This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software ANSSI-CC-2016/59 |
Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 9 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software BSI-DSZ-CC-0624-2010 |
|
---|---|---|
name | S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software | Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 9 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software |
not_valid_before | 2016-08-26 | 2010-01-29 |
not_valid_after | 2021-08-26 | 2019-09-01 |
scheme | FR | DE |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2016_59en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624b_pdf.pdf |
manufacturer | Samsung Electronics Co., Ltd. / Trusted Labs | Samsung Electronics Co., Ltd. |
security_level | ASE_TSS.2, EAL6+ | EAL5+ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_59fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624a_pdf.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2010, 6, 30), 'maintenance_title': 'Samsung S3CC9LA 16-bit RISC Microcontroller for Smart Card, Revision 2 with optional secure RSA3.7S and ECC 2.4S Libraries including specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624_ma3a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624_ma3b_pdf.pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2010, 3, 16), 'maintenance_title': 'Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 11 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624_ma1b_pdf.pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2010, 6, 30), 'maintenance_title': 'Samsung S3CC9L5 16-bit RISC Microcontroller for Smart Card, Revision 2 with optional secure RSA3.7S and ECC 2.4S Libraries including specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624_ma2a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0624_ma2b_pdf.pdf'}) | |
state/report/pdf_hash | db137e34ae91187b2f065c68ead18ed8d8cb485c71ac9ae172e6d28524e714f8 | 47888df7d2fcf546f9fdd9dba25805a96d29af5a3d9ca8df2e7674d214bd9885 |
state/report/txt_hash | 1b654cd14f977145ddd04c3164fa6e4cea8b8b9e8406a5bc577b564b2549d2c2 | 025d866a26cc415141f9fe528c97b80774f047a2eae7909c1ed083aa02fa266a |
state/st/pdf_hash | d71f81cd92b03aa8dfa99d0ce1d768bc34b072bbb79bcc885cc4e97585a5c329 | 3b679ff648a507d0fe29e77a750803b7aa2e1e9843e529d1e4f752ab7bf24765 |
state/st/txt_hash | 63ee0be1a5dcad71b90d001733997d81bda6f0b92d6123c3c2ca19216817bff1 | 9a707a636cfa03bc1a38f99e680e2eb7702499c7eab779c41d18cc705fcab4e7 |
heuristics/cert_id | ANSSI-CC-2016/59 | BSI-DSZ-CC-0624-2010 |
heuristics/cert_lab | CEA | BSI |
heuristics/extracted_versions | 16 | 3.7, 2.4 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2017/24 | KECS-ISIS-0378-2012, ANSSI-CC-2012/09 |
heuristics/report_references/directly_referencing | ANSSI-CC-2015/66 | BSI-DSZ-CC-0501-2008 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2018/58v2, ANSSI-CC-2019/07, ANSSI-CC-2020/12, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2018/57, ANSSI-CC-2018/33, ANSSI-CC-2018/56v2, ANSSI-CC-2018/32, ANSSI-CC-2018/32v2, ANSSI-CC-2020/93, ANSSI-CC-2018/57v2, ANSSI-CC-2018/56, ANSSI-CC-2017/24, ANSSI-CC-2018/58 | KECS-ISIS-0378-2012, ANSSI-CC-2012/09 |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2015/66 | BSI-DSZ-CC-0400-2007, BSI-DSZ-CC-0501-2008, BSI-DSZ-CC-0438-2007, BSI-DSZ-CC-0452-2007 |
heuristics/scheme_data |
|
None |
heuristics/st_references/directly_referenced_by | ANSSI-CC-2019/07, ANSSI-CC-2018/53 | KECS-ISIS-0378-2012 |
heuristics/st_references/indirectly_referenced_by | ANSSI-CC-2019/07, ANSSI-CC-2018/53 | KECS-ISIS-0378-2012 |
pdf_data/report_filename | ANSSI-CC-2016_59fr.pdf | 0624a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 25 | 39 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_INT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM | 1 | 2 |
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_IND | 1 | 2 |
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 2 | 3 |
pdf_data/report_keywords/cc_security_level/EAL/EAL7 | 1 | 4 |
pdf_data/report_keywords/certification_process | |
|
pdf_data/report_keywords/cipher_mode | |
|
pdf_data/report_keywords/cplc_data | |
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function | |
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis | |
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 2 | 7 |
pdf_data/report_keywords/technical_report_id | |
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vendor/Samsung/Samsung | 15 | 30 |
pdf_data/report_metadata//Author | Coralie | Bundesamt für Sicherheit in der Informationstechnik |
pdf_data/report_metadata//CreationDate | D:20160902171415+02'00' | D:20100208102410+01'00' |
pdf_data/report_metadata//Creator | Microsoft® Word 2010 | Writer |
pdf_data/report_metadata//Keywords | ANSSI-CC-CER-F-07.018 | "Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 9 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software, Samsung Electronics Co, Ltd." |
pdf_data/report_metadata//ModDate | D:20160902171415+02'00' | D:20100210110815+01'00' |
pdf_data/report_metadata//Producer | Microsoft® Word 2010 | StarOffice 9 |
pdf_data/report_metadata//Subject | S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software | Common Criteria Certification |
pdf_data/report_metadata//Title | ANSSI-CC-2016/59 | Certificationreport BSI-DSZ-CC-0624-2010 |
pdf_data/report_metadata/pdf_file_size_bytes | 731540 | 815194 |
pdf_data/report_metadata/pdf_hyperlinks | mailto:[email protected], http://www.ssi.gouv.fr/ | http://www.bsi.bund.de/ |
pdf_data/report_metadata/pdf_number_of_pages | 18 | 38 |
pdf_data/st_filename | ANSSI_cible2016_59en.pdf | 0624b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 37 | 83 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 9 | 10 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 14 | 25 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 3 | 2 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 4 | 2 |
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 6 | 5 |
pdf_data/st_keywords/cc_claims/T/T.RND | 5 | 4 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 | 2 | 5 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 1 | 6 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 8 | 3 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 12 | 8 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 16 | 5 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 24 | 41 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 11 | 29 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 49 | 17 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 21 | 35 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC | 8 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 19 | 24 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF | 10 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 17 | 12 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 23 | 25 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 11 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 11 | 26 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 22 | 4 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 28 | 14 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 32 | 19 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 12 | 13 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 15 | 14 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 9 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 6 | 9 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 15 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP | 3 | 2 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 21 | 18 |
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 17 | 18 |
pdf_data/st_keywords/cc_sfr/FTP |
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 13 | 3 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 | 4 | 3 |
pdf_data/st_keywords/cipher_mode/ECB/ECB | 3 | 2 |
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine/TORNADO/TORNADO | 4 | 17 |
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 3 | 1 |
pdf_data/st_keywords/ecc_curve/Brainpool |
|
|
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP224r1 | 4 | 5 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP256r1 | 4 | 5 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP320r1 | 4 | 1 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP384r1 | 4 | 5 |
pdf_data/st_keywords/ecc_curve/Brainpool/brainpoolP512r1 | 4 | 1 |
pdf_data/st_keywords/ecc_curve/NIST |
|
|
pdf_data/st_keywords/ecc_curve/NIST/P-192 | 8 | 10 |
pdf_data/st_keywords/ecc_curve/NIST/P-224 | 8 | 10 |
pdf_data/st_keywords/ecc_curve/NIST/P-256 | 8 | 10 |
pdf_data/st_keywords/ecc_curve/NIST/P-384 | 8 | 10 |
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 | 3 | 5 |
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 | 2 | 1 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA224 | 6 | 8 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 | 6 | 8 |
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 11 | 10 |
pdf_data/st_keywords/randomness/RNG/RNG | 17 | 3 |
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 26 | 24 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 13 | 12 |
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering | 3 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 8 | 10 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 21 | 20 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 7 | 6 |
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing | 9 | 6 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 1 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/side-channel | 4 | 2 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 4 | 3 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 180-3 | 7 | 6 |
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA | 1 | 2 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 3 | 1 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 9 | 10 |
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/HMAC | 2 | 3 |
pdf_data/st_keywords/vendor/Samsung/Samsung | 17 | 3 |
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Windows 사용자 | KyungSuk YI (Bryant) |
pdf_data/st_metadata//CreationDate | D:20160704161852+09'00' | D:20091216150432+09'00' |
pdf_data/st_metadata//Creator | Microsoft® Word 2010 | Word용 Acrobat PDFMaker 9.1 |
pdf_data/st_metadata//ModDate | D:20160704161852+09'00' | D:20100128181239+09'00' |
pdf_data/st_metadata//Producer | Microsoft® Word 2010 | Acrobat Distiller 9.2.0 (Windows) |
pdf_data/st_metadata//Title | ST_Klallam7_Ver1.1 | Security Target Lite of Samsung S3CC9LC 16-bit Secure RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software |
pdf_data/st_metadata/pdf_file_size_bytes | 1379185 | 518043 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/, mailto:[email protected] | |
pdf_data/st_metadata/pdf_is_encrypted | False | True |
pdf_data/st_metadata/pdf_number_of_pages | 105 | 70 |
dgst | b970e91a8ee93f36 | 164184f3ca5502fb |