| name |
Verizon UniCERT v5.5.1 |
Card ASEPcos-CNS/CIE: AT90SC144144CT microcontroller embedding the software ASEPcos-CNS/CIE with Digital Signature Application |
| category |
Key Management Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
MY |
FR |
| status |
active |
archived |
| not_valid_after |
26.05.2026 |
01.09.2019 |
| not_valid_before |
26.05.2021 |
08.11.2007 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C120-CERTIFICATE-v1.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C120-CR-V1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2007_22en.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Verizon%20UniCERT%205.5.1%20Security%20Target%20v0.8.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2007_22en.pdf |
| manufacturer |
Verizon Australia Pty Ltd |
Athena Smartcard Solutions Inc |
| manufacturer_web |
|
https://www.athena-scs.com/ |
| security_level |
EAL2+, ALC_FLR.2 |
EAL4+, AVA_VLA.4, AVA_MSU.3 |
| dgst |
e6d0ea8c4152fe4f |
9dd7e2c242a68490 |
| heuristics/cert_id |
ISCB-5-RPT-C120-CR-v1 |
ANSSI-CC-2007/22 |
| heuristics/cert_lab |
[] |
CEACI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ADV_LLD.1, ALC_LCD.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, ATE_IND.2, AVA_VLA.4, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_IMP.1, AVA_MSU.3, ADV_SPM.1, ALC_DVS.1 |
| heuristics/extracted_versions |
5.5.1 |
- |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2008/22 |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2010/05, ANSSI-CC-2009/04, ANSSI-CC-2008/22, ANSSI-CC-2009/59, ANSSI-CC-2010/60, ANSSI-CC-2009/41 |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_no: 2021-002-C120
- certification_date: 26.05.2021
- developer: Teron Labs Pty Ltd Verizon Australia Pty Ltd
- enhanced:
- assurance_level: EAL2+ ALC_FLR.2
- category: Key Management System
- cert_id: C120
- certification_date: 26.05.2021
- developer: Teron Labs Unit 3, 10 Geils Court, Deakin, ACT 2601, Australia
- expiration_date: 26.05.2026
- mutual_recognition: CCRA
- product: Verizon UniCERT v5.5.1
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C120/ISCB-5-RPT-C120-CR-V1.pdf
- scope: The TOE is a software product which provides all the (PKI-specific) functionality needed to implement a Public Key Infrastructure (PKI) system. The primary function of a PKI system is to issue and manage digital certificates that allow other IT systems to verify the identity of the holder. The TOE provides all the functionality needed to implement a PKI system, essentially a system that provides certificate registration, PKI management, a Certification Authority, and certificate lifecycle management functions. The TOE implements standard digital signature methods to allow the content of certificates and CRLs to be verifiable and to prevent forgery and tampering, protect the integrity of data (including certificates and CRLs) when at rest and when in transit between components of the TOE, allows TLS/SSL authentication of itself to the Enterprise Server to ensure that the Enterprise Server only accepts certificates published by a legitimate TOE and protect the integrity of messages transmitted between components of the TOE.
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C120/Verizon_UniCERT_551_Security_Target_v08_2.pdf
- type: Key Management System
- expiration_date: 26.05.2026
- level: EAL2+ ALC_FLR.2
- product: Verizon UniCERT v5.5.1
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/91
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
ISCB-5-CERT-C120-CERTIFICATE-v1.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20210602024355Z00'00'
- /Creator: Word
- /ModDate: D:20210602024355Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H524) Quartz PDFContext
- pdf_file_size_bytes: 185266
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
ISCB-5-RPT-C120-CR-V1.pdf |
2007_22en.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmented AVA_MSU.3, AVA_VLA.4
- cc_version: Common Criteria version 2.3 compliant with ISO 15408:2005
- cert_id: DCSSI-2007/22
- cert_item: Card ASEPcos-CNS/CIE: AT90SC144144CT microcontroller embedding the software ASEPcos-CNS/CIE with Digital Signature Application
- cert_item_version: ASEPCOS Version 1.60 Build 001 on AT90SC144144CT reference AT58807 rev. G with Toolbox Version: 00.03.01.04
- cert_lab: CEACI (Thales Security Systems – CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 61 28 16 51, email : [email protected]
- developer: Athena Smartcard Solutions Regus House, 10 Lochside Place, Edinburgh Park, Edinburgh, EH12 9RG, Scotland, United Kingdom ATMEL Secure Products Division Maxwell Building - Scottish Enterprise technology Park, East Kilbride, G75 0QR - Scotland, United Kingdom Sponsor Athena Smartcard Solutions 1-14-16, Motoyokoyama-cho, Hachioji-shi, Tokyo, 192-0063, Japan
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: Protection Profile — Secure Signature-Creation Device Type 3
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C120-CR-V1: 47
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
- EAL 7: 1
- EAL4: 5
- EAL4 augmented: 1
- EAL5+: 1
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_SCP: 1
- ADO:
- ADV:
- ADV_FSP: 1
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR: 2
- ALC_TAT: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 1
- AVA_VLA: 1
- AVA_VLA.4: 2
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 2
- FAU_GEN.2: 1
- FAU_SAR.1: 3
- FAU_SAR.2: 1
- FAU_SAR.3: 2
- FAU_STG.1: 1
- FCO:
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.2: 2
- FCS_CKM.3: 1
- FCS_COP: 4
- FDP:
- FDP_ACC.1: 16
- FDP_ACF.1: 16
- FDP_DAU.2: 1
- FDP_IFC.1: 2
- FDP_IFF.1: 2
- FDP_ITT.1: 2
- FDP_ITT.3: 1
- FIA:
- FIA_ATD.1: 2
- FIA_SOS.1: 2
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FIA_USB.1: 4
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 2
- FMT_MTD.1: 1
- FMT_SAE.1: 1
- FMT_SMF.1: 9
- FMT_SMR.1: 2
- FPT:
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ACCOUNTABILITY: 1
- A.AUDIT_REVIEW: 1
- A.AUTH_DATA_DISPOSAL: 1
- A.COMMS_PROTECTION: 1
- A.COMPETENT: 1
- A.HSM: 1
- A.PHYSICAL_PROTECTION: 1
- A.ROLE_SEPARATION: 1
- A.SECURE_INSTALL: 1
- A.TIME_SOURCE: 1
- A.TRUSTED_USERS: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
- PKCS:
- X509:
|
- BSI:
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20210602023203Z00'00'
- /Creator: Word
- /ModDate: D:20210602023203Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H524) Quartz PDFContext
- pdf_file_size_bytes: 1144678
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
- /Author: Mathieu Robert
- /CreationDate: D:20071109092507+01'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /Keywords: CER/F/07.5
- /ModDate: D:20071109092515+01'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: Card ASEPcos-CNS/CIE: AT90SC144144CT microcontroller embedding the software ASEPcos-CNS/CIE with Digital Signature Application
- /Title: DCSSI-2007/22
- pdf_file_size_bytes: 265568
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 16
|
| pdf_data/st_filename |
Verizon UniCERT 5.5.1 Security Target v0.8.pdf |
cible2007_22en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 23
- EAL 4+: 5
- EAL4: 7
- EAL4 augmented: 2
- EAL4+: 3
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 5
- ACM_CAP.3: 1
- ACM_CAP.4: 4
- ACM_SCP.2: 5
- ADO:
- ADO_DEL.2: 7
- ADO_IGS.1: 8
- ADV:
- ADV_FSP.1: 10
- ADV_FSP.2: 5
- ADV_HLD.1: 2
- ADV_HLD.2: 6
- ADV_IMP.1: 8
- ADV_LLD.1: 7
- ADV_RCR.1: 7
- ADV_SPM.1: 5
- AGD:
- AGD_ADM.1: 12
- AGD_USR.1: 10
- ALC:
- ALC_DVS.1: 6
- ALC_LCD.1: 3
- ALC_TAT.1: 7
- ATE:
- ATE_COV.2: 5
- ATE_DPT.1: 2
- ATE_FUN.1: 7
- ATE_IND.2: 3
- AVA:
- AVA_MSU.3: 13
- AVA_SOF: 1
- AVA_SOF.1: 6
- AVA_VLA.4: 15
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 3
- FAU_SAR.2.1: 1
- FAU_SAR.3: 3
- FAU_SAR.3.1: 1
- FAU_STG: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_UID.1: 1
- FCO:
- FCO_NRO.1: 1
- FCO_NRO.2: 5
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM.3: 4
- FCS_CKM.3.1: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP: 10
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 1
- FDP_DAU.2: 4
- FDP_DAU.2.2: 1
- FDP_IFC.1: 8
- FDP_IFC.1.1: 1
- FDP_IFF.1: 5
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_ITT.1: 5
- FDP_ITT.1.1: 1
- FDP_ITT.3: 4
- FDP_ITT.3.1: 1
- FDP_ITT.3.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD: 1
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 3
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 5
- FIA_UID.2: 3
- FIA_UID.2.1: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 3
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SAE.1: 3
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 2
- FMT_SMR: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 4
- FPT_ITT.1: 4
- FPT_STM.1: 4
- FTP:
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 13
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 16
- FCS_CKM.4.1: 2
- FCS_COP: 16
- FCS_COP.1: 9
- FDP:
- FDP_ACC: 41
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF: 30
- FDP_ACF.1: 17
- FDP_ETC: 5
- FDP_ETC.1: 3
- FDP_ITC: 7
- FDP_ITC.1: 5
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDI: 12
- FDP_SDI.2: 7
- FDP_UIT: 20
- FDP_UIT.1: 11
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA: 15
- FMT_MSA.1: 5
- FMT_MSA.2: 15
- FMT_MSA.2.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 5
- FMT_SMF: 1
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 8
- FPT_AMT.1.1: 2
- FPT_FLS: 1
- FPT_FLS.1: 7
- FPT_FLS.1.1: 2
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 6
- FPT_PHP.3.1: 2
- FPT_TRP: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 2
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 25
- FTP_ITC.1: 16
- FTP_ITC.1.2: 1
- FTP_TRP: 11
- FTP_TRP.1: 8
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 2
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ACCOUNTABILITY: 2
- A.AUDIT_REVIEW: 2
- A.AUTH_DATA_DISPOSAL: 2
- A.COMMS_PROTECTION: 2
- A.COMPETENT_USERS: 2
- A.HSM: 2
- A.PHYSICAL_PROTECTION: 2
- A.ROLE_SEPARATION: 2
- A.SECURE_INSTALL: 2
- A.TIME_SOURCE: 2
- A.TRUSTED_USERS: 2
- O:
- O.AUDIT: 6
- O.CRYPTOGRAPHY: 8
- O.EVIDENCE_OF_ORIGIN: 3
- O.PASSPHRASE: 7
- O.PROTECTED_AUDIT: 5
- O.PROTECTED_CONFIG: 9
- O.PROTECT_DATA: 7
- O.PROTECT_MESSAGE: 3
- OE:
- OE.ACCOUNTABILITY: 3
- OE.AUDIT_REVIEW: 3
- OE.AUTH_DATA_DISPOSAL: 4
- OE.COMMS_PROTECTION: 4
- OE.COMPETENT_USERS: 5
- OE.HSM: 5
- OE.PHYSICAL_PROTECTION: 7
- OE.ROLE_SEPARATION: 5
- OE.SECURE_INSTALL: 6
- OE.TIME_SOURCE: 2
- OE.TIME_STAMP: 2
- OE.TRUSTED_USERS: 5
- T:
- T.AUDIT_LOSS: 2
- T.DATA_COMPROMISE: 2
- T.MESSAGE_COMPROMISE: 2
- T.REPUDIATE: 2
- T.UNAUTH_CHANGE: 2
- T.USER_ERROR: 2
|
- A:
- OE:
- OE.DEV_TOOLS: 4
- OE.HI_VAD: 6
- OE.SOFT_DLV: 4
- OE.SOFT_MECH: 3
- OE.SOT_MECH: 1
- T:
- T.DEV_ORG: 4
- T.SOFT_ARCHI: 4
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3-DES: 1
- 3DES: 9
- Triple-DES: 1
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- RIPEMD:
- RIPEMD-160: 3
- RIPEMD160: 1
- SHA:
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- physical tampering: 5
- SCA:
- DPA: 2
- SPA: 3
- Timing attacks: 1
- timing attacks: 2
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- ISO:
- PKCS:
- PKCS #11: 1
- PKCS #7: 1
- PKCS#11: 12
- PKCS#12: 6
- PKCS#7: 3
- PKCS11: 9
- PKCS12: 2
- PKCS7: 1
- RFC:
- X509:
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- ICAO:
- ISO:
- PKCS:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /CreationDate: D:20210520100128Z00'00'
- /Creator: Word
- /ModDate: D:20210520100128Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H524) Quartz PDFContext
- pdf_file_size_bytes: 1221595
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 105
|
- /Author: Eran Navoth
- /CreationDate: D:20071106151106+01'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /ModDate: D:20071106151122+01'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Title: ASEPcos Security Target
- pdf_file_size_bytes: 552965
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 55
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |