Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43
BSI-DSZ-CC-0329-2006
Apollo OS e-Passport Version 1.0
JISEC-CC-CRP-C0229
name Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43 Apollo OS e-Passport Version 1.0
scheme DE JP
not_valid_after 01.09.2019 31.07.2014
not_valid_before 28.03.2006 27.07.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0329a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0229_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0329b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0229_est.pdf
manufacturer Renesas SC Square LTD.
manufacturer_web https://am.renesas.com/ https://www.scsquare.com/
security_level ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 AVA_MSU.3, EAL4+, AVA_VLA.4
dgst b059b04aeee5dc3e 2b75001bea02144e
heuristics/cert_id BSI-DSZ-CC-0329-2006 JISEC-CC-CRP-C0229
heuristics/cert_lab BSI []
heuristics/extracted_sars ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1, AVA_MSU.3 ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3
heuristics/extracted_versions 1.43 1.0
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0353-2006, BSI-DSZ-CC-0379-2006, BSI-DSZ-CC-0341-2006 {}
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0399-2007
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0350-2007, BSI-DSZ-CC-0341-2006, BSI-DSZ-CC-0386-2006, BSI-DSZ-CC-0353-2006, BSI-DSZ-CC-0434-2007, BSI-DSZ-CC-0490-2008, BSI-DSZ-CC-0379-2006, BSI-DSZ-CC-0529-2010, BSI-DSZ-CC-0489-2008 {}
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0229
  • certification_date: 01.07.2009
  • claim: EAL4+ ADV_IMP.2, ALC_DVS.2 PP
  • enhanced:
    • assurance_level: EAL4 Augmented with ADV_IMP.2, ALC_DVS.2
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0229_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The Target of Evaluation (TOE) is the contactless integrated circuit chip of machine readable travel documents (MRTD's chip) programmed according to the Logical Data Structure (LDS) [LDS] and providing the Basic Access Control according to the ICAO technical report [PKI]. The MRTD is viewed as unit of - The physical MRTD as travel document in form of paper, plastic and chip. It presents visual readable data including (but not limited to) personal data of the MRTD holder - the biographical data on the biographical data page of the passport book, - the printed data in the Machine Readable Zone (MRZ) and - The printed portrait. - The logical MRTD as data of the MRTD holder stored according to the Logical Data Structure [LDS] as specified by ICAO on the contactless integrated circuit. It presents contactless readable data including (but not limited to) personal data of the MRTD holder - the digital Machine Readable Zone Data (digital MRZ data, EF.DG1), - the digitized portraits (EF.DG2), - the biometric reference data of finger(s) (EF.DG3) or iris image(s) (EF.DG4) or both - the other data according to LDS (EF.DG5 to EF.DG16) and - the Document security object The physical MRTD is protected by physical security measures (e.g. watermark on paper, security printing), logical (e.g. authentication keys of the MRTD痴 chip) and organisational security measures (e.g. control of materials, personalization procedures) [SSMR]. These security measures include the binding of the MRTD痴 chip to the passport book. The logical MRTD is protected in authenticity and integrity by a digital signature created by the document signer acting for the issuing State or Organization and the security features of the MRTD痴 chip. TOE security functions TOE security function is as follows - SF.Cryptographic Support The cryptographic support for the other Security Functions. - SF.Identification and Authentication The identification and authentication for the TOE user - SF. User Data Protection The user data protection - SF.Security Management The security management of the TOE - SF.Protection (Protection of TSC) This Security Function protects the TSF functionality, TSF data and user data.
    • evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
    • product: Apollo OS e-Passport
    • product_type: IT Product (IC chip firmware)
    • protection_profile: BSI-PP-0017
    • report_link: https://www.ipa.go.jp/en/security/c0229_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0229_est.pdf
    • toe_version: 1.0
    • vendor: SC Square LTD.
  • expiration_date: 01.07.2014
  • supplier: SC Square LTD.
  • toe_japan_name: Apollo OS e-Passport 1.0
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0229_it8194.html
  • toe_overseas_name: Apollo OS e-Passport 1.0
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0399-2007
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0399-2007
pdf_data/report_filename 0329a.pdf c0229_erpt.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0329-2006
    • cert_item: Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43
    • cert_lab: BSI
    • developer: Renesas Technology Corp
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0329-2006: 30
  • DE:
    • BSI-DSZ-CC-0399-2007: 1
  • JP:
    • CRP-C0229-01: 1
    • Certification No. C0229: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 4
  • BSI:
    • BSI-PP-0017: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 3
    • EAL 4 augmented: 2
    • EAL 4+: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 12
    • EAL4 augmented: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL4: 3
    • EAL4 augmented: 2
    • EAL5+: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 2
    • ACM_CAP: 2
    • ACM_CAP.4: 2
    • ACM_SCP: 2
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 2
    • ADO_IGS: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.2: 5
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 2
    • ALC_TAT: 2
    • ALC_TAT.1: 2
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
  • ADV:
    • ADV_IMP.2: 3
  • ALC:
    • ALC_DVS.2: 4
  • AVA:
    • AVA_MSU.3: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP.1: 4
    • FCS_RND.1: 2
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
    • FDP_IFC.1: 2
    • FDP_ITT.1: 2
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 2
    • FPT_PHP.3: 1
    • FPT_SEP.1: 1
  • FRU:
    • FRU_FLT.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.INSP_SYS: 1
    • A.PERS_AGENT: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
  • Infineon:
    • Infineon: 2
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 2
    • TÜViT: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 4
      • Triple-DES: 3
    • DES:
      • DES: 15
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • RIPEMD:
    • RIPEMD-160: 1
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 5
  • RNG:
    • RNG: 10
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • physical tampering: 1
  • SCA:
    • Physical probing: 1
    • physical probing: 1
  • FI:
    • Fault Injection: 1
    • Malfunction: 1
    • Physical Tampering: 1
    • Physical tampering: 1
    • fault injection: 3
    • malfunction: 3
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • physical probing: 1
  • other:
    • reverse engineering: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 1
    • AIS20: 1
    • AIS31: 1
    • AIS36: 1
  • FIPS:
    • FIPS PUB 180-1: 2
    • FIPS PUB 46-3: 3
  • ISO:
    • ISO/IEC 15408:1999: 1
    • ISO/IEC15408: 1999: 1
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 23: 1
    • AIS 31: 1
    • AIS 32: 1
    • AIS 34: 1
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ICAO:
    • ICAO: 7
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 27 January 2006 (confidential document) [10] FIPS PUB 46-3 Federal Information Processing Standards Publication Data Encryption Standard: 1
    • HD65255C1) Version 02 with ACL version 1.43 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Protection Profile BSI-PP-0002-2001, Version v1.0, Smartcard IC platform Protection Profile: 1
    • HD65255C1) Version 02 with ACL version 1.43 Smartcard Security Target, Renesas Technology Corp. (confidential document)). The evaluators verified, that the threats and the security objectives for the life cycle phases: 1
    • Technical Report lite, Version 1.0, 22 March 2006, ETR-lite for composition according to AIS36 (confidential document) [17] Smartcard Integrated Circuit Platform Augmentations, v1.0, Atmel, Hitachi Europe, Infineon: 1
    • Technical Report, Version 1.0, March 22, 2006, Evaluation Technical Report BSI-DSC-CC-0329 (confidential document) [9] Renesas 32-bit Smart Card Microcomputer AE-5 Series User Guidance Manual, Rev. 4.40, Renesas: 1
pdf_data/report_metadata
  • /Author: BSI
  • /Category: Common Criteria Zertfikat
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /CreationDate: D:20060329121735+02'00'
  • /Creator: Acrobat PDFMaker 7.0.7 für Word
  • /Keywords: Renesas AE55C1 (HD65255C1) smartcard integrated circuit version 02 with ACL version 1.43; BSI-DSZ-CC-0329-2006, CC,
  • /ModDate: D:20060329121911+02'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20060329101620
  • /Title: Certification Report BSI-DSZ-CC-0329-2006
  • pdf_file_size_bytes: 341601
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
  • /CreationDate: D:20090910140719+09'00'
  • /ModDate: D:20090910140719+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 170365
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 27
pdf_data/st_filename 0329b.pdf c0229_est.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0399-2007: 1
  • NL:
    • CC-1: 3
    • CC-2: 3
    • CC-3: 2
    • CC-4: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0002: 4
    • BSI-PP-0002: 82
  • BSI:
    • BSI-PP-0002-2001: 1
    • BSI-PP-0017: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 6
    • EAL4 augmented: 2
  • EAL:
    • EAL 4+: 1
    • EAL 5+: 1
    • EAL4: 9
    • EAL4 augmented: 2
    • EAL4+: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 1
    • ACM_SCP: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 2
    • ADV_LLD: 1
    • ADV_RCR: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 4
  • AGD:
    • AGD_ADM: 3
    • AGD_USR: 3
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_LCD: 1
    • ALC_TAT: 1
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.3: 2
    • AVA_SOF: 7
    • AVA_VLA: 1
    • AVA_VLA.4: 1
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
  • ADO:
    • ADO_DEL: 1
    • ADO_DEL.2: 1
    • ADO_IGS: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.2: 8
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 3
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_MSU.3: 1
    • AVA_SOF.1: 1
    • AVA_VLA.2: 1
    • AVA_VLA.4: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAS.1: 9
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 32
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 3
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 52
    • FCS_COP.1.1: 5
    • FCS_RND: 1
    • FCS_RND.1: 16
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 27
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 30
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 3
    • FDP_ITC.1: 18
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 23
    • FDP_ITT.1.1: 1
    • FDP_SDI.1: 1
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 10
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 10
    • FMT_LIM.2.1: 1
    • FMT_MSA.1: 2
    • FMT_MSA.2: 22
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 9
    • FMT_SMR.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 31
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 21
    • FPT_ITT.1.1: 2
    • FPT_PHP.3: 12
    • FPT_PHP.3.1: 1
    • FPT_SEP.1: 12
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FRU:
    • FRU_FLT.1: 1
    • FRU_FLT.2: 15
  • FAU:
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 4
  • FCS:
    • FCS_CKM: 22
    • FCS_CKM.1: 30
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.4: 33
    • FCS_COP: 46
    • FCS_COP.1: 24
    • FCS_RND: 8
    • FCS_RND.1: 13
    • FCS_UIT: 1
  • FDP:
    • FDP_ACC: 19
    • FDP_ACC.1: 25
    • FDP_ACC.1.1: 1
    • FDP_ACF: 15
    • FDP_ACF.1: 34
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU: 2
    • FDP_DAU.1: 5
    • FDP_IFC: 1
    • FDP_IFC.1: 9
    • FDP_IFF: 1
    • FDP_ITC.1: 17
    • FDP_ITC.2: 13
    • FDP_SDI.1: 1
    • FDP_SDI.2: 1
    • FDP_UCT: 12
    • FDP_UCT.1: 12
    • FDP_UIT: 12
    • FDP_UIT.1: 13
  • FIA:
    • FIA_API: 6
    • FIA_API.1: 1
    • FIA_UAU: 36
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 3
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 7
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 4
    • FIA_UAU.6: 7
    • FIA_UCT: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 3
    • FIA_UID.1.2: 3
  • FMT:
    • FMT_LIM.1: 12
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 12
    • FMT_LIM.2.1: 3
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 4
    • FMT_MSA.1: 2
    • FMT_MSA.2: 22
    • FMT_MSA.3: 4
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 22
    • FMT_MTD.1: 14
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 3
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 11
    • FPT_FLS.1.1: 3
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 4
    • FPT_RVM.1: 6
    • FPT_RVM.1.1: 3
    • FPT_SEP.1: 8
    • FPT_SEP.1.1: 4
    • FPT_SEP.1.2: 4
    • FPT_TST: 1
    • FPT_TST.1: 11
    • FPT_TST.1.1: 3
    • FPT_TST.1.2: 3
    • FPT_TST.1.3: 4
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_TRP.1: 8
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 5
  • T:
    • T.RND: 5
  • A:
    • A.INSP_SYS: 2
    • A.PERS_AGENT: 2
  • O:
    • O.RND: 1
  • OE:
    • OE.EXAM_MRTD: 1
    • OE.PERSONALIZATION: 2
    • OE.PROT_LOGICAL_MRTD: 2
  • OT:
    • OT.AC_PERS: 4
    • OT.DATA_CONF: 3
    • OT.PROT_ABUSE_FU: 2
    • OT.PROT_ABUSE_FUNC: 1
    • OT.PROT_INF_LEAK: 2
    • OT.PROT_MALFUNCT: 2
    • OT.PROT_PHYS_TAMPER: 1
  • T:
    • T.ABUSE_FUNC: 1
    • T.CHIP_ID: 1
    • T.EAVESDROPPING: 1
    • T.FORGERY: 1
    • T.INFORMATION_LEAKAGE: 1
    • T.MALFUNCTION: 1
    • T.PHYS_TAMPER: 1
    • T.SKIMMING: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
  • Infineon:
    • Infineon: 2
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 18
      • Triple-DES: 3
    • DES:
      • DES: 51
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 22
    • DES:
      • DES: 11
pdf_data/st_keywords/hash_function
  • RIPEMD:
    • RIPEMD-160: 11
  • SHA:
    • SHA1:
      • SHA-1: 19
  • SHA:
    • SHA1:
      • SHA-1: 7
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 10
pdf_data/st_keywords/crypto_protocol
  • PGP:
    • PGP: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 13
  • RNG:
    • RND: 10
    • RNG: 21
  • TRNG:
    • TRNG: 8
  • RNG:
    • RND: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 3
  • CBC:
    • CBC: 6
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 2
    • Malfunction: 15
    • malfunction: 5
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 16
    • Physical Probing: 2
    • Physical probing: 1
    • physical probing: 4
  • FI:
    • Malfunction: 5
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 8
  • SCA:
    • DPA: 1
    • Leak-Inherent: 2
    • physical probing: 4
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 1
    • EF.DG16: 1
    • EF.DG2: 1
    • EF.DG3: 1
    • EF.DG4: 1
    • EF.DG5: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
    • AIS20: 4
    • AIS31: 6
  • FIPS:
    • FIPS PUB 180-1: 3
    • FIPS PUB 46-3: 4
  • ISO:
    • ISO/IEC 10118-: 1
    • ISO/IEC 9796-2: 5
    • ISO/IEC7816-3: 1
  • BSI:
    • AIS31: 5
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • FIPS:
    • FIPS 180-2: 3
    • FIPS 180-212: 1
    • FIPS 46-3: 3
    • FIPS PUB 46-3: 1
  • ICAO:
    • ICAO: 12
  • ISO:
    • ISO/IEC 7816: 2
pdf_data/st_metadata
  • /CreationDate: D:20060202164233+09'00'
  • /Creator: クセロPDF v1.12 Rev0480
  • /ModDate: D:20060202164431-08'00'
  • /Producer: Xelo PDF Library
  • pdf_file_size_bytes: 1096866
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 74
  • /CreationDate: D:20090812100814Z
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20090812131114+03'00'
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1066290
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 116
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different