Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series
None
Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43
BSI-DSZ-CC-0329-2006
name RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43
category Boundary Protection Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme TR DE
not_valid_after 27.03.2017 01.09.2019
not_valid_before 15.03.2013 28.03.2006
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20CERTIFICATION%20REPORT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0329a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20ST-%20v0.9.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0329b.pdf
manufacturer RIOREY Incorporated Renesas
manufacturer_web https://www.riorey.com/ https://am.renesas.com/
security_level EAL4+, ALC_FLR.1 ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2
dgst 53265b9d283d6074 b059b04aeee5dc3e
heuristics/cert_id BSI-DSZ-CC-0329-2006
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1, AVA_MSU.3
heuristics/extracted_versions - 1.43
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0353-2006, BSI-DSZ-CC-0379-2006, BSI-DSZ-CC-0341-2006
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0350-2007, BSI-DSZ-CC-0341-2006, BSI-DSZ-CC-0386-2006, BSI-DSZ-CC-0353-2006, BSI-DSZ-CC-0434-2007, BSI-DSZ-CC-0490-2008, BSI-DSZ-CC-0379-2006, BSI-DSZ-CC-0529-2010, BSI-DSZ-CC-0489-2008
pdf_data/report_filename RioRey CERTIFICATION REPORT.pdf 0329a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0329-2006
    • cert_item: Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43
    • cert_lab: BSI
    • developer: Renesas Technology Corp
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0329-2006: 30
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4+: 5
    • EAL4: 1
    • EAL4+: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 3
    • EAL 4 augmented: 2
    • EAL 4+: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 12
    • EAL4 augmented: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 2
    • ACM_CAP: 2
    • ACM_CAP.4: 2
    • ACM_SCP: 2
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 2
    • ADO_IGS: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.2: 5
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 2
    • ALC_TAT: 2
    • ALC_TAT.1: 2
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
pdf_data/report_keywords/cc_sfr
  • FRU:
    • FRU_DDOS_EXT.1: 1
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP.1: 4
    • FCS_RND.1: 2
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
    • FDP_IFC.1: 2
    • FDP_ITT.1: 2
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 2
    • FPT_PHP.3: 1
    • FPT_SEP.1: 1
  • FRU:
    • FRU_FLT.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 4
      • Triple-DES: 3
    • DES:
      • DES: 15
pdf_data/report_keywords/hash_function
  • RIPEMD:
    • RIPEMD-160: 1
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 5
  • RNG:
    • RNG: 10
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • physical tampering: 1
  • SCA:
    • Physical probing: 1
    • physical probing: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • BSI:
    • AIS 20: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 1
    • AIS20: 1
    • AIS31: 1
    • AIS36: 1
  • FIPS:
    • FIPS PUB 180-1: 2
    • FIPS PUB 46-3: 3
  • ISO:
    • ISO/IEC 15408:1999: 1
    • ISO/IEC15408: 1999: 1
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 27 January 2006 (confidential document) [10] FIPS PUB 46-3 Federal Information Processing Standards Publication Data Encryption Standard: 1
    • HD65255C1) Version 02 with ACL version 1.43 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Protection Profile BSI-PP-0002-2001, Version v1.0, Smartcard IC platform Protection Profile: 1
    • HD65255C1) Version 02 with ACL version 1.43 Smartcard Security Target, Renesas Technology Corp. (confidential document)). The evaluators verified, that the threats and the security objectives for the life cycle phases: 1
    • Technical Report lite, Version 1.0, 22 March 2006, ETR-lite for composition according to AIS36 (confidential document) [17] Smartcard Integrated Circuit Platform Augmentations, v1.0, Atmel, Hitachi Europe, Infineon: 1
    • Technical Report, Version 1.0, March 22, 2006, Evaluation Technical Report BSI-DSC-CC-0329 (confidential document) [9] Renesas 32-bit Smart Card Microcomputer AE-5 Series User Guidance Manual, Rev. 4.40, Renesas: 1
pdf_data/report_metadata
  • /Author: Tse
  • /CreationDate: D:20130318153433-04'00'
  • /Creator: Microsof Word 2010
  • /ModDate: D:20130318153433-04'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 1
  • pdf_file_size_bytes: 511380
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /Author: BSI
  • /Category: Common Criteria Zertfikat
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /CreationDate: D:20060329121735+02'00'
  • /Creator: Acrobat PDFMaker 7.0.7 für Word
  • /Keywords: Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43; BSI-DSZ-CC-0329-2006, CC,
  • /ModDate: D:20060329121911+02'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20060329101620
  • /Title: Certification Report BSI-DSZ-CC-0329-2006
  • pdf_file_size_bytes: 341601
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
pdf_data/st_filename RioRey ST- v0.9.pdf 0329b.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0002: 4
    • BSI-PP-0002: 82
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4+: 6
  • EAL:
    • EAL4: 6
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 1
    • ACM_SCP: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 2
    • ADV_LLD: 1
    • ADV_RCR: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 4
  • AGD:
    • AGD_ADM: 3
    • AGD_USR: 3
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_LCD: 1
    • ALC_TAT: 1
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.3: 2
    • AVA_SOF: 7
    • AVA_VLA: 1
    • AVA_VLA.4: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 13
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 12
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAS.1: 9
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 32
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 3
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 52
    • FCS_COP.1.1: 5
    • FCS_RND: 1
    • FCS_RND.1: 16
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 27
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 30
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 3
    • FDP_ITC.1: 18
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 23
    • FDP_ITT.1.1: 1
    • FDP_SDI.1: 1
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 10
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 10
    • FMT_LIM.2.1: 1
    • FMT_MSA.1: 2
    • FMT_MSA.2: 22
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 9
    • FMT_SMR.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 31
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 21
    • FPT_ITT.1.1: 2
    • FPT_PHP.3: 12
    • FPT_PHP.3.1: 1
    • FPT_SEP.1: 12
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FRU:
    • FRU_FLT.1: 1
    • FRU_FLT.2: 15
pdf_data/st_keywords/cc_claims
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 6
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
  • O:
    • O.RND: 5
  • T:
    • T.RND: 5
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 18
      • Triple-DES: 3
    • DES:
      • DES: 51
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • RIPEMD:
    • RIPEMD-160: 11
  • SHA:
    • SHA1:
      • SHA-1: 19
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 13
  • RNG:
    • RND: 10
    • RNG: 21
  • TRNG:
    • TRNG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 3
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 2
    • Malfunction: 15
    • malfunction: 5
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 16
    • Physical Probing: 2
    • Physical probing: 1
    • physical probing: 4
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
    • AIS20: 4
    • AIS31: 6
  • FIPS:
    • FIPS PUB 180-1: 3
    • FIPS PUB 46-3: 4
  • ISO:
    • ISO/IEC 10118-: 1
    • ISO/IEC 9796-2: 5
    • ISO/IEC7816-3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
pdf_data/st_metadata
  • /CreationDate: D:20130328162641+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130328162641+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1068348
  • pdf_hyperlinks: https://tools.ietf.org/html/rfc6151
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
  • /CreationDate: D:20060202164233+09'00'
  • /Creator: クセロPDF v1.12 Rev0480
  • /ModDate: D:20060202164431-08'00'
  • /Producer: Xelo PDF Library
  • pdf_file_size_bytes: 1096866
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 74
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different