This page was not yet optimized for use on mobile
devices.
JCLX80jTOP20ID smart card: Java Trusted Open Platform on SLE66CLX800PE microcontroller
CSV information
| Status | archived |
|---|---|
| Valid from | 19.12.2008 |
| Valid until | 01.09.2019 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Trusted Logic |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL5 |
| Maintenance updates | Maintenance Report DCSSI-2008/43-M01 (06.07.2009) Certification report |
Heuristics summary
Certificate ID: ANSSI-CC-2008/43
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Asymmetric Algorithms
RSA2048, ECCSchemes
Key AgreementRandomness
TRNGJavaCard versions
Java Card 2.2.1, GlobalPlatform 2.1.1Vendor
InfineonSecurity level
EAL 5, EAL4, EAL7, EAL 1, EAL 3, EAL 7, EAL5+, EAL 5 augmented, ITSEC E6 andSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VLA.4, AVA_MSU.3, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLAProtection profiles
BSI-PP-0002-2001Certificates
BSI-DSZ-CC-04821, BSI-DSZ-CC-0482, DCSSI-2008/43Evaluation facilities
Serma TechnologiesStandards
AIS 34, AIS 31, AIS34, AIS31, ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
| Title | Microsoft Word - dcssi-2008_43en.doc |
|---|---|
| Author | nassor |
| Creation date | D:20081223095616+01'00' |
| Modification date | D:20081223095616+01'00' |
| Pages | 20 |
| Creator | PScript5.dll Version 5.2 |
| Producer | Acrobat Distiller 8.0.0 (Windows) |
Frontpage
| Certificate ID | DCSSI-2008/43 |
|---|---|
| Certified item | JCLX80jTOP20ID smart card: Java Trusted Open Platform on SLE66CLX800PE microcontroller |
| Certification lab | Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected] |
| Developer | Trusted Logic SA 5, rue du Bailliage 78000 Versailles – France Sponsor Trusted Logic SA 5, rue du Bailliage 78000 Versailles – France |
Security target
Extracted keywords
Symmetric Algorithms
DES, 3DESAsymmetric Algorithms
RSA2048, RSA-CRT, ECC, Diffie-HellmanHash functions
SHA-224, SHA-256Schemes
MAC, Key Agreement, Key agreementRandomness
RND, RNGBlock cipher modes
ECB, CBC, CCMJavaCard versions
Java Card 2.2.1, GlobalPlatform 2.1.1Security level
EAL5, EAL5 augmentedClaims
D.APP-CODE, D.APP-INST, D.COMMAND, D.ISD-SESSION-KEYS, D.JCS_KEYS, D.ISD-, D.ISD-PERSO, D.GP-REGISTRY, D.CVM, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.SOFTWARE, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.API_DATA, D.CRYPTO, O.REQUEST, O.INFO-ORIGIN, O.LOAD, O.INSTALL, O.INFO-INTEGRITY, O.INFO-CONFIDENTIALITY, O.NO-KEY-REUSE, O.DELETION, O.LIFE-CYCLE, O.IDENTIFICATION, O.GLOBAL-CVM, O.CVM-BLOCK, O.SID, O.ERROR-COUNTERS, O.RECOVERY, O.LOCK, O.OPERATE, O.RESOURCES, O.FIREWALL, O.REALLOCATION, O.SHRD_VAR_CONFID, O.SHRD_VAR_INTEG, O.NATIVE, O.VERIFICATION, O.OS-SUPPORT, O.PIN-MNGT, O.ALARM, O.TRANSACTION, O.CIPHER, O.KEY-MNGT, O.OBJ-DELETION, O.PROT-INF-LEAK, O.PROT-PHYS-TAMPER, O.ABUSE-FUNC, O.IC-SUPPORT, O.PROT-MALFUNCTION, O.PROT-, O.RND, T.INSTALL, T.CRYPTO, T.CONFID-APPLI-DATA, T.CONFID-JCS-DATA, T.INTEG-, T.INTEG-JCS-DATA, T.DELETION, T.IMPERSONATE, T.INVALID-INPUT, T.INVALID-ORDER, T.FORCED-RESET, T.REPLAY, T.BRUTE-FORCE, T.LIFE-CYCLE, T.CONFID-JCS-CODE, T.INTEG-APPLI-CODE, T.INTEG-JCS-CODE, T.INTEG-APPLI-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESSOURCES, T.OBJ-DELETION, T.ABUSE-FUNC, T.PHYS-TAMPER, T.MALFUNCTION, T.INF-LEAK, T.RND, A.CARD-MANAGEMENT, A.NATIVE, A.VERIFICATION, A.APPLET, A.MANUFACTURING, R.JAVA, OE.IC, OE.SCP, OE.RECOVERY, OE.SUPPORT, OE.CARD-MANAGEMENT, OE.MANUFACTURING, OE.VERIFICATION, OE.NATIVE, OE.APPLET, OE.SECRETS, OE.KEY-LENGTH, OE.NO-RMI-APPLETS, OSP, OSP.VERIFICATION, OSP.FILE-ORIGIN, OSP.SECRETS, OSP.KEY-LENGTH, OSP.NO-RMI-APPLETS, OSP.PERSONALIZATION, OSP.PROCESS-TOESecurity Assurance Requirements (SAR)
ADV_HLD, ALC_DVS.2, AVA_VLA.4Security Functional Requirements (SFR)
FAU_ARP, FAU_ARP.1, FCO_NRO, FCO_NRO.2, FCS_RND, FCS_RND.1, FCS_COP, FCS_COP.1, FCS_CKM, FCS_CKM.3, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_RND.1.1, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_ACF.1.2, FDP_IFC, FDP_IFC.2, FDP_IFF, FDP_IFF.1, FDP_IFF.1.5, FDP_IFF.1.2, FDP_ITC, FDP_ITC.1, FDP_UIT, FDP_UIT.1, FDP_ROL, FDP_ROL.1, FDP_ITC.2, FDP_ACC.2, FDP_IFC.1, FDP_RIP, FDP_RIP.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACF.1.1, FDP_ITT, FDP_ITT.1, FDP_IFF.2, FIA_UID, FIA_UID.1, FIA_UAU, FIA_UAU.1, FIA_UAU.4, FIA_AFL, FIA_AFL.1, FIA_ATD, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_SMF, FMT_SMF.1, FMT_SMR, FMT_SMR.1, FMT_MSA.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FPR_UNO, FPR_UNO.1, FPT_TST.2, FPT_TDC, FPT_TDC.1, FPT_FLS, FPT_FLS.1, FPT_RCV, FPT_RCV.3, FPT_SEP, FPT_SEP.1, FPT_RVM.1, FPT_RVM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_AMT, FPT_AMT.1, FPT_RCV.4, FPT_TST, FPT_PHP, FPT_PHP.3, FPT_ITT, FPT_ITT.1, FPT_TST.2.1, FRU_RSA, FRU_RSA.1, FRU_FLT, FRU_FLT.2, FTP_ITC, FTP_ITC.1Protection profiles
BSI-PP-0002Evaluation facilities
SERMASide-channel analysis
Leak-Inherent, physical probing, DPA, SPA, physical tampering, Physical tampering, malfunction, DFA, reverse engineeringStandards
FIPS PUB 46-3, FIPS 46-2, FIPS PUB 81, FIPS 180-2, PKCS#1, PKCS#3, ISO/IEC 15946-1, ISO/IEC 15946-3, ISO/IEC 15408:2005, ICAO, SCP01, SCP02, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
| Title | Microsoft Word - CP-2007-RT-075-1.4 JCLX80jTOP20ID - Security Target Lite.doc |
|---|---|
| Author | gimenez |
| Creation date | D:20081217221029-02'00' |
| Modification date | D:20081217221029-02'00' |
| Pages | 122 |
| Creator | PrimoPDF http://www.primopdf.com/ |
| Producer | PrimoPDF |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2008/43Extracted SARs
ALC_DVS.2, AVA_MSU.3, AVA_VLA.4References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "e89d5ad10223e35a",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2008/43",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2009-07-06",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_43-M01en.pdf",
"maintenance_st_link": null,
"maintenance_title": "Maintenance Report DCSSI-2008/43-M01"
}
]
},
"manufacturer": "Trusted Logic",
"manufacturer_web": "https://www.trusted-logic.com/",
"name": "JCLX80jTOP20ID smart card: Java Trusted Open Platform on SLE66CLX800PE microcontroller",
"not_valid_after": "2019-09-01",
"not_valid_before": "2008-12-19",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "dcssi-2008_43en.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augmented ALC_DVS.2, AVA_VLA.4",
"cc_version": "Common Criteria version 2.3 compliant with ISO 15408:2005",
"cert_id": "DCSSI-2008/43",
"cert_item": "JCLX80jTOP20ID smart card: Java Trusted Open Platform on SLE66CLX800PE microcontroller",
"cert_item_version": "IFXv#27_0.1, software revision v1.4",
"cert_lab": "Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected]",
"developer": "Trusted Logic SA 5, rue du Bailliage 78000 Versailles \u2013 France Sponsor Trusted Logic SA 5, rue du Bailliage 78000 Versailles \u2013 France",
"match_rules": [
"Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements"
],
"ref_protection_profiles": "None"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
},
"RSA": {
"RSA2048": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0482": 1,
"BSI-DSZ-CC-04821": 1
},
"FR": {
"DCSSI-2008/43": 21
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_CAP": 1,
"ACM_SCP": 1
},
"ADO": {
"ADO_DEL": 1,
"ADO_IGS": 1
},
"ADV": {
"ADV_FSP": 1,
"ADV_HLD": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_LLD": 1,
"ADV_RCR": 1,
"ADV_SPM": 1
},
"AGD": {
"AGD_ADM": 1,
"AGD_USR": 1
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_CCA": 1,
"AVA_MSU": 1,
"AVA_MSU.3": 1,
"AVA_SOF": 1,
"AVA_VLA": 1,
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 5 augmented": 2,
"EAL 7": 1,
"EAL4": 4,
"EAL5+": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 and": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 3
},
"JavaCard": {
"Java Card 2.2.1": 2
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 31": 1,
"AIS 34": 2,
"AIS31": 2,
"AIS34": 1
},
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-002": 1,
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"ISO": {
"ISO/IEC 15408:2005": 1,
"ISO/IEC 18045:2005": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "nassor",
"/CreationDate": "D:20081223095616+01\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2",
"/ModDate": "D:20081223095616+01\u002700\u0027",
"/Producer": "Acrobat Distiller 8.0.0 (Windows)",
"/Title": "Microsoft Word - dcssi-2008_43en.doc",
"pdf_file_size_bytes": 188011,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 20
},
"st_filename": "dcssi-cible2008_43en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 5
}
},
"RSA": {
"RSA-CRT": 1,
"RSA2048": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.APPLET": 2,
"A.CARD-MANAGEMENT": 1,
"A.MANUFACTURING": 3,
"A.NATIVE": 3,
"A.VERIFICATION": 2
},
"D": {
"D.API_DATA": 2,
"D.APP-CODE": 3,
"D.APP-INST": 2,
"D.APP_C_DATA": 2,
"D.APP_I_DATA": 2,
"D.COMMAND": 2,
"D.CRYPTO": 3,
"D.CVM": 2,
"D.GP-REGISTRY": 2,
"D.ISD-": 1,
"D.ISD-PERSO": 2,
"D.ISD-SESSION-KEYS": 2,
"D.JCS_CODE": 1,
"D.JCS_DATA": 2,
"D.JCS_KEYS": 1,
"D.PIN": 2,
"D.SEC_DATA": 2,
"D.SOFTWARE": 2
},
"O": {
"O.ABUSE-FUNC": 2,
"O.ALARM": 2,
"O.CIPHER": 2,
"O.CVM-BLOCK": 2,
"O.DELETION": 2,
"O.ERROR-COUNTERS": 2,
"O.FIREWALL": 2,
"O.GLOBAL-CVM": 2,
"O.IC-SUPPORT": 3,
"O.IDENTIFICATION": 3,
"O.INFO-CONFIDENTIALITY": 3,
"O.INFO-INTEGRITY": 4,
"O.INFO-ORIGIN": 3,
"O.INSTALL": 4,
"O.KEY-MNGT": 3,
"O.LIFE-CYCLE": 3,
"O.LOAD": 4,
"O.LOCK": 2,
"O.NATIVE": 2,
"O.NO-KEY-REUSE": 2,
"O.OBJ-DELETION": 2,
"O.OPERATE": 2,
"O.OS-SUPPORT": 3,
"O.PIN-MNGT": 2,
"O.PROT-": 1,
"O.PROT-INF-LEAK": 4,
"O.PROT-MALFUNCTION": 3,
"O.PROT-PHYS-TAMPER": 4,
"O.REALLOCATION": 2,
"O.RECOVERY": 3,
"O.REQUEST": 2,
"O.RESOURCES": 2,
"O.RND": 3,
"O.SHRD_VAR_CONFID": 2,
"O.SHRD_VAR_INTEG": 2,
"O.SID": 2,
"O.TRANSACTION": 2,
"O.VERIFICATION": 3
},
"OE": {
"OE.APPLET": 2,
"OE.CARD-MANAGEMENT": 1,
"OE.IC": 1,
"OE.KEY-LENGTH": 2,
"OE.MANUFACTURING": 3,
"OE.NATIVE": 2,
"OE.NO-RMI-APPLETS": 2,
"OE.RECOVERY": 1,
"OE.SCP": 2,
"OE.SECRETS": 2,
"OE.SUPPORT": 1,
"OE.VERIFICATION": 2
},
"OSP": {
"OSP": 1,
"OSP.FILE-ORIGIN": 2,
"OSP.KEY-LENGTH": 2,
"OSP.NO-RMI-APPLETS": 2,
"OSP.PERSONALIZATION": 2,
"OSP.PROCESS-TOE": 3,
"OSP.SECRETS": 3,
"OSP.VERIFICATION": 2
},
"R": {
"R.JAVA": 1
},
"T": {
"T.ABUSE-FUNC": 1,
"T.BRUTE-FORCE": 2,
"T.CONFID-APPLI-DATA": 3,
"T.CONFID-JCS-CODE": 2,
"T.CONFID-JCS-DATA": 3,
"T.CRYPTO": 4,
"T.DELETION": 3,
"T.EXE-CODE": 4,
"T.FORCED-RESET": 2,
"T.IMPERSONATE": 2,
"T.INF-LEAK": 2,
"T.INSTALL": 4,
"T.INTEG-": 1,
"T.INTEG-APPLI-CODE": 4,
"T.INTEG-APPLI-DATA": 4,
"T.INTEG-JCS-CODE": 2,
"T.INTEG-JCS-DATA": 3,
"T.INVALID-INPUT": 2,
"T.INVALID-ORDER": 2,
"T.LIFE-CYCLE": 3,
"T.MALFUNCTION": 2,
"T.NATIVE": 2,
"T.OBJ-DELETION": 2,
"T.PHYS-TAMPER": 2,
"T.REPLAY": 2,
"T.RESSOURCES": 2,
"T.RND": 2,
"T.SID": 4
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002": 1
}
},
"cc_sar": {
"ADV": {
"ADV_HLD": 1
},
"ALC": {
"ALC_DVS.2": 2
},
"AVA": {
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL5": 2,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 3,
"FAU_ARP.1": 1
},
"FCO": {
"FCO_NRO": 2,
"FCO_NRO.2": 3
},
"FCS": {
"FCS_CKM": 18,
"FCS_CKM.1": 4,
"FCS_CKM.2": 3,
"FCS_CKM.3": 1,
"FCS_CKM.4": 1,
"FCS_COP": 24,
"FCS_COP.1": 12,
"FCS_RND": 6,
"FCS_RND.1": 6,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC": 11,
"FDP_ACC.1": 3,
"FDP_ACC.2": 5,
"FDP_ACF": 10,
"FDP_ACF.1": 20,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_IFC": 10,
"FDP_IFC.1": 2,
"FDP_IFC.2": 4,
"FDP_IFF": 6,
"FDP_IFF.1": 13,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.5": 1,
"FDP_IFF.2": 7,
"FDP_ITC": 6,
"FDP_ITC.1": 3,
"FDP_ITC.2": 5,
"FDP_ITT": 3,
"FDP_ITT.1": 1,
"FDP_RIP": 16,
"FDP_RIP.1": 8,
"FDP_ROL": 4,
"FDP_ROL.1": 4,
"FDP_SDI.2": 2,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 3,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 4,
"FIA_AFL.1": 4,
"FIA_ATD": 2,
"FIA_ATD.1": 1,
"FIA_UAU": 4,
"FIA_UAU.1": 2,
"FIA_UAU.4": 1,
"FIA_UID": 6,
"FIA_UID.1": 2,
"FIA_UID.2": 1,
"FIA_USB.1": 2,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 42,
"FMT_MSA.1": 11,
"FMT_MSA.2": 3,
"FMT_MSA.3": 14,
"FMT_MTD": 4,
"FMT_MTD.1": 1,
"FMT_MTD.3": 1,
"FMT_SMF": 10,
"FMT_SMF.1": 5,
"FMT_SMR": 12,
"FMT_SMR.1": 12
},
"FPR": {
"FPR_UNO": 4,
"FPR_UNO.1": 2
},
"FPT": {
"FPT_AMT": 2,
"FPT_AMT.1": 2,
"FPT_FLS": 12,
"FPT_FLS.1": 5,
"FPT_ITT": 2,
"FPT_ITT.1": 1,
"FPT_PHP": 2,
"FPT_PHP.3": 1,
"FPT_RCV": 7,
"FPT_RCV.3": 12,
"FPT_RCV.4": 1,
"FPT_RVM.1": 2,
"FPT_RVM.1.1": 1,
"FPT_SEP": 4,
"FPT_SEP.1": 4,
"FPT_TDC": 2,
"FPT_TDC.1": 4,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST": 4,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1,
"FPT_TST.2": 6,
"FPT_TST.2.1": 1
},
"FRU": {
"FRU_FLT": 2,
"FRU_FLT.2": 1,
"FRU_RSA": 4,
"FRU_RSA.1": 2
},
"FTP": {
"FTP_ITC": 2,
"FTP_ITC.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CCM": {
"CCM": 1
},
"ECB": {
"ECB": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 2,
"Key agreement": 1
},
"MAC": {
"MAC": 14
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-224": 1,
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"javacard": {
"javacard.security": 2
}
},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 9
},
"JavaCard": {
"Java Card 2.2.1": 4
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"Physical tampering": 1,
"malfunction": 8,
"physical tampering": 3
},
"SCA": {
"DPA": 3,
"Leak-Inherent": 1,
"SPA": 2,
"physical probing": 5
},
"other": {
"reverse engineering": 2
}
},
"standard_id": {
"CC": {
"CCMB-2005-08-001": 2,
"CCMB-2005-08-002": 2,
"CCMB-2005-08-003": 2,
"CCMB-2005-08-004": 1
},
"FIPS": {
"FIPS 180-2": 1,
"FIPS 46-2": 1,
"FIPS PUB 46-3": 6,
"FIPS PUB 81": 1
},
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 15408:2005": 3,
"ISO/IEC 15946-1": 1,
"ISO/IEC 15946-3": 3
},
"PKCS": {
"PKCS#1": 2,
"PKCS#3": 1
},
"SCP": {
"SCP01": 1,
"SCP02": 9
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 1
},
"DES": {
"DES": 34
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "gimenez",
"/CreationDate": "D:20081217221029-02\u002700\u0027",
"/Creator": "PrimoPDF http://www.primopdf.com/",
"/ModDate": "D:20081217221029-02\u002700\u0027",
"/Producer": "PrimoPDF",
"/Title": "Microsoft Word - CP-2007-RT-075-1.4 JCLX80jTOP20ID - Security Target Lite.doc",
"pdf_file_size_bytes": 1019152,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 122
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_43en.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible2008_43en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "47e0d7056ef248e74fc4a1e9eeb66400624b1f8cc330f74b38a505fc5df6b73b",
"txt_hash": "d238ae352d20be0e9f6a1640b13ce74c60dc7d6ca6a4b1753c4db6038be78a33"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b187a8a308a53ce7562618407ca4eec78aaad99988dfc2a7b98f6a2fb913ad0f",
"txt_hash": "063b5b26831a11d2aae3d4ea1db99fe0764facc3cdb6fccc492265a4e2475182"
}
},
"status": "archived"
}