This page was not yet optimized for use on mobile devices.
S3FV9VH 32-Bit RISC Microcontroller for Smart Cards, Revision 0 including specific IC Dedicated Software
CSV information ?
Status | archived |
---|---|
Valid from | 08.12.2017 |
Valid until | 08.12.2022 |
Scheme | 🇩🇪 DE |
Manufacturer | Samsung Electronics Co., Ltd. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ASE_TSS.2, EAL6+ |
Maintenance updates | S3FV9VH 32-Bit RISC Microcontroller for Smart Cards, Revision 0 including specific IC Dedicated Software (14.12.2022) Certification report |
Heuristics summary ?
Certificate ID: BSI-DSZ-CC-1026-2017
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, TDEA, CBC-MACRandomness
DTRNG, RNGBlock cipher modes
ECBVendor
SamsungSecurity level
EAL 6, EAL 5, EAL 2, EAL 1, EAL 4, EAL 2+, EAL 5+, EAL 6 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR, ALC_CMC, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ASE_TSS.2Protection profiles
BSI-CC-PP-0084-2014Certificates
BSI-DSZ-CC-1026-2017Evaluation facilities
TÜV InformationstechnikCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, for Smart Card with specific IC Dedicated Software, Version 2.0, 2017-08-31, Samsung Electronics (confidential document) [7] Evaluation Technical Report, Version 2, 2017-09-29, Evaluation Technical Report Summary (ETR, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, ETR COMP) for the S3FV9VH Revision 0, version 2, 2017-09-29, TÜV Informationstechnik GmbH. (confidential document) [11] S3FV9VH HW DTRNG FRO M and DTRNG FRO M Library Application Note, Version 1.2, 2016-10-07Side-channel analysis
physical tampering, JILCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, for Smart Card with specific IC Dedicated Software, Version 2.0, 2017-08-31, Samsung Electronics (confidential document) [7] Evaluation Technical Report, Version 2, 2017-09-29, Evaluation Technical Report Summary (ETR, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, ETR COMP) for the S3FV9VH Revision 0, version 2, 2017-09-29, TÜV Informationstechnik GmbH. (confidential document) [11] S3FV9VH HW DTRNG FRO M and DTRNG FRO M Library Application Note, Version 1.2, 2016-10-07Standards
FIPS197, AIS31, AIS 34, AIS 25, AIS 26, AIS 31, AIS 37, AIS 36, AIS 35, AIS 1, AIS 32, AIS 38, AIS 46, AIS 47, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 9797-1, ICAOTechnical reports
BSI TR-02102, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-1026-2017 |
---|---|
Subject | S3FV9VH 32-Bit RISC Microcontroller for Smart Cards, Revision 0 including specific IC Dedicated Software from Samsung Electronics |
Keywords | "Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1026-2017, Samsung, Kiowa 2, Smart Card" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20171219151816+01'00' |
Modification date | D:20171220100211+01'00' |
Pages | 28 |
Creator | Writer |
Producer | LibreOffice 5.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-1026-2017 |
---|---|
Certified item | S3FV9VH 32-Bit RISC Microcontroller for Smart Cards, Revision 0 including specific IC Dedicated Software |
Certification lab | BSI |
Developer | Samsung Electronics |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, TDES, TDEA, CBC-MACRandomness
DTRNG, TRNG, RNG, RNDBlock cipher modes
ECBVendor
SamsungSecurity level
EAL6, EAL 4, EAL 5, EAL6 augmented, EAL 4 augmented, EAL 5 augmentedClaims
O.RND, O.AES, O.TDES, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_ARC.1, ADV_SPM.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_FSP.4, ADV_SPM, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_CMS.4, ATE_COV, ATE_COV.3, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VAN, APE_ECD, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_REQ.1Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FAU_GEN.1, FCS_RNG, FCS_COP, FCS_CKM, FCS_RNG.1, FCS_COP.1, FCS_CKM.1, FCS_CKM.4, FDP_SDC, FDP_ACC, FDP_ACF, FDP_SDC.1, FDP_SDI, FDP_SDC.1.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITT.1, FDP_ITT.1.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_ACC.1, FDP_MSA.1, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_SDI.1, FDP_IFC, FDP_ITT, FIA_API, FIA_API.1, FIA_API.1.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA, FMT_SMF, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_PHP, FPT_ITT.1, FPT_ITT.1.1, FPT_FLS, FPT_ITT, FRU_FLT.2, FRU_FLT.1, FRU_FLTProtection profiles
BSI-CC-PP- 0084-2014, BSI-CC-PP-0084, BSI-PP-0084Certification process
out of scope, operational environment and SFRs related to the TOE authentication are regarded as not applicable (out of scope of the intended use-case), as the authentication functionality is no longer available. CompositeSide-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, side-channel, SPA, DPA, timing attacks, physical tampering, Malfunction, malfunction, reverse engineering, JILCertification process
out of scope, operational environment and SFRs related to the TOE authentication are regarded as not applicable (out of scope of the intended use-case), as the authentication functionality is no longer available. CompositeStandards
FIPS197, AIS31, ISO/IEC 9797-1, ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title | Security Target Lite Samsung S3FV9VH 32-bit RISC Microcontroller for Smart Card with specific IC Dedicated Software |
---|---|
Subject | Security Target Lite Samsung S3FV9VH 32-bit RISC Microcontroller for Smart Card with ST Lite Samsung S3FV9VH 32-bit RISC Microcontroller for Smart Card with specific IC Dedicated Software |
Keywords | ST Lite; S3FV9VH |
Author | Sunggeun Park |
Creation date | D:20171208161554+09'00' |
Modification date | D:20171208162325+09'00' |
Pages | 72 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Heuristics ?
Certificate ID: BSI-DSZ-CC-1026-2017
Extracted SARs
ASE_CCL.1, AGD_PRE.1, ASE_REQ.2, ADV_TDS.5, ATE_IND.2, ASE_ECD.1, ASE_TSS.2, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_TAT.3, ALC_DVS.2, ADV_SPM.1, ALC_LCD.1, ALC_CMC.5, ASE_INT.1, ADV_IMP.2, ATE_COV.3, ATE_FUN.1, ASE_OBJ.2, ADV_INT.3, ADV_FSP.5, ATE_DPT.3, ALC_CMS.5, ADV_ARC.1, AGD_OPE.1References ?
No references are available for this certificate.
Updates ?
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name S3FV9VH 32-Bit RISC Microcontroller for Smart Cards, Revision 0 including specific IC Dedicated Software was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "fbbd023618bad95b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1026-2017",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"0",
"32"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-12-14",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1026ma1a_pdf.pdf",
"maintenance_st_link": null,
"maintenance_title": "S3FV9VH 32-Bit RISC Microcontroller for Smart Cards, Revision 0 including specific IC Dedicated Software"
}
]
},
"manufacturer": "Samsung Electronics Co., Ltd.",
"manufacturer_web": "https://www.samsung.com",
"name": "S3FV9VH 32-Bit RISC Microcontroller for Smart Cards, Revision 0 including specific IC Dedicated Software",
"not_valid_after": "2022-12-08",
"not_valid_before": "2017-12-08",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "1026a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2",
"cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-1026-2017",
"cert_item": "S3FV9VH 32-Bit RISC Microcontroller for Smart Cards, Revision 0 including specific IC Dedicated Software",
"cert_lab": "BSI",
"developer": "Samsung Electronics",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1026-2017": 18
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 4
}
},
"cc_sar": {
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.5": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 3,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"ASE": {
"ASE_TSS.2": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 1,
"EAL 5": 4,
"EAL 5+": 1,
"EAL 6": 5,
"EAL 6 augmented": 3
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
" T\u00dcV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January": 1,
"ETR COMP) for the S3FV9VH Revision 0, version 2, 2017-09-29, T\u00dcV Informationstechnik GmbH. (confidential document) [11] S3FV9VH HW DTRNG FRO M and DTRNG FRO M Library Application Note, Version 1.2, 2016-10-07": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"for Smart Card with specific IC Dedicated Software, Version 2.0, 2017-08-31, Samsung Electronics (confidential document) [7] Evaluation Technical Report, Version 2, 2017-09-29, Evaluation Technical Report Summary (ETR": 1
}
},
"cipher_mode": {
"ECB": {
"ECB": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
},
"TRNG": {
"DTRNG": 7
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
},
"other": {
"JIL": 4
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 4,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 2,
"AIS 37": 1,
"AIS 38": 1,
"AIS 46": 1,
"AIS 47": 1,
"AIS31": 4
},
"FIPS": {
"FIPS197": 3
},
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4,
"ISO/IEC 9797-1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 2
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 21
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20171219151816+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1026-2017, Samsung, Kiowa 2, Smart Card\"",
"/ModDate": "D:20171220100211+01\u002700\u0027",
"/Producer": "LibreOffice 5.2",
"/Subject": "S3FV9VH 32-Bit RISC Microcontroller for Smart Cards, Revision 0 including specific IC Dedicated Software from Samsung Electronics",
"/Title": "Certification Report BSI-DSZ-CC-1026-2017",
"pdf_file_size_bytes": 778469,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.sogisportal.eu/",
"https://www.bsi.bund.de/AIS",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/",
"http://www.commoncriteriaportal.org/cc/",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
},
"st_filename": "1026b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.AES": 5,
"O.RND": 6,
"O.TDES": 6
},
"T": {
"T.RND": 6
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0084-2014": 2,
"BSI-CC-PP-0084": 1,
"BSI-PP-0084": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 5,
"ADV_FSP": 2,
"ADV_FSP.4": 2,
"ADV_FSP.5": 3,
"ADV_IMP": 1,
"ADV_IMP.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 7,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 2,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_ECD": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 2,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.2": 11
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.3": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 5": 2,
"EAL 5 augmented": 2,
"EAL6": 30,
"EAL6 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 1,
"FAU_SAS": 8,
"FAU_SAS.1": 12,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 28,
"FCS_CKM.1": 8,
"FCS_CKM.4": 4,
"FCS_COP": 24,
"FCS_COP.1": 5,
"FCS_RNG": 14,
"FCS_RNG.1": 7
},
"FDP": {
"FDP_ACC": 27,
"FDP_ACC.1": 3,
"FDP_ACF": 28,
"FDP_ACF.1": 9,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 15,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 3,
"FDP_ITC.1": 8,
"FDP_ITC.2": 8,
"FDP_ITT": 1,
"FDP_ITT.1": 18,
"FDP_ITT.1.1": 1,
"FDP_MSA.1": 1,
"FDP_SDC": 6,
"FDP_SDC.1": 15,
"FDP_SDC.1.1": 2,
"FDP_SDI": 2,
"FDP_SDI.1": 1,
"FDP_SDI.2": 11,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_API": 7,
"FIA_API.1": 12,
"FIA_API.1.1": 2
},
"FMT": {
"FMT_LIM": 26,
"FMT_LIM.1": 29,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 33,
"FMT_LIM.2.1": 2,
"FMT_MSA": 2,
"FMT_MSA.1": 14,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 17,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 6
},
"FPT": {
"FPT_FLS": 1,
"FPT_FLS.1": 21,
"FPT_FLS.1.1": 1,
"FPT_ITT": 1,
"FPT_ITT.1": 16,
"FPT_ITT.1.1": 1,
"FPT_PHP": 3,
"FPT_PHP.3": 21,
"FPT_PHP.3.1": 1
},
"FRU": {
"FRU_FLT": 1,
"FRU_FLT.1": 1,
"FRU_FLT.2": 17
}
},
"certification_process": {
"OutOfScope": {
"operational environment and SFRs related to the TOE authentication are regarded as not applicable (out of scope of the intended use-case), as the authentication functionality is no longer available. Composite": 4,
"out of scope": 4
}
},
"cipher_mode": {
"ECB": {
"ECB": 14
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 12,
"RNG": 8
},
"TRNG": {
"DTRNG": 18,
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 26,
"malfunction": 11,
"physical tampering": 3
},
"SCA": {
"DPA": 3,
"Leak-Inherent": 21,
"Physical Probing": 4,
"Physical probing": 2,
"SPA": 2,
"physical probing": 9,
"side-channel": 1,
"timing attacks": 1
},
"other": {
"JIL": 1,
"reverse engineering": 3
}
},
"standard_id": {
"BSI": {
"AIS31": 3
},
"CC": {
"CCMB-2012-09-001": 3,
"CCMB-2012-09-002": 3,
"CCMB-2012-09-003": 3,
"CCMB-2012-09-004": 3
},
"FIPS": {
"FIPS197": 2
},
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 9797-1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 36
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 16,
"Triple-DES": 10
},
"DES": {
"DES": 8
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 12
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Sunggeun Park",
"/CreationDate": "D:20171208161554+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "ST Lite; S3FV9VH",
"/ModDate": "D:20171208162325+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "Security Target Lite Samsung S3FV9VH 32-bit RISC Microcontroller for Smart Card with ST Lite Samsung S3FV9VH 32-bit RISC Microcontroller for Smart Card with specific IC Dedicated Software",
"/Title": "Security Target Lite Samsung S3FV9VH 32-bit RISC Microcontroller for Smart Card with specific IC Dedicated Software",
"pdf_file_size_bytes": 1016457,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 72
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf",
"pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/1026a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ASE_TSS.2",
"EAL6+"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/1026b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "df7900b977837eba948379af03aaf2e1d5a9d289dfae4da511201feb9bad4979",
"txt_hash": "5a97c81394b0383e41dd4fbe88fb91c933389330911455a40ac8e0c6e64fad09"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b38c86f5915f784f2614c9d3ce568f900fbda50a2d85b60989fca1cc1da85d39",
"txt_hash": "1ef28802aa4ac83996de9ddeafa7b5ea1fd2d3f7ba7d05b79b963016b4d964ac"
}
},
"status": "archived"
}