Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series
None
Plateforme jTOP INFv#46 masquée sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM avec fonctionnalités MRTD
ANSSI-CC-2013/42
name RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series Plateforme jTOP INFv#46 masquée sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM avec fonctionnalités MRTD
category Boundary Protection Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme TR FR
not_valid_after 27.03.2017 01.09.2019
not_valid_before 15.03.2013 27.06.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20CERTIFICATION%20REPORT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-42fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20ST-%20v0.9.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-42en.pdf
manufacturer RIOREY Incorporated Trusted Logic / Infineon
manufacturer_web https://www.riorey.com/ https://www.trusted-logic.com/
security_level EAL4+, ALC_FLR.1 EAL5+, ALC_DVS.2, AVA_VAN.5
dgst 53265b9d283d6074 ac1e7ac251e9255c
heuristics/cert_id ANSSI-CC-2013/42
heuristics/cert_lab [] SERMA
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ALC_DVS.2, AVA_VAN.5
heuristics/extracted_versions - 46
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2015/25, BSI-DSZ-CC-0898-2014
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0829-2012
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2015/25, BSI-DSZ-CC-0898-2014
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0829-2012
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0898-2014
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0898-2014
heuristics/protection_profiles {} 9399bd94f9925b16
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf
pdf_data/report_filename RioRey CERTIFICATION REPORT.pdf ANSSI-CC_2013-42fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 3
    • cert_id: ANSSI-CC-2013/42
    • cert_item: Plateforme jTOP INFv#46 masquée sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM avec fonctionnalités MRTD
    • cert_item_version: Version 46.03
    • cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, FRANCE
    • developer: Trusted Logic SAS 6, rue de la Verrerie, 92197 Meudon, FRANCE Infineon Technologies AG AIM CC SM PS - Am Campeon 1-12 - 85579 Neubiberg, GERMANY Commanditaire Trusted Logic SAS 6, rue de la Verrerie, 92197 Meudon, FRANCE
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: JCSPP], version 3.0 Java CardTM System Open Configuration Protection Profile
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0829-2012: 3
  • FR:
    • ANSSI-CC-2013/42: 19
    • Rapport de certification 2013/42: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4+: 5
    • EAL4: 1
    • EAL4+: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sfr
  • FRU:
    • FRU_DDOS_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 23
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
  • TrustedLabs:
    • Trusted Labs: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_metadata
  • /Author: Tse
  • /CreationDate: D:20130318153433-04'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130318153433-04'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 1
  • pdf_file_size_bytes: 511380
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /CreationDate: D:20130731165216+02'00'
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate: D:20130801102813+02'00'
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 231283
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename RioRey ST- v0.9.pdf ANSSI-CC-cible_2013-42en.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0017: 1
    • BSI-PP-0035: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4+: 6
  • EAL:
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 13
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 12
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
  • FAU:
    • FAU_ARP: 3
    • FAU_ARP.1: 3
    • FAU_SAS: 1
  • FCO:
    • FCO_NRO: 7
    • FCO_NRO.2: 8
    • FCO_NRR: 2
    • FCO_NRR.1: 3
  • FCS:
    • FCS_CKM: 19
    • FCS_CKM.1: 3
    • FCS_CKM.2: 2
    • FCS_CKM.3: 1
    • FCS_CKM.4: 2
    • FCS_COP: 30
    • FCS_COP.1: 5
    • FCS_RND: 4
    • FCS_RND.1: 5
    • FCS_RND.1.1: 1
    • FCS_RNG: 1
    • FCS_TST.1: 1
  • FDP:
    • FDP_ACC: 12
    • FDP_ACC.1: 3
    • FDP_ACC.2: 5
    • FDP_ACF: 13
    • FDP_ACF.1: 23
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_IFC: 6
    • FDP_IFC.1: 1
    • FDP_IFC.2: 2
    • FDP_IFF: 5
    • FDP_IFF.1: 16
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.4: 1
    • FDP_ITC: 5
    • FDP_ITC.1: 3
    • FDP_ITC.2: 9
    • FDP_ITT: 1
    • FDP_RIP: 23
    • FDP_RIP.1: 9
    • FDP_ROL: 6
    • FDP_ROL.1: 7
    • FDP_SDI: 2
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT: 2
    • FDP_UCT.1: 1
    • FDP_UIT: 6
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 9
    • FIA_AFL.1: 8
    • FIA_ATD: 2
    • FIA_ATD.1: 1
    • FIA_UAU: 14
    • FIA_UAU.1: 4
    • FIA_UAU.4: 2
    • FIA_UAU.5: 2
    • FIA_UAU.6: 1
    • FIA_UID: 9
    • FIA_UID.1: 4
    • FIA_UID.2: 1
    • FIA_USB: 2
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 9
    • FMT_LIM.1: 9
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 8
    • FMT_LIM.2.1: 2
    • FMT_MSA: 40
    • FMT_MSA.1: 10
    • FMT_MSA.2: 3
    • FMT_MSA.3: 14
    • FMT_MTD: 9
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_SMF: 11
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR: 15
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 4
    • FPR_UNO.1: 2
  • FPT:
    • FPT_FLS: 14
    • FPT_FLS.1: 5
    • FPT_ITT: 1
    • FPT_PHP: 1
    • FPT_RCV: 10
    • FPT_RCV.3: 18
    • FPT_RCV.4: 1
    • FPT_TDC: 2
    • FPT_TDC.1: 4
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 4
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT: 1
    • FRU_RSA: 2
    • FRU_RSA.1: 1
  • FTP:
    • FTP_ITC: 7
    • FTP_ITC.1: 7
pdf_data/st_keywords/cc_claims
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 6
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
  • A:
    • A.APPLET: 2
    • A.CARD-MANAGEMENT: 1
    • A.DELETION: 1
    • A.NATIVE: 3
    • A.VERIFICATION: 2
  • D:
    • D.API_DATA: 4
    • D.APP-CODE: 3
    • D.APP-INST: 2
    • D.APP_CODE: 5
    • D.APP_C_DATA: 4
    • D.APP_I_DATA: 6
    • D.COMMAND: 2
    • D.CRYPTO: 5
    • D.CVM: 2
    • D.GP-REGISTRY: 2
    • D.JCS_CODE: 5
    • D.JCS_DATA: 6
    • D.PIN: 5
    • D.SD-PERSO: 2
    • D.SD-SESSION-KEYS: 2
    • D.SEC_DATA: 8
    • D.SOFTWARE: 2
  • O:
    • O.ALARM: 2
    • O.APPLET: 16
    • O.CARD-: 1
    • O.CARD-MANAGEMENT: 2
    • O.CIPHER: 3
    • O.CODE_PKG: 14
    • O.CVM-BLOCK: 2
    • O.DELETION: 2
    • O.ERROR-COUNTERS: 2
    • O.FIREWALL: 2
    • O.GLOBAL-CVM: 2
    • O.GLOBAL_ARRAYS_CONFID: 2
    • O.GLOBAL_ARRAYS_INTEG: 2
    • O.INFO-CONFIDENTIALITY: 2
    • O.INFO-INTEGRITY: 3
    • O.INFO-ORIGIN: 2
    • O.INSTALL: 4
    • O.JAVAOBJECT: 41
    • O.KEY-MNGT: 3
    • O.LIFE-CYCLE: 2
    • O.LOAD: 4
    • O.LOCK: 2
    • O.NATIVE: 2
    • O.NO-KEY-REUSE: 2
    • O.OBJ-DELETION: 2
    • O.OPERATE: 2
    • O.OS-SUPPORT: 2
    • O.PIN-MNGT: 3
    • O.REALLOCATION: 2
    • O.RECEIPT: 2
    • O.RECOVERY: 2
    • O.REQUEST: 2
    • O.RESOURCES: 2
    • O.RND: 1
    • O.SID: 2
    • O.TRANSACTION: 3
    • O.VERIFICATION: 3
  • OE:
    • OE.APPLET: 2
    • OE.BAC_PP: 2
    • OE.CARD-MANAGEMENT: 2
    • OE.CODE-EVIDENCE: 2
    • OE.KEY-LENGTH: 2
    • OE.MRTD_: 1
    • OE.NATIVE: 2
    • OE.NO-RMI-APPLETS: 2
    • OE.SCP: 6
    • OE.SECRETS: 2
    • OE.VERIFICATION: 5
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 2
    • OP.DELETE_PKG_APPLET: 1
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.PUT: 6
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.BAC-PP: 2
    • OSP.FILE-ORIGIN: 2
    • OSP.KEY-LENGTH: 2
    • OSP.NO-RMI-APPLETS: 2
    • OSP.PERSONALIZATION: 2
    • OSP.PROCESS-TOE: 1
    • OSP.SECRETS: 3
    • OSP.VERIFICATION: 2
  • R:
    • R.JAVA: 10
  • T:
    • T.BRUTE-FORCE: 2
    • T.CONFID-APPLI-DATA: 2
    • T.CONFID-JCS-CODE: 2
    • T.CONFID-JCS-DATA: 2
    • T.CRYPTO: 2
    • T.DELETION: 4
    • T.EXE-CODE: 4
    • T.FORCED-RESET: 2
    • T.IMPERSONATE: 2
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 4
    • T.INTEG-APPLI-DATA: 4
    • T.INTEG-JCS-CODE: 2
    • T.INTEG-JCS-DATA: 2
    • T.INVALID-INPUT: 2
    • T.INVALID-ORDER: 2
    • T.LIFE-CYCLE: 2
    • T.MALFUNCTION: 1
    • T.MEM_ACCESS: 1
    • T.NATIVE: 2
    • T.OBJ-DELETION: 2
    • T.PHYSICAL: 2
    • T.PHYS_MANIPULATION: 1
    • T.PHYS_PROBING: 1
    • T.RECEIPT: 2
    • T.REPLAY: 2
    • T.RESOURCES: 2
    • T.RND: 1
    • T.SID: 4
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 2
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 25
      • AES128: 6
  • DES:
    • 3DES:
      • TDES: 1
      • Triple-DES: 3
    • DES:
      • DES: 35
  • constructions:
    • MAC:
      • CMAC: 2
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 7
    • ECDSA:
      • ECDSA: 11
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 9
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 1536: 1
    • RSA-CRT: 3
    • RSA1024: 2
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-2: 1
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 16
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • PACE:
    • PACE: 105
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 7
  • CCM:
    • CCM: 1
  • ECB:
    • ECB: 4
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 2
    • Malfunction: 3
    • Physical Tampering: 1
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 7
    • physical tampering: 2
  • SCA:
    • DPA: 4
    • Leak-Inherent: 1
    • SPA: 2
    • physical probing: 3
  • other:
    • reverse engineering: 2
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 2
    • EF.DG1: 2
    • EF.DG14: 1
    • EF.DG16: 2
    • EF.DG2: 2
    • EF.DG3: 2
    • EF.DG4: 2
    • EF.DG5: 2
    • EF.SOD: 2
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
  • BSI:
    • AIS34: 4
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS 180-2: 2
    • FIPS 197: 2
    • FIPS 46-2: 1
    • FIPS 46-3: 2
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 6
    • FIPS PUB 81: 1
  • ICAO:
    • ICAO: 14
  • ISO:
    • ISO/IEC 15408:2005: 3
    • ISO/IEC 15946-: 2
    • ISO/IEC 15946-3: 3
  • NIST:
    • NIST SP 800-38B: 6
  • PKCS:
    • PKCS#1: 5
    • PKCS#3: 3
  • SCP:
    • SCP02: 8
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.2.1: 1
  • JavaCard:
    • Java Card 3.0.4: 4
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 3
    • javacard.internalservices: 1
    • javacard.lds.filesystem: 1
    • javacard.pace: 1
    • javacard.security: 5
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
pdf_data/st_metadata
  • /CreationDate: D:20130328162641+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130328162641+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1068348
  • pdf_hyperlinks: https://tools.ietf.org/html/rfc6151
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
  • /CreationDate: D:20130519162311+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20130801102846+02'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title:
  • pdf_file_size_bytes: 3935958
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 162
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different