Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
ANSSI-CC-2015/16
Plate-forme STSAFE-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
ANSSI-CC-2017/23
name Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B Plate-forme STSAFE-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
not_valid_before 2015-05-15 2017-03-23
not_valid_after 2020-05-15 2017-03-23
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16_Cible.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_23en.pdf.pdf
manufacturer Incard Division / ST Microelectronics STMicroelectronics S.r.l et STMicroelectronics
manufacturer_web None https://www.st.com/content/st_com/en.html
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_23fr.pdf
state/report/pdf_hash b3cb628bfac0a4bce8c004064c9f41c07d14e3f0153073a9f62e56b6d9ca3207 7b7061f941ffdbaca260adcb631ef3d680b66fb1552b8cf5cc6c90ab55552433
state/report/txt_hash 5035b7914b7ed978e1ea32111a7492b11f34256e133ad436c1f3097101f76943 b3aaa53c0da51b4949de8b29b59a38992bb704690306220b98cfcc0e75f39384
state/st/pdf_hash 36c06e10735fe312f02299921740c4a902dff2d83c7340b00c62baca0cf9fb90 c905ecc27b2531ed9a46da10375b83845056fbfb853872cb252ef1bc0122947f
state/st/txt_hash 59d15b2ee5c2ba904009f029a07f27abd7c67a347f8a2b32e4d374d6f48dcfeb ad97dcbff1a25db167461ce1e3e6c70a9cc382f402581cd9a0b1d6788cf4cab6
heuristics/cert_id ANSSI-CC-2015/16 ANSSI-CC-2017/23
heuristics/extracted_versions 2.11.0 1.1.4
heuristics/report_references/directly_referenced_by ANSSI-CC-2015/17 BSI-DSZ-CC-1037-2018
heuristics/report_references/directly_referencing ANSSI-CC-2012/68 ANSSI-CC-2015/59, ANSSI-CC-2017/10
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2015/17 BSI-DSZ-CC-1037-2018
heuristics/report_references/indirectly_referencing ANSSI-CC-2010/01, ANSSI-CC-2009/50, ANSSI-CC-2009/62, ANSSI-CC-2009/26, ANSSI-CC-2009/06, ANSSI-CC-2010/02, ANSSI-CC-2012/68, ANSSI-CC-2009/05, ANSSI-CC-2009/51, ANSSI-CC-2009/28 ANSSI-CC-2015/59, ANSSI-CC-2017/10
heuristics/scheme_data/cert_id 2015/16 2017/23
heuristics/scheme_data/description Le produit certifié est la « Plateforme J-Safe, en configuration fermée, version 2.11.0, sur lecomposant SB23YR80B » développée par STMicroelectronics S.r.l. – Incard Division et STMicroelectronics. La plateforme est une carte à puce offrant les modes contact, sans contact et duaux. Elle est en configuration fermée, elle ne correspond donc pas un produit utilisable en tant que tel. Elle estn Le produit certifié est la « Plate-forme STSAFE-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03 » développée par ST MICROELECTRONICS S.r.l sur le microcontrôleur ST31H320 A03 fabriqué par la société STMICROELECTRONICS . La plateforme est une carte à puce en mode contact. Elle est en configuration fermée, et ne correspond pas à un produit utilisable en tant que tel. Elle
heuristics/scheme_data/developer STMicroelectronics S.r.l. - Incard Division / STMicroelectronics STMicroelectronics S.r.l., STMicroelectronics
heuristics/scheme_data/enhanced/cc_version Critères Communs version 3.1r3 Critères Communs version 3.1r4
heuristics/scheme_data/enhanced/cert_id 2015/16 2017/23
heuristics/scheme_data/enhanced/certification_date 15/05/2015 23/03/2017
heuristics/scheme_data/enhanced/developer STMicroelectronics S.r.l. - Incard Division / STMicroelectronics STMicroelectronics S.r.l., STMicroelectronics
heuristics/scheme_data/enhanced/evaluation_facility Serma Technologies Serma Safety & Security
heuristics/scheme_data/enhanced/mutual_recognition SOG-IS CCRA
heuristics/scheme_data/enhanced/protection_profile PP JCS ANSSI-CC-PP-2010/07-M01
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_16.pdf https://cyber.gouv.fr/sites/default/files/2017/04/anssi-cc-2017_23fr.pdf
heuristics/scheme_data/enhanced/sponsor STMicroelectronics S.r.l. - Incard Division STMicroelectronics S.r.l.
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_16_Cible.pdf https://cyber.gouv.fr/sites/default/files/2017/04/anssi_cible2017_23en.pdf
heuristics/scheme_data/product Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B Plate-forme STSAFE-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
heuristics/scheme_data/sponsor STMicroelectronics S.r.l. - Incard Division STMicroelectronics S.r.l.
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/plateforme-j-safe-en-configuration-fermee-version-2110-sur-le-composant https://cyber.gouv.fr/produits-certifies/plate-forme-stsafe-j-en-configuration-fermee-version-114-sur-le-composant
heuristics/st_references/directly_referenced_by None BSI-DSZ-CC-1037-2018
heuristics/st_references/directly_referencing ANSSI-CC-2012/68 ANSSI-CC-2015/59
heuristics/st_references/indirectly_referenced_by None BSI-DSZ-CC-1037-2018
heuristics/st_references/indirectly_referencing ANSSI-CC-2012/68 ANSSI-CC-2015/59
pdf_data/report_filename ANSSI-CC-2015_16.pdf ANSSI-CC-2017_23fr.pdf
pdf_data/report_frontpage/FR/cc_version Critères Communs version 3.1 révision 3 Critères Communs version 3.1 révision 4
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2015/16 ANSSI-CC-2017/23
pdf_data/report_frontpage/FR/cert_item Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B Plate-forme STSAFE-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
pdf_data/report_frontpage/FR/cert_item_version Version 2.11.0 Version 1.1.4
pdf_data/report_frontpage/FR/cert_lab Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
pdf_data/report_frontpage/FR/developer STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics S.r.l. Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 190 Avenue Celestin COQ 13106 ROUSSET CEDEX, FRANCE Commanditaire STMicroelectronics S.r.l. Z.I Marcianise Sud, 81025 Marcianise, Italie
pdf_data/report_frontpage/FR/ref_protection_profiles PP JCS] Java Card protection profile – closed configuration, version 3.0 Java Card Protection profile – Closed Configuration Version 3.0, ANSSI-CC-PP-2010/07-M01
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2015/16: 16
  • ANSSI-CC-2012/68: 2
  • ANSSI-CC-2012/68-S02: 1
  • ANSSI-CC-2017/23: 17
  • ANSSI-CC-2017/10: 1
  • ANSSI-CC-2015/59: 2
  • ANSSI-CC-2015/59-M01: 2
  • ANSSI-CC-2015/59-S01: 2
pdf_data/report_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/report_keywords/cc_protection_profile_id/ANSSI/ANSSI-CC-PP-2010/07-M01 1 2
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035-2007: 1
  • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_IMP.2: 1
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_FLR.1: 1
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 3
  • ALC_CMC.5: 1
  • ALC_FLR.1: 1
  • ALC_TAT.3: 1
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 2 3
pdf_data/report_keywords/cc_sar/ATE
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_FUN: 1
  • ATE_IND: 1
  • ATE_COV.3: 1
  • ATE_FUN.2: 1
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_FUN: 1
  • ATE_IND: 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 4 5
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL4: 2
  • EAL6: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5: 3
  • EAL2: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
pdf_data/report_keywords/eval_facility/Serma
  • Serma Technologies: 1
  • Serma Safety & Security: 3
pdf_data/report_keywords/vendor/STMicroelectronics/STMicroelectronics 6 3
pdf_data/report_metadata//Author Administrateur
pdf_data/report_metadata//CreationDate D:20150522134001+02'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 PDFCreator Version 1.2.1
pdf_data/report_metadata//Keywords ANSSI-CC-CER-F-07.016
pdf_data/report_metadata//ModDate D:20150522134001+02'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 GPL Ghostscript 9.02
pdf_data/report_metadata//Subject Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
pdf_data/report_metadata//Title ANSSI-CC-2015/16 ANSSI-CC-2017_23fr
pdf_data/report_metadata/pdf_file_size_bytes 579179 760248
pdf_data/report_metadata/pdf_hyperlinks http://www.ssi.gouv.fr/, mailto:[email protected]
pdf_data/report_metadata/pdf_number_of_pages 15 16
pdf_data/st_filename ANSSI-CC-2015_16_Cible.pdf ANSSI_cible2017_23en.pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDSA:
    • ECDSA: 1
  • ECDH:
    • ECDH: 2
  • ECDSA:
    • ECDSA: 2
  • ECC:
    • ECC: 1
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 1 2
pdf_data/st_keywords/asymmetric_crypto/FF/DH
  • Diffie-Hellman: 5
  • DH: 1
  • Diffie-Hellman: 5
pdf_data/st_keywords/cc_cert_id/FR
  • ANSSI-CC-2012/68: 2
  • ANSSI-CC-2015/59-M01: 1
  • ANSSI-CC-2015/59-S01: 1
  • ANSSI-CC-2015/59: 1
pdf_data/st_keywords/cc_claims/O
  • O.SCP: 65
  • O.SIDE_CHANNEL: 10
  • O.LIFE_CYCLE: 12
  • O.RND: 1
  • O.CIPHER: 40
  • O.SID: 25
  • O.GLOBAL_ARRAYS_CONFID: 15
  • O.NATIVE: 12
  • O.REALLOCATION: 9
  • O.KEY_MNGT: 1
  • O.TRANSACTION: 16
  • O.OPERATE: 34
  • O.ROLES: 7
  • O.FIREWALL: 26
  • O.GLOBAL_ARRAYS_INTEG: 8
  • O.RESOURCES: 9
  • O.ALARM: 21
  • O.KEY-MNGT: 15
  • O.PIN-MNGT: 13
  • O.OBJ-DELETION: 6
  • O.APPLET: 1
  • O.JAVAOBJECT: 20
  • O.GP_REGISTRY: 10
  • O.JAVA: 3
  • O.JAVAOB: 2
  • O.OBJ-DEL: 1
  • O.SCP: 70
  • O.SIDE_CHANNEL: 10
  • O.LIFE_CYCLE: 13
  • O.RND: 1
  • O.CIPHER: 45
  • O.SID: 25
  • O.GLOBAL_ARRAYS_CONFID: 10
  • O.NATIVE: 12
  • O.REALLOCATION: 13
  • O.PIN_MNGT: 1
  • O.OBJ-DELETION: 8
  • O.ROLES: 6
  • O.FIREWALL: 26
  • O.GLOBAL_ARRAYS_INTEG: 8
  • O.OPERATE: 33
  • O.RESOURCES: 9
  • O.ALARM: 21
  • O.KEY-MNGT: 11
  • O.PIN-MNGT: 16
  • O.TRANSACTION: 11
  • O.APPLET: 1
  • O.JAVAOBJECT: 20
  • O.GP_REGISTRY: 10
  • O.JAVA: 3
  • O.JAVAOB: 2
pdf_data/st_keywords/cc_claims/O/O.CIPHER 40 45
pdf_data/st_keywords/cc_claims/O/O.GLOBAL_ARRAYS_CONFID 15 10
pdf_data/st_keywords/cc_claims/O/O.KEY-MNGT 15 11
pdf_data/st_keywords/cc_claims/O/O.LIFE_CYCLE 12 13
pdf_data/st_keywords/cc_claims/O/O.OBJ-DELETION 6 8
pdf_data/st_keywords/cc_claims/O/O.OPERATE 34 33
pdf_data/st_keywords/cc_claims/O/O.PIN-MNGT 13 16
pdf_data/st_keywords/cc_claims/O/O.REALLOCATION 9 13
pdf_data/st_keywords/cc_claims/O/O.ROLES 7 6
pdf_data/st_keywords/cc_claims/O/O.SCP 65 70
pdf_data/st_keywords/cc_claims/O/O.TRANSACTION 16 11
pdf_data/st_keywords/cc_claims/OE
  • OE.SCP: 3
  • OE.NO-DELETION: 6
  • OE.VERIFICATION: 32
  • OE.CARD_MANAGEMENT: 16
  • OE.NO-INSTALL: 5
  • OE.MANAGEMENT_OF_SECRETS: 3
  • OE.CARD-MANAGEMENT: 12
  • OE.SCP: 3
  • OE.NO-DELETION: 6
  • OE.VERIFICATION: 33
  • OE.CARD_MANAGEMENT: 17
  • OE.NO-INSTALL: 5
  • OE.CODE-EVIDENCE: 17
  • OE.MANAGEMENT_OF_SECRETS: 3
  • OE.CARD-MANAGEMENT: 12
  • OE.CODE-: 1
pdf_data/st_keywords/cc_claims/OE/OE.CARD_MANAGEMENT 16 17
pdf_data/st_keywords/cc_claims/OE/OE.VERIFICATION 32 33
pdf_data/st_keywords/cc_claims/T/T.INTEG-APPLI-CODE 10 12
pdf_data/st_keywords/cc_claims/T/T.INTEG-APPLI-DATA 21 23
pdf_data/st_keywords/cc_claims/T/T.INTEG-JCS-CODE 6 7
pdf_data/st_keywords/cc_claims/T/T.INTEG-JCS-DATA 10 11
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 2
    • BSI-PP- 0035: 2
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0055: 2
  • ANSSI:
    • ANSSI-CC-PP-2010/07-M01: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0055: 2
  • BSI-PP- 0035: 2
  • BSI-CC-PP-0084-2014: 1
  • BSI-CC-PP-0055: 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 1 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 2 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 9 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 2 6
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 7 6
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ITT.1: 4
  • FDP_IFC.1: 7
  • FDP_ACC.2: 1
  • FDP_ACF.1: 4
  • FDP_ACF: 7
  • FDP_IFF.1: 5
  • FDP_ROL: 12
  • FDP_ROL.1: 3
  • FDP_ACC: 8
  • FDP_IFF: 3
  • FDP_IFC: 3
  • FDP_RIP: 36
  • FDP_RIP.1: 3
  • FDP_SDI.2: 2
  • FDP_SDC: 4
  • FDP_SDC.1: 8
  • FDP_SDI.2: 2
  • FDP_ITT.1: 4
  • FDP_IFC.1: 7
  • FDP_ACC: 10
  • FDP_ACF: 9
  • FDP_ITC: 1
  • FDP_SDI: 3
  • FDP_SDC.1.1: 1
  • FDP_ACF.1: 3
  • FDP_IFF.1: 5
  • FDP_ROL.1: 3
  • FDP_ROL: 10
  • FDP_IFF: 3
  • FDP_IFC: 3
  • FDP_RIP: 31
  • FDP_RIP.1: 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 8 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 7 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 4 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 36 31
pdf_data/st_keywords/cc_sfr/FDP/FDP_ROL 12 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 1 3
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 5
  • FMT_LIM.1: 13
  • FMT_LIM.2: 12
  • FMT_MSA.3: 4
  • FMT_MSA.1: 2
  • FMT_LIM.1.1: 1
  • FMT_LIM.2.1: 1
  • FMT_MSA: 14
  • FMT_MSA.2: 2
  • FMT_SMR.1: 3
  • FMT_MTD: 6
  • FMT_SMR: 1
  • FMT_SMF.1: 6
  • FMT_LIM: 14
  • FMT_LIM.1: 10
  • FMT_LIM.2: 10
  • FMT_MSA: 20
  • FMT_SMF: 2
  • FMT_SMR: 2
  • FMT_LIM.1.1: 1
  • FMT_LIM.2.1: 1
  • FMT_MSA.3: 3
  • FMT_MSA.2: 2
  • FMT_SMR.1: 3
  • FMT_MSA.1: 1
  • FMT_MTD: 6
  • FMT_SMF.1: 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 5 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 13 10
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 12 10
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 14 20
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 4 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR 1 2
pdf_data/st_keywords/cc_sfr/FPR
  • FPR_UNO.1: 3
  • FPR_UNO.1: 1
  • FPR_UNO: 2
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 3 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS 17 9
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 5 6
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 4
  • interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
  • and is out of the scope of current evaluation. Any other application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.1 Java Card Platform The Java technology, embedded on the TOE: 1
  • of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: Product Development Product: 1
  • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
  • out of scope: 4
  • interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
  • application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.2 Java Card Platform The Java technology, embedded on the TOE: 1
  • of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: • Product Development • Product: 1
  • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/crypto_library/Neslib
  • NesLib v.3.1: 1
  • NesLib v.4.2.10: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
  • MAC:
    • MAC: 6
  • KA:
    • Key Agreement: 2
pdf_data/st_keywords/crypto_scheme/MAC/MAC 4 6
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 2
  • SHA-256: 2
  • SHA-384: 1
  • SHA-512: 2
  • SHA224: 2
  • SHA256: 2
  • SHA384: 2
  • SHA512: 2
  • SHA-224: 2
  • SHA-256: 2
  • SHA-512: 2
  • SHA384: 3
  • SHA224: 2
  • SHA256: 2
  • SHA512: 2
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA384 2 3
pdf_data/st_keywords/javacard_version/GlobalPlatform/GlobalPlatform 2.1.1 2 3
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 4
  • TRNG:
    • TRNG: 1
  • PRNG:
    • DRBG: 1
  • RNG:
    • RND: 1
    • RNG: 19
pdf_data/st_keywords/randomness/RNG/RNG 4 19
pdf_data/st_keywords/side_channel_analysis/FI
  • Physical tampering: 2
  • physical tampering: 1
  • Malfunction: 1
  • malfunction: 2
  • fault injection: 2
  • physical tampering: 1
  • Malfunction: 1
  • malfunction: 2
pdf_data/st_keywords/standard_id
  • PKCS:
    • PKCS#1: 1
    • PKCS3: 1
    • PKCS1: 1
  • SCP:
    • SCP02: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS 140-2: 1
  • PKCS:
    • PKCS#1: 2
    • PKCS1: 1
  • SCP:
    • SCP02: 2
    • SCP03: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#1: 1
  • PKCS3: 1
  • PKCS1: 1
  • PKCS#1: 2
  • PKCS1: 1
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 1 2
pdf_data/st_keywords/standard_id/SCP
  • SCP02: 1
  • SCP02: 2
  • SCP03: 2
pdf_data/st_keywords/standard_id/SCP/SCP02 1 2
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 7 5
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • CBC-MAC: 1
  • CMAC: 3
  • CBC-MAC: 2
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CBC-MAC 1 2
pdf_data/st_keywords/vendor/STMicroelectronics/STM 15 13
pdf_data/st_keywords/vendor/STMicroelectronics/STMicroelectronics 8 6
pdf_data/st_metadata
  • pdf_file_size_bytes: 1236830
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
  • /Author: Luca Di Cosmo
  • /CreationDate: D:20150402161829+02'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20150522134244+02'00'
  • /Producer: Microsoft® Word 2013
  • /Title: J-Safe_SB23YR80B_Security_Target
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 692327
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 95
  • /Producer: PDFCreator 2.0.0.0
  • /CreationDate: D:20170127111137+01'00'
  • /ModDate: D:20170127111137+01'00'
  • /Title: STSafe-J_SecurityTarget_Lite_A
  • /Author: daniela terracciano
  • /Subject:
  • /Keywords:
  • /Creator: PDFCreator 2.0.0.0
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Luca Di Cosmo daniela terracciano
pdf_data/st_metadata//CreationDate D:20150402161829+02'00' D:20170127111137+01'00'
pdf_data/st_metadata//Creator Microsoft® Word 2013 PDFCreator 2.0.0.0
pdf_data/st_metadata//ModDate D:20150522134244+02'00' D:20170127111137+01'00'
pdf_data/st_metadata//Producer Microsoft® Word 2013 PDFCreator 2.0.0.0
pdf_data/st_metadata//Title J-Safe_SB23YR80B_Security_Target STSafe-J_SecurityTarget_Lite_A
pdf_data/st_metadata/pdf_file_size_bytes 1236830 692327
pdf_data/st_metadata/pdf_number_of_pages 90 95
dgst bb81f40b202b203a a0ac2d4999a67119