This page was not yet optimized for use on mobile devices.
JCLX80jTOP20ID smart card: Java Trusted Open Platform on SLE66CLX800PE microcontroller
CSV information ?
Status | archived |
---|---|
Valid from | 19.12.2008 |
Valid until | 01.09.2019 |
Scheme | 🇫🇷 FR |
Manufacturer | Trusted Logic |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL5 |
Maintenance updates | Maintenance Report DCSSI-2008/43-M01 (06.07.2009) Certification report |
Heuristics summary ?
Certificate ID: ANSSI-CC-2008/43
Certificate ?
Certification report ?
Extracted keywords
Asymmetric Algorithms
RSA2048, ECCSchemes
Key AgreementRandomness
TRNGJavaCard versions
Java Card 2.2.1, GlobalPlatform 2.1.1Vendor
InfineonSecurity level
EAL 5, EAL4, EAL7, EAL 1, EAL 3, EAL 7, EAL5+, EAL 5 augmented, ITSEC E6 andSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VLA.4, AVA_MSU.3, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLAProtection profiles
BSI-PP-0002-2001Certificates
BSI-DSZ-CC-04821, BSI-DSZ-CC-0482, DCSSI-2008/43Evaluation facilities
Serma TechnologiesStandards
AIS 34, AIS 31, AIS34, AIS31, ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
Title | Microsoft Word - dcssi-2008_43en.doc |
---|---|
Author | nassor |
Creation date | D:20081223095616+01'00' |
Modification date | D:20081223095616+01'00' |
Pages | 20 |
Creator | PScript5.dll Version 5.2 |
Producer | Acrobat Distiller 8.0.0 (Windows) |
Frontpage
Certificate ID | DCSSI-2008/43 |
---|---|
Certified item | JCLX80jTOP20ID smart card: Java Trusted Open Platform on SLE66CLX800PE microcontroller |
Certification lab | Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : e.francois@serma.com |
Developer | Trusted Logic SA 5, rue du Bailliage 78000 Versailles – France Sponsor Trusted Logic SA 5, rue du Bailliage 78000 Versailles – France |
Security target ?
Extracted keywords
Symmetric Algorithms
DES, 3DESAsymmetric Algorithms
RSA2048, RSA-CRT, ECC, Diffie-HellmanHash functions
SHA-224, SHA-256Schemes
MAC, Key Agreement, Key agreementRandomness
RND, RNGBlock cipher modes
ECB, CBC, CCMJavaCard versions
Java Card 2.2.1, GlobalPlatform 2.1.1Security level
EAL5, EAL5 augmentedClaims
D.APP-CODE, D.APP-INST, D.COMMAND, D.ISD-SESSION-KEYS, D.JCS_KEYS, D.ISD-, D.ISD-PERSO, D.GP-REGISTRY, D.CVM, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.SOFTWARE, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.API_DATA, D.CRYPTO, O.REQUEST, O.INFO-ORIGIN, O.LOAD, O.INSTALL, O.INFO-INTEGRITY, O.INFO-CONFIDENTIALITY, O.NO-KEY-REUSE, O.DELETION, O.LIFE-CYCLE, O.IDENTIFICATION, O.GLOBAL-CVM, O.CVM-BLOCK, O.SID, O.ERROR-COUNTERS, O.RECOVERY, O.LOCK, O.OPERATE, O.RESOURCES, O.FIREWALL, O.REALLOCATION, O.SHRD_VAR_CONFID, O.SHRD_VAR_INTEG, O.NATIVE, O.VERIFICATION, O.OS-SUPPORT, O.PIN-MNGT, O.ALARM, O.TRANSACTION, O.CIPHER, O.KEY-MNGT, O.OBJ-DELETION, O.PROT-INF-LEAK, O.PROT-PHYS-TAMPER, O.ABUSE-FUNC, O.IC-SUPPORT, O.PROT-MALFUNCTION, O.PROT-, O.RND, T.INSTALL, T.CRYPTO, T.CONFID-APPLI-DATA, T.CONFID-JCS-DATA, T.INTEG-, T.INTEG-JCS-DATA, T.DELETION, T.IMPERSONATE, T.INVALID-INPUT, T.INVALID-ORDER, T.FORCED-RESET, T.REPLAY, T.BRUTE-FORCE, T.LIFE-CYCLE, T.CONFID-JCS-CODE, T.INTEG-APPLI-CODE, T.INTEG-JCS-CODE, T.INTEG-APPLI-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESSOURCES, T.OBJ-DELETION, T.ABUSE-FUNC, T.PHYS-TAMPER, T.MALFUNCTION, T.INF-LEAK, T.RND, A.CARD-MANAGEMENT, A.NATIVE, A.VERIFICATION, A.APPLET, A.MANUFACTURING, R.JAVA, OE.IC, OE.SCP, OE.RECOVERY, OE.SUPPORT, OE.CARD-MANAGEMENT, OE.MANUFACTURING, OE.VERIFICATION, OE.NATIVE, OE.APPLET, OE.SECRETS, OE.KEY-LENGTH, OE.NO-RMI-APPLETS, OSP, OSP.VERIFICATION, OSP.FILE-ORIGIN, OSP.SECRETS, OSP.KEY-LENGTH, OSP.NO-RMI-APPLETS, OSP.PERSONALIZATION, OSP.PROCESS-TOESecurity Assurance Requirements (SAR)
ADV_HLD, ALC_DVS.2, AVA_VLA.4Security Functional Requirements (SFR)
FAU_ARP, FAU_ARP.1, FCO_NRO, FCO_NRO.2, FCS_RND, FCS_RND.1, FCS_COP, FCS_COP.1, FCS_CKM, FCS_CKM.3, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_RND.1.1, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_ACF.1.2, FDP_IFC, FDP_IFC.2, FDP_IFF, FDP_IFF.1, FDP_IFF.1.5, FDP_IFF.1.2, FDP_ITC, FDP_ITC.1, FDP_UIT, FDP_UIT.1, FDP_ROL, FDP_ROL.1, FDP_ITC.2, FDP_ACC.2, FDP_IFC.1, FDP_RIP, FDP_RIP.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACF.1.1, FDP_ITT, FDP_ITT.1, FDP_IFF.2, FIA_UID, FIA_UID.1, FIA_UAU, FIA_UAU.1, FIA_UAU.4, FIA_AFL, FIA_AFL.1, FIA_ATD, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_SMF, FMT_SMF.1, FMT_SMR, FMT_SMR.1, FMT_MSA.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FPR_UNO, FPR_UNO.1, FPT_TST.2, FPT_TDC, FPT_TDC.1, FPT_FLS, FPT_FLS.1, FPT_RCV, FPT_RCV.3, FPT_SEP, FPT_SEP.1, FPT_RVM.1, FPT_RVM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_AMT, FPT_AMT.1, FPT_RCV.4, FPT_TST, FPT_PHP, FPT_PHP.3, FPT_ITT, FPT_ITT.1, FPT_TST.2.1, FRU_RSA, FRU_RSA.1, FRU_FLT, FRU_FLT.2, FTP_ITC, FTP_ITC.1Protection profiles
BSI-PP-0002Evaluation facilities
SERMASide-channel analysis
Leak-Inherent, physical probing, DPA, SPA, physical tampering, Physical tampering, malfunction, DFA, reverse engineeringStandards
FIPS PUB 46-3, FIPS 46-2, FIPS PUB 81, FIPS 180-2, PKCS#1, PKCS#3, ISO/IEC 15946-1, ISO/IEC 15946-3, ISO/IEC 15408:2005, ICAO, SCP01, SCP02, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
Title | Microsoft Word - CP-2007-RT-075-1.4 JCLX80jTOP20ID - Security Target Lite.doc |
---|---|
Author | gimenez |
Creation date | D:20081217221029-02'00' |
Modification date | D:20081217221029-02'00' |
Pages | 122 |
Creator | PrimoPDF http://www.primopdf.com/ |
Producer | PrimoPDF |
Heuristics ?
Certificate ID: ANSSI-CC-2008/43
Extracted SARs
AVA_MSU.3, AVA_VLA.4, ALC_DVS.2References ?
No references are available for this certificate.
Updates ?
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name JCLX80jTOP20ID smart card: Java Trusted Open Platform on SLE66CLX800PE microcontroller was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "e89d5ad10223e35a",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2008/43",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2009-07-06",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_43-M01en.pdf",
"maintenance_st_link": null,
"maintenance_title": "Maintenance Report DCSSI-2008/43-M01"
}
]
},
"manufacturer": "Trusted Logic",
"manufacturer_web": "https://www.trusted-logic.com/",
"name": "JCLX80jTOP20ID smart card: Java Trusted Open Platform on SLE66CLX800PE microcontroller",
"not_valid_after": "2019-09-01",
"not_valid_before": "2008-12-19",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "dcssi-2008_43en.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augmented ALC_DVS.2, AVA_VLA.4",
"cc_version": "Common Criteria version 2.3 compliant with ISO 15408:2005",
"cert_id": "DCSSI-2008/43",
"cert_item": "JCLX80jTOP20ID smart card: Java Trusted Open Platform on SLE66CLX800PE microcontroller",
"cert_item_version": "IFXv#27_0.1, software revision v1.4",
"cert_lab": "Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : e.francois@serma.com",
"developer": "Trusted Logic SA 5, rue du Bailliage 78000 Versailles \u2013 France Sponsor Trusted Logic SA 5, rue du Bailliage 78000 Versailles \u2013 France",
"match_rules": [
"Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements"
],
"ref_protection_profiles": "None"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
},
"RSA": {
"RSA2048": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0482": 1,
"BSI-DSZ-CC-04821": 1
},
"FR": {
"DCSSI-2008/43": 21
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_CAP": 1,
"ACM_SCP": 1
},
"ADO": {
"ADO_DEL": 1,
"ADO_IGS": 1
},
"ADV": {
"ADV_FSP": 1,
"ADV_HLD": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_LLD": 1,
"ADV_RCR": 1,
"ADV_SPM": 1
},
"AGD": {
"AGD_ADM": 1,
"AGD_USR": 1
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_CCA": 1,
"AVA_MSU": 1,
"AVA_MSU.3": 1,
"AVA_SOF": 1,
"AVA_VLA": 1,
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 5 augmented": 2,
"EAL 7": 1,
"EAL4": 4,
"EAL5+": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 and": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 3
},
"JavaCard": {
"Java Card 2.2.1": 2
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 31": 1,
"AIS 34": 2,
"AIS31": 2,
"AIS34": 1
},
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-002": 1,
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"ISO": {
"ISO/IEC 15408:2005": 1,
"ISO/IEC 18045:2005": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "nassor",
"/CreationDate": "D:20081223095616+01\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2",
"/ModDate": "D:20081223095616+01\u002700\u0027",
"/Producer": "Acrobat Distiller 8.0.0 (Windows)",
"/Title": "Microsoft Word - dcssi-2008_43en.doc",
"pdf_file_size_bytes": 188011,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 20
},
"st_filename": "dcssi-cible2008_43en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 5
}
},
"RSA": {
"RSA-CRT": 1,
"RSA2048": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.APPLET": 2,
"A.CARD-MANAGEMENT": 1,
"A.MANUFACTURING": 3,
"A.NATIVE": 3,
"A.VERIFICATION": 2
},
"D": {
"D.API_DATA": 2,
"D.APP-CODE": 3,
"D.APP-INST": 2,
"D.APP_C_DATA": 2,
"D.APP_I_DATA": 2,
"D.COMMAND": 2,
"D.CRYPTO": 3,
"D.CVM": 2,
"D.GP-REGISTRY": 2,
"D.ISD-": 1,
"D.ISD-PERSO": 2,
"D.ISD-SESSION-KEYS": 2,
"D.JCS_CODE": 1,
"D.JCS_DATA": 2,
"D.JCS_KEYS": 1,
"D.PIN": 2,
"D.SEC_DATA": 2,
"D.SOFTWARE": 2
},
"O": {
"O.ABUSE-FUNC": 2,
"O.ALARM": 2,
"O.CIPHER": 2,
"O.CVM-BLOCK": 2,
"O.DELETION": 2,
"O.ERROR-COUNTERS": 2,
"O.FIREWALL": 2,
"O.GLOBAL-CVM": 2,
"O.IC-SUPPORT": 3,
"O.IDENTIFICATION": 3,
"O.INFO-CONFIDENTIALITY": 3,
"O.INFO-INTEGRITY": 4,
"O.INFO-ORIGIN": 3,
"O.INSTALL": 4,
"O.KEY-MNGT": 3,
"O.LIFE-CYCLE": 3,
"O.LOAD": 4,
"O.LOCK": 2,
"O.NATIVE": 2,
"O.NO-KEY-REUSE": 2,
"O.OBJ-DELETION": 2,
"O.OPERATE": 2,
"O.OS-SUPPORT": 3,
"O.PIN-MNGT": 2,
"O.PROT-": 1,
"O.PROT-INF-LEAK": 4,
"O.PROT-MALFUNCTION": 3,
"O.PROT-PHYS-TAMPER": 4,
"O.REALLOCATION": 2,
"O.RECOVERY": 3,
"O.REQUEST": 2,
"O.RESOURCES": 2,
"O.RND": 3,
"O.SHRD_VAR_CONFID": 2,
"O.SHRD_VAR_INTEG": 2,
"O.SID": 2,
"O.TRANSACTION": 2,
"O.VERIFICATION": 3
},
"OE": {
"OE.APPLET": 2,
"OE.CARD-MANAGEMENT": 1,
"OE.IC": 1,
"OE.KEY-LENGTH": 2,
"OE.MANUFACTURING": 3,
"OE.NATIVE": 2,
"OE.NO-RMI-APPLETS": 2,
"OE.RECOVERY": 1,
"OE.SCP": 2,
"OE.SECRETS": 2,
"OE.SUPPORT": 1,
"OE.VERIFICATION": 2
},
"OSP": {
"OSP": 1,
"OSP.FILE-ORIGIN": 2,
"OSP.KEY-LENGTH": 2,
"OSP.NO-RMI-APPLETS": 2,
"OSP.PERSONALIZATION": 2,
"OSP.PROCESS-TOE": 3,
"OSP.SECRETS": 3,
"OSP.VERIFICATION": 2
},
"R": {
"R.JAVA": 1
},
"T": {
"T.ABUSE-FUNC": 1,
"T.BRUTE-FORCE": 2,
"T.CONFID-APPLI-DATA": 3,
"T.CONFID-JCS-CODE": 2,
"T.CONFID-JCS-DATA": 3,
"T.CRYPTO": 4,
"T.DELETION": 3,
"T.EXE-CODE": 4,
"T.FORCED-RESET": 2,
"T.IMPERSONATE": 2,
"T.INF-LEAK": 2,
"T.INSTALL": 4,
"T.INTEG-": 1,
"T.INTEG-APPLI-CODE": 4,
"T.INTEG-APPLI-DATA": 4,
"T.INTEG-JCS-CODE": 2,
"T.INTEG-JCS-DATA": 3,
"T.INVALID-INPUT": 2,
"T.INVALID-ORDER": 2,
"T.LIFE-CYCLE": 3,
"T.MALFUNCTION": 2,
"T.NATIVE": 2,
"T.OBJ-DELETION": 2,
"T.PHYS-TAMPER": 2,
"T.REPLAY": 2,
"T.RESSOURCES": 2,
"T.RND": 2,
"T.SID": 4
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002": 1
}
},
"cc_sar": {
"ADV": {
"ADV_HLD": 1
},
"ALC": {
"ALC_DVS.2": 2
},
"AVA": {
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL5": 2,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 3,
"FAU_ARP.1": 1
},
"FCO": {
"FCO_NRO": 2,
"FCO_NRO.2": 3
},
"FCS": {
"FCS_CKM": 18,
"FCS_CKM.1": 4,
"FCS_CKM.2": 3,
"FCS_CKM.3": 1,
"FCS_CKM.4": 1,
"FCS_COP": 24,
"FCS_COP.1": 12,
"FCS_RND": 6,
"FCS_RND.1": 6,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC": 11,
"FDP_ACC.1": 3,
"FDP_ACC.2": 5,
"FDP_ACF": 10,
"FDP_ACF.1": 20,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_IFC": 10,
"FDP_IFC.1": 2,
"FDP_IFC.2": 4,
"FDP_IFF": 6,
"FDP_IFF.1": 13,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.5": 1,
"FDP_IFF.2": 7,
"FDP_ITC": 6,
"FDP_ITC.1": 3,
"FDP_ITC.2": 5,
"FDP_ITT": 3,
"FDP_ITT.1": 1,
"FDP_RIP": 16,
"FDP_RIP.1": 8,
"FDP_ROL": 4,
"FDP_ROL.1": 4,
"FDP_SDI.2": 2,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 3,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 4,
"FIA_AFL.1": 4,
"FIA_ATD": 2,
"FIA_ATD.1": 1,
"FIA_UAU": 4,
"FIA_UAU.1": 2,
"FIA_UAU.4": 1,
"FIA_UID": 6,
"FIA_UID.1": 2,
"FIA_UID.2": 1,
"FIA_USB.1": 2,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 42,
"FMT_MSA.1": 11,
"FMT_MSA.2": 3,
"FMT_MSA.3": 14,
"FMT_MTD": 4,
"FMT_MTD.1": 1,
"FMT_MTD.3": 1,
"FMT_SMF": 10,
"FMT_SMF.1": 5,
"FMT_SMR": 12,
"FMT_SMR.1": 12
},
"FPR": {
"FPR_UNO": 4,
"FPR_UNO.1": 2
},
"FPT": {
"FPT_AMT": 2,
"FPT_AMT.1": 2,
"FPT_FLS": 12,
"FPT_FLS.1": 5,
"FPT_ITT": 2,
"FPT_ITT.1": 1,
"FPT_PHP": 2,
"FPT_PHP.3": 1,
"FPT_RCV": 7,
"FPT_RCV.3": 12,
"FPT_RCV.4": 1,
"FPT_RVM.1": 2,
"FPT_RVM.1.1": 1,
"FPT_SEP": 4,
"FPT_SEP.1": 4,
"FPT_TDC": 2,
"FPT_TDC.1": 4,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST": 4,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1,
"FPT_TST.2": 6,
"FPT_TST.2.1": 1
},
"FRU": {
"FRU_FLT": 2,
"FRU_FLT.2": 1,
"FRU_RSA": 4,
"FRU_RSA.1": 2
},
"FTP": {
"FTP_ITC": 2,
"FTP_ITC.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CCM": {
"CCM": 1
},
"ECB": {
"ECB": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 2,
"Key agreement": 1
},
"MAC": {
"MAC": 14
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-224": 1,
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"javacard": {
"javacard.security": 2
}
},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 9
},
"JavaCard": {
"Java Card 2.2.1": 4
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"Physical tampering": 1,
"malfunction": 8,
"physical tampering": 3
},
"SCA": {
"DPA": 3,
"Leak-Inherent": 1,
"SPA": 2,
"physical probing": 5
},
"other": {
"reverse engineering": 2
}
},
"standard_id": {
"CC": {
"CCMB-2005-08-001": 2,
"CCMB-2005-08-002": 2,
"CCMB-2005-08-003": 2,
"CCMB-2005-08-004": 1
},
"FIPS": {
"FIPS 180-2": 1,
"FIPS 46-2": 1,
"FIPS PUB 46-3": 6,
"FIPS PUB 81": 1
},
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 15408:2005": 3,
"ISO/IEC 15946-1": 1,
"ISO/IEC 15946-3": 3
},
"PKCS": {
"PKCS#1": 2,
"PKCS#3": 1
},
"SCP": {
"SCP01": 1,
"SCP02": 9
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 1
},
"DES": {
"DES": 34
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "gimenez",
"/CreationDate": "D:20081217221029-02\u002700\u0027",
"/Creator": "PrimoPDF http://www.primopdf.com/",
"/ModDate": "D:20081217221029-02\u002700\u0027",
"/Producer": "PrimoPDF",
"/Title": "Microsoft Word - CP-2007-RT-075-1.4 JCLX80jTOP20ID - Security Target Lite.doc",
"pdf_file_size_bytes": 1019152,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 122
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/dcssi-2008_43en.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL5"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/dcssi-cible2008_43en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "47e0d7056ef248e74fc4a1e9eeb66400624b1f8cc330f74b38a505fc5df6b73b",
"txt_hash": "d238ae352d20be0e9f6a1640b13ce74c60dc7d6ca6a4b1753c4db6038be78a33"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b187a8a308a53ce7562618407ca4eec78aaad99988dfc2a7b98f6a2fb913ad0f",
"txt_hash": "063b5b26831a11d2aae3d4ea1db99fe0764facc3cdb6fccc492265a4e2475182"
}
},
"status": "archived"
}