name |
Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A |
TCOS FlexCert Version 2.0 Release 2/SLC52 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
DE |
status |
active |
active |
not_valid_after |
07.06.2027 |
24.06.2026 |
not_valid_before |
07.06.2022 |
24.06.2021 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48_Certificado.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0904V2c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20INF-3811.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0904V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20ST_lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0904V2b_pdf.pdf |
manufacturer |
Winbond Electonics Corporation |
Deutsche Telekom Security GmbH |
manufacturer_web |
https://www.winbond.com/ |
https://www.telekom.de/security |
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
ATE_DPT.2, AVA_VAN.5, ALC_DVS.2, EAL4+ |
dgst |
51a1149f945dea23 |
8bed4c0262f0c75c |
heuristics/cert_id |
2019-48-INF-3811 |
BSI-DSZ-CC-0904-V2-2021 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_LCD.1, ASE_CCL.1, AGD_OPE.1, ASE_SPD.1, ASE_OBJ.2, ATE_DPT.3, ATE_COV.2, ALC_CMS.5, ADV_ARC.1, ATE_FUN.1, ADV_IMP.1, ALC_DVS.2, ALC_TAT.2, ASE_INT.1, AVA_VAN.5, ASE_TSS.1, ADV_TDS.4, ALC_CMC.4, ADV_INT.2, ASE_REQ.2, ALC_DEL.1, ADV_FSP.5, AGD_PRE.1, ASE_ECD.1 |
ATE_FUN.1, ALC_CMC.4, ALC_TAT.1, ALC_LCD.1, ADV_FSP.4, ATE_COV.2, ALC_DEL.1, ADV_IMP.1, ALC_DVS.2, AGD_PRE.1, ALC_CMS.4, AVA_VAN.5, AGD_OPE.1, ADV_FUN.1, ATE_DPT.2, ADV_TDS.3, ADV_ARC.1 |
heuristics/extracted_versions |
- |
2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0904-2015, BSI-DSZ-CC-1079-V2-2020 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0904-2015, BSI-DSZ-CC-1079-V2-2020, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
heuristics/scheme_data |
- category: Smart Cards and similiar devices
- certification_date: 07.06.2022
- enhanced:
- category: Smart Cards and similiar devices
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1478
- certification_date: 07.06.2022
- description: The TOE is a memory flash IC designed to be embedded into highly critical hardware devices such as smart card, secure element, USB token, secure micro SD, etc. These devices will embed secure applications such as financial, telecommunication, identity (e-Government), etc. and will be working in a hostile environment. In particular, the TOE main function is the secure storage of the code and data of critical applications. The security needs for the TOE consist in: Maintaining the integrity of the content of the memories and the confidentiality of the content of protected memory areas as required by the critical HW products (e.g. Security IC) the Memory Flash is built for. Providing a secure communication with the Host device that will embed the TOE in a secure HW product such as Security IC.
- evaluation_facility: Applus Laboratories
- level: EAL5 + ALC_DVS.2 + AVA_VAN.5
- manufacturer: Winbond Electronics Corporation
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1479
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1477
- type: Product
- manufacturer: Winbond Electronics Corporation
- product: Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/826-winbond-spiflash-trustme-secure-flash-memory-w75f40wbyjeg-version-a
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1067-V5-2024, BSI-DSZ-CC-1067-V4-2023, BSI-DSZ-CC-1068-V3-2022, BSI-DSZ-CC-1067-V3-2022, BSI-DSZ-CC-1068-V4-2023, BSI-DSZ-CC-1068-V5-2024 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1079-V2-2020 |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1067-V5-2024, BSI-DSZ-CC-1067-V4-2023, BSI-DSZ-CC-1068-V3-2022, BSI-DSZ-CC-1067-V3-2022, BSI-DSZ-CC-1068-V4-2023, BSI-DSZ-CC-1068-V5-2024 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1079-V2-2020 |
heuristics/protection_profiles |
{} |
af9c3335f79dec6f |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0082V4b_pdf.pdf |
pdf_data/cert_filename |
2019-48_Certificado.pdf |
0904V2c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0904-V2-2021: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 880365
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210701140233+02'00'
- /Creator: Writer
- /ModDate: D:20210701140348+02'00'
- /Producer: LibreOffice 6.3
- /Subject: TCOS FlexCert Version 2.0 Release 2/SLC52 from Deutsche Telekom Security GmbH
- /Title: Certification Report BSI-DSZ-CC-0904-V2-2021
- pdf_file_size_bytes: 241525
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
2019-48 INF-3811.pdf |
0904V2a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0904-V2-2021
- cert_item: TCOS FlexCert Version 2.0 Release 2/SLC52
- cert_lab: BSI
- developer: Deutsche Telekom Security GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Card Operating System Generation 2 (PP COS G2), Version 2.1, 10 July 2019, BSI-CC-PP-0082-V4- 2019
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0904-2015: 3
- BSI-DSZ-CC-0904-2015-MA-01: 2
- BSI-DSZ-CC-0904-V2-2021: 26
- BSI-DSZ-CC-1079-: 1
- BSI-DSZ-CC-1079-V2-: 2
- BSI-DSZ-CC-1079-V2-2020: 4
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0082-V4-: 1
- BSI-CC-PP-0082-V4-2019: 3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL5: 8
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
- EAL6: 3
- EAL6 augmented: 2
- EAL6+: 2
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_IFC.1: 1
- FDP_RIP.1: 1
- FDP_SDI.2: 1
- FDP_UIT.1: 1
- FMT:
- FPT:
- FPT_FLS: 2
- FPT_ITT.1: 1
- FPT_TRP.1: 1
- FRU:
|
- FCS:
- FCS_CKM: 4
- FCS_COP: 28
- FCS_RNG: 6
- FCS_RNG.1: 1
- FIA:
- FPT:
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 9
- Infineon Technologies AG: 6
|
pdf_data/report_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 20
- SRC:
- SRC Security Research & Consulting: 3
- TSystems:
- T-Systems International: 2
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 3
- SCA:
- DPA: 1
- SPA: 1
- side channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-03116-1: 1
- BSI TR-03143: 4
- BSI TR-03144: 9
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 4
- AIS 23: 1
- AIS 25: 4
- AIS 26: 4
- AIS 31: 6
- AIS 32: 1
- AIS 34: 4
- AIS 35: 1
- AIS 36: 5
- AIS 37: 2
- AIS 38: 1
- AIS 46: 2
- AIS20: 2
- AIS31: 2
- FIPS:
- FIPS 180-4: 7
- FIPS 197: 13
- FIPS PUB 180-4: 1
- FIPS PUB 197: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18031:2005: 1
- ISO/IEC 18045: 4
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 2/SLC52, Version 0.92, 26 May 2021, Deutsche Telekom Security GmbH (confidential document) [10] TCOS FlexCert Version 2.0 Release 2, Administrator’s Guidance, Guidance Documentation of TCOS: 1
- Certification Report DSZ-CC-1079-V2-2020, Version 2, 15 May 2020, TÜV Informationstechnik GmbH (confidential document) [18] Einführung der Gesundheitskarte, Spezifikation des Card Operating System (COS), Elektrische: 1
- G12, Revision 1.3, 3 April 2020, Infineon Technologies AG, BSI-DSZ-CC-1079-V2- 2020 (confidential document) Security Target Lite of the underlying hardware platform, Public Security Target Common Criteria: 1
- RNG] Zufallszahlengenerierung in TCOS, Version 0.7, 3 November 2020, T-Systems International GmbH (confidential document) [AIS 20] see chapter 14, [4] of this report [AIS 31] see chapter 14, [4] of this report Note: End: 1
- Version 2.0 Release 2/SLC52, Version 1.1, 2 June 2021, SRC Security Research & Consulting GmbH (confidential document) [9] Configuration List BSI-DSZ-CC-0904-V2-2021, Konfigurationsliste von TCOS FlexCert Version 2.0: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 964023
- pdf_hyperlinks: http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210701134203+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, G2 COS, eHealth"
- /ModDate: D:20210701140047+02'00'
- /Producer: LibreOffice 6.3
- /Subject: TCOS FlexCert Version 2.0 Release 2/SLC52 from Deutsche Telekom Security GmbH
- /Title: Certification Report BSI-DSZ-CC-0904-V2-2021
- pdf_file_size_bytes: 944995
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/, https://www.sogis.eu/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
pdf_data/st_filename |
2019-48 ST_lite.pdf |
0904V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1079-V2-2020: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 1
- BSI-CC-PP- 0082-V4: 1
- BSI-CC-PP-0082-V4-2019: 2
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0084-2014: 21
- BSI-CC-PP0082: 4
- BSI-CC-PP0084: 2
- BSI-PP-0082: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 6
- EAL5 augmented: 2
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
- EAL 5 augmented: 1
- EAL 6: 1
- EAL4: 10
- EAL4 augmented: 2
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 3
- ADV_FSP.4: 1
- ADV_FSP.5: 8
- ADV_IMP.1: 9
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 5
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 4
- ADV_FSP: 1
- ADV_FSP.4: 2
- ADV_FUN.1: 1
- ADV_IMP.1: 2
- ADV_TDS.3: 3
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 5
- ATE_FUN: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 3
- FDP_ACF: 1
- FDP_IFC.1: 27
- FDP_IFC.1.1: 1
- FDP_IFF.1: 4
- FDP_ITT.1: 13
- FDP_ITT.1.1: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDC: 4
- FDP_SDC.1: 16
- FDP_SDC.1.1: 2
- FDP_SDI: 1
- FDP_SDI.2: 11
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 8
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FMT:
- FMT_LIM: 5
- FMT_LIM.1: 22
- FMT_LIM.1.1: 2
- FMT_LIM.2: 19
- FMT_LIM.2.1: 2
- FPT:
- FPT_FLS: 24
- FPT_FLS.1: 3
- FPT_ITT.1: 12
- FPT_ITT.1.1: 1
- FPT_PHP.3: 14
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT.2: 12
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 11
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_SAS: 10
- FAU_SAS.1: 7
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 42
- FCS_CKM.1: 23
- FCS_CKM.2: 4
- FCS_CKM.4: 28
- FCS_CKM.4.1: 2
- FCS_COP: 141
- FCS_COP.1: 20
- FCS_RNG: 36
- FCS_RNG.1: 28
- FCS_RNG.1.1: 4
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 64
- FDP_ACC.1: 39
- FDP_ACF: 77
- FDP_ACF.1: 38
- FDP_IFC: 5
- FDP_IFC.1: 10
- FDP_IFF.1: 1
- FDP_ITC.1: 19
- FDP_ITC.2: 17
- FDP_ITT: 5
- FDP_ITT.1: 3
- FDP_RIP: 6
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FDP_SDC: 10
- FDP_SDC.1: 5
- FDP_SDC.1.1: 1
- FDP_SDI: 9
- FDP_SDI.1: 2
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 6
- FDP_UCT.1: 1
- FDP_UIT: 6
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 19
- FIA_AFL.1: 4
- FIA_API: 11
- FIA_API.1: 17
- FIA_API.1.1: 2
- FIA_ATD: 5
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU: 37
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 12
- FIA_UAU.4.1: 1
- FIA_UAU.5: 15
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UID: 7
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 28
- FIA_USB.1: 29
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 2
- FMT:
- FMT_LIM: 17
- FMT_LIM.1: 17
- FMT_LIM.1.1: 1
- FMT_LIM.2: 16
- FMT_LIM.2.1: 1
- FMT_MSA: 52
- FMT_MSA.1: 7
- FMT_MSA.3: 25
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 27
- FMT_MTD.1: 4
- FMT_SMF: 1
- FMT_SMF.1: 34
- FMT_SMF.1.1: 1
- FMT_SMR: 6
- FMT_SMR.1: 22
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 10
- FPT_EMS.1: 16
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 7
- FPT_FLS.1: 16
- FPT_FLS.1.1: 2
- FPT_ITE: 14
- FPT_ITE.1: 12
- FPT_ITE.1.1: 2
- FPT_ITE.1.2: 2
- FPT_ITE.2: 12
- FPT_ITE.2.1: 6
- FPT_ITE.2.2: 2
- FPT_ITT: 5
- FPT_ITT.1: 2
- FPT_PHP: 5
- FPT_PHP.3: 7
- FPT_TDC: 1
- FPT_TDC.1: 5
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 3
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 12
- FTP_ITC.1: 6
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.AES: 1
- O.PACE_CHIP: 9
- O.RND: 3
- T:
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 2
- NXP:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
- DeutscheTelekom:
- Deutsche Telekom Security: 137
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 49
- AES-192: 1
- AES-256: 1
- AES128: 2
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-256: 12
- SHA-384: 7
- SHA-512: 5
- SHA512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 3
- brainpoolP384r1: 3
- brainpoolP512r1: 2
- NIST:
- NIST P-256: 1
- P-256: 3
- P-384: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Fault Injection: 1
- Malfunction: 17
- fault injection: 2
- malfunction: 3
- physical tampering: 3
- SCA:
- Leak-Inherent: 17
- Physical Probing: 2
- physical probing: 5
|
- FI:
- DFA: 1
- Malfunction: 7
- malfunction: 6
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 8
- Physical Probing: 2
- Physical probing: 1
- SPA: 1
- physical probing: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- AIS 31: 1
- AIS 36: 1
- AIS31: 5
- AIS36: 4
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 4
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS180: 2
- FIPS186: 5
- FIPS197: 8
- ICAO:
- ISO:
- ISO/IEC 18033-3: 3
- ISO/IEC 9797-1: 2
- NIST:
- NIST SP 800-38B: 1
- SP 800-38A: 3
- PKCS:
- RFC:
- RFC 3447: 1
- RFC 5639: 1
- RFC3447: 7
- RFC5639: 8
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |