This page was not yet optimized for use on mobile
devices.
LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17, version 1.0
CSV information
| Status | archived |
|---|---|
| Valid from | 03.11.2008 |
| Valid until | 01.09.2019 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Gemalto - Infineon Technologies AG |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_MSU.3, EAL4+, AVA_VLA.4 |
| Maintenance updates | Maintenance Report ANSSI-CC-2008/37-M01 (12.03.2010) Certification report |
Heuristics summary
Certificate ID: ANSSI-CC-2008/37
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
JavaCard versions
Java Card 2.2.1Vendor
Infineon Technologies AG, Infineon, Gemalto, ThalesSecurity level
EAL 4, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL5+, EAL 4 augmented, ITSEC E6 andClaims
OE.HI_VADSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLAProtection profiles
BSI-PP-0006-2002T, BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0376-2006, DCSSI-2008/37Standards
AIS 34, AIS34, ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
| Title | DCSSI-2008/37 |
|---|---|
| Subject | LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17 |
| Keywords | CER/F/07.5 |
| Author | J. Chuzel |
| Creation date | D:20081103113048+01'00' |
| Modification date | D:20081103113130+01'00' |
| Pages | 17 |
| Creator | Acrobat PDFMaker 8.0 for Word |
| Producer | Acrobat Distiller 8.0.0 (Windows) |
Frontpage
| Certificate ID | DCSSI-2008/37 |
|---|---|
| Certified item | LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B- EP3B platform embedded on SLE88CFX4002P/m8834b17 |
| Certification lab | CEACI (Thales Security Systems – CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 61 28 16 51, email : [email protected] |
| Developer | GEMALTO 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG Automotive, Industrial & Multimarket, Chipcard & Security IC´s, Am Campeon 1- 12, 85579 Neubiberg, Germany Sponsor GEMALTO 6 rue de la verrerie, 92197 Meudon, France |
References
Outgoing- BSI-DSZ-CC-0376-2006 - archived - Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17, SLE88CFX3520P/m8847b17, SLE88CFX2920P/m8849b17, SLE88CF4000P/m8845b17, SLE88CF4002P/m8846b17 SLE88CF3520P/m8848b17, SLE88CF2920P/m8850b17 each with PSL V0.50.23_E107 or PSL V0.50.23_E110 and specific IC Dedicated Software
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, 3-DES, Triple-DESAsymmetric Algorithms
RSA 1024Hash functions
SHA-1JavaCard versions
JavaCard 2.2.1, Java Card 2.2.1, JC2.2.1, Global Platform 2.1.1Vendor
Infineon, GemaltoSecurity level
EAL4+, EAL5, EAL4, EAL5+, EAL5 augmented, EAL4 augmentedClaims
D.SCD, D.SVD, D.DTBS, D.VAD, D.RAD, D.SIGN_APPLI, D.SIGNATURE, D.USER_PIN, A.CGA, A.SCA, OE.HI_VADSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_XXX, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_SOF.1Security Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM.1.1, FCS_CKM, FCS_COP, FDP_ACC.1, FDP_ACF.1, FDP_ETC.1, FDP_ITC.1, FDP_RIP.1, FDP_SDI.2, FDP_UIT.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_UIT.1.2, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1.2, FIA_UAU.1.2, FIA_UAU.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SMR.1, FMT_SMF.1, FMT_MOF, FMT_MSA.1.1, FMT_MSA.3.2, FMT_SMR.1.2, FMT_SMF, FPT_AMT.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_SEP.1, FPT_TST.1.3, FPT_PHP.1.2, FPT_TST.1.2, FPT_SEP.1.1, FPT_SEP.1.2, FPT_SEP, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ITC.1.2, FTP_ITC.1.3, FTP_ITC.1.1, FTP_TRP.1.2, FTP_TRP.1.3Protection profiles
BSI-PP, BSI-PP-0006-2002T-, BSI-PP-0004-2002T-, BSI-PP-0005-2002T-03-04-2002, BSI-PP-0006-2002T-03-04-2002, BSI-PP-0002Certificates
BSI-DSZ-CC-0269-2006Side-channel analysis
SPA, DPA, timing attacks, physical tampering, Physical tampering, malfunctionCertification process
out of scope, verification of correct passcode stored in SIM at perso time. NB: The passcode functionality is out of scope of this Security target. 2.3 TOE LIFE CYCLE The TOE is composed of a JavaCard and a EEPROMed JavaStandards
SCP02File metadata
| Title | ASE10448v1.4_Lite |
|---|---|
| Creation date | D:20081020110655 |
| Modification date | D:20081020110655 |
| Pages | 52 |
| Creator | PDFCreator Version 0.9.3 |
| Producer | GPL Ghostscript 8.54 |
References
Outgoing- BSI-DSZ-CC-0269-2006 - archived - Infineon Smart Card IC (Security Controller) SLE88CFX4000P/m8830b17, SLE88CFX4002P/m8834b17, SLE88CFX3520P/m8847b17 and SLE88CFX2920P/m8849b17 each with PSL V0.50.23 and specific IC Dedicated Software
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2008/37Extracted SARs
ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4Similar certificates
| Name | Certificate ID | |
|---|---|---|
| NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware c... | 21.0.03/TSE-CCCS-48 | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "18b005fb398b1c2b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2008/37",
"cert_lab": [
"CEACI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0376-2006"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0376-2006",
"BSI-DSZ-CC-0269-2006"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0269-2006"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0269-2006"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2010-03-12",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2008-37-M01en.pdf",
"maintenance_st_link": null,
"maintenance_title": "Maintenance Report ANSSI-CC-2008/37-M01"
}
]
},
"manufacturer": "Gemalto - Infineon Technologies AG",
"manufacturer_web": "https://www.gemalto.com/",
"name": "LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17, version 1.0",
"not_valid_after": "2019-09-01",
"not_valid_before": "2008-11-03",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "dcssi-2008_37en.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 4 augmented AVA_MSU.3, AVA_VLA.4",
"cc_version": "Common Criteria version 2.3 compliant with ISO 15408:2005",
"cert_id": "DCSSI-2008/37",
"cert_item": "LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B- EP3B platform embedded on SLE88CFX4002P/m8834b17",
"cert_item_version": "T1004530 A3 / Version 1.0",
"cert_lab": "CEACI (Thales Security Systems \u2013 CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 61 28 16 51, email : [email protected]",
"developer": "GEMALTO 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG Automotive, Industrial \u0026 Multimarket, Chipcard \u0026 Security IC\u00b4s, Am Campeon 1- 12, 85579 Neubiberg, Germany Sponsor GEMALTO 6 rue de la verrerie, 92197 Meudon, France",
"match_rules": [
"Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements"
],
"ref_protection_profiles": "none"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0376-2006": 1
},
"FR": {
"DCSSI-2008/37": 18
}
},
"cc_claims": {
"OE": {
"OE.HI_VAD": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 1,
"BSI-PP-0006-2002T": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_CAP": 1,
"ACM_SCP": 1
},
"ADO": {
"ADO_DEL": 1,
"ADO_IGS": 1
},
"ADV": {
"ADV_FSP": 1,
"ADV_HLD": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_LLD": 1,
"ADV_RCR": 1,
"ADV_SPM": 1
},
"AGD": {
"AGD_ADM": 1,
"AGD_USR": 1
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_CCA": 1,
"AVA_MSU": 1,
"AVA_MSU.3": 2,
"AVA_SOF": 1,
"AVA_VLA": 1,
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 2,
"EAL 4 augmented": 2,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 3,
"EAL5": 1,
"EAL5+": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 and": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"JavaCard": {
"Java Card 2.2.1": 2
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 34": 2,
"AIS34": 1
},
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-002": 1,
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"ISO": {
"ISO/IEC 15408:2005": 1,
"ISO/IEC 18045:2005": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 1
},
"Infineon": {
"Infineon": 4,
"Infineon Technologies AG": 4
},
"Thales": {
"Thales": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "J. Chuzel",
"/Comments": "Developpeur",
"/Company": "SGDN/DCSSI",
"/CreationDate": "D:20081103113048+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 8.0 for Word",
"/Keywords": "CER/F/07.5",
"/ModDate": "D:20081103113130+01\u002700\u0027",
"/Producer": "Acrobat Distiller 8.0.0 (Windows)",
"/SourceModified": "D:20081103103036",
"/Subject": "LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17",
"/Title": "DCSSI-2008/37",
"pdf_file_size_bytes": 237599,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "cible2008_37en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 1024": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0269-2006": 2
}
},
"cc_claims": {
"A": {
"A.CGA": 1,
"A.SCA": 1
},
"D": {
"D.DTBS": 8,
"D.RAD": 13,
"D.SCD": 11,
"D.SIGNATURE": 4,
"D.SIGN_APPLI": 3,
"D.SVD": 6,
"D.USER_PIN": 1,
"D.VAD": 5
},
"OE": {
"OE.HI_VAD": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP": 1,
"BSI-PP-0002": 1,
"BSI-PP-0004-2002T-": 1,
"BSI-PP-0005-2002T-03-04-2002": 1,
"BSI-PP-0006-2002T-": 1,
"BSI-PP-0006-2002T-03-04-2002": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_CAP.4": 1,
"ACM_SCP.2": 1,
"ACM_XXX": 1
},
"ADO": {
"ADO_DEL.2": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP.2": 1,
"ADV_HLD.2": 1,
"ADV_IMP.1": 1,
"ADV_LLD.1": 1,
"ADV_RCR.1": 1,
"ADV_SPM.1": 1
},
"AGD": {
"AGD_ADM.1": 1,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS.1": 1,
"ALC_DVS.2": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_MSU.3": 4,
"AVA_SOF.1": 1,
"AVA_VLA.4": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 2,
"EAL4 augmented": 2,
"EAL4+": 1,
"EAL5": 1,
"EAL5 augmented": 1,
"EAL5+": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 5,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 3,
"FCS_CKM.3": 3,
"FCS_CKM.4": 4,
"FCS_COP": 1,
"FCS_COP.1": 9
},
"FDP": {
"FDP_ACC.1": 7,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 4,
"FDP_ACF.1.2": 4,
"FDP_ETC.1": 5,
"FDP_ITC.1": 8,
"FDP_RIP.1": 4,
"FDP_SDI.2": 8,
"FDP_UIT.1": 13,
"FDP_UIT.1.2": 2
},
"FIA": {
"FIA_AFL.1": 4,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 4,
"FIA_UAU.1": 4,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 5,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 5,
"FMT_MSA.1": 5,
"FMT_MSA.1.1": 3,
"FMT_MSA.2": 4,
"FMT_MSA.3": 4,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 5,
"FMT_SMF": 2,
"FMT_SMF.1": 4,
"FMT_SMR.1": 4,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_AMT.1": 4,
"FPT_FLS.1": 4,
"FPT_PHP.1": 4,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 4,
"FPT_SEP": 1,
"FPT_SEP.1": 2,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_TST.1": 5,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 3
},
"FTP": {
"FTP_ITC": 2,
"FTP_ITC.1": 11,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 4,
"FTP_ITC.1.3": 4,
"FTP_TRP.1": 3,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"verification of correct passcode stored in SIM at perso time. NB: The passcode functionality is out of scope of this Security target. 2.3 TOE LIFE CYCLE The TOE is composed of a JavaCard and a EEPROMed Java": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"Global Platform 2.1.1": 1
},
"JavaCard": {
"JC2.2.1": 5,
"Java Card 2.2.1": 3,
"JavaCard 2.2.1": 2
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Physical tampering": 1,
"malfunction": 1,
"physical tampering": 5
},
"SCA": {
"DPA": 2,
"SPA": 1,
"timing attacks": 1
}
},
"standard_id": {
"SCP": {
"SCP02": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"3-DES": 1,
"Triple-DES": 1
},
"DES": {
"DES": 9
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 53
},
"Infineon": {
"Infineon": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20081020110655",
"/Creator": "PDFCreator Version 0.9.3",
"/Keywords": "",
"/ModDate": "D:20081020110655",
"/Producer": "GPL Ghostscript 8.54",
"/Subject": "",
"/Title": "ASE10448v1.4_Lite",
"pdf_file_size_bytes": 410066,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 52
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_37en.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VLA.4",
"EAL4+",
"AVA_MSU.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2008_37en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "74989bfcb830405a4750cd400060c9fcf84025a0f23fa61df041231a1ee4cce4",
"txt_hash": "a3b2c4e05840847402dcdc15fd6f112d8eea8094ddebfaee5d1c6ed346fbc507"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a6923322412785b9b77b3e5717d84c360ad723994cbd9e08b981ab64dd29f802",
"txt_hash": "6d7c33979b7bc8c9edcb9df02e412897ccd7283b87813ef4f4410d43559ec709"
}
},
"status": "archived"
}