Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Secure Element S3B512C/SC3512C (32-bit RISC Microcontroller) with optional AT1 Secure Library and Fingerprint Library including specific IC Dedicated software (Référence S3B512C_20210830)
ANSSI-CC-2021/62
S3NSN4V 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure RSA/SHA Livrary including specific IC Dedicated software
ANSSI-CC-2020/32
name Secure Element S3B512C/SC3512C (32-bit RISC Microcontroller) with optional AT1 Secure Library and Fingerprint Library including specific IC Dedicated software (Référence S3B512C_20210830) S3NSN4V 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure RSA/SHA Livrary including specific IC Dedicated software
not_valid_after 27.12.2026 26.06.2025
not_valid_before 27.12.2021 26.06.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021-62.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2020_32fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_62.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_32fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_62en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_32en.pdf
dgst 8d798205eaf3159d f22d62103867fc3a
heuristics/cert_id ANSSI-CC-2021/62 ANSSI-CC-2020/32
heuristics/cert_lab [] CEA
heuristics/cpe_matches {} cpe:2.3:h:samsung:s3nsn4v:-:*:*:*:*:*:*:*
heuristics/report_references/directly_referenced_by ANSSI-CC-2021/62-R01 ANSSI-CC-2021/35
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2021/62-R01, ANSSI-CC-2022/63 NSCIB-CC-0530096-CR, ANSSI-CC-2021/35-R02, NSCIB-CC-0530133-CR, ANSSI-CC-2021/35, ANSSI-CC-2021/35-R01
heuristics/scheme_data
  • cert_id: ANSSI-CC-2021/62
  • description: Le produit évalué est le « Secure Element S3B512C/SC3512C (32-bit RISC Microcontroller) with optional AT1 Secure Library and Fingerprint Library including specific IC Dedicated software, référence S3B512C_20210830 » développé par SAMSUNG ELECTRONICS CO. LTD. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications du Secure
  • developer: SAMSUNG ELECTRONICS CO. LTD.
  • enhanced:
    • augmented: ASE_TSS.2
    • category: Micro-circuits
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2021/62
    • cert_link: https://cyber.gouv.fr/sites/default/files/2022/01/certificat-anssi-cc-2021-62.pdf
    • certification_date: 2021-12-27
    • developer: SAMSUNG ELECTRONICS CO. LTD.
    • evaluation_facility: CEA-LETI
    • expiration_date: 2026-12-27
    • level: EAL6+
    • mutual_recognition: SOG-IS CCRA
    • protection_profile: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages : “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only”
    • report_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2021_62.pdf
    • sponsor: SAMSUNG ELECTRONICS CO. LTD.
    • target_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2021_62en.pdf
  • expiration_date: 2026-12-27
  • level: EAL6+
  • product: Secure Element S3B512C/SC3512C (32-bit RISC Microcontroller) with optional AT1 Secure Library and Fingerprint Library including specific IC Dedicated software (Référence S3B512C_20210830)
  • sponsor: SAMSUNG ELECTRONICS CO. LTD.
  • url: https://cyber.gouv.fr/produits-certifies/secure-element-s3b512csc3512c-32-bit-risc-microcontroller-optional-at1-secure
  • cert_id: ANSSI-CC-2020/32
  • description: Le produit évalué est le microcontrôleur « S3NSN4V 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure RSA/SHA Livrary including specific IC Dedicated software, Revision 0 » développé par SAMSUNG ELECTRONICS CO. LTD.. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un suppo
  • developer: Samsung Electronics Co. Ltd.
  • enhanced:
    • augmented: ASE_TSS.2
    • category: Micro-circuits
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2020/32
    • certification_date: 2020-06-26
    • developer: Samsung Electronics Co. Ltd.
    • evaluation_facility: CEA-Leti
    • expiration_date: 2025-06-26
    • level: EAL6
    • mutual_recognition: SOG-IS CCRA
    • protection_profile: BSI-CC-PP-0084-2014
    • report_link: https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cc-2020_32fr.pdf
    • sponsor: Samsung Electronics Co. Ltd.
    • target_link: https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cible-cc-2020_32en.pdf
  • expiration_date: 2025-06-26
  • level: EAL6
  • product: S3NSN4V 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure RSA/SHA Livrary including specific IC Dedicated software
  • sponsor: Samsung Electronics Co. Ltd.
  • url: https://cyber.gouv.fr/produits-certifies/s3nsn4v-32-bit-risc-microcontroller-smart-card-optional-ae1-secure-rsasha
pdf_data/cert_filename certificat-anssi-cc-2021-62.pdf certificat-2020_32fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2021/62: 2
  • FR:
    • ANSSI-CC-2020/32: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL2: 1
    • EAL6: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA-LETI: 2
  • CEA-LETI:
    • CEA-LETI: 1
pdf_data/cert_metadata
  • /Author: DUCLOS Charlene
  • /CreationDate: D:20220107145313+01'00'
  • /Creator: Microsoft® Word 2019
  • /Keywords: version x.x, révision x
  • /ModDate: D:20220107145313+01'00'
  • /Producer: Microsoft® Word 2019
  • /Title: ANSSI-CC-20xx/xx
  • pdf_file_size_bytes: 353503
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20200702164835+02'00'
  • /ModDate: D:20200702164835+02'00'
  • pdf_file_size_bytes: 419790
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename anssi-cc-2021_62.pdf anssi-cc-2020_32fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 6 augmenté ASE_TSS.2
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2020/32
    • cert_item: S3NSN4V 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure RSA/SHA Library including specific IC Dedicated software
    • cert_item_version: Référence S3NSN4V_20191220, revision 0
    • cert_lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
    • developer: Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330, Corée du Sud Commanditaire Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330, Corée du Sud
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2021/62: 14
  • FR:
    • ANSSI-CC-2020/32: 16
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 6: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 1
    • EAL 6: 2
    • EAL 7: 1
    • EAL2: 2
    • EAL4: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E3 Elémentaire: 1
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMC: 1
    • ALC_FLR: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 2
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA-LETI: 1
  • CESTI:
    • CESTI: 4
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/report_keywords/randomness
  • TRNG:
    • DTRNG: 7
  • TRNG:
    • DTRNG: 10
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 6
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS31: 3
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • BSI:
    • AIS 31: 1
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_metadata
pdf_data/st_filename anssi-cible-cc-2021_62en.pdf anssi-cible-cc-2020_32en.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084: 1
    • BSI-CC-PP-0084-: 1
    • BSI-PP-0084: 1
  • BSI:
    • BSI-CC-PP-0084: 2
    • BSI-CC-PP-0084-: 1
    • BSI-PP-0084: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL 6: 2
    • EAL 6 augmented: 2
    • EAL6: 4
    • EAL6 augmented: 1
    • EAL6+: 1
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 6: 2
    • EAL 6 augmented: 2
    • EAL6: 5
    • EAL6 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 5
    • ADV_FSP: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 2
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 2
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 2
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 11
  • ATE:
    • ATE_COV: 1
    • ATE_COV.3: 1
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 5
    • ADV_FSP: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 2
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 2
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 2
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 11
  • ATE:
    • ATE_COV: 1
    • ATE_COV.3: 1
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 1
    • FAU_SAS: 8
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 21
    • FCS_CKM.1: 32
    • FCS_CKM.2: 6
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 51
    • FCS_COP.1: 23
    • FCS_RNG: 17
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 10
    • FDP_ACC.1: 24
    • FDP_ACC.1.1: 1
    • FDP_ACF: 14
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 27
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ITC.1: 16
    • FDP_ITC.2: 16
    • FDP_ITT: 1
    • FDP_ITT.1: 18
    • FDP_ITT.1.1: 1
    • FDP_SDC: 5
    • FDP_SDC.1: 13
    • FDP_SDC.1.1: 1
    • FDP_SDI: 1
    • FDP_SDI.1: 2
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT: 6
    • FDP_UCT.1: 11
    • FDP_UCT.1.1: 1
    • FDP_UIT: 6
    • FDP_UIT.1: 12
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 7
    • FIA_API.1: 11
    • FIA_API.1.1: 2
  • FMT:
    • FMT_CKM.4: 1
    • FMT_LIM: 22
    • FMT_LIM.1: 28
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 32
    • FMT_LIM.2.1: 2
    • FMT_MSA: 2
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 22
    • FPT_FLS.1.1: 1
    • FPT_ITT: 1
    • FPT_ITT.1: 16
    • FPT_ITT.1.1: 1
    • FPT_PHP: 3
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT: 1
    • FRU_FLT.1: 1
    • FRU_FLT.2: 17
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 8
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 1
    • FAU_SAS: 8
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 7
    • FCS_CKM.1: 16
    • FCS_CKM.2: 2
    • FCS_CKM.4: 11
    • FCS_COP: 31
    • FCS_COP.1: 15
    • FCS_RNG: 17
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 11
    • FDP_ACC.1: 20
    • FDP_ACC.1.1: 1
    • FDP_ACF: 15
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 23
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ITC.1: 7
    • FDP_ITC.2: 7
    • FDP_ITT: 1
    • FDP_ITT.1: 18
    • FDP_ITT.1.1: 1
    • FDP_SDC: 4
    • FDP_SDC.1: 14
    • FDP_SDC.1.1: 1
    • FDP_SDI: 1
    • FDP_SDI.1: 2
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 6
    • FIA_API.1: 12
    • FIA_API.1.1: 2
  • FMT:
    • FMT_CKM.4: 1
    • FMT_LIM: 22
    • FMT_LIM.1: 28
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 32
    • FMT_LIM.2.1: 2
    • FMT_MSA: 2
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 22
    • FPT_FLS.1.1: 1
    • FPT_ITT: 1
    • FPT_ITT.1: 16
    • FPT_ITT.1.1: 1
    • FPT_PHP: 3
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT: 1
    • FRU_FLT.1: 1
    • FRU_FLT.2: 17
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • O:
    • O.AES: 7
    • O.ECDH: 7
    • O.ECDSA: 6
    • O.MEM_ACCESS: 1
    • O.RND: 6
    • O.RSA: 8
    • O.SHA: 6
    • O.TDES: 7
  • T:
    • T.RND: 5
  • O:
    • O.AES: 5
    • O.MEM_ACCESS: 1
    • O.RND: 6
    • O.RSA: 8
    • O.SHA: 5
    • O.TDES: 7
  • T:
    • T.RND: 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 42
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 13
      • Triple-DES: 6
    • DES:
      • DES: 8
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 27
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 13
      • Triple-DES: 6
    • DES:
      • DES: 9
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 21
    • ECDH:
      • ECDH: 17
    • ECDSA:
      • ECDSA: 23
  • FF:
    • DH:
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 6
  • RSA:
    • RSA-CRT: 1
  • ECC:
    • ECC:
      • ECC: 4
  • RSA:
    • RSA-CRT: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
      • SHA224: 6
      • SHA256: 6
      • SHA384: 6
      • SHA512: 5
  • SHA:
    • SHA1:
      • SHA1: 2
    • SHA2:
      • SHA224: 5
      • SHA256: 5
      • SHA384: 5
      • SHA512: 4
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
pdf_data/st_keywords/crypto_protocol
  • PGP:
    • PGP: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 11
    • RNG: 8
  • TRNG:
    • DTRNG: 23
    • TRNG: 1
  • RNG:
    • RND: 11
    • RNG: 8
  • TRNG:
    • DTRNG: 27
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 4
  • ECB:
    • ECB: 3
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP192r1: 4
    • brainpoolP192t1: 4
    • brainpoolP224r1: 4
    • brainpoolP224t1: 4
    • brainpoolP256r1: 4
    • brainpoolP256t1: 4
    • brainpoolP320r1: 4
    • brainpoolP320t1: 4
    • brainpoolP384r1: 4
    • brainpoolP384t1: 4
    • brainpoolP512r1: 4
    • brainpoolP512t1: 4
  • NIST:
    • P-192: 8
    • P-224: 8
    • P-256: 8
    • P-384: 8
    • secp192k1: 4
    • secp192r1: 4
    • secp224k1: 4
    • secp224r1: 4
    • secp256k1: 4
    • secp256r1: 4
    • secp384r1: 4
pdf_data/st_keywords/crypto_library
  • AT1:
    • AT1 Secure RSA/ECC/SHA library: 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 4
    • Malfunction: 26
    • malfunction: 11
    • physical tampering: 3
  • SCA:
    • DPA: 8
    • Leak-Inherent: 23
    • Physical Probing: 4
    • Physical probing: 2
    • SPA: 7
    • physical probing: 9
    • side channel: 3
    • side-channel: 4
    • timing attack: 2
    • timing attacks: 1
  • other:
    • reverse engineering: 4
  • FI:
    • DFA: 2
    • Malfunction: 26
    • malfunction: 11
    • physical tampering: 3
  • SCA:
    • DPA: 7
    • Leak-Inherent: 23
    • Physical Probing: 4
    • Physical probing: 2
    • SPA: 5
    • physical probing: 9
    • side channel: 3
    • side-channel: 4
    • timing attack: 1
    • timing attacks: 1
  • other:
    • reverse engineering: 5
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 17
pdf_data/st_keywords/standard_id
  • BSI:
    • BSI-AIS31: 4
  • CC:
    • CCMB-2017-04-001: 3
    • CCMB-2017-04-002: 3
    • CCMB-2017-04-003: 3
    • CCMB-2017-04-004: 3
  • FIPS:
    • FIPS 197: 1
    • FIPS PUB 180-3: 5
    • FIPS197: 2
  • ISO:
    • ISO/IEC 18032: 2
  • BSI:
    • AIS31: 1
    • BSI-AIS31: 2
  • CC:
    • CCMB-2017-04-001: 3
    • CCMB-2017-04-002: 3
    • CCMB-2017-04-003: 3
    • CCMB-2017-04-004: 3
  • FIPS:
    • FIPS 197: 1
    • FIPS PUB 180-3: 6
    • FIPS197: 1
  • ISO:
    • ISO/IEC 14443: 8
    • ISO/IEC 15693: 4
    • ISO/IEC 18092: 2
pdf_data/st_metadata
  • /Author: Windows 사용자
  • /CreationDate: D:20200203102748+09'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20200203102748+09'00'
  • /Producer: Microsoft® Word 2013
  • /Title: ST_Klallam7_Ver1.1
  • pdf_file_size_bytes: 1299586
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 108
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/convert_garbage True False
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different