Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CEITEC ePassport Module, CTC21001, v1.0 (supporting EAC)
SERTIT-080
Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0
BSI-DSZ-CC-0869-2015
name CEITEC ePassport Module, CTC21001, v1.0 (supporting EAC) Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0
scheme NO DE
not_valid_after 17.01.2022 17.02.2020
not_valid_before 17.01.2017 17.02.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20170117%20S-080%20CR%20Ceitec%20EAC.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0869a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STlite-EAC]%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0869b_pdf.pdf
manufacturer CEITEC S.A. Oracle Corporation
manufacturer_web https://www.ceitec-sa.com https://www.oracle.com
security_level EAL4+, ALC_DVS.2, AVA_VAN.5 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 8856518b423e12c4 a43ba4af9421da93
heuristics/cert_id SERTIT-080 BSI-DSZ-CC-0869-2015
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, ALC_DVS.2, ADV_FSP.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_IND.3, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ATE_DPT.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, APE_INT.1, APE_SPD.1, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0869-V2-2019
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0782-2012
heuristics/report_references/indirectly_referenced_by {} JISEC-CC-CRP-C0649-01-2019, BSI-DSZ-CC-0869-V2-2019, JISEC-CC-CRP-C0648-01-2019
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0782-2012
heuristics/scheme_data
  • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
  • certification_date: 17.01.2017
  • developer: CEITEC S.A.
  • enhanced:
    • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
    • cert_id: SERTIT-080
    • certification_date: 17.01.2017
    • description: The TOE is an electronic module for machine readable travel documents (MRTDs) based on the requirements of the International Civil Aviation Organization, as defined in ICAO Doc 9303. The TOE is developed and produced by CEITEC and delivered to the passport manufacturer as micro modules. The TOE contains at the physical level: Integrated circuit chip; IC Software; data necessary to enable the MRTD personalization; the associated guidance documentation. The TOE also provides the security functions: integrity and confidentiality of personal data; access control, identification and authentication; protection against abuse of functionality, information leakage, physical tampering, malfunctions.
    • developer: CEITEC S.A.
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135163-1607953148/SERTIT/Sertifikater/2017/80/20170117%20Sertit-080%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135166-1607953151/SERTIT/Sertifikater/2017/80/%5BSTlite-EAC%5D%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135160-1607953146/SERTIT/Sertifikater/2017/80/20170117%20S-080%20CR%20Ceitec%20EAC.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 4, ALC_DVS.2, AVA_VAN.5
    • mutual_recognition: CCRA, SOG-IS
    • product: 1.0
    • protection_profile: BSI-CC-PP-0056, "Machine Readable Travel Document with 'ICAO Application', Extended Access Control"
    • sponsor: CEITEC S.A.
  • product: CEITEC ePassport Module CTC21001
  • url: https://sertit.no/certified-products/product-archive/ceitec-epassport-module-ctc21001
heuristics/protection_profiles a33327d40f253f46 9399bd94f9925b16
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf
pdf_data/report_filename 20170117 S-080 CR Ceitec EAC.pdf 0869a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 Valid until (*): 17 February 2020 SOGIS Recognition Agreement
    • cc_version: PP conformant including optional package EMG plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0869-2015
    • cert_item: Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0
    • cert_lab: BSI
    • developer: Oracle Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Java Card Protection Profile - Open Configuration, Version 3.0, May 2012, ANSSI-CC-PP-2010/03-M01
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-080: 19
  • DE:
    • BSI-DSZ-CC-0782: 1
    • BSI-DSZ-CC-0782-2012: 2
    • BSI-DSZ-CC-0782-2012-MA-01: 2
    • BSI-DSZ-CC-0782-MA-01: 2
    • BSI-DSZ-CC-0869-2015: 24
  • FR:
    • ANSSI-CC-PP-2010/03-M01: 4
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0056: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4+: 19
    • EAL1: 1
    • EAL4: 1
    • EAL7: 1
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 9
    • EAL 5: 14
    • EAL 5 augmented: 3
    • EAL 5+: 1
    • EAL 6: 4
    • EAL 7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 1
    • AGD_PRE: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP: 4
    • FCS_RND.1: 4
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_UCT.1: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_API.1: 4
    • FIA_UAU.1: 1
    • FIA_UAU.4: 1
    • FIA_UAU.5: 1
    • FIA_UAU.6: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
    • FMT_MTD: 8
    • FMT_MTD.3: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_PHP.3: 1
    • FPT_TST.1: 1
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.VERIFICATION: 3
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 26
    • Infineon Technologies AG: 3
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • TUV:
    • TÜV Informationstechnik: 2
    • TÜViT: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • TDES: 2
  • miscellaneous:
    • SEED:
      • SEED: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DSA:
      • DSA: 2
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • RIPEMD:
    • RIPEMD: 1
    • RIPEMD160: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 4
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 6
  • TRNG:
    • TRNG: 2
pdf_data/report_keywords/cipher_mode
  • CCM:
    • CCM: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 5
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • other:
    • JIL: 1
  • FI:
    • malfunction: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7138: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
    • BSI TR-02102-1: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 15408: 2
  • BSI:
    • AIS 1: 1
    • AIS 20: 2
    • AIS 25: 1
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 6
    • AIS 46: 1
    • AIS20: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • SCP:
    • SCP01: 2
    • SCP02: 2
    • SCP03: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • ETR for Composition (ETR-COMP), M7892 B11, BSI-DSZ-CC-0782, Version 5, 20 March 2014, TÜViT GmbH (confidential document) [21] SLx 70 Family Production and Personalization User’s Manual, Revision 2012-06-27, Infineon: 1
    • Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, TÜViT GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-0869-2015: Configuration Management Scope for Java Card: 1
    • SLJ 52GxxyyyzR) V1.0, BSI-DSZ-CC-0869-2015, ST Version 2.0, 20 November 2014, Oracle Corporation (confidential document) 9 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
    • and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification: 1
    • for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0, Version 1, 30 January 2015, TÜViT GmbH (confidential document) [19] Certification Report – for Infineon Security Controller M7892 B11 with optional RSA2048/4096: 1
    • for Infineon on SLE78 (SLJ 52GxxyyyzR) V 1.0, Version 1.4, 29 January 2015, Oracle Corporation (confidential document) [11] AGD_OPE for Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0: 1
  • OutOfScope:
    • out of scope: 1
    • the TOE, but pre-issuance loading of applets is possible. Native code post-issuance downloading is out of scope. The TOE fulfills the requirements of the Protection Profile Java Card Protection Profile - Open: 1
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Kjaertan
  • /CreationDate: D:20170118113117Z00'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ugradert
  • /ModDate: D:20170118113117Z00'00'
  • /Producer: Mac OS X 10.12.2 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 650258
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20150227121448+01'00'
  • /Creator: Writer
  • /Keywords: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-0869-2015, Java Card
  • /ModDate: D:20150227130818+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification BSI-DSZ-CC-0869-2015
  • /Title: Certification Report BSI-DSZ-CC-0869-2015
  • pdf_file_size_bytes: 1268716
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
pdf_data/st_filename [STlite-EAC] CEITECSA 5.410.052 - ST-Lite ePassport Module EAC 2.0.pdf 0869b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-2012-MA-01: 1
    • BSI-DSZ-CC-0782-MA-01: 2
    • BSI-DSZ-CC-0869: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056: 7
    • BSI-PP-0056: 1
    • BSI-PP-CC-0056: 1
  • BSI:
    • BSI-CC-PP-0035-2007: 1
    • BSI-PP-0017-2005: 1
    • BSI-PP-0035: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 8
    • EAL4 augmented: 2
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL5: 6
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 5
  • APE:
    • APE_SRE: 1
  • AVA:
    • AVA_VAN.5: 5
  • ADV:
    • ADV_ARC.1: 6
    • ADV_COMP.1: 1
    • ADV_FSP.1: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 7
    • ADV_IMP.1: 9
    • ADV_INT.2: 1
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 10
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 6
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM.1: 26
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 36
    • FCS_COP.1: 7
    • FCS_RND: 7
    • FCS_RND.1: 11
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 20
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 4
    • FDP_ITC: 1
    • FDP_ITC.1: 10
    • FDP_ITC.2: 10
    • FDP_UCT.1: 8
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 6
    • FIA_API.1: 10
    • FIA_API.1.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 8
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 21
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 18
    • FMT_LIM.2.1: 2
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 46
    • FMT_MTD.1: 11
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 34
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 38
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
  • FAU:
    • FAU_ARP.1: 24
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 3
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.2: 6
  • FCS:
    • FCS_CKM: 6
    • FCS_CKM.1: 19
    • FCS_CKM.2: 11
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 7
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 17
    • FCS_CKM.4.1: 1
    • FCS_COP: 32
    • FCS_COP.1: 26
    • FCS_RNG: 4
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 40
    • FDP_ACC.1: 17
    • FDP_ACC.2: 5
    • FDP_ACF: 38
    • FDP_ACF.1: 24
    • FDP_IFC: 25
    • FDP_IFC.1: 15
    • FDP_IFC.2: 2
    • FDP_IFF: 18
    • FDP_IFF.1: 17
    • FDP_ITC: 12
    • FDP_ITC.1: 4
    • FDP_ITC.2: 13
    • FDP_ITT.1: 1
    • FDP_RIP: 135
    • FDP_RIP.1: 11
    • FDP_ROL: 16
    • FDP_ROL.1: 5
    • FDP_SDI.1: 1
    • FDP_SDI.2: 13
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 6
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_UID: 22
    • FIA_UID.1: 12
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 135
    • FMT_MSA.1: 14
    • FMT_MSA.2: 2
    • FMT_MSA.3: 22
    • FMT_MTD: 20
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_SMF: 41
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR: 43
    • FMT_SMR.1: 37
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 13
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 36
    • FPT_FLS.1: 16
    • FPT_FLS.1.1: 2
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
    • FPT_RCV: 27
    • FPT_RCV.3: 13
    • FPT_RCV.4: 2
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 10
    • FTP_ITC.1: 5
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.BAC-PP: 2
    • OE.BAC_PP: 1
    • OE.MRTD_: 2
  • A:
    • A.APPLET: 6
    • A.DELETION: 1
    • A.VERIFICATION: 6
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 7
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.CM_APDU: 1
    • D.CRYPTO: 6
    • D.JCS_CODE: 3
    • D.JCS_DATA: 4
    • D.JCS_KEYS: 3
    • D.PIN: 6
    • D.SEC_ATTRIBUTES: 2
    • D.SEC_DATA: 8
  • O:
    • O.ALARM: 21
    • O.APPLET: 19
    • O.CARD-: 6
    • O.CARD-MANAGEMENT: 33
    • O.CIPHER: 16
    • O.CODE_PKG: 16
    • O.COMMUNICATION: 11
    • O.DELETION: 15
    • O.EXT-: 1
    • O.EXT-MEM: 20
    • O.EXT_MEM_INSTANCE: 10
    • O.FIREWALL: 46
    • O.GLOBAL_ARRAYS_C: 1
    • O.GLOBAL_ARRAYS_CONFID: 17
    • O.GLOBAL_ARRAYS_IN: 1
    • O.GLOBAL_ARRAYS_INTEG: 9
    • O.IC_SUPPORT: 17
    • O.INSTALL: 15
    • O.JAVAOBJECT: 41
    • O.KEY-: 1
    • O.KEY-MNGT: 24
    • O.LOAD: 18
    • O.NATIVE: 13
    • O.OBJ-DELETION: 8
    • O.OPERATE: 35
    • O.OS: 1
    • O.OS_SUPPORT: 23
    • O.PACKAGE: 2
    • O.PIN-: 1
    • O.PIN-MNGT: 22
    • O.REALLOCATION: 17
    • O.RECOVERY: 24
    • O.REMOTE: 1
    • O.RESOURCES: 24
    • O.RND: 14
    • O.SID: 35
    • O.TRANSACTION: 18
  • OE:
    • OE.APPLET: 8
    • OE.CARD-MANAGEMENT: 2
    • OE.CODE-: 4
    • OE.CODE-EVIDENCE: 17
    • OE.SCP: 6
    • OE.VERIFICATION: 38
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.CREATE_EXT_MEM_INSTANCE: 3
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GP: 3
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.LOAD_PCKG: 1
    • OP.PUT: 6
    • OP.READ_EXT_MEM: 3
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
    • OP.WRITE_EXT_MEM: 3
  • OSP:
    • OSP.VERIFICATION: 6
  • R:
    • R.JAVA: 12
  • T:
    • T.COMMUNICATION: 5
    • T.CONFID-APPLI-: 3
    • T.CONFID-APPLI-DATA: 17
    • T.CONFID-JCS-: 8
    • T.CONFID-JCS-CODE: 6
    • T.CONFID-JCS-DATA: 6
    • T.DELETION: 5
    • T.EXE-: 1
    • T.EXE-CODE: 8
    • T.FAULT: 5
    • T.INSTALL: 6
    • T.INTEG-: 10
    • T.INTEG-APPLI-: 10
    • T.INTEG-APPLI-CODE: 9
    • T.INTEG-APPLI-DATA: 18
    • T.INTEG-JCS-: 1
    • T.INTEG-JCS-CODE: 8
    • T.INTEG-JCS-DATA: 7
    • T.LEAKAGE: 5
    • T.NATIVE: 6
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 8
    • T.RESOURCES: 9
    • T.RND: 5
    • T.SID: 19
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 182
    • Infineon Technologies AG: 2
  • NXP:
    • NXP Semiconductors: 1
  • STMicroelectronics:
    • STMicroelectronics: 1
pdf_data/st_keywords/eval_facility
  • TUV:
    • TUV Informationstechnik: 1
    • TÜV Informationstechnik: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 2
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 19
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 22
      • Triple-DES: 1
    • DES:
      • DES: 9
  • constructions:
    • MAC:
      • CMAC: 1
  • miscellaneous:
    • SEED:
      • SEED: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
  • FF:
    • DH:
      • Diffie-Hellman: 5
  • ECC:
    • ECC:
      • ECC: 11
    • ECDH:
      • ECDH: 5
    • ECDSA:
      • ECDSA: 10
  • FF:
    • DH:
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 2
  • RSA:
    • RSA-CRT: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
  • MD:
    • MD5:
      • MD5: 3
  • RIPEMD:
    • RIPEMD-160: 2
    • RIPEMD160: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 5
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
  • KA:
    • KA: 2
    • Key Agreement: 2
  • KEX:
    • Key exchange: 1
  • MAC:
    • MAC: 4
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 20
    • RNG: 11
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CBC:
    • CBC: 21
  • CCM:
    • CCM: 1
  • ECB:
    • ECB: 6
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-192: 2
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • Physical Tampering: 7
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 5
  • SCA:
    • DPA: 3
    • SPA: 2
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
  • FI:
    • Malfunction: 3
    • malfunction: 4
    • physical tampering: 1
  • SCA:
    • DPA: 4
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 3
    • side channel: 1
    • timing attacks: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 10
    • EF.DG1: 20
    • EF.DG13: 2
    • EF.DG14: 7
    • EF.DG16: 17
    • EF.DG2: 7
    • EF.DG3: 20
    • EF.DG4: 18
    • EF.DG5: 5
    • EF.SOD: 10
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-411: 1
  • ICAO:
    • ICAO: 9
  • PKCS:
    • PKCS#3: 2
    • PKCS#34: 1
  • BSI:
    • AIS20: 4
    • AIS36: 2
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-4: 6
    • FIPS 186-3: 7
    • FIPS 197: 9
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-3: 1
    • FIPS PUB 197: 1
    • FIPS140: 2
  • ICAO:
    • ICAO: 6
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 15946-: 5
    • ISO/IEC 18092: 2
    • ISO/IEC7816: 2
  • NIST:
    • NIST SP 800-108: 1
    • NIST SP 800-38B: 1
  • RFC:
    • RFC 5639: 5
  • SCP:
    • SCP 02: 2
    • SCP 03: 3
    • SCP01: 2
    • SCP02: 9
    • SCP03: 9
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.1: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 4
    • javacard.security: 3
  • javacardx:
    • javacardx.crypto: 3
    • javacardx.external: 1
    • javacardx.security: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Software development environment. Phase 2 covers the Secure IC Development of Infineon and is out of scope of the TOE evaluation as that is part of the IC platform evaluation. In Phase 3, the Chip: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.RECOVERY and O.OS_SUPPORT are: 1
    • by the TOE. There are no pre-issuance applets installed. Native code post-issuance downloading is out of scope The SCP is a certified hardware platform – the SLE78CLFX4000P(M) with RSA2048/4096 v1.02.013, EC v1: 1
    • out of scope: 3
pdf_data/st_metadata
  • /Author: Marcos Kordyas Dossa
  • /CreationDate: D:20161212160233-02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20161212160233-02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1330959
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 71
  • /Author: TÜV Informationstechnik GmbH, Roland Atoui, Linda Kyrnitszke
  • /CreationDate: D:20141120164433+01'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Java Card Platform, Smart Card,
  • /ModDate: D:20141120164433+01'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Common Criteria - ASE
  • /Title: Security Target Lite - Java Card Platform on SLE 78 (SLJ 52)
  • pdf_file_size_bytes: 2880995
  • pdf_hyperlinks: http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=30656
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 158
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different