Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series
KECS-CISS-1035-2020
MICARDO V4.0 R1.0 eHC v1.2
BSI-DSZ-CC-0861-2014
name Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series MICARDO V4.0 R1.0 eHC v1.2
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme KR DE
not_valid_after 26.08.2025 01.09.2019
not_valid_before 26.08.2020 15.05.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CISS-1035-2020_CR_EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0861a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CISS-1035-2020_ST_EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0861b_pdf.pdf
manufacturer HP Inc. Morpho Cards GmbH
manufacturer_web https://www8.hp.com/hpnext/tags/hp-inc#.Vjdf803sn4g https://www.morpho.com/e-documents
security_level EAL2+, ALC_FLR.2 EAL4+, AVA_VAN.5
dgst d5eaadb952636ef2 cb48c0a7c7fc3bbe
heuristics/cert_id KECS-CISS-1035-2020 BSI-DSZ-CC-0861-2014
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, AVA_VAN.5, ASE_INT.1, APE_ECD.1, ASE_REQ.2, ATE_DPT.4, ADV_FSP.6, ADV_TDS.6, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.3, ASE_ECD.1, ALC_FLR.1, APE_OBJ.2, ALC_TAT.3, ALC_DVS.2, ASE_SPD.1, APE_INT.1, ATE_COV.3, ADV_INT.3, ALC_LCD.2, ASE_TSS.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ALC_DEL.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2
heuristics/extracted_versions - 1.0, 1.2, 4.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0837-2013, NSCIB-CC-12-36243-CR, BSI-DSZ-CC-0673-2010
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0391-2009, BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0602-2009, BSI-DSZ-CC-0417-2008, NSCIB-CC-12-36243-CR, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0673-2010
heuristics/st_references/directly_referencing {} NSCIB-CC-12-36243-CR
heuristics/st_references/indirectly_referencing {} NSCIB-CC-12-36243-CR
heuristics/protection_profiles 154ef77c252799ee 248ee1444754e863
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0058b.pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP0020_V3b_pdf.pdf
pdf_data/report_filename KECS-CISS-1035-2020_CR_EN.pdf 0861a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0861-2014
    • cert_item: MICARDO V4.0 R1.0 eHC v1.2
    • cert_lab: BSI
    • developer: Morpho Cards GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • KR:
    • KECS-CISS-1035-2020: 1
  • DE:
    • BSI-DSZ-CC-0673-2010: 1
    • BSI-DSZ-CC-0837: 1
    • BSI-DSZ-CC-0837-2013: 4
    • BSI-DSZ-CC-0837-2013-MA-01: 1
    • BSI-DSZ-CC-0861: 1
    • BSI-DSZ-CC-0861-2014: 22
  • NL:
    • NSCIB-CC-12-36243: 1
    • NSCIB-CC-12-36243-MA1: 1
    • NSCIB-CC-36243: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0020-V3-2010-MA-01: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 2
    • EAL2+: 5
  • EAL:
    • EAL 4: 7
    • EAL 4 augmented: 3
    • EAL 5: 1
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 3
    • ADV_TDS.1: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 5
  • AVA:
    • AVA_VAN.2: 5
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FPT:
    • FPT_FDI_EXP: 1
    • FPT_FDI_EXP.1: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_COP: 8
    • FCS_RND.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 12
  • Morpho:
    • Morpho: 16
  • NXP:
    • NXP: 6
    • NXP Semiconductors: 1
pdf_data/report_keywords/eval_facility
  • KSEL:
    • KSEL: 3
  • SRC:
    • SRC Security Research & Consulting: 3
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA-OAEP: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KA:
    • Key Agreement: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 2
  • SCA:
    • physical probing: 1
    • side channel: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-03116-1: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • BSI:
    • AIS 20: 3
    • AIS 25: 3
    • AIS 26: 2
    • AIS 31: 4
    • AIS 32: 1
    • AIS 34: 1
    • AIS 35: 2
    • AIS 36: 4
    • AIS 38: 1
    • AIS20: 1
    • AIS36: 2
  • FIPS:
    • FIPS 180-4: 1
  • PKCS:
    • PKCS#1: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 2013, Morpho Cards GmbH (confidential document) [11] Preparative Procedures for the Initialiser for MICARDO V4.0 R1.0 V1.2, Version X1.004, 02: 1
    • Report BSI-DSZ-CC-0861, Version 1.8, 25 April 2014, SRC Security Research & Consulting GmbH (confidential document) [10] Preparative Procedures for the Personaliser for MICARDO V4.0 R1.0 V1.2, Version X1.002, 17: 1
    • Version X1.00.19, 10 April 2014, Security Target – MICARDO V4.0 R1.0 V1.2, Morpho Cards GmbH (confidential document) [7] Protection Profile for electronic Health Card (eHC) - elektronische Gesundheitskarte (eGK: 1
    • v4.0 Release 1 (Software Release Sheet – SRS), Version X1.0010, 10 April 2014, Morpho Cards GmbH (confidential document) 9 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20140526110553+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, MICARDO, Morpho, eHC, v1.2"
  • /ModDate: D:20140526110917+02'00'
  • /Producer: LibreOffice 3.6
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0861-2014
  • pdf_file_size_bytes: 1080045
  • pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename KECS-CISS-1035-2020_ST_EN.pdf 0861b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0837: 2
    • BSI-DSZ-CC-0837-2013-MA-01: 1
    • BSI-DSZ-CC-0837-MA-01: 1
    • BSI-DSZ-CC-0861: 1
  • NL:
    • NSCIB-CC-12-36243: 2
    • NSCIB-CC-12-36243-MA1: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0020-V3-2010-MA-01: 1
    • BSI-PP-0020-V3-2010-MA-01: 1
    • BSI-PP-0035: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 8
    • EAL2 augmented: 6
    • EAL3: 1
  • EAL:
    • EAL 4: 2
    • EAL 4 augmented: 2
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 12
    • ADV_FSP.1: 3
    • ADV_FSP.2: 16
    • ADV_TDS.1: 15
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 13
    • AGD_PRE: 1
    • AGD_PRE.1: 9
  • ALC:
    • ALC_CMC.2: 9
    • ALC_CMS.1: 1
    • ALC_CMS.2: 7
    • ALC_DEL.1: 6
    • ALC_FLR.2: 23
  • APE:
    • APE_ECD: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SPD: 1
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 13
    • ASE_INT.1: 15
    • ASE_OBJ.2: 12
    • ASE_REQ.1: 2
    • ASE_REQ.2: 14
    • ASE_SPD.1: 9
    • ASE_TSS.1: 6
  • ATE:
    • ATE_COV.1: 7
    • ATE_FUN.1: 11
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
  • ALC:
    • ALC_FLR.1: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 35
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 29
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 10
    • FDP_IFC.2: 7
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 16
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 31
    • FMT_MSA.1.1: 4
    • FMT_MSA.3: 31
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 31
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 9
    • FCS_CKM.2: 1
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 7
    • FCS_COP.1: 8
    • FCS_RND: 2
    • FCS_RND.1: 1
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 4
    • FDP_ACC.2: 2
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 3
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 8
    • FDP_ITC.2: 8
    • FDP_RIP.1: 1
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 1
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 4
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 4
    • FIA_ATD.1: 1
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 3
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UID.1: 3
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 2
    • FMT_LIM.1: 3
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 3
    • FMT_LIM.2.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD: 5
    • FMT_MTD.1: 6
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 1
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 4
    • A.ADMIN: 8
    • A.USER: 4
  • D:
    • D.CONF: 7
    • D.DOC: 15
    • D.FUNC: 8
    • D.PROT: 4
  • O:
    • O.AUDIT: 6
    • O.AUDIT_ACCESS: 6
    • O.AUDIT_STORAG: 1
    • O.AUDIT_STORAGE: 5
    • O.CONF: 12
    • O.DOC: 13
    • O.FUNC: 6
    • O.INTERFACE: 6
    • O.PROT: 6
    • O.SOFTWARE: 6
    • O.USER: 12
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 4
    • OE.AUDIT_ACCESS: 4
    • OE.AUDIT_STORAGE: 4
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 14
  • T:
    • T.CONF: 8
    • T.DOC: 8
    • T.FUNC: 4
    • T.PROT: 4
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 9
  • Infineon:
    • Infineon Technologies AG: 1
  • Morpho:
    • Morpho: 89
  • NXP:
    • NXP: 6
    • NXP Semiconductors: 20
  • STMicroelectronics:
    • STMicroelectronics: 1
pdf_data/st_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3DES: 2
  • AES_competition:
    • AES:
      • AES: 1
    • HPC:
      • HPC: 6
  • DES:
    • 3DES:
      • 3DES: 5
    • DES:
      • DES: 11
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA-OAEP: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA256: 1
  • RIPEMD:
    • RIPEMD160: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 2
      • SHA-256: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 15
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 11
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 11
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • DFA: 6
    • malfunction: 1
    • physical tampering: 1
  • SCA:
    • DPA: 6
    • SPA: 6
    • side channel: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS 20: 1
    • AIS 36: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 7816-4: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 1
  • X509:
    • X.509: 2
pdf_data/st_metadata
  • /Author: Karsten Klohs
  • /CreationDate: D:20140417111536+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20140526113904+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target
  • /Title: MICARDO V4.0 R1.0 eHC V1.2
  • pdf_file_size_bytes: 586793
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 60
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different