This page was not yet optimized for use on mobile
devices.
NATIONAL SMARTCARD IC UKTÜM-H v7.0 WITH DES – 3DES v7.0, AES256 v7.0, RSA2048 v7.0 LIBRARIES AND WITH IC DEDICATED SOFTWARE
CSV information
| Status | archived |
|---|---|
| Valid from | 05.09.2013 |
| Valid until | 27.03.2017 |
| Scheme | 🇹🇷 TR |
| Manufacturer | TÜBİTAK BİLGEM UEKAE |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL5+, AVA_VAN.5 |
Heuristics summary
Certificate ID: 21.0.01/TSE-CCCS-017
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
AES256, AES, DES, 3DESAsymmetric Algorithms
RSA2048, RSA1024Hash functions
SHA-256Security level
EAL 5+, EAL4, EAL 5Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RND.1, FCS_COP.1, FCS_CKM, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FPT_FLS.1, FPT_PHP.3, FPT_TST.2, FRU_FLT.2, FTP_ITT.1Protection profiles
BSI-PP-0035Certificates
21.0.01/TSE-CCCS-017Evaluation facilities
TÜBİTAK BİLGEMSide-channel analysis
Leak-Inherent, Physical Probing, side channel, SPA, DPA, reverse engineeringStandards
FIPS 186-3, ISO/IEC 17025, ISO/IEC 7816-3File metadata
| Title | 1 |
|---|---|
| Author | Tse |
| Creation date | D:20130905141019 |
| Modification date | D:20130905141019 |
| Pages | 25 |
| Creator | Microsoft® Office Word 2007 |
| Producer | Microsoft® Office Word 2007 |
Security target
Extracted keywords
Symmetric Algorithms
AES256, AES, DES, 3DESAsymmetric Algorithms
RSA2048, RSA 2048, RSA1024Hash functions
SHA-256Randomness
RNG, RNDSecurity level
EAL 5+, EAL5Claims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FAU_GEN.1, FCS_RND, FCS_COP, FCS_CKM, FCS_RND.1, FCS_RND.1.1, FCS_RND.1.2, FCS_COP.1, FCS_CKM.1, FCS_COP.1.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.4, FDP_SDI, FDP_ITT, FDP_IFC, FDP_ACF, FDP_ITT.1, FDP_IFC.1, FDP_SDI.2, FDP_ITT.1.1, FDP_IFC.1.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC.1, FDP_IFF.1, FDP_ITC.2, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.2, FPT_TST.2, FPT_FLS, FPT_PHP, FPT_ITT, FPT_TST, FPT_TST.1, FPT_TST.2.1, FPT_AMT.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_ITT.1.1, FRU_FLT, FRU_FLT.2, FRU_FLT.2.1, FTP_ITT.1Protection profiles
BSI-PP-0035Evaluation facilities
TÜBİTAK BİLGEMSide-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, side channel, DPA, SPA, physical tampering, Malfunction, malfunction, reverse engineeringCertification process
out of scope, v7.0 SECURITY TARGET 13 / 76 SHA-256 coprocessor block is not available to the user and it is out of scope of the TOE. 8052 Microprocessor RSA 2048 DES 3DES AES 256 TEST ROM 10KB SRAM 8KB FLASH 192 KBStandards
FIPS PUB 46-3, FIPS PUB 197, FIPS 186-3, ISO/IEC 7816-3, ISO/IEC 9796-1File metadata
| Title | ST |
|---|---|
| Subject | Güvenlik Hedefi |
| Author | Ülkühan Güler |
| Creation date | D:20140425173446+03'00' |
| Modification date | D:20140425173446+03'00' |
| Pages | 76 |
| Creator | Microsoft® Word 2013 |
| Producer | Microsoft® Word 2013 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
21.0.01/TSE-CCCS-017Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
| Name | Certificate ID | |
|---|---|---|
| NATIONAL SMARTCARD IC (UKTÜM) UKT23T64H v4 WITH DES – 3DES v4.2, AES256 v4.2, RSA2048 v4.2 LIBRARIES AND WITH IC DEDI... | None | Compare |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "90263bdb4cc9e7ae",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "21.0.01/TSE-CCCS-017",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"7.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "T\u00dcB\u0130TAK B\u0130LGEM UEKAE",
"manufacturer_web": "https://www.uekae.tubitak.gov.tr",
"name": "NATIONAL SMARTCARD IC UKT\u00dcM-H v7.0 WITH DES \u2013 3DES v7.0, AES256 v7.0, RSA2048 v7.0 LIBRARIES AND WITH IC DEDICATED SOFTWARE",
"not_valid_after": "2017-03-27",
"not_valid_before": "2013-09-05",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "uktumv7-0_certification-report-v1-0.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA1024": 2,
"RSA2048": 17
}
},
"cc_cert_id": {
"TR": {
"21.0.01/TSE-CCCS-017": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.5": 1,
"ADV_IMP.1": 1,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 2,
"ATE_DPT.3": 2,
"ATE_FUN.1": 2,
"ATE_IND.2": 2
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 2,
"EAL 5+": 5,
"EAL4": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 1
},
"FCS": {
"FCS_CKM": 1,
"FCS_COP.1": 1,
"FCS_RND.1": 1
},
"FDP": {
"FDP_IFC.1": 1,
"FDP_ITT.1": 1,
"FDP_SDI.2": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_PHP.3": 1,
"FPT_TST.2": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITT.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUBITAK-BILGEM": {
"T\u00dcB\u0130TAK B\u0130LGEM": 6
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"org": {
"org.tr": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"DPA": 1,
"Leak-Inherent": 2,
"Physical Probing": 1,
"SPA": 1,
"side channel": 1
},
"other": {
"reverse engineering": 3
}
},
"standard_id": {
"FIPS": {
"FIPS 186-3": 1
},
"ISO": {
"ISO/IEC 17025": 2,
"ISO/IEC 7816-3": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7,
"AES256": 14
}
},
"DES": {
"3DES": {
"3DES": 12
},
"DES": {
"DES": 16
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Tse",
"/CreationDate": "D:20130905141019",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20130905141019",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "1",
"pdf_file_size_bytes": 689399,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
},
"st_filename": "UKT\u00dcM-H_v7 0_Security_Target_.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 2048": 1,
"RSA1024": 3,
"RSA2048": 14
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.RND": 11
},
"T": {
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.5": 2,
"ADV_IMP.1": 2,
"ADV_INT.2": 2,
"ADV_TDS.4": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 2,
"ALC_CMS.5": 2,
"ALC_DEL.1": 2,
"ALC_DVS.1": 2,
"ALC_LCD.1": 2,
"ALC_TAT.2": 2
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 2,
"ASE_INT.1": 2,
"ASE_OBJ.2": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.2": 2,
"ATE_DPT.3": 2,
"ATE_FUN.1": 2,
"ATE_IND.2": 2
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 5+": 3,
"EAL5": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 1,
"FAU_SAS": 7,
"FAU_SAS.1": 13,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 8,
"FCS_CKM.1": 8,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 6,
"FCS_COP": 7,
"FCS_COP.1": 19,
"FCS_COP.1.1": 4,
"FCS_RND": 7,
"FCS_RND.1": 10,
"FCS_RND.1.1": 2,
"FCS_RND.1.2": 2
},
"FDP": {
"FDP_ACF": 1,
"FDP_IFC": 2,
"FDP_IFC.1": 16,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 2,
"FDP_ITC.1": 5,
"FDP_ITC.2": 4,
"FDP_ITT": 2,
"FDP_ITT.1": 13,
"FDP_ITT.1.1": 1,
"FDP_SDI": 3,
"FDP_SDI.2": 7,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FMT": {
"FMT_LIM": 6,
"FMT_LIM.1": 17,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 14,
"FMT_LIM.2.1": 2,
"FMT_MSA.2": 1
},
"FPT": {
"FPT_AMT.1": 4,
"FPT_FLS": 2,
"FPT_FLS.1": 13,
"FPT_FLS.1.1": 1,
"FPT_ITT": 2,
"FPT_ITT.1": 10,
"FPT_ITT.1.1": 1,
"FPT_PHP": 2,
"FPT_PHP.3": 12,
"FPT_PHP.3.1": 1,
"FPT_TST": 3,
"FPT_TST.1": 3,
"FPT_TST.2": 14,
"FPT_TST.2.1": 2
},
"FRU": {
"FRU_FLT": 2,
"FRU_FLT.2": 11,
"FRU_FLT.2.1": 1
},
"FTP": {
"FTP_ITT.1": 1
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"v7.0 SECURITY TARGET 13 / 76 SHA-256 coprocessor block is not available to the user and it is out of scope of the TOE. 8052 Microprocessor RSA 2048 DES 3DES AES 256 TEST ROM 10KB SRAM 8KB FLASH 192 KB": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUBITAK-BILGEM": {
"T\u00dcB\u0130TAK B\u0130LGEM": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 16,
"RNG": 5
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 23,
"malfunction": 5,
"physical tampering": 2
},
"SCA": {
"DPA": 3,
"Leak-Inherent": 19,
"Physical Probing": 7,
"Physical probing": 1,
"SPA": 1,
"physical probing": 6,
"side channel": 1
},
"other": {
"reverse engineering": 5
}
},
"standard_id": {
"FIPS": {
"FIPS 186-3": 2,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 2
},
"ISO": {
"ISO/IEC 7816-3": 2,
"ISO/IEC 9796-1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 18,
"AES256": 8
}
},
"DES": {
"3DES": {
"3DES": 9
},
"DES": {
"DES": 17
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "\u00dclk\u00fchan G\u00fcler",
"/CreationDate": "D:20140425173446+03\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/ModDate": "D:20140425173446+03\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"/Subject": "G\u00fcvenlik Hedefi",
"/Title": "ST",
"pdf_file_size_bytes": 830920,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 76
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/uktumv7-0_certification-report-v1-0.pdf",
"scheme": "TR",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/UKT\u00dcM-H_v7%200_Security_Target_.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "1340316ef0890d28163ba0b14c97e638e8e9ef70b09701e400cadd4af87bb179",
"txt_hash": "836639682d4735978cf5b65bbb9fd256a0e74062b882709520fcb8ae2f192ad2"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "16d40513861fbf4d7dd4962c26ba25c7fd7960a3d19a71380112905f9015ae76",
"txt_hash": "dc381f540a7ca4f6a54d34e3748d48acc15869f35681ff163c18cd4e803a45fd"
}
},
"status": "archived"
}