name |
Touch&Sign2048 Version 1.00 |
KOMSCO JK31 V1.0 on M7892 |
category |
Products for Digital Signatures |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
KR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
22.01.2020 |
not_valid_before |
09.04.2008 |
22.01.2015 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080527_0422a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-15-07%20KOMSCO%20JK31%20V1.0%20on%20M7892(eng).pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080527_0422b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[JK31-TR-0001]%20Security%20Target-Lite-e-v1.0.pdf |
manufacturer |
ST Incard S.R.L. |
KOMSCO |
manufacturer_web |
https://www.incard.it/ |
https://www.komsco.com |
security_level |
AVA_MSU.3, EAL4+, AVA_VLA.4 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
90c173d803358cae |
8ddbc2c0032f297e |
heuristics/cert_id |
BSI-DSZ-CC-0422-2008 |
KECS-ISIS-0579-2015 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, AVA_VLA.4, ATE_IND.2, ADV_LLD.1, ADV_MSU.3, ADV_SPM.1, AVA_MSU.3 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
1.00 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2006/18 |
BSI-DSZ-CC-0782-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2006/18 |
BSI-DSZ-CC-0782-2012 |
heuristics/scheme_data |
|
- category: Java card platform
- cert_id: KECS-ISIS-0579-2015
- certification_date: 22.01.2015
- enhanced:
- level: EAL5+
- product: KOMSCO JK31 V1.0 on M7892
- product_link: https://itscc.kr/certprod/view.do?product_id=579&product_class=4
- vendor: KOMSCO Co., Ltd.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2006/18 |
BSI-DSZ-CC-0782-2012 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2006/18 |
BSI-DSZ-CC-0758-2012, BSI-DSZ-CC-0782-2012 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
20080527_0422a.pdf |
KECS-CR-15-07 KOMSCO JK31 V1.0 on M7892(eng).pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0422-2008
- cert_item: Touch&Sign2048 Version 1.00
- cert_lab: BSI
- developer: ST Incard S.r.l. Certification Report V1.0 ZS-01-01-F-326 V4.1 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 (0)228 9582-0, Fax +49 (0)228 9582-5477, Infoline +49 (0)228 9582-111
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
|
pdf_data/report_keywords/cc_cert_id |
- AU:
- Certification Report 2006/18: 1
- DE:
- FR:
- Certification Report 2006/18: 1
|
- DE:
- BSI-DSZ-CC-0782-2012: 4
- BSI-DSZ-CC-0782-2012-MA-01: 4
- KR:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5+: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL4+: 1
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 6+: 1
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 2
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_CAP: 2
- ACM_SCP: 2
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_TAT: 2
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 3
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
- ADV:
- ADV_ARC: 3
- ADV_ARC.1: 2
- ADV_FSP.5: 3
- ADV_IMP.1: 2
- ADV_INT.2: 3
- ADV_TDS.4: 3
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 2
- ALC_DEL.1: 2
- ALC_DVS.2: 6
- ALC_LCD.1: 2
- ALC_TAT.2: 2
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 3
- ATE:
- ATE_COV.2: 3
- ATE_DPT.3: 3
- ATE_FUN.1: 3
- ATE_IND.2: 4
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CGA: 1
- A.MANAGE: 1
- A.PERSONALIZATION: 1
- A.SCA: 1
- A.VAD: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 6
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
- Serma:
- TUV:
- TÜV Informationstechnik: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- miscellaneous:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 3
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 3
- AIS 38: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 180-1: 1
- FIPS 180-2: 1
- FIPS PUB 140-2: 1
- ISO:
- ISO/IEC 15408:2005: 2
- ISO/IEC 7816: 2
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 1
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 4
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 2006 and Surveillance Technical Report ST19WR66I, (EAL 5+), ITSEF of SERMA Technologies 25.02.2008 (confidential document) [11] Touch&Sign2048 V1.00 –Configuration List, Version A-1, Date: 2008-01- 18, ST Incard: 1
- BSI-DSZ-0422-2008, Touch&Sign2048 V1.00 - Security Target, Version A-3, Date 2007-03-29, ST Incard (confidential document) [7] Security Target BSI-DSZ-0422-2008, Touch&Sign2048 V1.00 - Security Target, Version A-3, Date: 1
- V1.00, Version 3, Date 2008-03-05, Evaluation Body for IT-Security of TÜV Informationstechnik GmbH (confidential document) B-17 Certification Report BSI-DSZ-CC-0422-2008 B-18 [9] Schutzprofil Secure Signature-Creation: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20080509075923+02'00'
- /Creator: Acrobat PDFMaker 8.1 für Word
- /Keywords: "BSI-DSZ-CC-0422-2008, Touch&Sign2048 Version 1.00,ST Incard S.r.l.,Smart Card with Digital Signature Application, Common Criteria, Certification, Zertifizierung "
- /ModDate: D:20080516074846+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20080509055908
- /Subject: Touch&Sign
- /Title: Certification Report BSI-DSZ-CC-0422-2008
- pdf_file_size_bytes: 253367
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
- /Author: 이은경
- /CreationDate: D:20150121185239+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20150121185239+09'00'
- /Producer: Microsoft® Word 2010
- /Title: 평가단위보고서(ADV_ARC.1)
- pdf_file_size_bytes: 494547
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
20080527_0422b.pdf |
[JK31-TR-0001] Security Target-Lite-e-v1.0.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- AU:
- Certification Report 2006/18: 1
- DE:
- FR:
- Certification Report 2006/18: 1
|
- DE:
- BSI-DSZ-CC-0782-: 1
- BSI-DSZ-CC-0782-2012: 1
- BSI-DSZ-CC-0782-2012-MA-01: 3
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 002-2001: 1
- BSI-PP-0006-2002: 2
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 4+: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 2
- EAL5: 1
- EAL5 augmented: 1
|
- EAL:
- EAL 5+: 1
- EAL4: 2
- EAL5: 12
- EAL5+: 7
- EAL6+: 7
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_MSU.3: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.3: 8
- AVA_SOF.1: 2
- AVA_VLA.4: 9
|
- ADV:
- ADV_ARC.1: 15
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 19
- ADV_IMP.1: 13
- ADV_INT.2: 11
- ADV_TDS.1: 2
- ADV_TDS.3: 5
- ADV_TDS.4: 19
- AGD:
- AGD_OPE.1: 17
- AGD_PRE.1: 10
- ALC:
- ALC_CMC.4: 17
- ALC_CMS.1: 1
- ALC_CMS.5: 10
- ALC_DEL.1: 7
- ALC_DVS.1: 1
- ALC_DVS.2: 17
- ALC_LCD.1: 9
- ALC_TAT.1: 2
- ALC_TAT.2: 13
- ASE:
- ASE_CCL.1: 16
- ASE_ECD.1: 14
- ASE_INT.1: 16
- ASE_OBJ.2: 13
- ASE_REQ.1: 2
- ASE_REQ.2: 15
- ASE_SPD.1: 10
- ASE_TSS.1: 7
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 7
- ATE_DPT.1: 2
- ATE_DPT.3: 10
- ATE_FUN.1: 13
- ATE_IND.2: 9
- AVA:
- AVA_VAN.4: 1
- AVA_VAN.5: 19
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 1
- FCS_CKM.1.1: 6
- FCS_CKM.2: 3
- FCS_CKM.3: 3
- FCS_CKM.4: 2
- FCS_CKM.4.1: 2
- FCS_COP: 1
- FCS_COP.1: 10
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 12
- FDP_ACF.1: 23
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 13
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 9
- FDP_ETC.1: 3
- FDP_ETC.1.1: 2
- FDP_ETC.1.2: 2
- FDP_ITC.1: 4
- FDP_ITC.1.1: 2
- FDP_ITC.1.2: 2
- FDP_ITC.1.3: 2
- FDP_RIP.1: 1
- FDP_RIP.1.1: 2
- FDP_SDI.2: 5
- FDP_SDI.2.1: 8
- FDP_SDI.2.2: 8
- FDP_UIT: 2
- FDP_UIT.1: 11
- FDP_UIT.1.1: 7
- FDP_UIT.1.2: 7
- FIA:
- FIA_AFL.1: 1
- FIA_AFL.1.1: 21
- FIA_AFL.1.2: 3
- FIA_ATD.1: 1
- FIA_ATD.1.1: 2
- FIA_UAU.1: 3
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 2
- FIA_UID.1: 4
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 1
- FMT_MOF.1.1: 2
- FMT_MSA: 1
- FMT_MSA.1: 1
- FMT_MSA.1.1: 5
- FMT_MSA.2: 1
- FMT_MSA.2.1: 2
- FMT_MSA.3: 1
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 2
- FMT_MTD: 1
- FMT_MTD.1: 2
- FMT_MTD.1.1: 5
- FMT_SMF.1: 13
- FMT_SMF.1.1: 4
- FMT_SMR.1: 1
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_AMT.1: 1
- FPT_AMT.1.1: 3
- FPT_FLS.1: 1
- FPT_FLS.1.1: 7
- FPT_PHP.1: 1
- FPT_PHP.1.1: 6
- FPT_PHP.1.2: 6
- FPT_PHP.3: 1
- FPT_PHP.3.1: 6
- FPT_TST.1: 1
- FPT_TST.1.1: 3
- FPT_TST.1.2: 4
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 18
- FTP_ITC.1.1: 10
- FTP_ITC.1.2: 10
- FTP_ITC.1.3: 10
- FTP_TRP: 5
- FTP_TRP.1: 12
- FTP_TRP.1.1: 5
- FTP_TRP.1.2: 5
- FTP_TRP.1.3: 5
|
- FAU:
- FAU_ARP.1: 6
- FAU_ARP.1.1: 1
- FAU_GEN.1: 3
- FAU_SAA.1: 8
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FCS:
- FCS_CKM.1: 26
- FCS_CKM.1.1: 3
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.4: 20
- FCS_CKM.4.1: 1
- FCS_COP.1: 39
- FCS_COP.1.1: 7
- FCS_RNG: 2
- FCS_RNG.1: 12
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.2: 12
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 18
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 8
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 6
- FDP_UCT.1.1: 1
- FDP_UIT.1: 5
- FDP_UIT.1.1: 2
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 12
- FIA_ATD.1.1: 2
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 24
- FIA_UAU.1.1: 4
- FIA_UAU.1.2: 4
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 5
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 12
- FMT_MSA.1.1: 3
- FMT_MSA.3: 9
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_MTD.2: 6
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 17
- FMT_SMR.1.1: 5
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 5
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS.1: 7
- FPT_FLS.1.1: 2
- FPT_PHP.3: 6
- FPT_RCV.2: 1
- FPT_RCV.3: 5
- FPT_RCV.3.1: 1
- FPT_RCV.3.2: 1
- FPT_RCV.3.3: 1
- FPT_RCV.3.4: 1
- FPT_RCV.4: 4
- FPT_RCV.4.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CGA: 1
- A.MANAGE: 3
- A.PERSONALIZATION: 3
- A.SGA: 1
- A.VAD: 4
- OE:
- OT:
- T:
|
- D:
- D.APP_CODE: 1
- D.APP_DATA: 1
- D.CRYPTO: 1
- D.PIN: 1
- D.SEC_DATA: 1
- D.TS_CODE: 1
- D.TS_DATA: 1
- O:
- OP:
- OP.ARRAY_ACCESS: 5
- OP.CREATE: 3
- OP.DELETE: 10
- OP.INSTALL: 10
- OP.INSTANCE_FIELD: 5
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 5
- OP.JAVA: 3
- OP.LOAD: 10
- OP.THROW: 5
- OP.TYPE_ACCESS: 7
|
pdf_data/st_keywords/vendor |
- STMicroelectronics:
- STM: 1
- STMicroelectronics: 1
|
- Infineon:
- Infineon: 8
- Infineon Technologies: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 6
- SHA-224: 2
- SHA-256: 1
- SHA-384: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 3
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
- FI:
- DFA: 1
- Physical tampering: 1
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCIMB-2005-08-001: 1
- CCIMB-2005-08-002: 1
- CCIMB-2005-08-003: 1
- FIPS:
- FIPS PUB 113: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-1: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 14443-2: 1
- ISO/IEC 14443-3: 1
- ISO/IEC 14443-4: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 15408:2005: 2
- ISO/IEC 7816: 4
- ISO/IEC 7816-: 1
- ISO/IEC 9797-1: 1
- PKCS:
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 2
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- NIST:
- PKCS:
- PKCS #1: 2
- PKCS#1: 1
- PKCS#2: 2
- RFC:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- the application although it is possible to load the application on the FLASH of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE The TOE is the Javacard Platform that supports the analysis: 1
|
pdf_data/st_metadata |
- /Author: ST Incard Srl
- /CreationDate: Wed Dec 22 1999
- /CreationDate--Text: Wed Dec 22 1999
- /Keywords: BSI-DSZ-CC-0422
- /ModDate: D:20080516075017+02'00'
- /Producer: AFPL Ghostscript 7.0
- /Subject: BSI-DSZ-CC-0422
- /Title: Touch&Sign2048 V1.00 - Security Target
- pdf_file_size_bytes: 721164
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |