name |
DMT-CBS-CE3D3 Family (DMT-CBS-CE3D3/CC080/CC048) Dual Interface smart card chips with HAL library, version 2.0 |
RC-SA08/01et RC-SA08/02 version 1.00 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
FR |
status |
archived |
archived |
not_valid_after |
10.02.2022 |
21.08.2022 |
not_valid_before |
10.02.2017 |
21.08.2017 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-093%20CR%20V1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_44fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[09083][SERTIT-093][ST][0.3]%20ASE_DMT-CBS-CE3D3%20Security%20Target%20Lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible2017_44en.pdf |
manufacturer |
Datang Microelectronics Technology Co., Ltd (DMT) |
Sony Corporation |
manufacturer_web |
https://www.dmt.com.cn/English/ |
https://www.sony.com/ |
security_level |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
EAL5+, ASE_TSS.2, ALC_DVS.2, AVA_VAN.5 |
dgst |
ac00266687e9a428 |
549050cd6694b982 |
heuristics/cert_id |
SERTIT-093 |
ANSSI-CC-2017/44 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3 |
heuristics/extracted_versions |
2.0 |
1.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2016/58 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2016/58 |
heuristics/scheme_data |
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 10.02.2017
- developer: Datang Microelectronics Technology Co., Ltd (DMT)
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-093
- certification_date: 10.02.2017
- description: The DMT-CBS-CE3D3 Family TOE is a dual interface smart card chips suitable for instance to support a Java Card OS, ID cards, Banking card, etc. The TOE consists of hardware and IC dedicated software. The hardware is based on a 32-bit CPU with ROM (Non-Volatile Read-Only Memory), EEPROM (Non-volatile Programmable Memory) and RAM (Volatile Memory). The hardware of the DMT-CBS-CE3D3 Family also incorporates communication peripherals and cryptographic coprocessors for execution and acceleration of symmetric and asymmetric cryptographic algorithms. The IC dedicated software contains a library of cryptographic services.
- developer: Datang Microelectronics Technology Co., Ltd (DMT)
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135637-1611769644/SERTIT/Sertifikater/2017/93/SERTIT-093%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135193-1607953274/SERTIT/Sertifikater/2017/93/%5B09083%5D%5BSERTIT-093%5D%5BST%5D%5B0.3%5D%20ASE_DMT-CBS-CE3D3%20Security%20Target%20Lite.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135640-1611769655/SERTIT/Sertifikater/2017/93/SERTIT-093%20CR.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 5, ALC_DVS.2, AVA_VAN.5
- mutual_recognition: CCRA, SOG-IS
- product: 2.0
- sponsor: Datang Microelectronics Technology Co., Ltd (DMT)
- product: DMT-CBS-CE3D3 Family (DMT-CBS-CE3D3/CC080/CC048) Dual Interface smart card chips with HAL library
- url: https://sertit.no/certified-products/product-archive/dmt-cbs-ce3d3-family-dmt-cbs-ce3d3-cc080-cc048-dual-interface-smart-card-chips-with-hal-library
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
cf0f01bcd7be3e9c |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
SERTIT-093 CR V1.0.pdf |
anssi-cc-2017_44fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ASE_TSS.2, ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2017/44
- cert_item: RC-SA08/01 et RC-SA08/02
- cert_item_version: Version 1.00
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa- ku Tokyo, 141-86-10 Japan STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa-ku Tokyo, 141-86-10 Japan
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP 0084], version 1.0 Security IC Platform Protection Profile with Augmentation Packages
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2016/58: 2
- ANSSI-CC-2017/44: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 5: 2
- EAL 5 augmented: 1
- EAL 5+: 17
- EAL1: 1
- EAL2: 1
- EAL4: 1
- EAL5: 1
- EAL5+: 1
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 4
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.5: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 3
- ATE:
- ATE_COV: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_COP.1: 4
- FCS_RNG.1: 2
- FDP:
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_SDC.1: 3
- FDP_SDI.2: 2
- FMT:
- FMT_LIM.1: 2
- FMT_LIM.2: 2
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FRU:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- SERMA: 1
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408: 2
- ISO/IEC 7816: 2
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /AAPL:Keywords: ['ugradert']
- /Author: Ulrich Isachsen
- /CreationDate: D:20170210134309Z00'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ugradert
- /ModDate: D:20170210134309Z00'00'
- /Producer: Mac OS X 10.12.3 Quartz PDFContext
- /Title: tittel
- pdf_file_size_bytes: 1420130
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /CreationDate: D:20170904143302+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.024
- /ModDate: D:20170911160750+02'00'
- /Producer: Microsoft® Word 2010
- /Subject:
- /Title:
- pdf_file_size_bytes: 531170
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
[09083][SERTIT-093][ST][0.3] ASE_DMT-CBS-CE3D3 Security Target Lite.pdf |
anssi_cible2017_44en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0084-2014: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 2
- EAL5 augmented: 2
|
- EAL:
- EAL5: 9
- EAL5 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP: 1
- ADV_FSP.5: 6
- ADV_IMP.1: 3
- ADV_IMP.2: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.5: 5
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 10
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 3
- ASE_OBJ.2: 1
- ASE_REQ.2: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 9
- ATE:
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.4: 7
- FCS_COP.1: 21
- FCS_COP.1.1: 3
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_IFC.1: 10
- FDP_ITC.1: 7
- FDP_ITC.2: 7
- FDP_ITT.1: 9
- FDP_SDC.1: 7
- FDP_SDC.1.1: 1
- FDP_SDI.1: 2
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 3
- FPT:
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_ITT.1: 10
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FRU:
|
- FAU:
- FAU_SAS: 1
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 2
- FCS_RNG: 1
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACC.2: 1
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 10
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 2
- FDP_ITT.1: 8
- FDP_ITT.1.1: 1
- FDP_RIP.1: 2
- FDP_ROL.1: 1
- FDP_SDC: 1
- FDP_SDC.1: 5
- FDP_SDC.1.1: 1
- FDP_SDI: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_TDC.1: 1
- FIA:
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 2
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UAU.5: 2
- FIA_UID.1: 7
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 2
- FMT:
- FMT_LIM.1: 9
- FMT_LIM.1.1: 1
- FMT_LIM.2: 9
- FMT_LIM.2.1: 1
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MTD.1: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNL.1: 7
- FPR_UNL.1.1: 1
- FPT:
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_RPL.1: 2
- FPT_TDC.1: 1
- FPT_TRP.1: 2
- FRU:
- FRU_FLT.2: 9
- FRU_FLT.2.1: 1
- FRU_RSA.2: 2
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AES: 5
- O.DES: 3
- O.RND: 3
- O.RSA: 4
- O.TDES: 3
- T:
|
- O:
- O.AC: 18
- O.RND: 5
- O.SC: 12
- T:
|
pdf_data/st_keywords/vendor |
|
- STMicroelectronics:
- STM: 7
- STMicroelectronics: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 16
- Triple-DES: 5
- DES:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 7
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 5
- Physical Probing: 2
- physical probing: 3
- side channel: 1
|
- FI:
- Malfunction: 13
- malfunction: 3
- SCA:
- Leak-Inherent: 13
- Physical Probing: 2
- Side-channel: 1
- physical probing: 4
- side-channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 4
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-67: 1
- PKCS:
|
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 18092: 2
- ISO/IEC 7816: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- FeliCa OS, and APDU commands, which are processed by the Java Card System. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. The Java Card System and Java Applets are: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: DMT
- /CreationDate: D:20170125114905+01'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20170125114905+01'00'
- /Producer: Microsoft® Word 2013
- /Title: DMT
- pdf_file_size_bytes: 787920
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |