Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
CCEVS-VR-VID-10380-2012
S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 2
BSI-DSZ-CC-0501-2008
name RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9 S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 2
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US DE
not_valid_after 31.12.2014 01.09.2019
not_valid_before 21.12.2012 01.07.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0501a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0501b.pdf
manufacturer RIOREY Incorporated Samsung Electronics Co., Ltd.
manufacturer_web https://www.riorey.com/ https://www.samsung.com
security_level ALC_FLR.1, EAL4+ EAL5+, AVA_MSU.3, ALC_DVS.2, AVA_VLA.4
dgst 7f09c099abfb5dbf 3f287c94d1039f0b
heuristics/cert_id CCEVS-VR-VID-10380-2012 BSI-DSZ-CC-0501-2008
heuristics/cert_lab US BSI
heuristics/extracted_sars AGD_OPE.1, ADV_IMP.1, ATE_COV.2, ALC_DEL.1, AVA_VAN.3, ADV_ARC.1, ATE_DPT.1, ADV_FSP.4, ALC_DVS.1, ALC_TAT.1, ATE_IND.2, AGD_PRE.1, ALC_FLR.1, ADV_TDS.3, ALC_LCD.1, ATE_FUN.1, ALC_CMC.4, ALC_CMS.4 ATE_IND.2, ADV_FSP.3, ALC_LCD.2, AVA_SOF.1, ALC_TAT.2, ADV_SPM.3, ADV_RCR.2, ADV_IMP.2, AVA_CCA.1, AVA_MSU.3, ADV_LLD.1, ADV_INT.1, ALC_DVS.2, ATE_COV.2, AGD_USR.1, ADV_HLD.3, AGD_ADM.1, ATE_DPT.2, AVA_VLA.4, ATE_FUN.1
heuristics/extracted_versions 5.0.12 2, 16
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0624-2010, KECS-ISIS-0222-2010
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0452-2007
heuristics/report_references/indirectly_referenced_by {} KECS-ISIS-0378-2012, BSI-DSZ-CC-0624-2010, ANSSI-CC-2012/09, KECS-ISIS-0222-2010
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0452-2007, BSI-DSZ-CC-0438-2007, BSI-DSZ-CC-0400-2007
heuristics/st_references/directly_referenced_by {} KECS-ISIS-0222-2010
heuristics/st_references/indirectly_referenced_by {} KECS-ISIS-0222-2010
maintenance_updates


pdf_data/report_filename st_vid10380-vr.pdf 0501a.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10380-2012
    • cert_item: RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG) with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
    • cert_lab: US NIAP
  • DE:
    • cert_id: BSI-DSZ-CC-0501-2008
    • cert_item: S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 2
    • cert_lab: BSI
    • developer: Samsung Electronics Co., Ltd
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10380-2012: 1
  • DE:
    • BSI-DSZ-CC-0452-2007: 1
    • BSI-DSZ-CC-0501: 1
    • BSI-DSZ-CC-0501-2008: 19
  • NL:
    • CC-0452-2007: 1
    • CC-0501: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 8
    • EAL 4 augmented: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 5
    • EAL 5: 4
    • EAL 5 augmented: 4
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.1: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 3
  • AVA:
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.3: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_IMP.2: 1
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 2
    • ALC_TAT.2: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • Philips:
    • Philips: 1
  • Samsung:
    • Samsung: 17
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 2
    • TÜViT: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • Triple-DES: 5
    • DES:
      • DES: 7
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/report_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • physical probing: 1
    • side-channel: 1
  • other:
    • Bellcore attack: 1
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICVersion:
    • IC Version: 1
pdf_data/report_keywords/standard_id
  • RFC:
    • RFC 1858: 1
  • BSI:
    • AIS 25: 3
    • AIS 26: 2
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 36: 1
    • AIS 38: 1
    • AIS20: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 2, TÜViT (confidential document) [8] Configuration Management Documentation (Class ACM_AUT/CAP/SCP) – Project Cheyenne II, Version: 1
    • 3, 2008-05-09 Samsung Electronics (confidential document) [9] Security Target Lite of S3CC9LC 16-bit RISC Microcontroller for Smart Cards, Version 1.0: 1
    • EVALUATION (ETR-COMP), 8103842493 / BSI-DSZ- CC-0501, S3CC91A, Version 2, 2008-06-03, TÜViT (confidential document) [12] Security Application Note, S3CC9LC, Version 1.1, 2008-05-06, Samsung Electronics 8: 1
    • for Smart Cards – Project Cheyenne II, Version 1.4, 2008-04-29, Samsung Electronics (confidential document) [7] EVALUATION TECHNICAL REPORT-SUMMARY (ETR SUMMARY), 8103842493 / BSI-DSZ-CC-0501, S3CC9LC: 1
pdf_data/report_metadata
  • /Author: Federal Office for Information Security
  • /CreationDate: D:20080717125300+02'00'
  • /Creator: Writer
  • /Keywords: "S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 2, BSI-DSZ-CC-0501-2008, Samsung Electronics Co., Ltd."
  • /ModDate: D:20080717145955+02'00'
  • /Producer: StarOffice 8
  • /Subject: Common Criteria Zertifizierung
  • /Title: Zertifizierungsreport BSI-DSZ-CC-0501-2008
  • pdf_file_size_bytes: 569988
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename st_vid10380-st.pdf 0501b.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 8
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4+: 6
  • EAL:
    • EAL4: 1
    • EAL5: 8
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 2
    • ACM_SCP: 2
    • ACM_SCP.3: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 2
    • ADO_IGS: 2
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 2
    • ADV_FSP.3: 1
    • ADV_HLD: 1
    • ADV_HLD.2: 1
    • ADV_HLD.3: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_LLD: 1
    • ADV_LLD.1: 2
    • ADV_RCR: 1
    • ADV_RCR.2: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 4
    • ADV_SPM.3: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 4
    • AGD_USR: 2
    • AGD_USR.1: 4
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 6
    • ALC_LCD: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 2
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 2
    • ATE_DPT: 1
    • ATE_DPT.2: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 1
    • AVA_CCA.1: 1
    • AVA_MSU: 1
    • AVA_MSU.2: 1
    • AVA_MSU.3: 6
    • AVA_SOF: 1
    • AVA_SOF.1: 1
    • AVA_VLA: 1
    • AVA_VLA.4: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 14
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 13
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 1
    • FAU_SAS: 3
    • FAU_SAS.1: 8
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 29
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 4
    • FCS_CKM.4: 19
    • FCS_CKM.4.1: 2
    • FCS_COP: 1
    • FCS_COP.1: 21
    • FCS_COP.1.1: 2
    • FCS_RND: 2
    • FCS_RND.1: 8
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 21
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_CKM.2: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 22
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ITC.1: 15
    • FDP_ITC.1.1: 2
    • FDP_ITC.1.2: 2
    • FDP_ITC.1.3: 2
    • FDP_ITC.2: 17
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 2
    • FDP_ITC.2.3: 2
    • FDP_ITC.2.4: 2
    • FDP_ITC.2.5: 2
    • FDP_ITT: 1
    • FDP_ITT.1: 17
    • FDP_ITT.1.1: 1
    • FDP_SDI.1: 2
  • FMT:
    • FMT_LIM: 4
    • FMT_LIM.1: 14
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 1
    • FMT_MSA: 2
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 21
    • FMT_MSA.2.1: 2
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 8
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS: 1
    • FPT_FLS.1: 22
    • FPT_FLS.1.1: 1
    • FPT_ITT: 1
    • FPT_ITT.1: 15
    • FPT_ITT.1.1: 1
    • FPT_PHP: 2
    • FPT_PHP.3: 18
    • FPT_PHP.3.1: 1
    • FPT_SEP: 2
    • FPT_SEP.1: 10
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TDC.1: 2
  • FRU:
    • FRU_FLT: 1
    • FRU_FLT.1: 1
    • FRU_FLT.2: 18
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 5
    • O.TRANSMISSION: 1
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
  • O:
    • O.RND: 5
  • T:
    • T.RND: 4
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 13
      • T-DES: 1
      • Triple-DES: 1
    • DES:
      • DES: 12
  • miscellaneous:
    • SEED:
      • SEED: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 10
    • RNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
pdf_data/st_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 8
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 24
    • malfunction: 12
    • physical tampering: 2
  • SCA:
    • DPA: 5
    • Leak-Inherent: 20
    • Physical Probing: 4
    • Physical probing: 2
    • SPA: 3
    • physical probing: 6
    • side-channel: 2
    • timing attacks: 1
  • other:
    • reverse engineering: 3
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
  • BSI:
    • AIS 20: 2
    • AIS20: 3
  • FIPS:
    • FIPS PUB 46-3: 2
  • ISO:
    • ISO/IEC 15408-2005: 1
    • ISO/IEC 7816: 4
    • ISO/IEC 9796-1: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
pdf_data/st_metadata
  • /CreationDate: D:20130115104027
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130115104027
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1295508
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
  • /Author: Kyungsuk Yi (Bryant)
  • /CreationDate: D:20080604112348+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /Keywords: Smartcard, IC, S3CC9LC, 16-bit RISC Microcontroller For Smart Cards, 16-bit CMOS Microcontroller For Smart Cards, Samsung Electronics
  • /ModDate: D:20080609165456+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /Subject: Security Target Lite
  • /Title: Security Target Lite of S3CC9LC 16-bit RISC Microcontroller For Smart Cards
  • pdf_file_size_bytes: 536251
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 60
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different