL5 augmented: 2
|
- EAL:
- EAL 5: 9
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 3
- EAL 6 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 3
- ADV_FSP.4: 1
- ADV_FSP.5: 8
- ADV_IMP.1: 9
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 5
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 5
- ADV_FSP.4: 1
- ADV_IMP.1: 8
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.2: 8
- ALC_FLR.1: 2
- ASE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 3
- FDP_ACF: 1
- FDP_IFC.1: 27
- FDP_IFC.1.1: 1
- FDP_IFF.1: 4
- FDP_ITT.1: 13
- FDP_ITT.1.1: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDC: 4
- FDP_SDC.1: 16
- FDP_SDC.1.1: 2
- FDP_SDI: 1
- FDP_SDI.2: 11
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 8
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FMT:
- FMT_LIM: 5
- FMT_LIM.1: 22
- FMT_LIM.1.1: 2
- FMT_LIM.2: 19
- FMT_LIM.2.1: 2
- FPT:
- FPT_FLS: 24
- FPT_FLS.1: 3
- FPT_ITT.1: 12
- FPT_ITT.1.1: 1
- FPT_PHP.3: 14
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT.2: 12
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 11
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 15
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 45
- FCS_CKM.1: 21
- FCS_CKM.2: 5
- FCS_CKM.4: 39
- FCS_CKM.4.1: 1
- FCS_COP: 87
- FCS_COP.1: 11
- FCS_RND: 6
- FCS_RND.1: 17
- FCS_RND.1.1: 1
- FCS_RNG: 3
- FDP:
- FDP_ACC: 26
- FDP_ACC.1: 11
- FDP_ACF: 26
- FDP_ACF.1: 23
- FDP_IFC.1: 5
- FDP_ITC: 1
- FDP_ITC.1: 16
- FDP_ITC.2: 16
- FDP_ITT.1: 1
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FDP_SDC.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 9
- FDP_UCT.1: 1
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 14
- FIA_AFL.1: 4
- FIA_API: 5
- FIA_API.1: 12
- FIA_API.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU: 65
- FIA_UAU.1: 6
- FIA_UAU.4: 1
- FIA_UAU.5: 2
- FIA_UAU.6: 2
- FIA_UID: 15
- FIA_UID.1: 6
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 23
- FMT_LIM.1.1: 2
- FMT_LIM.2: 22
- FMT_LIM.2.1: 2
- FMT_MSA: 2
- FMT_MSA.3: 6
- FMT_MTD: 90
- FMT_MTD.1: 13
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 46
- FMT_SMF.1.1: 1
- FMT_SMR: 23
- FMT_SMR.1: 24
- FPT:
- FPT_EMS: 3
- FPT_EMS.1: 19
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 16
- FPT_PHP.3.1: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 13
- FTP_ITC.1: 7
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 6
- NXP Semiconductors: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 14
- AES128: 1
- AES192: 1
- AES256: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 11
- Diffie-Hellman: 14
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 5
- SHA-384: 4
- SHA-512: 5
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- ANSSI:
- Brainpool:
- brainpoolP192r1: 1
- brainpoolP224r1: 4
- brainpoolP224t1: 3
- brainpoolP256r1: 5
- brainpoolP256t1: 3
- brainpoolP320r1: 4
- brainpoolP320t1: 3
- brainpoolP384r1: 5
- brainpoolP384t1: 3
- brainpoolP512r1: 5
- brainpoolP512t1: 3
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Fault Injection: 1
- Malfunction: 17
- fault injection: 2
- malfunction: 3
- physical tampering: 3
- SCA:
- Leak-Inherent: 17
- Physical Probing: 2
- physical probing: 5
|
- FI:
- DFA: 1
- Malfunction: 4
- Physical Tampering: 4
- fault injection: 1
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 5
- EF.CardAccess: 3
- EF.DG1: 15
- EF.DG11: 1
- EF.DG14: 17
- EF.DG16: 9
- EF.DG2: 2
- EF.DG3: 12
- EF.DG4: 13
- EF.DG5: 1
- EF.DG6: 1
- EF.DG7: 12
- EF.DG8: 12
- EF.DG9: 1
- EF.SOD: 6
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 197: 1
- FIPS PUB 197: 1
- ICAO:
- NIST:
- PKCS:
- PKCS #1: 1
- PKCS #15: 1
- PKCS #3: 1
- PKCS#1: 1
- PKCS#3: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- SHA-1. However, this algorithm is out of scope for the certification due to security considerations. The cryptographic functionality of the TOE: 2
- and the list of security mechanisms given in “ICAO Doc 9303” (please see [ 11 ]), this algorithm is out of scope for the certification as well. FCS_COP.1/SIG_GEN Cryptographic Operation - Signature generation: 1
- brainpoolP384r1, and brainpoolP512r1. In addition, RSA key lengths under 1976 bits are out of scope for the certification. FCS_CKM.1/CA Cryptographic Key Generation - Diffie-Hellman for Chip: 1
- considerations and BSI and SOGIS recommendations (please see [ 31 ] and [ 32 ]), this algorithm is out of scope for the certification as well. FCS_COP.1/CA_MAC Cryptographic Operation - MAC for CA protocol: 1
- out of scope: 9
- paper or the plastic card is achieved by physical and organizational security measures which are out of scope of this ST. The physical scope of the TOE is composed of the IC dedicated software, the IC embedded: 1
- please see [ 11 ]), this algorithm is out of scope for the certification as well: 1
- please see [ 31 ] and [ 32 ]), this algorithm is out of scope for the certification as well: 1
- the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. Application Note 6: The cryptographic functionality of the TOE includes hash: 1
- the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. Application Note 8: The cryptographic functionality of the TOE includes hash: 1
- the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. FCS_CKM.4 Cryptographic Key Destruction Hierarchical to: No other components: 1
|
pdf_data/st_metadata |
|
- /Author: Ali YILDIRIM
- /CreationDate: D:20240219152217+03'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20240219152217+03'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 2020528
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 128
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |