This page was not yet optimized for use on mobile
devices.
MULTOS I4C (1-1-1) platform with patch AMD 0029v002 on component SLE66CX322P/m1484a24
CSV information
| Status | archived |
|---|---|
| Valid from | 04.12.2003 |
| Valid until | 01.09.2019 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Keycorp Limited / Infineon Technologies AG |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL4+, AVA_VLA.4, ADV_IMP.2, ALC_DVS.2 |
Heuristics summary
Certificate ID: ANSSI-CC-2003/14
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
DESAsymmetric Algorithms
RSA 2048Vendor
Infineon Technologies AG, InfineonSecurity level
EAL7, EAL4, EAL 5, EAL41, EAL1, EAL3, EAL5, ITSEC E6 etClaims
O.DLV_PROTECT, O.DLV_AUDIT, O.DLV_RESP, O.DLV_DATA, O.TEST_OPERATE, O.USE_DIAG, O.CODE_HASH, O.APPLI_DEVSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_FLR, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_MSU.2, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FCS_CKM.3, FCS_CKM.4, FCS_COP.1, FDP_ACC.2, FDP_ACF.1, FDP_DAU.1, FDP_ETC.1, FDP_ITC.1, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU.4, FIA_UID.1, FIA_USB.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_SMR.1, FPR_UNO.1, FPT_FLS.1, FPT_PHP.3, FPT_RCV.4, FPT_RVM.1, FPT_SEP.1, FPT_TDC.1, FPT_TST.1, FRU_RSA.1Protection profiles
BSI-PP-0002Certificates
BSI-DSZ-CC-0223-2003, Rapport de certification 2003/14, Rapport de certification 2003/01Standards
CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
| Title | Rapport de certification 2003/14 |
|---|---|
| Subject | Plate-forme MULTOS I4C (1-1-1) |
| Author | Patrick REDON |
| Creation date | D:20031204162531+01'00' |
| Modification date | D:20031204162711+01'00' |
| Pages | 35 |
| Creator | Acrobat PDFMaker 5.0 pour Word |
| Producer | Acrobat Distiller 5.0 (Windows) |
References
Outgoing- BSI-DSZ-CC-0223-2003 - archived - Infineon Smart Card IC (Security Controller) SLE66CX322P with RSA 2048/m1484 a24/ m1484a27 and m1484b14
Security target
Extracted keywords
Symmetric Algorithms
DESHash functions
SHA-1Randomness
RNGBlock cipher modes
CBCVendor
Infineon Technologies, Infineon, ThalesSecurity level
EAL4, EAL4 augmentedClaims
O.CODE_HASH, O.TAMPER_ES, O.SIDE, O.ROLLBACK, O.RESOURCE, O.LOAD, O.SECURITY, O.EFFECT_L, O.REMOVE, O.EFFECT_R, O.SEGREGATE, O.DEV_DIS_ES, O.INIT_ACS, O.SAMPLE_ACS, O.DLV_DATA, O.APPLI_DEV, O.RESOURCES, O.SAMPLES_ACS, O.DIS_, O.DIS, O.MOD_, O.OPERATE, O.DIS_MEMORY, O.MOD_MEMORY, O.FLAW, O.CLON, T.DIS_TEST_ES, T.T_TOOLS, T.MOD, T.T_ES, T.T_CMD, T.MOD_TSF, T.MOD_LOAD, T.MOD_EXE, T.MOD_SHARE, T.LOAD_MAN, T.LOAD_APP, T.LOAD_OTHER, T.LOAD_MOD, T.APP_DISC, T.APP_CORR, T.APP_REMOVE, T.ERR_REMOVE, T.DEL_REMOVE, T.APP_READ, T.APP_MOD, T.RESOURCES, T.DIS_DATA, T.MOD_DATA, T.DIS_TEST, T.T_SAMPLE, T.MOD_DEL, T.MOD_SOF, T.MOD_LOA, T.MOD_SHA, T.MOD_DAT, T.LOAD_MA, T.LOAD_OT, T.LOAD_MO, T.APP_COR, T.APP_REM, T.ERR_REM, T.DEL_REM, T.APP_REA, T.RESOURC, T.CLON, T.DIS_INFO, T.DIS_DEL, T.MOD_SOFT, A.APPLI_CONTSecurity Assurance Requirements (SAR)
ADV_IMP, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ADV_IMP.1, ADV_HLD, ADV_LLD, AGD_ADM.1, AGD_USR.1, AGD_ADM, ALC_DVS, ALC_DVS.2, ALC_TAT.1, ALC_DVS.1, AVA_VLA, AVA_VLA.4Security Functional Requirements (SFR)
FAU_ARP, FAU_SAA, FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAA.1, FCS_CKM, FCS_COP, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FDP_ACC, FDP_ACF, FDP_DAU, FDP_ETC, FDP_ITC, FDP_RIP, FDP_ROL, FDP_SDI, FDP_ACC.2, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ETC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP.1, FDP_RIP.1.1, FDP_ROL.1, FDP_ROL.1.1, FDP_ROL.1.2, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FIA_AFL, FIA_ATD, FIA_UAU, FIA_UID, FIA_USB, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.4.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1, FIA_USB.1.1, FMT_MOF, FMT_MSA, FMT_MTD, FMT_SMR, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.2, FMT_MTD.2.1, FMT_MTD.2.2, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS, FPT_PHP, FPT_RCV, FPT_RVM, FPT_SEP, FPT_TDC, FPT_TST, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_RCV.4, FPT_RCV.4.1, FPT_RVM.1, FPT_RVM.1.1, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FRU_RSA, FRU_RSA.1, FRU_RSA.1.1Side-channel analysis
side channel, SPA, DPA, Timing attacks, timing attack, timing attacks, physical tampering, Physical tamperingCertification process
out of scope, Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements, strength level of these security functions is “SOF high”. Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements. 6.1.1Standards
FIPS PUB 180-2, PKCS # 1, PKCS#2File metadata
| Title | Public Security Target |
|---|---|
| Subject | Keycorp MULTOS Common Criteria |
| Author | Thales Microelectronics & Keycorp MULTOS Team |
| Creation date | D:20040526124355 |
| Modification date | D:20040526124445+11'00' |
| Pages | 85 |
| Creator | Microsoft Word 8.0 |
| Producer | Acrobat Distiller 4.0 for Windows |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2003/14Extracted SARs
ADV_FSP.1, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "72ed5b59efbf992c",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2003/14",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_PPC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_DES",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ENV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0223-2003"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0169-2002",
"BSI-DSZ-CC-0223-2003"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Keycorp Limited / Infineon Technologies AG",
"manufacturer_web": "https://www.keycorp.net/",
"name": "MULTOS I4C (1-1-1) platform with patch AMD 0029v002 on component SLE66CX322P/m1484a24",
"not_valid_after": "2019-09-01",
"not_valid_before": "2003-12-04",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "2003_14.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 2048": 2
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0223-2003": 3
},
"FR": {
"Rapport de certification 2003/01": 1,
"Rapport de certification 2003/14": 18
}
},
"cc_claims": {
"O": {
"O.APPLI_DEV": 1,
"O.CODE_HASH": 1,
"O.DLV_AUDIT": 1,
"O.DLV_DATA": 1,
"O.DLV_PROTECT": 1,
"O.DLV_RESP": 1,
"O.TEST_OPERATE": 1,
"O.USE_DIAG": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_AUT.1": 1,
"ACM_CAP": 1,
"ACM_CAP.4": 1,
"ACM_SCP": 1,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL": 1,
"ADO_DEL.2": 1,
"ADO_IGS": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP": 1,
"ADV_FSP.2": 1,
"ADV_HLD": 1,
"ADV_HLD.2": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 3,
"ADV_INT": 1,
"ADV_LLD": 1,
"ADV_LLD.1": 1,
"ADV_RCR": 1,
"ADV_RCR.1": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1
},
"AGD": {
"AGD_ADM": 1,
"AGD_ADM.1": 1,
"AGD_USR": 1,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 4,
"ALC_FLR": 2,
"ALC_LCD.1": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_DES.1": 1,
"ASE_ENV.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_PPC.1": 1,
"ASE_REQ.1": 1,
"ASE_SRE.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_IND": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA": 1,
"AVA_MSU": 1,
"AVA_MSU.2": 1,
"AVA_MSU.3": 1,
"AVA_SOF": 1,
"AVA_SOF.1": 1,
"AVA_VLA": 1,
"AVA_VLA.4": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL1": 1,
"EAL3": 1,
"EAL4": 1,
"EAL41": 1,
"EAL5": 1,
"EAL7": 2
},
"ITSEC": {
"ITSEC E6 et": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 2,
"FAU_SAA.1": 2
},
"FCS": {
"FCS_CKM.3": 2,
"FCS_CKM.4": 2,
"FCS_COP.1": 2
},
"FDP": {
"FDP_ACC.2": 2,
"FDP_ACF.1": 2,
"FDP_DAU.1": 2,
"FDP_ETC.1": 2,
"FDP_ITC.1": 2,
"FDP_RIP.1": 2,
"FDP_ROL.1": 2,
"FDP_SDI.2": 2
},
"FIA": {
"FIA_AFL.1": 2,
"FIA_ATD.1": 2,
"FIA_UAU.1": 2,
"FIA_UAU.4": 2,
"FIA_UID.1": 2,
"FIA_USB.1": 2
},
"FMT": {
"FMT_MOF.1": 2,
"FMT_MSA.1": 2,
"FMT_MSA.2": 2,
"FMT_MSA.3": 2,
"FMT_MTD.1": 2,
"FMT_MTD.2": 2,
"FMT_SMR.1": 2
},
"FPR": {
"FPR_UNO.1": 2
},
"FPT": {
"FPT_FLS.1": 2,
"FPT_PHP.3": 2,
"FPT_RCV.4": 2,
"FPT_RVM.1": 2,
"FPT_SEP.1": 2,
"FPT_TDC.1": 2,
"FPT_TST.1": 2
},
"FRU": {
"FRU_RSA.1": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 7,
"Infineon Technologies AG": 7
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Patrick REDON",
"/CreationDate": "D:20031204162531+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 5.0 pour Word",
"/ModDate": "D:20031204162711+01\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0 (Windows)",
"/Subject": "Plate-forme MULTOS I4C (1-1-1)",
"/Title": "Rapport de certification 2003/14",
"pdf_file_size_bytes": 867591,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 35
},
"st_filename": "cible2003_14.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.APPLI_CONT": 1
},
"O": {
"O.APPLI_DEV": 4,
"O.CLON": 1,
"O.CODE_HASH": 2,
"O.DEV_DIS_ES": 6,
"O.DIS": 1,
"O.DIS_": 1,
"O.DIS_MEMORY": 1,
"O.DLV_DATA": 3,
"O.EFFECT_L": 4,
"O.EFFECT_R": 3,
"O.FLAW": 1,
"O.INIT_ACS": 4,
"O.LOAD": 4,
"O.MOD_": 1,
"O.MOD_MEMORY": 1,
"O.OPERATE": 1,
"O.REMOVE": 4,
"O.RESOURCE": 2,
"O.RESOURCES": 1,
"O.ROLLBACK": 3,
"O.SAMPLES_ACS": 1,
"O.SAMPLE_ACS": 2,
"O.SECURITY": 4,
"O.SEGREGATE": 4,
"O.SIDE": 4,
"O.TAMPER_ES": 11
},
"T": {
"T.APP_COR": 1,
"T.APP_CORR": 4,
"T.APP_DISC": 9,
"T.APP_MOD": 5,
"T.APP_REA": 1,
"T.APP_READ": 4,
"T.APP_REM": 1,
"T.APP_REMOVE": 4,
"T.CLON": 1,
"T.DEL_REM": 1,
"T.DEL_REMOVE": 4,
"T.DIS_DATA": 5,
"T.DIS_DEL": 1,
"T.DIS_INFO": 1,
"T.DIS_TEST": 1,
"T.DIS_TEST_ES": 4,
"T.ERR_REM": 1,
"T.ERR_REMOVE": 4,
"T.LOAD_APP": 6,
"T.LOAD_MA": 1,
"T.LOAD_MAN": 4,
"T.LOAD_MO": 1,
"T.LOAD_MOD": 6,
"T.LOAD_OT": 1,
"T.LOAD_OTHER": 4,
"T.MOD": 5,
"T.MOD_DAT": 1,
"T.MOD_DATA": 3,
"T.MOD_DEL": 3,
"T.MOD_EXE": 5,
"T.MOD_LOA": 1,
"T.MOD_LOAD": 4,
"T.MOD_SHA": 1,
"T.MOD_SHARE": 4,
"T.MOD_SOF": 1,
"T.MOD_SOFT": 1,
"T.MOD_TSF": 5,
"T.RESOURC": 1,
"T.RESOURCES": 4,
"T.T_CMD": 5,
"T.T_ES": 5,
"T.T_SAMPLE": 1,
"T.T_TOOLS": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 2,
"ADV_HLD": 1,
"ADV_HLD.2": 1,
"ADV_IMP": 3,
"ADV_IMP.1": 2,
"ADV_IMP.2": 10,
"ADV_LLD": 1,
"ADV_LLD.1": 3,
"ADV_RCR.1": 2
},
"AGD": {
"AGD_ADM": 1,
"AGD_ADM.1": 1,
"AGD_USR.1": 2
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.1": 1,
"ALC_DVS.2": 10,
"ALC_TAT.1": 2
},
"AVA": {
"AVA_VLA": 3,
"AVA_VLA.4": 15
}
},
"cc_security_level": {
"EAL": {
"EAL4": 17,
"EAL4 augmented": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 2,
"FAU_ARP.1": 11,
"FAU_ARP.1.1": 2,
"FAU_SAA": 2,
"FAU_SAA.1": 15,
"FAU_SAA.1.1": 2,
"FAU_SAA.1.2": 2
},
"FCS": {
"FCS_CKM": 2,
"FCS_CKM.3": 12,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 12,
"FCS_CKM.4.1": 1,
"FCS_COP": 2,
"FCS_COP.1": 12,
"FCS_COP.1.1": 4
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.2": 15,
"FDP_ACC.2.1": 2,
"FDP_ACC.2.2": 1,
"FDP_ACF": 2,
"FDP_ACF.1": 14,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_DAU": 2,
"FDP_DAU.1": 9,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ETC": 2,
"FDP_ETC.1": 5,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_ITC": 2,
"FDP_ITC.1": 10,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_RIP": 2,
"FDP_RIP.1": 8,
"FDP_RIP.1.1": 1,
"FDP_ROL": 2,
"FDP_ROL.1": 4,
"FDP_ROL.1.1": 1,
"FDP_ROL.1.2": 1,
"FDP_SDI": 2,
"FDP_SDI.2": 6,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 2,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 10,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 7,
"FIA_UAU.4.1": 1,
"FIA_UID": 2,
"FIA_UID.1": 10,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB": 2,
"FIA_USB.1": 8,
"FIA_USB.1.1": 1
},
"FMT": {
"FMT_MOF": 2,
"FMT_MOF.1": 8,
"FMT_MOF.1.1": 2,
"FMT_MSA": 2,
"FMT_MSA.1": 12,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 9,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 10,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 2,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 1,
"FMT_MTD.2": 6,
"FMT_MTD.2.1": 1,
"FMT_MTD.2.2": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 9,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO": 3,
"FPR_UNO.1": 7,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 2,
"FPT_FLS.1": 10,
"FPT_FLS.1.1": 1,
"FPT_PHP": 2,
"FPT_PHP.3": 10,
"FPT_PHP.3.1": 1,
"FPT_RCV": 2,
"FPT_RCV.4": 4,
"FPT_RCV.4.1": 1,
"FPT_RVM": 2,
"FPT_RVM.1": 6,
"FPT_RVM.1.1": 1,
"FPT_SEP": 2,
"FPT_SEP.1": 11,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_TDC": 2,
"FPT_TDC.1": 5,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST": 3,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_RSA": 2,
"FRU_RSA.1": 5,
"FRU_RSA.1.1": 1
}
},
"certification_process": {
"OutOfScope": {
" Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements": 1,
"out of scope": 1,
"strength level of these security functions is \u201cSOF high\u201d. Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements. 6.1.1": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Physical tampering": 1,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"SPA": 2,
"Timing attacks": 1,
"side channel": 2,
"timing attack": 1,
"timing attacks": 1
}
},
"standard_id": {
"FIPS": {
"FIPS PUB 180-2": 1
},
"PKCS": {
"PKCS # 1": 1,
"PKCS#2": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 16
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 2,
"Infineon Technologies": 5
},
"Thales": {
"Thales": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Thales Microelectronics \u0026 Keycorp MULTOS Team",
"/CreationDate": "D:20040526124355",
"/Creator": "Microsoft Word 8.0",
"/ModDate": "D:20040526124445+11\u002700\u0027",
"/Producer": "Acrobat Distiller 4.0 for Windows",
"/Subject": "Keycorp MULTOS Common Criteria",
"/Title": "Public Security Target",
"pdf_file_size_bytes": 652006,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 85
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2003_14.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"ADV_IMP.2",
"EAL4+",
"AVA_VLA.4"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2003_14.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "3979eb58e5c3ee9abc048d5c36861ff230bfc68cb37f01c29bc103e1612dfa61",
"txt_hash": "3a0158df6abcb2abd887b7e4b9ae3276c1582aaa803e59f0ad08d6c9e645c49e"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "fb17d9af5360e801f93a406d87aa8efb76a926e679dc6383c116551c4eb2495a",
"txt_hash": "bfce1933bc4dce3591006fedb708451ad6cc98b189598e2f1465b2cff2cad249"
}
},
"status": "archived"
}