name |
Philips Smart Card Controller P8WE5033V0G |
Sm@rtSIM CX Hercules M4M |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
UK |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
31.03.2022 |
not_valid_before |
01.08.2002 |
31.03.2017 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0199a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP%20299.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0199b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ASE_ST_Lite_SkySIM_CX_Hercules_M4M.PDF |
manufacturer |
Philips Semiconductors GmbH Business Unit Identification |
G+D Mobile Security GmbH |
manufacturer_web |
https://www.philips.com/ |
https://www.gi-de.com/de/de/mobile-security/ |
security_level |
AVA_MSU.3, EAL5+, AVA_VLA.4, ALC_DVS.2 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
5a66c79e949f46b7 |
10c11cee79adf14f |
heuristics/cert_id |
BSI-DSZ-CC-0199-2002 |
CRP299 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_CCA.1, ADV_IMP.2, ATE_IND.2, ALC_LCD.2, ALC_DVS.2, ADV_HLD.3, ASE_ENV.1, ASE_INT.1, AVA_VLA.4, AVA_SOF.1, ADV_INT.1, AGD_ADM.1, ATE_FUN.1, ASE_DES.1, ASE_OBJ.1, ATE_COV.2, ADV_RCR.2, ADV_SPM.3, ASE_TSS.1, AGD_USR.1, ASE_PPC.1, AVA_MSU.3, ATE_DPT.2, ALC_TAT.2, ADV_FSP.3, ASE_SRE.1, ADV_LLD.1, ASE_REQ.1 |
ALC_DVS.2, AVA_VAN.5 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2015/61 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2015/61 |
heuristics/protection_profiles |
{} |
9399bd94f9925b16, 7b81fd67c02d34de |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-04en.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0199a.pdf |
CRP 299.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0199-2002
- cert_item: Philips Smart Card Controller P8WE5033V0G
- cert_lab: BSI
- developer: Philips Semiconductors GmbH Business Unit Identification
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0177: 1
- BSI-DSZ-CC-0199: 2
- BSI-DSZ-CC-0199-2002: 21
|
- FR:
- ANSSI-CC-2014/46-M01: 1
- ANSSI-CC-PP-2010/03: 1
- UK:
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0002-2001: 2
- BSI-PP-0002-: 1
- BSI-PP-0002-2001: 7
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL5: 9
- EAL5 augmented: 2
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL1: 1
- EAL2: 1
- EAL4: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL7: 1
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 2
- ACM_CAP: 2
- ACM_CAP.4: 2
- ACM_SCP: 2
- ACM_SCP.3: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 2
- ADV_FSP.3: 1
- ADV_HLD: 2
- ADV_HLD.3: 1
- ADV_IMP: 2
- ADV_IMP.2: 1
- ADV_INT: 2
- ADV_INT.1: 1
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.2: 1
- ADV_SPM: 2
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 4
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 2
- ALC_TAT: 2
- ALC_TAT.2: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.2: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.3: 3
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 4
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_COP.1: 2
- FCS_RND.1: 1
- FDP:
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_SEP.1: 1
- FRU:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 1
- Giesecke & Devrient: 15
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- SCA:
- DPA: 3
- Timing Attacks: 1
- physical probing: 1
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 36: 4
- FIPS:
- FIPS PUB 46: 1
- FIPS PUB 46-3: 3
- ISO:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
- SCP:
- SCP02: 1
- SCP03: 1
- SCP80: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 2002, Evaluation of Philips P8WE5033V0G Secure 8-bit Smart Card Controller, Philips Semiconductors (confidential document) BSI-DSZ-CC-0199-2002 Certification Report C-1 C Excerpts from the Criteria CC Part 1: Caveats on: 1
- 2002, Evaluation of Philips P8WE5033V0G Secure 8-bit Smart Card Controller, Philips Semiconductors (confidential document) [6] Security Target Lite BSI-DSZ-CC-0199, Version 1.6, August 19th , 2002, Evaluation of Philips: 1
- Manual of Philips P8WE5033V0G Secure 8-bit Smart Card Controller, Version 1.3, 25. April 2002 (confidential document) [11] Data Sheet, P8WE5033 Secure 8-bit Smart Card Controller, Product Specification, Philips: 1
- Revision 3.2, July 05th 2002, Doc. No.: 047632 (confidential document) [12] Data Encryption Standard (DES), FIPS PUB 46, US NBS, 1977, Washington [13] FIPS PUB 46-3: 1
- Technical Report, Philips P8WE5033V0G Secure 8 bit Smart Card Controller, Version 1.2, 20.08.2002 (confidential document) [8] ETR-lite for Composition, according AIS 36, Version 1.3, 20.08.2002 (confidential document) [9: 1
|
|
pdf_data/report_metadata |
- /CreationDate: D:20020829161948
- /ModDate: D:20020829161948+02'00'
- /Producer: Acrobat Distiller 4.0 for Windows
- pdf_file_size_bytes: 339038
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 40
|
|
pdf_data/st_filename |
0199b.pdf |
ASE_ST_Lite_SkySIM_CX_Hercules_M4M.PDF |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2015/61: 1
- ANSSI-CC-PP-2010/03: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5: 4
- EAL 5 augmented: 2
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
- EAL5: 34
- EAL5 augmented: 1
- EAL5+: 1
|
- EAL:
- EAL 4: 2
- EAL 5: 2
- EAL4: 2
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 2
- ACM_SCP: 2
- ACM_SCP.2: 4
- ACM_SCP.3: 5
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 2
- ADO_IGS: 1
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 3
- ADV_FSP.2: 4
- ADV_FSP.3: 6
- ADV_HLD: 1
- ADV_HLD.3: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 4
- ADV_RCR.2: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 2
- AGD_USR: 1
- AGD_USR.1: 2
- ALC:
- ALC_DVS.2: 2
- ALC_LCD.2: 1
- ALC_TAT.2: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.3: 1
- AVA_SOF: 1
- AVA_SOF.1: 2
- AVA_VLA: 1
- AVA_VLA.4: 3
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.2: 1
- FCS_CKM.4: 4
- FCS_COP.1: 17
- FCS_COP.1.1: 3
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 3
- FDP_IFF.1: 1
- FDP_ITC.1: 4
- FDP_ITT.1: 2
- FIA:
- FMT:
- FMT_LIM.1: 2
- FMT_LIM.2: 2
- FMT_MSA.1: 1
- FMT_MSA.2: 4
- FMT_MSA.3: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 3
- FPT_ITT.1: 2
- FPT_PHP.3: 2
- FPT_SEP.1: 2
- FRU:
|
- FAU:
- FAU_ARP.1: 12
- FAU_ARP.1.1: 2
- FCO:
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.2.1: 2
- FCS_CKM.3: 5
- FCS_CKM.3.1: 2
- FCS_CKM.4: 3
- FCS_CKM.4.1: 2
- FCS_COP: 5
- FCS_COP.1: 11
- FCS_COP.1.1: 4
- FCS_PHP.3: 1
- FCS_RNG: 4
- FCS_RNG.1: 16
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 8
- FDP_ACC.1: 3
- FDP_ACC.2: 9
- FDP_ACF: 8
- FDP_ACF.1: 28
- FDP_IFC: 13
- FDP_IFC.1: 2
- FDP_IFC.2: 6
- FDP_IFF: 13
- FDP_IFF.1: 28
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 14
- FDP_ITC.1: 1
- FDP_ITC.2: 15
- FDP_MSA.3: 1
- FDP_RIP: 16
- FDP_RIP.1: 18
- FDP_ROL: 10
- FDP_ROL.1: 11
- FDP_SDI.2: 5
- FDP_SDI.2.1: 3
- FDP_SDI.2.2: 2
- FDP_UIT: 10
- FDP_UIT.1: 6
- FIA:
- FIA_ATD: 4
- FIA_ATD.1: 2
- FIA_UAU: 4
- FIA_UAU.1: 4
- FIA_UAU.4: 2
- FIA_UID: 14
- FIA_UID.1: 6
- FIA_UID.2: 2
- FIA_USB: 4
- FIA_USB.1: 6
- FMT:
- FMT_MSA: 55
- FMT_MSA.1: 12
- FMT_MSA.2: 3
- FMT_MSA.3: 26
- FMT_MSA.3.1: 2
- FMT_MTD: 10
- FMT_MTD.1: 2
- FMT_MTD.3: 2
- FMT_SMF: 19
- FMT_SMF.1: 13
- FMT_SMF.1.1: 2
- FMT_SMR: 18
- FMT_SMR.1: 18
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO.1: 5
- FPR_UNO.1.1: 2
- FPT:
- FPT_FLS: 21
- FPT_FLS.1: 23
- FPT_FLS.1.1: 4
- FPT_PHP.3: 8
- FPT_PHP.3.1: 2
- FPT_RCV: 7
- FPT_RCV.3: 11
- FPT_TDC.1: 3
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 3
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 3
- A.APPS-PROVIDER: 3
- A.CONTROLLING-AUTHORITY: 3
- A.DELETION: 7
- A.KEY-ESCROW: 3
- A.MOBILE-OPERATOR: 3
- A.OTA-ADMIN: 3
- A.PERSONALIZER: 3
- A.PRODUCTION: 3
- A.VERIFICATION: 4
- A.VERIFICATION-AUTHORITY: 3
- D:
- D.API_DATA: 1
- D.APP_CODE: 1
- D.APP_C_DATA: 1
- D.APP_I_DATA: 3
- D.APP_KEYS: 2
- D.APSD_KEYS: 2
- D.CARD_MNGT_DATA: 1
- D.CASD_KEYS: 2
- D.CRYPTO: 4
- D.GP_CODE: 1
- D.ISD_KEYS: 2
- D.JCS_CODE: 2
- D.JCS_DATA: 2
- D.PIN: 2
- D.SEC_DATA: 2
- D.VASD_KEYS: 2
- O:
- O.ALARM: 19
- O.APPLET: 16
- O.APPLI-AUTH: 7
- O.CARD-: 4
- O.CARD-MANAGEMENT: 30
- O.CARD_MANAGEMENT: 2
- O.CIPHER: 12
- O.CODE_PKG: 14
- O.COMM_AUTH: 8
- O.COMM_CONFIDENTIALITY: 6
- O.COMM_INTEGRITY: 9
- O.DELETION: 10
- O.DOMAIN-RIGHTS: 11
- O.FIREWALL: 26
- O.GLOBAL-ARRAYS-CONFID: 3
- O.GLOBAL-ARRAYS-INTEG: 2
- O.GLOBAL_ARRAYS_CONFID: 6
- O.GLOBAL_ARRAYS_INTEG: 6
- O.INPUT-VALIDATION: 1
- O.INSTALL: 17
- O.INTEG-APPLI-CODE: 1
- O.JAVAOBJECT: 41
- O.KEY-MNGT: 10
- O.LOAD: 19
- O.NATIVE: 12
- O.OBJ-DELETION: 5
- O.OPERATE: 25
- O.PIN-: 1
- O.PIN-MNGT: 8
- O.REALLOCATION: 9
- O.REMOTE: 1
- O.REMOTE_MTHD: 1
- O.REMOTE_OBJ: 1
- O.REPLAY: 1
- O.RESOURCES: 11
- O.RMI_SERVICE: 1
- O.RND: 3
- O.ROR: 1
- O.SCP: 79
- O.SCP-IC: 1
- O.SCP-SUPPORT: 3
- O.SID: 22
- O.TRANSACTION: 10
- OE:
- OE.AID-: 1
- OE.AID-MANAGEMENT: 6
- OE.AP-KEYS: 6
- OE.APPLET: 8
- OE.APPS-PROVIDER: 6
- OE.BASIC-: 7
- OE.BASIC-APPS-: 3
- OE.BASIC-APPS-VALIDATION: 14
- OE.CA-: 1
- OE.CA-KEYS: 7
- OE.CARD-MANAGEMENT: 2
- OE.CARD_MANAGEMENT: 2
- OE.CODE-: 4
- OE.CODE-EVIDENCE: 17
- OE.CONTROLLING-AUTHORITY: 6
- OE.KEY-CHANGE: 7
- OE.KEY-ESCROW: 6
- OE.KEY-GENERATION: 6
- OE.MOBILE-OPERATOR: 6
- OE.OPERATOR-KEYS: 6
- OE.OTA-ADMIN: 4
- OE.OTA-LOADING: 4
- OE.OTA-SERVERS: 6
- OE.PERSONALIZER: 4
- OE.PRODUCTION: 6
- OE.QUOTAS: 6
- OE.SCP: 19
- OE.SCP-SUPPORT: 2
- OE.SECURE-APPS-CERTIFICATION: 7
- OE.SECURITY-DOMAINS: 4
- OE.SHARE-CONTROL: 7
- OE.VA-KEYS: 7
- OE.VERIFICATION: 37
- OE.VERIFICATION-AUTHORITY: 4
- OP:
- OP.ARRAY_ACCESS: 3
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 1
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 6
- OP.INVK_VIRTUAL: 5
- OP.INVOKE: 1
- OP.JAVA: 6
- OP.PUT: 5
- OP.RET_RORD: 1
- OP.THROW: 4
- OP.TYPE_ACCESS: 4
- OSP:
- OSP.AID-MANAGEMENT: 4
- OSP.APSD-KEYS: 3
- OSP.BASIC-APPS-VALIDATION: 4
- OSP.CASD-KEYS: 3
- OSP.KEY-CHANGE: 3
- OSP.KEY-GENERATION: 3
- OSP.OPERATOR-KEYS: 3
- OSP.OTA-LOADING: 3
- OSP.OTA-SERVERS: 3
- OSP.QUOTAS: 3
- OSP.SECURE-APPS-CERTIFICATION: 4
- OSP.SECURITY-DOMAINS: 3
- OSP.SHARE-: 1
- OSP.SHARE-CONTROL: 3
- OSP.VASD-KEYS: 3
- OSP.VERIFICATION: 7
- R:
- T:
- T.COM-EXPLOIT: 1
- T.COM_EXPLOIT: 5
- T.CONFID-APPLI-DATA: 20
- T.CONFID-JCS-: 2
- T.CONFID-JCS-CODE: 7
- T.CONFID-JCS-DATA: 9
- T.DELETION: 5
- T.EXE-CODE: 10
- T.EXECODE: 1
- T.INSTALL: 7
- T.INTEG-: 1
- T.INTEG-APPLI-: 7
- T.INTEG-APPLI-CODE: 13
- T.INTEG-APPLI-DATA: 21
- T.INTEG-JCS-: 3
- T.INTEG-JCS-CODE: 6
- T.INTEG-JCS-DATA: 12
- T.INTEG-USER-DATA: 12
- T.LIFE_CYCLE: 5
- T.NATIVE: 7
- T.OBJ-DELETION: 4
- T.PHYSICAL: 12
- T.RESOURCES: 8
- T.SECURE_DELETION: 10
- T.SID: 18
- T.UNAUTHORIZED_ACCESS: 5
- T.UNAUTHORIZED_CARD-: 1
- T.UNAUTHORIZED_CARD-MNGT: 1
- T.UNAUTHORIZED_CARD_MNGT: 7
|
pdf_data/st_keywords/vendor |
|
- GD:
- G&D: 1
- Giesecke & Devrient: 17
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 3
- SHA-384: 2
- SHA-512: 3
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 7
- Physical Probing: 2
|
- FI:
- Malfunction: 3
- physical tampering: 4
- SCA:
- DPA: 2
- Leak-Inherent: 2
- physical probing: 2
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 46: 1
- FIPS PUB 46-3: 3
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180-4: 3
- FIPS 186-3: 1
- FIPS 186-4: 5
- FIPS 197: 5
- FIPS 46-3: 2
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 46-3: 1
- ISO:
- ISO/IEC 18031: 8
- ISO/IEC 9797-: 1
- ISO/IEC 9797-1: 3
- NIST:
- PKCS:
- RFC:
- RFC 2104: 1
- RFC 3447: 1
- RFC 5639: 1
- RFC2104: 1
- RFC3447: 3
- RFC5639: 4
- SCP:
- SCP02: 6
- SCP03: 6
- SCP80: 4
- SCP81: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 3
- javacard.security: 18
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this security target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20020821090129+02'00'
- /Creator: Pscript.dll Version 5.0
- /ModDate: D:20020903100906+02'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Title: st-lite_5033V0G_v1_6
- pdf_file_size_bytes: 222747
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 44
|
- /Augmentation: ALC_DVS.2 and AVA_VAN.5
- /Author: Giesecke & Devrient
- /Company: Giesecke & Devrient GmbH
- /CreationDate: D:20161222135100+01'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Keywords: Version 2.1/2016-12-22
- /ModDate: D:20161222135122+01'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20161222125027
- /State: Public
- /Styles: supported
- /Subject: SkySIM CX Hercules M4M V1.0
- /TOE_Configuration: Basic configuration
- /TOE_HW_ST: ST33G1M2 Rev. F
- /TOE_Name: SkySIM CX Hercules M4M V1.0
- /TemplVersion: 1.0
- /Title: Security Target Lite
- /conformance_claim: demonstrable
- pdf_file_size_bytes: 1065844
- pdf_hyperlinks: http://www.osptalliance.org/resources, http://www.secg.org/collateral/sec2_final.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 104
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |