Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
HED Secure Smart Card Chip CIU9872B_01 C11 with IC Dedicated Software
None
KOMSCO JK21 V1.0 on S3CT9KA/KC/KW
KECS-ISIS-0468-2013
name HED Secure Smart Card Chip CIU9872B_01 C11 with IC Dedicated Software KOMSCO JK21 V1.0 on S3CT9KA/KC/KW
scheme NO KR
not_valid_after 25.11.2021 01.06.2019
not_valid_before 25.11.2016 08.11.2013
report_link https://www.commoncriteriaportal.org/files/epfiles/20161125%20S-090%20CR%20%20v1.0%20Huada.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-13-37%20KOMSCO%20JK21%20V1.0%20on%20S3CT9KAKCKW(eng).pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/Security%20Target-lite%20of%20CIU9872B_01%20C11%20Secure%20Smart%20Card%20Chip%20V1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[JK21-TR-0001]%20Security%20Target-Lite-e-v1.1.pdf
manufacturer CEC Huada Electronic Design Co., Ltd. KOMSCO
manufacturer_web https://www.komsco.com
dgst d48cc6c1c371a5a4 fd0beec036b21950
heuristics/cert_id KECS-ISIS-0468-2013
heuristics/extracted_versions - 1.0
heuristics/report_references/directly_referencing {} ANSSI-CC-2012/70, BSI-DSZ-CC-0719-2011
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2012/70, BSI-DSZ-CC-0547-2009, BSI-DSZ-CC-0639-2010, BSI-DSZ-CC-0719-2011
heuristics/scheme_data
  • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
  • certification_date: 25.11.2016
  • developer: CEC Huada Electronic Design Co., Ltd.
  • enhanced:
    • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
    • cert_id: SERTIT-090
    • certification_date: 25.11.2016
    • description: The TOE is a high-end secure smart card integrated circuit with dedicated software mainly for financial applications. The scope of the TOE includes the IC hardware and IC dedicated software which is constitutive of Chip Management System (CMS) and cryptographic library. CMS supports two functionalities, which are booting process controlling and chip module function testing. The cryptographic library implements the arithmetic function like RSA, DES, and TDES with cooperating of hardware. The whole IC dedicated software is programed with C language.
    • developer: CEC Huada Electronic Design Co., Ltd.
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135106-1607952924/SERTIT/Sertifikater/2016/90/20161125%20SERTIT-090%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135112-1607952929/SERTIT/Sertifikater/2016/90/Security%20Target-lite%20of%20CIU9872B_01%20C11%20Secure%20Smart%20Card%20Chip%20V1.1.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135109-1607952926/SERTIT/Sertifikater/2016/90/20161125%20S-090%20CR%20%20v1.0%20Huada.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 5, ALC_DVS.2, AVA_VAN.5
    • mutual_recognition: CCRA, SOG-IS
    • product: C11
    • protection_profile: BSI-CC-PP-0084-2014 v1.0
    • sponsor: CEC Huada Electronic Design Co., Ltd.
  • product: HED Secure Smart Card Chip CIU9872B_01
  • url: https://sertit.no/certified-products/product-archive/hed-secure-smart-card-chip-ciu9872b-01
heuristics/st_references/directly_referencing {} ANSSI-CC-2012/70, ANSSI-CC-2012/72, BSI-DSZ-CC-0719-2011
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2012/70, ANSSI-CC-2012/72, BSI-DSZ-CC-0719-2011
protection_profile_links {} {}
pdf_data/report_filename KECS-CR-13-37 KOMSCO JK21 V1.0 on S3CT9KAKCKW(eng).pdf
pdf_data/report_frontpage
      pdf_data/report_keywords/cc_cert_id
      • DE:
        • BSI-DSZ-CC-0719: 3
        • BSI-DSZ-CC-0719-2011: 1
      • FR:
        • ANSSI-CC-2012/70: 4
      • KR:
        • KECS-ISIS-0468-2013: 1
      • NL:
        • CC-2011-002: 1
      pdf_data/report_keywords/cc_protection_profile_id
      pdf_data/report_keywords/cc_security_level
      • EAL:
        • EAL5: 2
        • EAL5 augmented: 2
        • EAL5+: 3
        • EAL6: 1
      pdf_data/report_keywords/cc_sar
      • ADV:
        • ADV_ARC.1: 2
        • ADV_FSP.5: 3
        • ADV_IMP.1: 2
        • ADV_INT.2: 3
        • ADV_TDS.4: 3
      • AGD:
        • AGD_OPE.1: 2
        • AGD_PRE.1: 3
      • ALC:
        • ALC_CMC.4: 2
        • ALC_CMS.5: 2
        • ALC_DEL.1: 2
        • ALC_DVS.2: 6
        • ALC_LCD.1: 2
        • ALC_TAT.2: 2
      • ASE:
        • ASE_CCL.1: 2
        • ASE_ECD.1: 3
        • ASE_INT.1: 3
        • ASE_OBJ.2: 2
        • ASE_REQ.2: 2
        • ASE_SPD.1: 2
        • ASE_TSS.1: 3
      • ATE:
        • ATE_COV.2: 3
        • ATE_DPT.3: 3
        • ATE_FUN.1: 2
        • ATE_IND.2: 4
      • AVA:
        • AVA_VAN.5: 8
      pdf_data/report_keywords/cc_sfr
      pdf_data/report_keywords/cc_claims
      pdf_data/report_keywords/vendor
      • Samsung:
        • Samsung: 8
      pdf_data/report_keywords/eval_facility
      • KISA:
        • KISA: 4
      pdf_data/report_keywords/symmetric_crypto
      • AES_competition:
        • AES:
          • AES: 3
      • DES:
        • DES:
          • DES: 3
      pdf_data/report_keywords/asymmetric_crypto
      • ECC:
        • ECC:
          • ECC: 4
      pdf_data/report_keywords/pq_crypto
      pdf_data/report_keywords/hash_function
      pdf_data/report_keywords/crypto_scheme
      pdf_data/report_keywords/crypto_protocol
      pdf_data/report_keywords/randomness
      • TRNG:
        • TRNG: 4
      pdf_data/report_keywords/cipher_mode
      pdf_data/report_keywords/ecc_curve
      pdf_data/report_keywords/crypto_engine
      pdf_data/report_keywords/tls_cipher_suite
      pdf_data/report_keywords/crypto_library
      pdf_data/report_keywords/vulnerability
      pdf_data/report_keywords/side_channel_analysis
      • FI:
        • fault injection: 1
      pdf_data/report_keywords/technical_report_id
      pdf_data/report_keywords/device_model
      pdf_data/report_keywords/tee_name
      pdf_data/report_keywords/os_name
      pdf_data/report_keywords/cplc_data
      pdf_data/report_keywords/ic_data_group
      pdf_data/report_keywords/standard_id
      • BSI:
        • AIS 34: 1
      • CC:
        • CCMB-2012-09-001: 2
        • CCMB-2012-09-003: 2
        • CCMB-2012-09-004: 1
      • ISO:
        • ISO/IEC 14443: 2
        • ISO/IEC 7816: 2
      • SCP:
        • SCP02: 1
      pdf_data/report_keywords/javacard_version
      • GlobalPlatform:
        • GlobalPlatform 2.1.1: 1
      • JavaCard:
        • Java Card 2.2.2: 3
      pdf_data/report_keywords/javacard_api_const
      pdf_data/report_keywords/javacard_packages
      pdf_data/report_keywords/certification_process
      pdf_data/report_metadata
      • /Author: 이은경
      • /CreationDate: D:20131107180619+09'00'
      • /Creator: Microsoft® Word 2010
      • /ModDate: D:20131107180619+09'00'
      • /Producer: Microsoft® Word 2010
      • /Title: 평가단위보고서(ADV_ARC.1)
      • pdf_file_size_bytes: 571329
      • pdf_hyperlinks: {}
      • pdf_is_encrypted: False
      • pdf_number_of_pages: 25
      pdf_data/st_filename Security Target-lite of CIU9872B_01 C11 Secure Smart Card Chip V1.1.pdf [JK21-TR-0001] Security Target-Lite-e-v1.1.pdf
      pdf_data/st_keywords/cc_cert_id
      • DE:
        • BSI-DSZ-CC-0719-: 1
        • BSI-DSZ-CC-0719-2011: 3
      • FR:
        • ANSSI-CC-2012/70: 3
        • ANSSI-CC-2012/72: 3
      pdf_data/st_keywords/cc_protection_profile_id
      • BSI:
        • BSI-CC-PP-0084-2014: 1
        • BSI-PP-0084: 24
      • BSI:
        • BSI-PP-0035-2007: 2
      pdf_data/st_keywords/cc_security_level
      • EAL:
        • EAL4: 1
        • EAL4 augmented: 1
        • EAL5: 9
        • EAL5 augmented: 3
        • EAL5+: 1
      • EAL:
        • EAL 5+: 1
        • EAL3: 1
        • EAL4: 3
        • EAL4+: 1
        • EAL5: 11
        • EAL5 augmented: 1
        • EAL5+: 13
      pdf_data/st_keywords/cc_sar
      • ADV:
        • ADV_ARC.1: 2
        • ADV_FSP.5: 2
        • ADV_IMP.1: 2
        • ADV_INT.2: 1
        • ADV_TDS.4: 2
      • AGD:
        • AGD_OPE: 2
        • AGD_OPE.1: 2
        • AGD_PRE: 2
        • AGD_PRE.1: 2
      • ALC:
        • ALC_CMC.4: 1
        • ALC_CMS.5: 1
        • ALC_DEL.1: 1
        • ALC_DVS.1: 1
        • ALC_DVS.2: 8
        • ALC_LCD.1: 1
        • ALC_TAT.2: 1
      • ASE:
        • ASE_CCL.1: 1
        • ASE_ECD.1: 1
        • ASE_INT.1: 1
        • ASE_OBJ.2: 1
        • ASE_REQ.2: 1
        • ASE_SPD.1: 1
        • ASE_TSS.1: 1
      • ATE:
        • ATE_COV.2: 1
        • ATE_DPT.3: 1
        • ATE_FUN.1: 1
        • ATE_IND.2: 1
      • AVA:
        • AVA_VAN.5: 10
      • ADV:
        • ADV_ARC.1: 15
        • ADV_FSP.1: 3
        • ADV_FSP.2: 2
        • ADV_FSP.4: 1
        • ADV_FSP.5: 19
        • ADV_IMP.1: 13
        • ADV_INT.2: 11
        • ADV_TDS.1: 2
        • ADV_TDS.3: 5
        • ADV_TDS.4: 19
      • AGD:
        • AGD_OPE.1: 17
        • AGD_PRE.1: 10
      • ALC:
        • ALC_CMC.4: 17
        • ALC_CMS.1: 1
        • ALC_CMS.5: 10
        • ALC_DEL.1: 7
        • ALC_DVS.1: 1
        • ALC_DVS.2: 20
        • ALC_LCD.1: 9
        • ALC_TAT.1: 2
        • ALC_TAT.2: 13
      • ASE:
        • ASE_CCL.1: 16
        • ASE_ECD.1: 14
        • ASE_INT.1: 16
        • ASE_OBJ.2: 13
        • ASE_REQ.1: 2
        • ASE_REQ.2: 15
        • ASE_SPD.1: 10
        • ASE_TSS.1: 7
      • ATE:
        • ATE_COV.1: 2
        • ATE_COV.2: 7
        • ATE_DPT.1: 2
        • ATE_DPT.3: 10
        • ATE_FUN.1: 13
        • ATE_IND.2: 9
      • AVA:
        • AVA_VAN.4: 2
        • AVA_VAN.5: 20
      pdf_data/st_keywords/cc_sfr
      • FAU:
        • FAU_GEN: 1
        • FAU_SAS: 5
        • FAU_SAS.1: 6
        • FAU_SAS.1.1: 1
      • FCS:
        • FCS_CKM.1: 13
        • FCS_CKM.4: 10
        • FCS_COP: 1
        • FCS_COP.1: 21
        • FCS_COP.1.1: 2
        • FCS_RNG: 3
        • FCS_RNG.1: 11
        • FCS_RNG.1.1: 2
        • FCS_RNG.1.2: 2
      • FDP:
        • FDP_ACC: 1
        • FDP_ACC.1: 12
        • FDP_ACC.1.1: 1
        • FDP_ACF: 1
        • FDP_ACF.1: 12
        • FDP_ACF.1.1: 1
        • FDP_ACF.1.2: 1
        • FDP_ACF.1.3: 1
        • FDP_ACF.1.4: 1
        • FDP_IFC.1: 4
        • FDP_ITC.1: 9
        • FDP_ITC.2: 9
        • FDP_ITT.1: 4
        • FDP_SDC: 3
        • FDP_SDC.1: 5
        • FDP_SDC.1.1: 1
        • FDP_SDI: 1
        • FDP_SDI.1: 3
        • FDP_SDI.2: 6
        • FDP_SDI.2.1: 1
        • FDP_SDI.2.2: 1
      • FMT:
        • FMT_LIM: 5
        • FMT_LIM.1: 5
        • FMT_LIM.2: 5
        • FMT_MSA.3: 4
      • FPT:
        • FPT_FLS: 1
        • FPT_FLS.1: 6
        • FPT_FLS.1.1: 1
        • FPT_ITT.1: 4
        • FPT_PHP: 1
        • FPT_PHP.3: 5
        • FPT_PHP.3.1: 1
      • FRU:
        • FRU_FLT: 1
        • FRU_FLT.2: 6
      • FAU:
        • FAU_ARP.1: 7
        • FAU_ARP.1.1: 1
        • FAU_GEN.1: 3
        • FAU_SAA.1: 10
        • FAU_SAA.1.1: 1
        • FAU_SAA.1.2: 1
        • FAU_SAS.1: 3
      • FCS:
        • FCS_CKM: 2
        • FCS_CKM.1: 29
        • FCS_CKM.1.1: 3
        • FCS_CKM.2: 12
        • FCS_CKM.4: 21
        • FCS_CKM.4.1: 2
        • FCS_COP: 6
        • FCS_COP.1: 44
        • FCS_COP.1.1: 7
        • FCS_RNG: 2
        • FCS_RNG.1: 14
        • FCS_RNG.1.1: 2
        • FCS_RNG.1.2: 2
      • FDP:
        • FDP_ACC.1: 17
        • FDP_ACC.2: 15
        • FDP_ACC.2.1: 2
        • FDP_ACC.2.2: 2
        • FDP_ACF.1: 22
        • FDP_ACF.1.1: 2
        • FDP_ACF.1.2: 2
        • FDP_ACF.1.3: 2
        • FDP_ACF.1.4: 2
        • FDP_IFC.1: 9
        • FDP_ITC.1: 12
        • FDP_ITC.2: 12
        • FDP_ITT.1: 1
        • FDP_RIP.1: 6
        • FDP_RIP.1.1: 1
        • FDP_SDI.1: 1
        • FDP_SDI.2: 6
        • FDP_SDI.2.1: 1
        • FDP_SDI.2.2: 1
        • FDP_UCT.1: 9
        • FDP_UCT.1.1: 1
        • FDP_UIT.1: 8
        • FDP_UIT.1.1: 2
      • FIA:
        • FIA_AFL.1: 7
        • FIA_AFL.1.1: 1
        • FIA_AFL.1.2: 1
        • FIA_ATD.1: 13
        • FIA_ATD.1.1: 2
        • FIA_SOS.1: 7
        • FIA_SOS.1.1: 1
        • FIA_UAU.1: 22
        • FIA_UAU.1.1: 7
        • FIA_UAU.1.2: 3
        • FIA_UAU.4: 7
        • FIA_UAU.4.1: 1
        • FIA_UAU.6: 6
        • FIA_UAU.6.1: 1
        • FIA_UID.1: 14
        • FIA_UID.1.1: 2
        • FIA_UID.1.2: 1
        • FIA_USB.1: 6
        • FIA_USB.1.1: 1
        • FIA_USB.1.2: 1
        • FIA_USB.1.3: 1
      • FMT:
        • FMT_LIM.1: 3
        • FMT_LIM.2: 3
        • FMT_MOF.1: 7
        • FMT_MOF.1.1: 1
        • FMT_MSA.1: 16
        • FMT_MSA.1.1: 3
        • FMT_MSA.3: 11
        • FMT_MSA.3.1: 2
        • FMT_MSA.3.2: 1
        • FMT_MTD.1: 7
        • FMT_MTD.1.1: 1
        • FMT_MTD.2: 7
        • FMT_MTD.2.1: 1
        • FMT_MTD.2.2: 1
        • FMT_SMF.1: 12
        • FMT_SMF.1.1: 1
        • FMT_SMR.1: 18
        • FMT_SMR.1.1: 5
        • FMT_SMR.1.2: 1
      • FPR:
        • FPR_UNO.1: 8
        • FPR_UNO.1.1: 1
      • FPT:
        • FPT_FLS.1: 8
        • FPT_FLS.1.1: 2
        • FPT_ITT.1: 1
        • FPT_PHP.3: 8
        • FPT_RCV.2: 1
        • FPT_RCV.3: 6
        • FPT_RCV.3.1: 1
        • FPT_RCV.3.2: 1
        • FPT_RCV.3.3: 1
        • FPT_RCV.3.4: 1
        • FPT_RCV.4: 5
        • FPT_RCV.4.1: 1
        • FPT_TST.1: 6
        • FPT_TST.1.1: 1
        • FPT_TST.1.2: 1
        • FPT_TST.1.3: 1
      • FRU:
        • FRU_FLT.2: 1
      • FTP:
        • FTP_ITC.1: 6
        • FTP_TRP.1: 5
      pdf_data/st_keywords/cc_claims
      • O:
        • O.MEM-ACCESS: 1
        • O.RND: 2
        • O.RSA: 4
        • O.TDES: 5
      • T:
        • T.RND: 2
      • A:
        • A.TOE: 3
        • A.TSF: 3
      • D:
        • D.APP_CODE: 1
        • D.APP_DATA: 1
        • D.CRYPTO: 1
        • D.PIN: 1
        • D.SEC_DATA: 1
        • D.TS_CODE: 1
        • D.TS_DATA: 1
      • O:
        • O.IC: 23
        • O.RND: 1
      • OE:
        • OE.TSF: 6
      • OP:
        • OP.ARRAY_ACCESS: 5
        • OP.CREATE: 3
        • OP.DELETE: 10
        • OP.INSTALL: 10
        • OP.INSTANCE_FIELD: 5
        • OP.INVK_INTERFACE: 7
        • OP.INVK_VIRTUAL: 5
        • OP.JAVA: 3
        • OP.LOAD: 10
        • OP.THROW: 5
        • OP.TYPE_ACCESS: 7
      • T:
        • T.RND: 1
      pdf_data/st_keywords/vendor
      • Samsung:
        • Samsung: 7
      pdf_data/st_keywords/symmetric_crypto
      • DES:
        • 3DES:
          • TDEA: 1
          • TDES: 28
        • DES:
          • DES: 3
      • AES_competition:
        • AES:
          • AES: 9
      • DES:
        • 3DES:
          • 3DES: 1
          • TDES: 14
        • DES:
          • DES: 2
      • miscellaneous:
        • ARIA:
          • ARIA: 7
        • SEED:
          • SEED: 6
      pdf_data/st_keywords/asymmetric_crypto
      • ECC:
        • ECC:
          • ECC: 14
        • ECDH:
          • ECDH: 3
        • ECDSA:
          • ECDSA: 4
      • FF:
        • DH:
          • DH: 1
          • Diffie-Hellman: 2
      • RSA:
        • RSA 1024: 2
      pdf_data/st_keywords/hash_function
      • SHA:
        • SHA2:
          • SHA-224: 2
          • SHA-256: 1
          • SHA-384: 1
      pdf_data/st_keywords/crypto_scheme
      • PKE:
        • PKE: 3
      • KA:
        • Key Agreement: 3
        • Key agreement: 1
      • MAC:
        • MAC: 6
      pdf_data/st_keywords/randomness
      • RNG:
        • RND: 4
        • RNG: 11
      • TRNG:
        • TRNG: 3
      • RNG:
        • RND: 2
        • RNG: 1
      • TRNG:
        • TRNG: 5
      pdf_data/st_keywords/cipher_mode
      • CBC:
        • CBC: 2
      • ECB:
        • ECB: 2
      • CBC:
        • CBC: 2
      pdf_data/st_keywords/side_channel_analysis
      • FI:
        • DFA: 2
        • Malfunction: 6
        • malfunction: 2
        • physical tampering: 1
      • SCA:
        • DPA: 3
        • Leak-Inherent: 5
        • Physical Probing: 2
        • SPA: 3
        • physical probing: 3
      • FI:
        • DFA: 1
        • Malfunction: 10
        • Physical tampering: 2
        • malfunction: 9
        • physical tampering: 1
      • SCA:
        • DPA: 1
        • Leak-Inherent: 2
        • SPA: 1
        • physical probing: 3
        • timing attack: 1
      pdf_data/st_keywords/standard_id
      • BSI:
        • AIS20: 5
      • CC:
        • CCMB-2012-09-001: 2
        • CCMB-2012-09-002: 2
        • CCMB-2012-09-003: 2
        • CCMB-2012-09-004: 2
      • FIPS:
        • FIPS PUB 46-3: 1
      • ISO:
        • ISO/IEC 14443: 2
        • ISO/IEC 7816: 2
        • ISO/IEC14443: 2
      • BSI:
        • AIS 31: 1
        • AIS31: 1
      • CC:
        • CCMB-2012-09-001: 1
        • CCMB-2012-09-002: 2
        • CCMB-2012-09-003: 2
      • FIPS:
        • FIPS 180-3: 1
        • FIPS 197: 2
        • FIPS PUB 197: 1
        • FIPS PUB 46-3: 1
      • PKCS:
        • PKCS#1: 1
        • PKCS#2: 2
      • SCP:
        • SCP 02: 1
        • SCP02: 19
      pdf_data/st_keywords/javacard_version
      • GlobalPlatform:
        • GlobalPlatform 2.1.1: 3
      pdf_data/st_keywords/javacard_api_const
      • misc:
        • TYPE_ACCESS: 8
      pdf_data/st_keywords/certification_process
      • OutOfScope:
        • out of scope: 1
        • the application although it is possible to load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE The TOE is the JavaCard Platform that supports the analysis: 1
      pdf_data/st_metadata
      • /Author: 刘剑峰
      • /CreationDate: D:20161125102430+00'00'
      • /Creator: Microsoft Word
      • /ModDate: D:20161125102430+00'00'
      • pdf_file_size_bytes: 1079746
      • pdf_hyperlinks: {}
      • pdf_is_encrypted: False
      • pdf_number_of_pages: 40
      • /Author: HoGeun Song
      • /CreationDate: D:20131111082538+09'00'
      • /Creator: Microsoft® Word 2010
      • /ModDate: D:20131111082538+09'00'
      • /Producer: Microsoft® Word 2010
      • /Title: KOMSCO Document Template
      • pdf_file_size_bytes: 1422360
      • pdf_hyperlinks: {}
      • pdf_is_encrypted: False
      • pdf_number_of_pages: 108
      state/report/convert_ok False True
      state/report/download_ok False True
      state/report/extract_ok False True
      state/report/pdf_hash Different Different
      state/report/txt_hash Different Different
      state/st/pdf_hash Different Different
      state/st/txt_hash Different Different