Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ShadowCube V7.0
KECS-CISS-1080-2021
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7793 A12 et G12
ANSSI-CC-2016/23
name ShadowCube V7.0 Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7793 A12 et G12
category Data Protection ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme KR FR
status active archived
not_valid_after 09.03.2026 23.05.2021
not_valid_before 09.03.2021 23.05.2016
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-21-10%20Certification%20Report.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-23.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ShadowCube%20V7.0%20Security%20Target%20V1.9.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2016-23.pdf
manufacturer Duruan Co., Ltd Gemalto
manufacturer_web https://www.gemalto.com/
security_level {} EAL5+, ALC_DVS.2, AVA_VAN.5
dgst d1a9b55fa4600ad6 9aa814bc0df8341c
heuristics/cert_id KECS-CISS-1080-2021 ANSSI-CC-2016/23
heuristics/cert_lab [] SERMA
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, ATE_FUN.1, AVA_VAN.1, ATE_IND.1, ATE_COV.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ALC_DVS.2, AVA_VAN.5
heuristics/extracted_versions 7.0 1.0
heuristics/report_references/directly_referencing {} ANSSI-CC-2015/73
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0926-2014, ANSSI-CC-2015/73, BSI-DSZ-CC-0907-2013
heuristics/scheme_data
  • category: Electronic Document Encryption
  • cert_id: KECS-CISS-1080-2021
  • certification_date: 09.03.2021
  • enhanced:
  • level: PP Compliant
  • product: ShadowCube V7.0
  • product_link: https://itscc.kr/certprod/view.do?product_id=1080&product_class=1
  • vendor: Duruan Co., Ltd
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0917-2014
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0917-2014
heuristics/protection_profiles 6f83fc6eba388cf0 d9553e7194783182, d918b28fd7bb5d79, 4a814d0e3c9f9082, 27abdb9c6ab375a7
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/KECS-PP-0821a-2017_PP_EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf
pdf_data/report_filename KECS-CR-21-10 Certification Report.pdf ANSSI-CC-2016-23.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2016/23
    • cert_item: Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7793 A12 et G12
    • cert_item_version: Version de l’application IAS Classic : 3.4.e Version de la plateforme Java Card MultiApp Essential : 1.0
    • cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: PP-SSCD part 2], version 2.0.1 - PP for Secure Signature Creation Device – Part 2 : Device with key generation. [PP-SSCD part 3], version 1.0.2 - PP for Secure Signature Creation Device – Part 3 : Device with key import. [PP-SSCD part 4], version 1.0.1 - PP for Secure Signature Creation Device – Part 4 : Extension for device with key generation and trusted communication with certificate generation application. [PP-SSCD part 5], version 1.0.1 - PP for Secure Signature Creation Device – Part 5 : Extension for device with key generation and trusted communication with signature creation application. [PP-SSCD part 6], version 1.0.4 - PP for Secure Signature Creation Device – Part 6 : Extension for device with key import and trusted communication with signature creation application
pdf_data/report_keywords/cc_cert_id
  • KR:
    • KECS-CISS-1080-2021: 1
  • DE:
    • BSI-DSZ-CC-0926-: 1
  • FR:
    • ANSSI-CC-2015/73: 1
    • ANSSI-CC-2016/23: 19
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0059-2009-MA-01: 1
    • BSI-CC-PP- 0071-2012: 1
    • BSI-CC-PP- 0072-2012: 1
    • BSI-CC-PP- 0075-2012: 1
    • BSI-CC-PP-0076-: 1
    • BSI-PP-0035-2007: 1
  • other:
    • PP-SSCD part: 10
    • PP-SSCD-: 5
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.1: 2
    • ASE_REQ.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_FUN.1: 3
    • ATE_IND.1: 3
  • AVA:
    • AVA_VAN.1: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 4
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 11
  • Gemalto:
    • Gemalto: 3
  • Infineon:
    • Infineon: 2
    • Infineon Technologies: 1
pdf_data/report_keywords/eval_facility
  • TTA:
    • TTA: 4
  • Serma:
    • SERMA: 1
    • Serma Safety & Security: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS 1.2: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RND: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
pdf_data/report_metadata
  • /Author: Administrator
  • /CreationDate: D:20210308175604+09'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20210308175604+09'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 488405
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Author:
  • /CreationDate:
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate:
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title: ANSSI-CC-2016-23
  • pdf_file_size_bytes: 277080
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename ShadowCube V7.0 Security Target V1.9.pdf cible_2016-23.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0917-2014: 1
    • BSI-DSZ-CC-0926-2014: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0076-2013: 1
    • BSI-PP-0035: 1
  • other:
    • PP-SSCD: 4
    • PP-SSCD-KG: 36
    • PP-SSCD-KI: 28
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 2
    • EAL1+: 5
  • EAL:
    • EAL 5+: 1
    • EAL5: 2
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 16
  • AGD:
    • AGD_OPE.1: 14
    • AGD_PRE.1: 10
  • ALC:
    • ALC_CMC.1: 6
    • ALC_CMS.1: 8
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 15
    • ASE_INT.1: 17
    • ASE_OBJ.1: 7
    • ASE_REQ.1: 14
    • ASE_REQ.1.1: 1
    • ASE_TSS.1: 8
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN: 1
    • ATE_FUN.1: 15
    • ATE_IND.1: 7
  • AVA:
    • AVA_VAN.1: 7
    • AVA_VAN.1.1: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 8
    • FAU_ARP.1.1: 1
    • FAU_GEN: 3
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAA.1: 9
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 6
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 3
    • FAU_STG.3: 11
    • FAU_STG.3.1: 1
    • FAU_STG.4: 10
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 28
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 14
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 20
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 22
    • FCS_COP.1.1: 2
    • FCS_RBG: 2
    • FCS_RBG.1: 13
    • FCS_RBG.1.1: 1
    • FCS_RGB.1: 1
    • FCS_RGB.1.1: 1
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 11
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC: 1
    • FDP_ITC.1: 7
    • FDP_ITC.2: 8
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_IMA: 1
    • FIA_IMA.1: 15
    • FIA_IMA.1.1: 2
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 7
    • FIA_UAU.4.1: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_IMA.1: 1
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_PWD: 1
    • FMT_PWD.1: 16
    • FMT_PWD.1.1: 2
    • FMT_PWD.1.2: 1
    • FMT_PWD.1.3: 2
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
    • FPT_MOF.1: 1
    • FPT_PST: 1
    • FPT_PST.1: 13
    • FPT_PST.1.1: 2
    • FPT_PST.2: 13
    • FPT_PST.2.1: 2
    • FPT_PST.2.2: 2
    • FPT_STM.1: 3
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_MCS.1: 1
    • FTA_MCS.2: 8
    • FTA_MCS.2.1: 1
    • FTA_MCS.2.2: 1
    • FTA_SSL: 1
    • FTA_SSL.5: 15
    • FTA_SSL.5.1: 2
    • FTA_TSE.1: 8
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_TRP.1: 1
  • FCS:
    • FCS_CKM: 14
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 2
    • FCS_COP: 8
    • FCS_COP.1: 2
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 4
    • FDP_ACF: 4
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_DAU: 4
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_IFC.1: 9
    • FDP_ITC: 2
    • FDP_ITC.1: 4
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 4
    • FDP_RIP: 1
    • FDP_RIP.1: 1
    • FDP_RIP.1.1: 1
    • FDP_SDI: 4
    • FDP_SDI.1: 2
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_UCT: 2
    • FDP_UCT.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT: 3
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 6
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 5
    • FIA_API.1: 8
    • FIA_API.1.1: 2
    • FIA_UAU: 5
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UID: 4
    • FIA_UID.1: 6
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF.1.1: 1
    • FMT_MSA: 14
    • FMT_MSA.1: 3
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 2
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4.1: 2
    • FMT_MTD: 4
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 7
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 2
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 2
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_PHP.3.1: 1
    • FPT_TST: 2
    • FPT_TST.1: 3
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 13
    • FTP_ITC.1: 2
    • FTP_ITC.1.1: 4
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 4
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.LOG_BACKUP: 2
    • OE.OPERATION_SYSTEM_REINFORCEMENT: 2
    • OE.PHYSICAL_CONTROL: 2
    • OE.SECURE_DBMS: 4
    • OE.TIMESTAMP: 1
    • OE.TIME_STAMP: 2
    • OE.TRUSTED_ADMIN: 2
    • OE.TRUSTED_PATH: 1
  • A:
    • A.CGA: 4
    • A.CSP: 5
    • A.SCA: 4
  • OE:
    • OE.HID_VAD: 2
    • OE.HI_VAD: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 16
  • Gemalto:
    • Gemalto: 339
  • Infineon:
    • Infineon: 4
pdf_data/st_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • TDES: 4
    • DES:
      • DES: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 19
  • RSA:
    • RSA 2048: 2
    • RSA-PSS: 4
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 8
  • SHA:
    • SHA2:
      • SHA-256: 51
      • SHA256: 9
  • SHA:
    • SHA2:
      • SHA-224: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 6
  • MAC:
    • MAC: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RBG: 5
  • RNG:
    • RND: 1
    • RNG: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • Leak-Inherent: 1
    • SPA: 1
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 1
  • ISO:
    • ISO/IEC 10118-: 1
    • ISO/IEC 10118-3: 4
    • ISO/IEC 11770-: 1
    • ISO/IEC 11770-3: 10
    • ISO/IEC 14888-: 1
    • ISO/IEC 14888-2: 2
    • ISO/IEC 18031: 14
    • ISO/IEC 18033-: 1
    • ISO/IEC 18033-2: 5
  • CC:
    • CCMB-2009-07-004: 1
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS PUB 46-3: 1
    • FIPS180-2: 1
    • FIPS46-3: 1
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 2
  • SCP:
    • SCP03: 1
pdf_data/st_metadata
  • /Author: Kyunghwa Kang
  • /CreationDate: D:20210304170331+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20210304170331+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 1258022
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 86
  • /Author: Antoine de Lavernette
  • /CreationDate: D:20160504104918+02'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: Security Target, CC, eTravel
  • /ModDate: D:20160504104918+02'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: MRTD
  • /Title: eTravel v1.0 Security Target MAÏA3
  • pdf_file_size_bytes: 1238467
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 52
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different