name |
Sony RC-S957/2 Series with contact-based operating system out of scope, v1.0 |
TESS v7.1 Platform Revision 1.0 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NL |
NL |
status |
archived |
active |
not_valid_after |
24.06.2019 |
02.07.2030 |
not_valid_before |
24.06.2009 |
02.07.2025 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400099-01-Cert.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification_Report_NSCIB-CC-09-10991-CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400099-01-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/957-2-STP-E01-10.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400099-01-ST_lite_v1.1p.pdf |
manufacturer |
Sony Corporation |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.sony.com/ |
https://www.thalesgroup.com/en/europe/france |
security_level |
EAL4 |
EAL4+, AVA_VAN.5, ALC_DVS.2 |
dgst |
b2a375e103b59ffb |
1a9aca884f38af4f |
heuristics/cert_id |
NSCIB-CC-09-10991-CR |
NSCIB-CC-2400099-01-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_LCD.1, ADV_IMP.1, ADV_HLD.2, AGD_USR.1, AVA_VLA.2, ALC_DVS.1, ADV_LLD.1, ADV_RCR.1, ALC_TAT.1, AVA_MSU.2, ADV_FSP.2, ATE_DPT.1, AGD_ADM.1, ATE_IND.2, ADV_SPM.1, ATE_COV.2, AVA_SOF.1, ATE_FUN.1 |
ADV_IMP.1, ASE_OBJ.2, ATE_DPT.1, AVA_VAN.5, ADV_ARC.1, ATE_IND.2, ATE_COV.2, ALC_LCD.1, ASE_TSS.2, ALC_CMS.4, ALC_DVS.2, ASE_ECD.1, AGD_OPE.1, ADV_FSP.4, ASE_INT.1, ASE_SPD.1, ASE_REQ.2, ATE_FUN.1, ADV_TDS.3, AGD_PRE.1, ALC_TAT.1, ALC_DEL.1, ASE_CCL.1, ALC_CMC.4 |
heuristics/extracted_versions |
1.0 |
1.0, 7.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0351-2006 |
ANSSI-CC-2023/46-R01 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0351-2006, BSI-DSZ-CC-0212-2004 |
ANSSI-CC-2023/46-R01 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0351-2006 |
ANSSI-CC-2023/46-R01 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0351-2006 |
ANSSI-CC-2023/46-R01 |
heuristics/protection_profiles |
{} |
1153ad24c84b397a, 3ebd6b9f8d81e522 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0104b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CCN-CC-PP-5-2021.pdf |
pdf_data/cert_filename |
|
NSCIB-CC-2400099-01-Cert.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- NL:
- NSCIB-2400099-01: 1
- NSCIB-CC-2400099-01: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL7: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.3: 1
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Valerie
- /CreationDate: D:20250211144115+00'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20250211144115+00'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 90865
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
Certification_Report_NSCIB-CC-09-10991-CR.pdf |
NSCIB-CC-2400099-01-CR.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-2400099-01-CR
- cert_item: TESS v7.1 Platform Revision 1.0
- cert_lab: SGS Brightsight B.V.
- developer: Thales DIS France SAS
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- NL:
- NSCIB-07-09612: 1
- NSCIB-CC-09-10991: 2
- NSCIB-CC-09-10991-CR: 16
|
- FR:
- NL:
- NSCIB-2400099-01: 1
- NSCIB-CC-2400099-01-CR: 12
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0002: 1
- BSI-PP-0002: 2
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 3
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.1: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_SOF.1: 1
- AVA_VLA.2: 2
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- CESTI:
- SGS:
- SGS: 2
- SGS Brightsight: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- SCA:
- physical probing: 2
- side channels: 1
- other:
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- SCP:
- SCP02: 1
- SCP03: 1
- SCP11: 1
- SCP80: 1
- SCP81: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- 1.2, 9 December 2004. [ST] Security Target RC-S957/2 Series with contact-based operating system out of scope, version 1.1, May 2009. [ST-HW] Renesas AE45X1-C (HD65145X1) Version 03 Smartcard Security Target –: 1
- 19, 2007. [ETR] Evaluation Technical Report, RC-S957/2 Series with contact operating system out of scope (09-RPT-128), Version 2.0, June 23, 2009. [ETR-HW] Renesas AE45X1-C ETR-Lite, version 1.0, July 13: 1
- 24, 2009 3 Security Target The Security Target RC-S957/2 Series with contact-based operating system out of scope (957-2-ST- E01-10), version 1.1, May 2009 is included here by reference. Please note that for the: 1
- Assurance Level (EAL) 4 evaluation is the RC- S957/2 Series with contact operating system out of scope, v1.0 from Sony Corporation located in Tokyo, Japan. This report pertains to the TOE which has the: 1
- Common Criteria security evaluation of the RC- S957/2 Series with contact-based operating system out of scope, v1.0. The developer of the RC- S957/2 Series with contact-based operating system out of scope is: 1
- EAL) 4 evaluation is the RC- S957/2 Series with contact operating system out of scope, v1.0 from Sony Corporation located in Tokyo, Japan: 1
- Evaluation Lab Brightsight BV TOE name RC-S957/2 Series with contact-based operating system out of scope, v1.0 Report title Certification Report Report reference name NSCIB-CC-09-10991-CR number page: 1
- NSCIB-CC-09-10991 Certification Report Sony RC-S957/2 Series with contact-based operating system out of scope, v1.0 Reproduction of this report is authorized provided the report is reproduced in its entirety: 1
- The Target of Evaluation – TOE (i.e., RC-S957/2 Series with contact-based operating system out of scope) is a dual interface integrated circuit with an embedded smartcard operating system. The TOE is: 1
- and was completed on 29 May 2008. The current RC-S957/2 Series with contact operating system out of scope v1.0 has been re-evaluated by Brightsight B.V. located in Delft, The Netherlands and was completed: 1
- as the NSCIB Certification Body, declares that the RC-S957/2 Series with contact operating system out of scope, v1.0 evaluation meets all the conditions for international recognition of Common Criteria: 1
- evaluation results the evaluation lab concluded the RC-S957/2 Series with contact operating system out of scope, v1.0, to be CC Part 2 conformant, CC Part 3 conformant, and to meet the requirements of EAL 4: 1
- evidence, Sony Corporation as the developer of the RC-S957/2 Series with contact operating system out of scope, v1.0 submitted an Impact Analysis Report [IAR] to the NSCIB Certification Body requesting a new: 1
- i.e., RC-S957/2 Series with contact-based operating system out of scope) is a dual interface integrated circuit with an embedded smartcard operating system: 1
- in yellow. The form factor of the smartcard is indicated in gray. The Global Platform OS, which is out of scope of the TOE, is indicated in blue. The components of the TOE “FeliCa Operating System” constitute: 1
- is a “delta” with respect to the evaluation of the “RC-S957 Series with contact operating system out of scope” with certification id NSCIB-07-09612. The difference between this evaluated TOE and the original: 1
- is defined uniquely by its name and version number RC-S957/2 Series with contact operating system out of scope, v1.0 and can be identified by its ROM version: 0C06 and form factor: Antenna Module (IC with: 1
- out of scope: 21
- reader is encrypted (based on single DES). The RC-S957/2 Series with contact-based operating system out of scope has several self-protection mechanisms, as follows: Ø Common smartcard self-protection mechanisms: 2
- recently performed evaluation of the original RC-S957 Series with contact-based operating system out of scope, v1.0. The original RC-S957 Series was certified on June 9th 2008 under the certification: 1
- requirements specified in Security Target RC-S957/2 Series with contact-based operating system out of scope (957-2-ST-E01-10), version 1.1, May 2009. The Security Target does not claim conformance to any: 1
- the evaluation, the intended environment for the RC-S957/2 Series with contact operating system out of scope, the security requirements, and the level of confidence (evaluation assurance level) at which the: 1
|
- OutOfScope:
- JTE) functionalities. - The CSP implements the following modes but they are out of scope of the TOE: - EACv1 - Integrated mapping (DH and ECDH: 1
- Telecom Environment (JTE) functionalities. - The CSP implements the following modes but they are out of scope of the TOE: - EACv1 - Integrated mapping (DH and ECDH) - Generic mapping (DH) 2.4 Architectural: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author: p647
- /CreationDate: D:20090702110646+02'00'
- /Creator: pdfFactory Pro www.pdffactory.com
- /Producer: pdfFactory Pro 3.22 (Windows XP Professional Dutch)
- /Title: Certification Report NSCIB-CC-09-10991-CR.doc
- pdf_file_size_bytes: 253688
- pdf_hyperlinks: mailto:[email protected], http://www.commoncriteriaportal.org
- pdf_is_encrypted: True
- pdf_number_of_pages: 16
|
|
pdf_data/st_filename |
957-2-STP-E01-10.pdf |
NSCIB-CC-2400099-01-ST_lite_v1.1p.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0351-2006: 1
- BSI-DSZ-CC-0351-2006-MA-01: 1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0099-V2-2020: 1
- BSI-CC-PP-0104-2019: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 7
- EAL4 augmented: 2
- EAL4+: 2
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 6
- AGD:
- ALC:
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_SOF.1: 1
- AVA_VLA.2: 1
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 7
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 4
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 4
- AGD:
- AGD_OPE.1: 9
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 5
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 4
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 1
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 5
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_COP: 18
- FCS_COP.1: 4
- FCS_MSA.3: 1
- FCS_RCV.4: 2
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 10
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 3
- FIA:
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.3: 8
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.2: 5
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 6
- FPT_PHP.3.1: 1
- FPT_RCV.4: 7
- FPT_RCV.4.1: 1
- FPT_RVM.1: 10
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_ARP.1: 15
- FAU_ARP.1.1: 2
- FAU_GEN: 1
- FAU_SAA.1: 3
- FAU_SAS.1: 1
- FCO:
- FCO_NRO: 28
- FCO_NRO.2: 9
- FCO_NRR: 5
- FCO_NRR.1: 3
- FCS:
- FCS_CKM: 328
- FCS_CKM.1: 81
- FCS_CKM.2: 35
- FCS_CKM.4: 63
- FCS_CKM.4.1: 1
- FCS_CKM.5: 15
- FCS_CKM.5.1: 1
- FCS_COP: 341
- FCS_COP.1: 75
- FCS_RNG: 11
- FCS_RNG.1: 14
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 101
- FDP_ACC.1: 60
- FDP_ACC.2: 5
- FDP_ACF: 71
- FDP_ACF.1: 54
- FDP_DAU: 10
- FDP_DAU.1: 2
- FDP_DAU.2: 4
- FDP_ETC: 1
- FDP_ETC.1: 5
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 6
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC: 67
- FDP_IFC.1: 52
- FDP_IFC.2: 6
- FDP_IFF: 53
- FDP_IFF.1: 27
- FDP_ITC: 48
- FDP_ITC.1: 60
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 79
- FDP_ITT.1: 2
- FDP_RIP: 132
- FDP_RIP.1: 10
- FDP_ROL: 31
- FDP_ROL.1: 11
- FDP_SDC: 1
- FDP_SDC.1: 12
- FDP_SDC.1.1: 3
- FDP_SDI: 26
- FDP_SDI.2: 10
- FDP_SDI.2.2: 1
- FDP_UCT: 6
- FDP_UCT.1: 2
- FDP_UIT: 9
- FDP_UIT.1: 3
- FIA:
- FIA_AFL: 11
- FIA_AFL.1: 13
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 18
- FIA_API.1: 9
- FIA_API.1.1: 1
- FIA_ATD: 13
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_UAU: 26
- FIA_UAU.1: 11
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.4: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 10
- FIA_UAU.5.2: 1
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UID: 33
- FIA_UID.1: 30
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 1
- FIA_USB: 7
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 3
- FMT_LIM.2: 3
- FMT_MOF.1: 8
- FMT_MOF.1.1: 5
- FMT_MSA: 208
- FMT_MSA.1: 33
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 39
- FMT_MSA.4: 8
- FMT_MTD: 69
- FMT_MTD.1: 25
- FMT_MTD.3: 24
- FMT_MTD.3.1: 1
- FMT_SAE: 1
- FMT_SAE.1: 6
- FMT_SAE.1.1: 2
- FMT_SAE.1.2: 1
- FMT_SMF: 95
- FMT_SMF.1: 30
- FMT_SMF.1.1: 1
- FMT_SMR: 109
- FMT_SMR.1: 45
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_STM.1: 1
- FPR:
- FPR_UNO: 12
- FPR_UNO.1: 14
- FPR_UNO.1.1: 1
- FPT:
- FPT_ESA: 6
- FPT_ESA.1: 10
- FPT_ESA.1.1: 1
- FPT_ESA.1.2: 1
- FPT_ESA.1.3: 1
- FPT_ESA.1.4: 1
- FPT_FLS: 57
- FPT_FLS.1: 19
- FPT_FLS.1.1: 1
- FPT_ISA: 18
- FPT_ISA.1: 15
- FPT_ISA.1.1: 1
- FPT_ISA.1.2: 1
- FPT_ISA.1.3: 1
- FPT_ISA.1.4: 1
- FPT_ISA.1.5: 1
- FPT_ITT.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FPT_RCV: 24
- FPT_RCV.3: 10
- FPT_RCV.4: 1
- FPT_STM: 3
- FPT_STM.1: 10
- FPT_TCT: 9
- FPT_TCT.1: 6
- FPT_TCT.1.1: 1
- FPT_TDC: 34
- FPT_TDC.1: 29
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TIT: 16
- FPT_TIT.1: 9
- FPT_TIT.1.1: 1
- FPT_TIT.1.2: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 8
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC: 32
- FTP_ITC.1: 31
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 2
- FTP_TRP: 10
- FTP_TRP.1: 15
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ADMIN: 3
- A.APPS-PROVIDER: 3
- A.CAP_FILE: 4
- A.CONTROLLING-: 1
- A.CONTROLLING-AUTHORITY: 2
- A.ISSUER: 3
- A.KEY-ESCROW: 3
- A.KEYS-PROT: 3
- A.OS-UPDATE-: 1
- A.OS-UPDATE-EVIDENCE: 2
- A.PERSONALISER: 3
- A.PRODUCTION: 4
- A.SCP-SUPP: 3
- A.SECURE_ACODE_: 1
- A.SECURE_ACODE_MANAGEMENT: 2
- A.VERIFICA: 1
- A.VERIFICATION: 2
- A.VERIFICATION-: 1
- A.VERIFICATION-AUTHORITY: 2
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 5
- D.APP_I_DATA: 9
- D.APP_KEYS: 9
- D.APSD_DAP_KEYS: 1
- D.APSD_KEYS: 3
- D.CASD_DAP_KEYS: 1
- D.CASD_KEYS: 1
- D.CCCM_KEYS: 1
- D.CLFDB-DK: 1
- D.CONFIRMATION-: 1
- D.CONFIRMATION-DATA: 1
- D.CRYPTO: 4
- D.CTL_PRO: 5
- D.CTL_REGISTRY: 5
- D.CVM_MGMT_STATE: 3
- D.CVM_PIN: 3
- D.DAP_BLOCK: 1
- D.ELF_AID: 3
- D.ELF_APP_INS: 3
- D.ELF_RG_DATA: 1
- D.ELF_SESSION_ST: 2
- D.GP_CODE: 1
- D.GP_REGISTRY: 6
- D.GS-PARAMETERS: 1
- D.ISD_KEYS: 3
- D.JCS_CODE: 6
- D.JCS_DATA: 10
- D.NEW_ELF: 3
- D.OLD_ELF: 3
- D.OS: 1
- D.OS-: 3
- D.OS-UPDATE-CODE-: 1
- D.OS-UPDATE-CODE-ID: 1
- D.OS-UPDATE_ADDITIONALCODE: 3
- D.OS-UPDATE_DEC-: 1
- D.OS-UPDATE_DEC-KEY: 1
- D.OS-UPDATE_SGNVER-KEY: 1
- D.PIN: 6
- D.RECEIPT-: 1
- D.RECEIPT-GENERATION-KEY: 1
- D.SEC_DATA: 8
- D.TOE_IDENTIFIER: 1
- D.TOKEN-: 1
- D.TOKEN-VERIFICATION-KEY: 1
- O:
- O.ALARM: 17
- O.APPLET: 16
- O.APPLI-AUTH: 6
- O.ARRAY_VIEWS_: 1
- O.ARRAY_VIEWS_CONFID: 5
- O.ARRAY_VIEWS_I: 1
- O.ARRAY_VIEWS_INTEG: 5
- O.CARD-: 11
- O.CARD-MANAGEMENT: 23
- O.CCCM: 10
- O.CIPHER: 9
- O.CLFDB-DECIPHER: 6
- O.CODE_: 1
- O.CODE_CAP_FILE: 12
- O.CODE_PKG: 1
- O.COMM-: 1
- O.COMM-AUTH: 10
- O.COMM-CONFIDENTIALITY: 8
- O.COMM-INTEGRITY: 10
- O.COMM_AUTH: 1
- O.COMM_CONFIDENTIALITY: 1
- O.COMM_INTEGRITY: 1
- O.CONFID-OS-: 1
- O.CONFID-OS-UPDATE: 7
- O.CRS_COUNTERS: 6
- O.CRS_PRIVILEGES: 6
- O.CRT-MNGT: 4
- O.CTL_REGISTRY: 6
- O.CTL_SC: 6
- O.CTR-MNGT: 3
- O.CVM-BLOCK: 10
- O.CVM-MGMT: 10
- O.DELETION: 6
- O.DOMAIN-RIGHTS: 10
- O.ELF_APP_DATA: 8
- O.ELF_AUTHORISED: 6
- O.ELF_DATA_PRO: 6
- O.ELF_DELE_IRR: 6
- O.ELF_INTEGRITY: 6
- O.ELF_SESSION: 8
- O.FIREWALL: 20
- O.GLOBAL-CVM: 6
- O.GLOBAL_ARRAY: 2
- O.GLOBAL_ARRAYS_CONFID: 7
- O.GLOBAL_ARRAYS_INTEG: 7
- O.INSTALL: 12
- O.JAVAO: 1
- O.JAVAOB: 4
- O.JAVAOBJE: 1
- O.JAVAOBJECT: 42
- O.KEY-MNGT: 10
- O.LC-MANAGEMENT: 7
- O.LOAD: 12
- O.MTC-CTR-: 1
- O.MTC-CTR-MNGT: 4
- O.NATIVE: 12
- O.NO-KEY-REUSE: 6
- O.OBJ-DELETION: 6
- O.OPERATE: 24
- O.PIN-MNGT: 9
- O.PRIVILEGES-: 1
- O.PRIVILEGES-MANAGEMENT: 5
- O.RBGS: 9
- O.REALLOCATION: 8
- O.RECEIPT: 6
- O.RESOURCES: 8
- O.RND: 1
- O.RNG: 9
- O.SCP: 48
- O.SECURE_AC_ACTIV: 1
- O.SECURE_AC_ACTIVATION: 7
- O.SECURE_LOAD_AC: 1
- O.SECURE_LOAD_ACODE: 11
- O.SECURITY-: 2
- O.SECURITY-DOMAINS: 4
- O.SENSITIVE_ARR: 1
- O.SENSITIVE_ARRAYS_INTEG: 5
- O.SENSITIVE_RES: 1
- O.SENSITIVE_RESULTS_INTEG: 5
- O.SID: 16
- O.TOE_IDENTIFICATI: 1
- O.TOE_IDENTIFICATION: 7
- O.TOKEN: 6
- O.TRANSACTION: 8
- O.TST: 7
- OE:
- OE.ADMIN: 4
- OE.AID-MANAGEMENT: 4
- OE.AP-KEYS: 4
- OE.APPLICATIONS: 4
- OE.APPS-PROVIDER: 4
- OE.CA-KEYS: 4
- OE.CAP_FILE: 7
- OE.CLFDB-ENC-PR: 4
- OE.CODE-: 5
- OE.CODE-EVIDENCE: 13
- OE.CONTROLLING-: 1
- OE.CONTROLLING-AUTHORITY: 3
- OE.DAP_BLOCK_GEN: 4
- OE.ISD-KEYS: 4
- OE.ISSUER: 4
- OE.KEY-CHANGE: 4
- OE.KEY-ESCROW: 4
- OE.KEY-GENERATION: 4
- OE.KEYS-PROT: 4
- OE.LOADING: 4
- OE.OS-UPDATE-: 1
- OE.OS-UPDATE-ENCRYPTION: 5
- OE.OS-UPDATE-EVIDENCE: 4
- OE.PERSONALISER: 4
- OE.PRODUCTION: 5
- OE.RECEIPT-VER: 4
- OE.SCP: 3
- OE.SCP-SUPP: 4
- OE.SECURE_ACODE_MANA: 1
- OE.SECURE_ACODE_MANAGEMENT: 3
- OE.SERVERS: 4
- OE.SUCP: 7
- OE.TOKEN-GEN: 4
- OE.VERIFICATION: 36
- OE.VERIFICATION-: 1
- OE.VERIFICATION-AUTHORITY: 3
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 4
- OP.ARRAY_LENGTH: 4
- OP.ARRAY_T_ALOAD: 3
- OP.ARRAY_T_ASTORE: 3
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_CAP_FILE: 3
- OP.DELETE_CAP_FILE_APPLET: 3
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.PUT: 5
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.ADDITIONAL_CODE_EN: 1
- OSP.ADDITIONAL_CODE_ENCRYPT: 1
- OSP.ADDITIONAL_CODE_ENCRYPTION: 1
- OSP.ADDITIONAL_CODE_SIG: 1
- OSP.ADDITIONAL_CODE_SIGNING: 2
- OSP.AID-MANAGEMENT: 3
- OSP.APPLICATIONS: 3
- OSP.APSD-KEYS: 3
- OSP.ATOMIC_ACTIVATION: 3
- OSP.CASD-KEYS: 3
- OSP.CCCM: 3
- OSP.CLFDB-ENC-PR: 3
- OSP.DAP_BLOCK_GEN: 3
- OSP.ELF_DELE_OP: 3
- OSP.ISD-KEYS: 3
- OSP.KEY-CHANGE: 3
- OSP.KEY-GENERATION: 3
- OSP.LOADING: 3
- OSP.RECEIPT-VER: 3
- OSP.SECURITY-DOMAINS: 3
- OSP.SERVERS: 3
- OSP.TC: 3
- OSP.TOE_IDENTIFICATION: 3
- OSP.TOKEN-GEN: 3
- OSP.VERIFICATION: 3
- R:
- T:
- T.BRUTE-FORCE-CVM: 3
- T.BRUTE-FORCE-SCP: 3
- T.CLFDB-DISC: 3
- T.COM-EXPLOIT: 4
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-: 2
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 3
- T.CONFID-OS-UPDATE-: 1
- T.CONFID-OS-UPDATE-LOAD: 2
- T.COUNTERS-FREEZE: 3
- T.CRS-BYPASS: 3
- T.CTL-AUTH-FORGE: 3
- T.CTL-REGISTRY-: 1
- T.CTL-REGISTRY-OVERWRITE: 2
- T.CVM-IMPERSONATE: 3
- T.CVM-UPDATE: 3
- T.DELETION: 4
- T.ELF-DATA-ACCESS: 3
- T.ELF-DATA-INTEGRITY: 3
- T.ELF-ILL-COMMAND: 3
- T.ELF-RES-DATA: 3
- T.ELF-SESSION: 3
- T.ELF-UNAUTHORISED: 3
- T.ELF-VERSION: 3
- T.EXE-CODE: 7
- T.FAKE-SGNVER-KEY: 3
- T.INSTALL: 4
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 4
- T.INTEG-JCS-: 1
- T.INTEG-JCS-CODE: 2
- T.INTEG-JCS-DATA: 4
- T.INTEG-OS-UPDATE-: 1
- T.INTEG-OS-UPDATE-LOAD: 2
- T.LIFE-CYCLE: 4
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 9
- T.RECEIPT: 3
- T.RESOURCES: 3
- T.SID: 7
- T.TOKEN: 3
- T.UNAUTHORISED-: 1
- T.UNAUTHORISED-CARD-MGMT: 4
- T.UNAUTHORISED-TOE-: 1
- T.UNAUTHORISED-TOE-CODE-: 1
- T.UNAUTHORISED-TOE-CODE-UPDATE: 1
- T.WRONG-UPDATE-: 1
- T.WRONG-UPDATE-STATE: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 61
- AES-: 3
- AES-128: 10
- AES-256: 11
- AES128: 2
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- CMAC: 16
- HMAC: 26
- KMAC: 3
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 7
- SHA-384: 6
- SHA-512: 5
- SHA224: 3
- SHA256: 4
- SHA384: 4
- SHA512: 4
- SHA3:
- SHA3-224: 1
- SHA3-256: 1
- SHA3-384: 1
- SHA3-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 8
- Key agreement: 10
- KEX:
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 4
- brainpoolP384r1: 2
- brainpoolP512r1: 2
- NIST:
- Curve P-256: 1
- Curve P-384: 1
- Curve P-521: 1
- P-256: 1
- P-384: 1
- P-521: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_PSK_WITH_AES_128_CBC_S: 1
- TLS_PSK_WITH_NULL_SHA: 1
- TLS_PSK_WITH_NULL_SHA256: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- SCA:
- Side_channel: 1
- physical probing: 6
- side channel: 1
- side channels: 1
|
- FI:
- Malfunction: 4
- malfunction: 6
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 3
- Physical Probing: 2
- physical probing: 12
- side channel: 1
- side channels: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- ISO:
- ISO/IEC 7810: 2
- ISO/IEC18092: 2
- ISO/IEC7816: 2
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 180: 1
- FIPS 180-4: 6
- FIPS 186-3: 3
- FIPS 197: 5
- FIPS 197112: 1
- FIPS 198: 2
- FIPS 202: 4
- FIPS 46: 1
- FIPS PUB 180-4: 2
- FIPS PUB 186-4: 8
- FIPS PUB 186-4163: 1
- FIPS PUB 197: 2
- FIPS PUB 46-3: 2
- FIPS PUB 81: 2
- FIPS197: 9
- ICAO:
- ISO:
- ISO/IEC 10116: 6
- ISO/IEC 14888-: 1
- ISO/IEC 14888-2: 7
- ISO/IEC 18032: 4
- ISO/IEC 18032:2020: 1
- ISO/IEC 18033-3: 5
- ISO/IEC 3309183: 2
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-1: 6
- ISO/IEC 9797-2: 3
- ISO/IEC18033-3: 1
- PKCS:
- PKCS #1: 5
- PKCS#1: 16
- PKCS#5: 1
- PKCS#5139: 1
- PKCS#5143: 1
- RFC:
- RFC 5246: 1
- RFC 5758: 2
- RFC 5869: 1
- RFC2104: 10
- RFC2409: 1
- RFC2409155: 1
- RFC3610: 1
- RFC5639: 10
- RFC5903: 5
- RFC6954: 7
- SCP:
- SCP02: 17
- SCP03: 14
- SCP10: 2
- SCP11: 14
- SCP21: 10
- SCP22: 2
- SCP80: 13
- SCP81: 12
- X509:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- AES:
- ALG_AES_BLOCK_128_CBC_NOPAD: 2
- ALG_AES_BLOCK_128_ECB_NOPAD: 2
- ALG_AES_CBC_ISO9797_M1: 2
- ALG_AES_CBC_ISO9797_M2: 2
- ALG_AES_CBC_PKCS5: 2
- ALG_AES_CCM: 2
- ALG_AES_CMAC_128: 3
- ALG_AES_CTR: 2
- ALG_AES_ECB_ISO9797_M1: 2
- ALG_AES_ECB_ISO9797_M2: 2
- ALG_AES_ECB_PKCS5: 2
- ALG_AES_GCM: 2
- ALG_AES_MAC_128_NOPAD: 2
- ALG_AES_MAC_192_NOPAD: 1
- ALG_AES_MAC_256_NOPAD: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 2
- ALG_DES_CBC_ISO9797_M2: 1
- ALG_DES_CBC_NOPAD: 2
- ALG_DES_CBC_PKCS5: 2
- ALG_DES_ECB_ISO9797_M1: 2
- ALG_DES_ECB_ISO9797_M2: 2
- ALG_DES_ECB_NOPAD: 2
- ALG_DES_ECB_PKCS5: 2
- ALG_DES_MAC4_ISO9797_1_M1_ALG3: 2
- ALG_DES_MAC4_ISO9797_1_M2_ALG3: 2
- ALG_DES_MAC4_ISO9797_M1: 2
- ALG_DES_MAC4_ISO9797_M2: 2
- ALG_DES_MAC4_NOPAD: 2
- ALG_DES_MAC4_PKCS5: 2
- ALG_DES_MAC8_ISO9797_1_M1_ALG3: 2
- ALG_DES_MAC8_ISO9797_1_M2_ALG3: 2
- ALG_DES_MAC8_ISO9797_M1: 2
- ALG_DES_MAC8_ISO9797_M2: 2
- ALG_DES_MAC8_NOPAD: 2
- ALG_DES_MAC8_PKCS5: 2
- EC:
- ALG_EC_FP: 6
- ALG_EC_SVDP_DHC_KDF: 1
- ALG_EC_SVDP_DHC_PLAIN: 2
- ALG_EC_SVDP_DH_KDF: 2
- ALG_EC_SVDP_DH_PLAIN: 1
- ALG_EC_SVDP_DH_PLAIN_XY: 2
- ECDSA:
- ALG_ECDSA_SHA: 2
- ALG_ECDSA_SHA_224: 3
- ALG_ECDSA_SHA_256: 2
- ALG_ECDSA_SHA_384: 3
- ALG_ECDSA_SHA_512: 2
- HMAC:
- ALG_HMAC_SHA1: 5
- ALG_HMAC_SHA_256: 5
- ALG_HMAC_SHA_384: 2
- ALG_HMAC_SHA_512: 2
- ISO3309:
- ALG_ISO3309_CRC16: 2
- ALG_ISO3309_CRC32: 2
- RSA:
- ALG_RSA_MD5_PKCS1: 1
- ALG_RSA_NOPAD: 2
- ALG_RSA_PKCS1: 1
- ALG_RSA_PKCS1_OAEP: 2
- ALG_RSA_SHA224_PKCS1: 1
- ALG_RSA_SHA384_PKCS1: 1
- ALG_RSA_SHA_224_PKCS1: 2
- ALG_RSA_SHA_224_PKCS1_PSS: 2
- ALG_RSA_SHA_256_PKCS1: 2
- ALG_RSA_SHA_256_PKCS1_PSS: 2
- ALG_RSA_SHA_384_PKCS1: 2
- ALG_RSA_SHA_384_PKCS1_PSS: 2
- ALG_RSA_SHA_512_PKCS1: 2
- ALG_RSA_SHA_512_PKCS1_PSS: 2
- ALG_RSA_SHA_ISO9796: 2
- ALG_RSA_SHA_ISO9796_MR: 2
- ALG_RSA_SHA_PKCS1: 2
- ALG_RSA_SHA_PKCS1_PSS: 2
- ALG_RSA_SHA_RFC2409: 2
- SHA:
- ALG_SHA_224: 3
- ALG_SHA_256: 4
- ALG_SHA_384: 3
- ALG_SHA_512: 3
- SHA3:
- ALG_SHA3_224: 3
- ALG_SHA3_256: 3
- ALG_SHA3_384: 3
- ALG_SHA3_512: 3
- curves:
- BRAINPOOLP192R1: 1
- BRAINPOOLP320R1: 2
- BRAINPOOLP320T1: 1
- BRAINPOOLP384R1: 2
- BRAINPOOLP384T1: 1
- BRAINPOOLP512R1: 2
- BRAINPOOLP512T1: 1
- SECP192R1: 1
- SECP256R1: 2
- SECP384R1: 1
- SECP521R1: 2
- misc:
- CIPHER_AES_CCM: 2
- CIPHER_AES_GCM: 2
- LENGTH_AES_128: 1
- LENGTH_EC_FP_160: 2
- LENGTH_EC_FP_192: 3
- LENGTH_EC_FP_224: 2
- LENGTH_EC_FP_256: 3
- LENGTH_EC_FP_384: 2
- LENGTH_EC_FP_521: 3
- LENGTH_HMAC_SHA_1_BLOCK_64: 1
- LENGTH_HMAC_SHA_256_BLOCK_64: 1
- LENGTH_HMAC_SHA_384_BLOCK_64: 1
- LENGTH_HMAC_SHA_512_BLOCK_64: 1
- LENGTH_RSA_1024: 1
- LENGTH_RSA_3072: 1
- LENGTH_SHA: 4
- LENGTH_SHA3_224: 1
- LENGTH_SHA3_384: 1
- LENGTH_SHA_224: 1
- LENGTH_SHA_384: 1
- PAD_PKCS1_OAEP: 1
- PAD_PKCS1_OAEP_SHA256: 1
- PAD_PKCS1_OAEP_SHA3_256: 1
- PAD_PKCS1_OAEP_SHA3_512: 1
- PAD_PKCS1_OAEP_SHA512: 1
- SIG_CIPHER_AES_CMAC128: 2
- SIG_CIPHER_AES_MAC128: 2
- SIG_CIPHER_DES_MAC4: 2
- SIG_CIPHER_DES_MAC8: 2
- SIG_CIPHER_ECDSA: 1
- SIG_CIPHER_ECDSA_PLAIN: 1
- SIG_CIPHER_HMAC: 1
- SIG_CIPHER_RSA: 1
- TYPE_ACCESS: 5
- TYPE_EC_FP_PRIVATE: 6
- TYPE_EC_FP_PRIVATE_TRANSIENT_RESET: 1
- TYPE_HMAC: 4
- TYPE_HMAC_TRANSIENT_RESET: 1
|
pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 5
- javacard.security: 8
- javacardx:
- javacardx.crypto: 1
- javacardx.framework.time: 1
- javacardx.security: 3
- javacardx.security.cert: 3
- javacardx.security.util: 4
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Dual Interface IC Chip Security Target RC-S957/2 Series with contact-based operating system out of scope Version: 1.1 Public Version No. 957-2-STP-E01-10 Introduction This document is the Security: 1
- FeliCa Dual Interface IC Chip Security Target RC-S957/2 Series with contact-based operating system out of scope Version 1.1 : June 2009 Sony Corporation FeliCa Business Division NO.957-2-STP-E01-10 ©2009 Sony: 1
- ST identification ST Name: Security Target RC-S957/2 Series with contact-based operating system out of scope Version: 1.1 Date: June 2009 TOE identification TOE Name: RC-S957/2 Series with contact-based: 1
- Security Target presents the following TOE: RC-S957/2 Series with contact-based operating system out of scope. The TOE is a dual interface integrated circuit with an antenna and an embedded smartcard operating: 1
- TOE Description 2.1. Overview The TOE (i.e., RC-S957/2 Series with contact-based operating system out of scope) is a dual interface COT package for an integrated circuit with an embedded smartcard operating: 1
- is indicated in yellow. The form factor of the smartcard is indicated in gray. The GP OS, which is out of scope of the TOE, is indicated in blue. The components of the TOE “FeliCa Operating System” constitute: 1
- out of scope: 7
- system out of scope Version: 1.0 Product type: Dual Interface IC Chip for smartcard Form factor: Antenna Module (IC: 1
|
- OutOfScope:
- GemActivate) The platform implements the following modes but they are out of scope of the TOE: - EACv1 - Integrated mapping (DH and ECDH: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- loading of software patches (GemActivate) The platform implements the following modes but they are out of scope of the TOE: - EACv1 - Integrated mapping (DH and ECDH) - Generic mapping (DH) Table 1 is: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20090623194607+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0.7
- /ModDate: D:20090623194911+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20090623104507
- /Title: Microsoft Word - 957-2-STP-E01-10.doc
- pdf_file_size_bytes: 344849
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 47
|
- /Author: mdoguet
- /CreationDate: D:20250207144111+01'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20250207144111+01'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 3304402
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 244
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |