Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Renesas HD65256D1 Version 02
BSI-DSZ-CC-0529-2010
ePass Applet on Sm@rtCafé® Expert 8.0 C2 v1.0
NSCIB-CC-2300051-01-CR
name Renesas HD65256D1 Version 02 ePass Applet on Sm@rtCafé® Expert 8.0 C2 v1.0
scheme DE NL
status archived active
not_valid_after 01.09.2019 12.12.2028
not_valid_before 24.03.2010 12.12.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2300051-01-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0529a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2300051-01-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0529b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2300051-01_STLite%20v2.pdf
manufacturer Renesas Technology Corporation Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei
manufacturer_web https://am.renesas.com/ https://www.veridos.com
security_level ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 AVA_VAN.5, EAL5+, ALC_DVS.2
dgst ac37e8c6afcb4efc 901e89b0e69f416b
heuristics/cert_id BSI-DSZ-CC-0529-2010 NSCIB-CC-2300051-01-CR
heuristics/cert_lab BSI
heuristics/extracted_sars ALC_DVS.2, ADV_IMP.2, ALC_TAT.1, ALC_LCD.1, AVA_VLA.4, ADV_SPM.1, AVA_MSU.3 ALC_FLR.1, AVA_VAN.5, ALC_DVS.2, ATE_DPT.2
heuristics/extracted_versions 02 8.0, 1.0
heuristics/report_references/directly_referencing BSI-DSZ-CC-0489-2008, BSI-DSZ-CC-0434-2007 NSCIB-CC-2300005-01-CR, BSI-DSZ-CC-1107-V3-2022
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0353-2006, BSI-DSZ-CC-0489-2008, BSI-DSZ-CC-0329-2006, BSI-DSZ-CC-0350-2007, BSI-DSZ-CC-0434-2007 NSCIB-CC-2300005-01-CR, BSI-DSZ-CC-1107-V3-2022
heuristics/scheme_data
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/protection_profiles {} a33327d40f253f46, b380aabf93b29692, 60455fc9564e2545
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf
pdf_data/cert_filename NSCIB-2300051-01-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • NSCIB-2300051-01: 1
    • NSCIB-CC-2300051-01: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 3
    • ALC_FLR: 1
    • ALC_FLR.3: 1
  • ATE:
    • ATE_DPT.2: 1
  • AVA:
    • AVA_VAN.5: 2
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
  • GD:
    • Giesecke+Devrient: 2
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
  • PACE:
    • PACE: 3
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 18045:2008: 1
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Microsoft Office User
  • /CreationDate: D:20240207150315+00'00'
  • /Creator: Microsoft® Word 2021
  • /ModDate: D:20240207150315+00'00'
  • /Producer: Microsoft® Word 2021
  • /Title: NSCIB Certificate
  • pdf_file_size_bytes: 72381
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 0529a_pdf.pdf NSCIB-2300051-01-CR.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0529-2010
    • cert_item: Renesas HD65256D1 Version 02
    • cert_lab: BSI
    • developer: Renesas Technology Corp. sponsored by Renesas Technology Europe Ltd
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • NL:
  • DE:
  • NL:
    • cert_id: NSCIB-CC-2300051-01-CR
    • cert_item: ePass Applet on Sm@rtCafé® Expert 8.0 C2 v1.0
    • cert_lab: SGS Brightsight B.V.
    • developer: Giesecke+Devrient Mobile Security GmbH
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0434-2007: 4
    • BSI-DSZ-CC-0489-2008: 1
    • BSI-DSZ-CC-0529: 2
    • BSI-DSZ-CC-0529-2010: 18
  • DE:
    • BSI-DSZ-CC-1107-: 2
    • BSI-DSZ-CC-1107-V3-2022: 2
  • NL:
    • NSCIB-2300051-01: 1
    • NSCIB-CC-2300005-01: 1
    • NSCIB-CC-2300051-01-CR: 12
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 4
  • BSI:
    • BSI-CC-PP-0055-2009: 1
    • BSI-CC-PP-0056-V2-: 1
    • BSI-CC-PP-0068-V2-MA-01: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 9
    • EAL 4 augmented: 3
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL 4: 1
    • EAL 5: 2
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 2
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_IMP.2: 5
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_DVS.2: 6
  • ATE:
    • ATE_DPT.2: 2
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • Philips:
    • Philips: 1
  • GD:
    • Giesecke+Devrient: 4
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 3
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 6
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 8
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • SCA:
    • physical probing: 1
  • other:
    • JIL: 3
  • other:
    • JIL: 2
    • JIL-AAPS: 1
    • JIL-AM: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 25: 3
    • AIS 26: 3
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 38: 1
    • AIS31: 1
    • AIS37: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
  • BSI:
    • AIS 36: 1
  • ICAO:
    • ICAO: 5
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 02 (HD65256D1), Brightsight (confidential document) [8] Configuration list for the TOE, Version 0.6.6, 22 July 2009, Document Version for the Common: 1
    • 5.0, 14 July 2009, HD65256D1 Version 02 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Evaluation Technical Report, Version 3.0, 8 February 2010, Evaluation Technical Report AE56D1: 1
    • confidential document) [9] Security Target BSI-DSZ-CC-0529, Version 2.0, 14 July 2009, HD65256D1 Version 02 Smartcard: 1
  • ConfidentialDocument:
    • V3-2022, Version 5, 2022-05-11, “ETR for Composition”, TÜV Informationstechnik GmbH (confidential document) [HW-ST] Security Target Lite BSI-DSZ-CC-1107-V3-2022, Version 4.3.1, 2022-05-10, “IFX_CCI_00002Dh: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20100413092737+02'00'
  • /Creator: Writer
  • /Keywords: "Certification, Common Criteria, Renesas HD65256D1 Version 02, Renesas Technology Europe Ltd, Renesas Technology Corp."
  • /ModDate: D:20100422145117+02'00'
  • /Producer: OpenOffice.org 3.1
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0529-2010
  • pdf_file_size_bytes: 370401
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
pdf_data/st_filename 0529b_pdf.pdf NSCIB-2300051-01_STLite v2.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-V3-2022: 2
  • NL:
    • CC-22-0289060: 1
    • NSCIB-CC-23-2300005-01-CR: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0002: 4
    • BSI-PP-0002: 82
  • BSI:
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0099-V2-2020: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 6
    • EAL4 augmented: 2
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL4: 3
    • EAL4 augmented: 1
    • EAL5: 5
    • EAL5 augmented: 3
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 1
    • ACM_SCP: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 2
    • ADV_LLD: 1
    • ADV_RCR: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 4
  • AGD:
    • AGD_ADM: 3
    • AGD_USR: 3
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_LCD: 1
    • ALC_TAT: 1
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.3: 2
    • AVA_SOF: 6
    • AVA_VLA: 1
    • AVA_VLA.4: 1
  • ALC:
    • ALC_DVS.2: 9
    • ALC_FLR.1: 1
  • ATE:
    • ATE_DPT.2: 3
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAS.1: 9
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 19
    • FCS_COP.1.1: 2
    • FCS_RND: 1
    • FCS_RND.1: 9
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 16
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 17
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 1
    • FDP_ITC.1: 12
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 10
    • FDP_ITT.1.1: 1
    • FDP_SDI.1: 1
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 10
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 10
    • FMT_LIM.2.1: 1
    • FMT_MSA.1: 2
    • FMT_MSA.2: 14
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 6
    • FMT_SMR.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 30
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 9
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 12
    • FPT_PHP.3.1: 1
    • FPT_SEP.1: 11
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FRU:
    • FRU_FLT.1: 1
    • FRU_FLT.2: 15
  • FAU:
    • FAU_ARP.1: 1
    • FAU_SAS: 3
    • FAU_SAS.1: 6
    • FAU_SAS.1.1: 1
    • FAU_UAU.4: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 16
    • FCS_CKM.1: 22
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.3: 1
    • FCS_CKM.4: 23
    • FCS_CKM.4.1: 1
    • FCS_COP: 51
    • FCS_COP.1: 32
    • FCS_RND.1: 6
    • FCS_RND.1.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 10
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF: 9
    • FDP_ACF.1: 25
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 4
    • FDP_IFF: 2
    • FDP_ITC: 1
    • FDP_ITC.1: 11
    • FDP_ITC.2: 11
    • FDP_RIP: 15
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
    • FDP_ROL: 1
    • FDP_SDI.2: 1
    • FDP_UCT: 4
    • FDP_UCT.1: 6
    • FDP_UCT.1.1: 1
    • FDP_UIT: 5
    • FDP_UIT.1: 5
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 4
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 5
    • FIA_API.1: 4
    • FIA_API.1.1: 1
    • FIA_ATD: 1
    • FIA_UAU: 30
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 11
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 1
    • FIA_UID: 10
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 1
  • FMT:
    • FMT_LIM: 6
    • FMT_LIM.1: 12
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 13
    • FMT_LIM.2.1: 3
    • FMT_MSA: 9
    • FMT_MSA.3: 3
    • FMT_MTD: 48
    • FMT_MTD.1: 18
    • FMT_MTD.3: 6
    • FMT_MTD.3.1: 1
    • FMT_SMF: 5
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR: 12
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 7
    • FPT_EMS.1.1: 1
    • FPT_EMS.1.2: 1
    • FPT_FLS: 10
    • FPT_FLS.1: 11
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 8
    • FPT_PHP.3.1: 1
    • FPT_RCV: 1
    • FPT_TDC.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 9
    • FTP_ITC.1: 8
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 4
  • T:
    • T.RND: 4
  • A:
    • A.APPLET: 1
    • A.CAP_FILE: 1
    • A.VERIFICATION: 1
  • O:
    • O.ALARM: 1
    • O.ARRAY_VIEWS_CONFID: 1
    • O.ARRAY_VIEWS_INTEG: 1
    • O.CARD-MANAGEMENT: 1
    • O.CIPHER: 1
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CON: 1
    • O.GLOBAL_ARRAYS_INTE: 1
    • O.INSTALL: 1
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.RNG: 1
    • O.SCP: 1
    • O.SID: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.BAC_PP: 1
    • OE.CAP_FILE: 1
    • OE.CODE-EVIDENCE: 1
    • OE.VERIFICATION: 1
  • OT:
    • OT.SCP: 2
  • T:
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.DELETION: 1
    • T.EXE-CODE: 2
    • T.INSTALL: 1
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 2
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 1
    • T.SECURE_DELETION: 1
    • T.SID: 2
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
  • GD:
    • G+D: 5
    • Giesecke+Devrient: 10
  • Infineon:
    • Infineon: 3
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 52
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • 3DES: 3
      • Triple-DES: 13
    • DES:
      • DES: 8
  • constructions:
    • MAC:
      • CMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 7
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 10
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 86
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 8
    • RNG: 18
  • RNG:
    • RND: 1
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 4
  • CBC:
    • CBC: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 2
    • P-521: 4
    • secp256r1: 1
    • secp384r1: 1
    • secp521r1: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 2
    • Malfunction: 15
    • malfunction: 5
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 16
    • Physical Probing: 2
    • Physical probing: 1
    • physical probing: 4
  • FI:
    • malfunction: 2
    • physical tampering: 5
  • SCA:
    • physical probing: 2
    • side channel: 2
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 8
    • EF.DG1: 14
    • EF.DG14: 3
    • EF.DG15: 1
    • EF.DG16: 14
    • EF.DG2: 5
    • EF.DG3: 11
    • EF.DG4: 11
    • EF.DG5: 5
    • EF.SOD: 12
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 31: 1
    • AIS31: 7
  • FIPS:
    • FIPS PUB 46-3: 3
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
    • AIS20: 6
    • AIS31: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-294: 1
    • FIPS 197: 1
    • FIPS 46-3: 2
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 2
    • FIPS197: 1
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 14888-3: 4
    • ISO/IEC 7816-2: 3
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS#3: 2
    • PKCS1: 2
  • RFC:
    • RFC 5639: 1
    • RFC5639: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • is also a part of TOE. But in the case of the package includes another chip, another chip is out of scope of the TOE. The package type is listed in section 2.1.1. 1.3 ST Overview This document is the ST: 1
    • out of scope: 1
  • OutOfScope:
    • No contradiction to this ST. FDP_IFF.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FDP_RIP.1/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FDP_RIP.1/TRANSIENT IP_SFR No correspondence. Out of scope (internal Java Card functionality: 1
    • No contradiction to this ST. FDP_RIP.1/bArray IP_SFR No correspondence. Out of scope (internal Java Card functionality: 1
    • No contradiction to this ST. FIA_UID.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FIA_USB.1/AID IP_SFR No correspondence Out of scope (internal Java Card functionality: 1
    • No contradiction to this ST. FMT_MSA.3/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FMT_MSA.3/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FMT_MTD.3/JCRE IP_SFR No correspondence Out of scope (internal Java Card functionality: 1
    • No contradiction to this ST. FMT_SMR.1/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FMT_SMR.1/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FMT_SMR.1/Installer IP_SFR No correspondence Out of scope (internal Java Card func tionality: 1
    • 20 of 92 Platform Objective Correspondence in this ST References/Remarks O.SID No correspondence Out of scope. No contradiction tothis ST. O.FIREWALL No correspondence Out of scope. No contradiction tothis ST: 1
    • 92 Platform SFR Correspondence in this ST References/Remarks FDP_IFC.2/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_IFF.1/CM IP_SFR No: 1
    • ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality: 1
    • ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/ADEL IP_SFR No: 1
    • DRG.3) that can be used directly. FDP_RIP.1/ABORT IP_SFR No correspondence. Out of scope (internal Java Card functionality: 1
    • FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) All IP_SFRs No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Derivation Algorithm: 1
    • FCS_CKM.1.1/RSA, FCS_CKM.1.1/ECC, FCS_CKM.1.1/3DES, FCS_CKM.1.1/AES) All IP_SFRs No crrespondence. Out of scope. The TOE uses the spe- cific Document Basic Access Key Derivation Algorithm. There are no: 1
    • FDP_RIP.1/ADEL FDP_RIP.1/ODEL FDP_RIP.1/ABORT) All IP_SFRs FMT_MSA.1/JCRE IP_SFR No correspondence Out of scope (internal Java Card Firewall). No contradiction to this ST. FMT_MSA.1/JCVM IP_SFR No correspondence: 1
    • FDP_RIP.1/bArray FDP_RIP.1/KEYS FDP_RIP.1/TRANSIENT No correspondence. Out of scope (internal Java Card Firewall). No contradiction to this ST. 3 Conformance Claims Security Target: 1
    • G OT.Data-Integrity No contradiction to this ST. O.ARRAY_VIEWS_CONFID No correspondence Out of scope. No contradiction to this ST. O.ARRAY_VIEWS_INTEG No correspondence Out of scope. No contradiction: 1
    • Java Card Firewall). No contradiction to this ST. FMT_MSA.2/FIREWALL- JCVM IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
    • No correspondence Out of scope. No contradiction to this ST. O.CARD-MANAGEMENT No correspondence Out of scope. No contradiction to this ST. OT.SCP.IC OT.Prot_Phys-Tamper The objectives are related. No con-: 1
    • O.ALARM No correspondence Out of scope. No contradiction to this ST. O.CIPHER No correspondence Indirectly relevant for the correct: 1
    • O.REALLOCATION No correspondence Out of scope. No contradiction to this ST. O.RESOURCES No correspondence Out of scope. No contradiction to this: 1
    • O.TRANSACTION No correspondence Out of scope. No contradiction to this ST. O.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
    • Out of scope: 86
    • Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
    • Out of scope (internal Java Card fun tionality). No contradiction to this ST. FIA_USB.1/AID IP_SFR No: 1
    • Out of scope (internal Java Card fun tionality). No contradiction to this ST. FMT_MTD.3/JCRE IP_SFR No: 1
    • Out of scope (internal Java Card func tionality). No contradiction to this ST. FPT_FLS.1/Installer IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. 3 Conformance Claims Security: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. CMGR Security Functional: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_UIT.1/CM IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UID.1/CM IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/ADEL IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/CM IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/CM IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/ADEL IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/CM IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/CM IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ADEL IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/CM IP_SFR No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. ODELG Security Functional: 1
    • Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/KEYS IP_SFR No: 1
    • Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/TRANSIENT IP_SFR No: 1
    • Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/bArray IP_SFR No: 1
    • Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_ROL.1/FIREWALL IP_SFR No: 1
    • Out of scope (internal Java Card functionality). No contradiction to this ST. FMT_MTD.1/JCRE IP_SFR No: 1
    • Out of scope (internal Java Card functionality). No contradiction to this ST. INSTG Security Functional: 1
    • Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_RIP.1 (FDP_RIP.1/OBJECTS FDP_RIP: 1
    • Platform Threat Correspondence in this ST References/Remarks T.CONFID-APPLI-DATA No correspondence Out of scope. No contradiction to this ST. T.CONFID-JCS-CODE No correspondence Out of scope. No contradiction to: 1
    • SFR Correspondence in this ST References/Remarks FPT_RCV.3/Installer IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. ADELG Security Functional: 1
    • SID.2 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.1 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.2 No correspondence Out of scope. No contradiction to this: 1
    • ST) Firewall Policy (chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall. The resulting requirements for applets are reflected in the User: 1
    • ST. O.DELETION No correspondence Out of scope. No contradiction to this ST. O.LOAD No correspondence Out of scope. No contradiction to this ST. O: 1
    • ST. T.INSTALL No correspondence Out of scope. No contradiction to this ST. T.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
    • ST. T.INTEG-JCS-DATA No correspondence Out of scope. No contradiction to this ST. T.SID.1 No correspondence Out of scope. No contradiction to this ST: 1
    • T.DELETION No correspondence Out of scope. No contradiction to this ST. T.SECURE_DELETION No correspondence Out of scope. No contradiction to: 1
    • T.INTEG-APPLI-DATA T.Forgery No contradiction to this ST. T.INTEG-APPLI-DATA.LOAD No correspondence Out of scope. No contradiction to this ST. T.INTEG-JCS-CODE No correspondence Out of scope. No contradiction to: 1
    • T.Information_Leakage No contradiction to this ST. T.INTEG-APPLI-CODE No correspondence Out of scope. No contradiction to this ST. T.INTEG-APPLI-CODE.LOAD No correspondence Out of scope. No: 1
    • T.NATIVE No correspondence Out of scope. No contradiction to this ST. T.RESOURCES No correspondence Out of scope. No contradiction to this: 1
    • The objectives are related. No con- tradiction to this ST. O.SCP.SUPPORT No correspondence Out of scope. No contradiction to this 3 Conformance Claims Security Target Lite ePass Applet on Sm@rtCafé®: 1
    • chapter 8.1.1.1 in platform ST) FDP_ACC.2/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall: 1
    • chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID IP_SFR No correspondence. Out of scope (internal Java Card fun tionality: 1
    • complement Java Card OS mechanisms. No contradiction tothis ST. FPT_TDC.1 IP_SFR No correspondence Out of scope (internal Java Card functionality). No contradiction to this ST. FPT_TST.1 RP_SFR-SERV FPT_TST.1: 1
    • defined quality metric (DRG.3) that can be used directly. FDP_RIP.1/ABORT IP_SFR No correspondence. Out of scope (internal Java Card functionality). No contradiction to this ST. FDP_RIP.1/APDU IP_SFR No: 1
    • for the TOE and are covered by SFRs in the platform ST. FTP_ITC.1/CMGR IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SCPG Security Functional: 1
    • internal Java Card Firew a l l ). No contradiction to this ST. FMT_SMF.1 IP_SFR No correspondence Out of scope (internal Java Card Firewall: 1
    • internal Java Card Firewall). No contradiction to this ST. FMT_MSA.1/JCVM IP_SFR No correspondence Out of scope (internal Java Card Firewall: 1
    • internal Java Card Firewall). No contradiction to this ST. FMT_SMR.1 IP_SFR No correspondence Out of scope (internal Java Card Firewall). No contradiction to this ST. Application Programming Interface: 1
    • internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM IP_SFR No correspondence Out of scope (internal Java Virtual Machine: 1
    • managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 IP_SFR No correspondence Out of scope (managed within Java Card OS: 1
    • no corresponding objectives for the TOE of this ST. No contradictions. O.KEY-MNGT No correspondence Out of scope. No contradiction to this ST. O.PIN-MNGT No correspondence Out of scope. No contradiction to this: 1
    • of the TOE. No contradic- tion to this ST. FMT_MSA.3/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
    • of the TOE. No contradic- tion to this ST. FMT_MSA.3/JCVM IP_SFR No correspondence Out of scope (internal Java Card Firew a l l ). No contradiction to this ST. FMT_SMF.1 IP_SFR No correspondence: 1
    • of the TOE. No contradiction to this ST. FDP_ACF.1/FIREWALL IP_SFR No correspondence Out of scope (internal Java Card Firewall). The resulting requirements for applets are reflected in the User: 1
    • of the TOE. No contradiction to this ST. FDP_IFC.1/JCVM IP_SFR No correspondence Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM IP_SFR No: 1
    • or that has been modified after bytecode verification. FCO_NRO.2/CM IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. 3 Conformance Claims Security: 1
    • owns the deleted objects by invoking a specific API method. FDP_RIP.1/ODEL IP_SFR No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ODEL RP_SFR-SERV: 1
    • start-up. AID Management (chapter 8.1.1.4 in platform ST) FIA_ATD.1/AID IP_SFR No correspondence. Out of scope (internal Java Card fun tionality). No contradiction to this ST. FIA_UID.2/AID IP_SFR No: 1
    • this ST. O.NATIVE No correspondence Out of scope. No contradiction to this ST. O.OPERATE No correspondence Out of scope. No contradiction to this ST: 1
    • to this ST. FCS_CKM.2 IP_SFR No correspondence Out of scope (managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 IP_SFR No correspondence Out: 1
    • which addresses security aspects outside the runtime. FDP_ITC.2/Installer IP_SFR No correspondence Out of scope (internal Java Card functionality). No contradiction to this ST. FMT_SMR.1/Installer IP_SFR No: 1
pdf_data/st_metadata
  • /Author: Renesas Electronics Corporation
  • /CreationDate: D:20090714085001+09'00'
  • /Creator: クセロPDF v1.14 Rev0495
  • /Keywords: HD65256D1, Common Criteria Certification, Security Controller, Security Target, EAL4+
  • /ModDate: D:20100422104451+01'00'
  • /Producer: Xelo PDF Library
  • /Subject: Common Criteria Certification BSI-DSZ-CC-0529-2010
  • /Title: HD65256D1 Version 02 Smartcard Security Target -Public Version-
  • pdf_file_size_bytes: 953247
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 62
  • /Author: G+D / stut
  • /CreationDate: D:20231009104359+02'00'
  • /Creator: Microsoft® Word für Microsoft 365
  • /Keywords: Version 2.0/Status 09.10.2023
  • /ModDate: D:20231009104359+02'00'
  • /Producer: Microsoft® Word für Microsoft 365
  • /Subject: ePass Applet on Sm@rtCafé® Expert 8.0 C2
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 1276094
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 92
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different