Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series
KECS-CISS-1035-2020
Carte à puce Multiapp ID IAS ECC wafer process : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB
ANSSI-CC-2010/52
name Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series Carte à puce Multiapp ID IAS ECC wafer process : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme KR FR
status active archived
not_valid_after 26.08.2025 01.09.2019
not_valid_before 26.08.2020 02.08.2010
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CISS-1035-2020_CR_EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2010-52fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CISS-1035-2020_ST_EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-52en.pdf
manufacturer HP Inc. Gemalto / NXP Semiconductors
manufacturer_web https://www8.hp.com/hpnext/tags/hp-inc#.Vjdf803sn4g https://www.gemalto.com/
security_level EAL2+, ALC_FLR.2 EAL4+, ALC_DVS.2, AVA_VAN.5
dgst d5eaadb952636ef2 b03a7489da392a5d
heuristics/cert_id KECS-CISS-1035-2020 ANSSI-CC-2010/52
heuristics/cert_lab [] SERMA
heuristics/extracted_sars AGD_OPE.1, ADV_TDS.1, ALC_DEL.1, ALC_CMC.2, ASE_INT.1, ATE_COV.1, AVA_VAN.2, ADV_ARC.1, ALC_FLR.2, ASE_ECD.1, ASE_REQ.2, ASE_OBJ.2, ATE_IND.2, ATE_FUN.1, ADV_FSP.2, ALC_CMS.2, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1 ADV_FSP.4, ALC_DVS.2, ATE_DPT.1, ADV_TDS.3, ADV_ARC.1, ALC_TAT.1, ATE_COV.2, ATE_IND.2, AVA_VAN.5, AGD_OPE.1, AVA_VLA.4, ATE_FUN.1, ADV_IMP.2, AGD_PRE.1, ALC_DEL.1, ALC_LCD.1, AVA_MSU.3, ALC_CMC.4
heuristics/extracted_versions - 1.0, 4.2.7, 1.2
heuristics/report_references/directly_referencing {} ANSSI-CC-2009/56, BSI-DSZ-CC-0411-2007
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2009/56, BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-0404-2007
heuristics/scheme_data
  • category: Digital Multifunction Printer
  • cert_id: KECS-CISS-1035-2020
  • certification_date: 26.08.2020
  • enhanced:
    • assurance_level: EAL2+
    • cc_version: CC V3.1 R5
    • cert_id: KECS-CISS-1035-2020
    • cert_link: https://itscc.kr/file/download.do?file=KPR100000001577
    • certification_date: 26.08.2020
    • developer: HP Printing Korea Co., Ltd
    • expiration_date: 26.08.2025
    • holder: HP Inc.
    • maintenance_update: [frozendict({'name': 'Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series Assurance maintenance1', 'certification_date': datetime.date(2023, 11, 9), 'cert_id': 'KECS-CISS-1035a-2020', 'maintenance_link': 'https://itscc.kr/file/download.do?file=KPR200000001712', 'target_link': 'https://itscc.kr/file/download.do?file=KPR200000001713'})]
    • product: Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series
    • product_type: Digital Multifunction Printer
    • protection_profile: U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std.2600.2-2009)
    • report_link: https://itscc.kr/file/download.do?file=KPR100000001569
    • target_link: https://itscc.kr/file/download.do?file=KPR100000001570
  • level: EAL2+
  • product: Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series
  • product_link: https://itscc.kr/certprod/view.do?product_id=1035&product_class=1
  • vendor: HP Inc.
heuristics/protection_profiles 154ef77c252799ee 9863a376f3bb4175, 40002c3611fc465f
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0058b.pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0005b.pdf
pdf_data/report_filename KECS-CISS-1035-2020_CR_EN.pdf ANSSI-CC_2010-52fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1
    • cert_id: ANSSI-CC-2010/52
    • cert_item: Carte à puce Multiapp ID IAS ECC wafer process : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB
    • cert_item_version: Version applet : v4.2.7.A Version plate-forme Java Card Multiapp : v1.0 Version correctif : v1.2 Version microcontrôleur : V0B
    • cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Tél : +33 (0)5 57 26 08 75, mél : [email protected]
    • developer: Gemalto SA1 6 rue de la Verrerie 92197 Meudon, France NXP Semiconductors GmbH1 Stresemannallee 101 D-22502 Hamburg, Germany Commanditaire Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
pdf_data/report_keywords/cc_cert_id
  • KR:
    • KECS-CISS-1035-2020: 1
  • DE:
    • BSI-DSZ-CC-0411-2007: 1
    • BSI-DSZ-CC-0411-2007-MA-05: 1
  • FR:
    • ANSSI-CC-2009_56: 5
    • ANSSI-CC-2010/52: 20
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0002-2001: 1
    • BSI-PP- 0005-2002: 1
    • BSI-PP- 0006-2002: 1
    • BSI-PP-0002-2001: 2
    • BSI-PP-0005-: 1
    • BSI-PP-0005-2002: 3
    • BSI-PP-0006-2002: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 2
    • EAL2+: 5
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 3
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 3
    • ADV_TDS.1: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 5
  • AVA:
    • AVA_VAN.2: 5
  • ADO:
    • ADO_DEL: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_MSU.3: 1
    • AVA_VAN: 1
    • AVA_VAN.5: 2
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_sfr
  • FPT:
    • FPT_FDI_EXP: 1
    • FPT_FDI_EXP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 12
  • Gemalto:
    • Gemalto: 20
  • NXP:
    • NXP: 15
    • NXP Semiconductors: 2
pdf_data/report_keywords/eval_facility
  • KSEL:
    • KSEL: 3
  • Serma:
    • Serma Technologies: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 34
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
pdf_data/report_metadata
  • /CreationDate: D:20100809174608+02'00'
  • /Keywords:
  • /ModDate: D:20100809174608+02'00'
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • pdf_file_size_bytes: 162430
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename KECS-CISS-1035-2020_ST_EN.pdf ANSSI-CC-cible_2010-52en.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 1
    • BSI-PP-0004-2002T-: 1
    • BSI-PP-0005-2002T-03-04-2002: 1
    • BSI-PP-0006-2002T-03-04-2002: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 8
    • EAL2 augmented: 6
    • EAL3: 1
  • EAL:
    • EAL4: 8
    • EAL4 augmented: 6
    • EAL4+: 4
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 12
    • ADV_FSP.1: 3
    • ADV_FSP.2: 16
    • ADV_TDS.1: 15
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 13
    • AGD_PRE: 1
    • AGD_PRE.1: 9
  • ALC:
    • ALC_CMC.2: 9
    • ALC_CMS.1: 1
    • ALC_CMS.2: 7
    • ALC_DEL.1: 6
    • ALC_FLR.2: 23
  • APE:
    • APE_ECD: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SPD: 1
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 13
    • ASE_INT.1: 15
    • ASE_OBJ.2: 12
    • ASE_REQ.1: 2
    • ASE_REQ.2: 14
    • ASE_SPD.1: 9
    • ASE_TSS.1: 6
  • ATE:
    • ATE_COV.1: 7
    • ATE_FUN.1: 11
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 1
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_IMP.2: 1
    • ADV_LLD: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_ADM: 1
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 3
    • AGD_PRE.1: 3
    • AGD_USR: 1
  • ALC:
    • ALC_CMC: 2
    • ALC_CMC.4: 1
    • ALC_CMS: 2
    • ALC_DEL: 2
    • ALC_DEL.1: 1
    • ALC_DVS: 3
    • ALC_DVS.2: 3
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 1
    • AVA_MSU: 1
    • AVA_MSU.3: 2
    • AVA_SOF: 1
    • AVA_VAN: 2
    • AVA_VAN.5: 2
    • AVA_VLA: 1
    • AVA_VLA.4: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 35
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 29
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 10
    • FDP_IFC.2: 7
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 16
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 31
    • FMT_MSA.1.1: 4
    • FMT_MSA.3: 31
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 31
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 9
    • FCS_CKM.1: 5
    • FCS_CKM.4: 4
    • FCS_COP: 9
    • FCS_COP.1: 9
  • FDP:
    • FDP_ACC: 10
    • FDP_ACC.1: 9
    • FDP_ACF: 9
    • FDP_ACF.1: 24
    • FDP_ETC: 6
    • FDP_ETC.1: 4
    • FDP_ITC: 6
    • FDP_ITC.1: 8
    • FDP_RIP: 4
    • FDP_RIP.1: 2
    • FDP_RIP.1.1: 1
    • FDP_SDI: 5
    • FDP_SDI.2: 7
    • FDP_UCT: 3
    • FDP_UCT.1: 5
    • FDP_UIT: 6
    • FDP_UIT.1: 6
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 4
    • FIA_ATD.1: 2
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 3
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UID: 4
    • FIA_UID.1: 4
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF: 3
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 1
    • FMT_MSA: 9
    • FMT_MSA.1: 5
    • FMT_MSA.2: 3
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 7
    • FMT_MTD: 3
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 2
    • FMT_SMR: 3
    • FMT_SMR.1: 3
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT: 1
    • FPT_AMT.1: 1
    • FPT_FLS: 3
    • FPT_FLS.1: 3
    • FPT_FLS.1.1: 1
    • FPT_PHP: 4
    • FPT_PHP.1: 3
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 3
    • FPT_PHP.3.1: 1
    • FPT_TST: 5
    • FPT_TST.1: 3
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 10
    • FTP_ITC.1: 14
    • FTP_TRP: 7
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 4
    • A.ADMIN: 8
    • A.USER: 4
  • D:
    • D.CONF: 7
    • D.DOC: 15
    • D.FUNC: 8
    • D.PROT: 4
  • O:
    • O.AUDIT: 6
    • O.AUDIT_ACCESS: 6
    • O.AUDIT_STORAG: 1
    • O.AUDIT_STORAGE: 5
    • O.CONF: 12
    • O.DOC: 13
    • O.FUNC: 6
    • O.INTERFACE: 6
    • O.PROT: 6
    • O.SOFTWARE: 6
    • O.USER: 12
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 4
    • OE.AUDIT_ACCESS: 4
    • OE.AUDIT_STORAGE: 4
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 14
  • T:
    • T.CONF: 8
    • T.DOC: 8
    • T.FUNC: 4
    • T.PROT: 4
  • A:
    • A.CGA: 2
    • A.SCA: 2
  • D:
    • D.DTBS: 6
    • D.RAD: 5
    • D.SCD: 10
    • D.SIG: 3
    • D.SSCD: 1
    • D.SVD: 7
    • D.VAD: 1
  • OE:
    • OE.HI_VAD: 3
    • OE.SVD_AUTH_CGA: 1
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 9
  • Gemalto:
    • Gemalto: 363
  • NXP:
    • NXP: 12
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3DES: 2
  • DES:
    • 3DES:
      • TDES: 9
      • Triple-DES: 1
    • DES:
      • DES: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 26
  • FF:
    • DH:
      • DH: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-256: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 15
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • SPA: 1
    • Side channel: 1
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 46-3: 1
  • PKCS:
    • PKCS #1: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • JC2.2: 1
    • JC2.2.1: 1
    • Java Card 2.2.1: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the Multiapp platform. Beside the TOE, the product also contains other Java Card applications (out of scope of the TOE) Figure 1 represents the product. The TOE is bordered with bold and un-continuous line: 1
pdf_data/st_metadata
  • /CreationDate: D:20100809174847+02'00'
  • /Keywords:
  • /ModDate: D:20100809174847+02'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • pdf_file_size_bytes: 274566
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 59
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different