Samsung S3CT9KW 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional secure RSA/ECC V1.0 Library including specific IC Dedicated Software
CSV information ?
Status | archived |
---|---|
Valid from | 17.08.2010 |
Valid until | 01.09.2019 |
Scheme | 🇩🇪 DE |
Manufacturer | Samsung Electronics Co., Ltd. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL5+ |
Maintenance updates | Samsung S3CT9KC/ S3CT9K9 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional secure RSA/ECC V1.0 Library including specific IC Dedicated Software (03.11.2010) Certification report Security target |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, HMACAsymmetric Algorithms
ECCRandomness
TRNG, RNGBlock cipher modes
ECB, CBCCPLC
IC Fabricator, IC VersionVendor
Infineon Technologies AG, Samsung, PhilipsSecurity level
EAL 5, EAL 4, EAL1, EAL4, EAL5+, EAL6, EAL3, EAL5, EAL7, EAL2, EAL 5 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0035-2007, BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0639-2010, BSI-DSZ-CC-0547-2009, BSI-DSZ-CC-0639Evaluation facilities
TĂśV Informationstechnik, TĂśViTSide-channel analysis
physical probing, side-channel, DPA, physical tampering, JILCertification process
optional Secure RSA and ECCLibrary – Project Crow, Version 1.6, 2010-03-10, Samsung Electronics (confidential document) [7] Evaluation Technical Report Summary (ETR SUMMARY), BSI-DSZ-CC-0639, S3CT9KW, Version 1, TÜViT (confidential document) [8] Life Cycle Definition (Class ALC_CMC.4/CMS.5) – Project Crow, version 1.2, 2009- 12-18, Electronics (confidential document) [9] Security Target Lite of S3CT9KW 16-bit RISC Microcontroller for Smart Cards – Project Crow, ETR for Composite Evaluation (ETR-COMP), BSI-DSZ-CC-0639, S3CT9KW, Version 1, 2010-07-05, TÜViT (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen undStandards
AIS20, AIS31, AIS 34, AIS 20, AIS 25, AIS 26, AIS 31, AIS 36, AIS 35, AIS 32, AIS 38Technical reports
BSI TR-02102, BSI 7125, BSI 7148, BSI 7149File metadata
Title | Certification Report BSI-DSZ-CC-0639-2010 |
---|---|
Subject | Common Criteria Certification |
Keywords | "Common Criteria, Certification, Zertifizierung, Samsung Electronics, Samsung S3CT9KW 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional secure RSA/ECC V1.0 Library including specific IC Dedicated Software" |
Author | Bundesamt fĂĽr Sicherheit in der Informationstechnik |
Creation date | D:20100902103123+02'00' |
Modification date | D:20100902111607+02'00' |
Pages | 38 |
Creator | Writer |
Producer | OpenOffice.org 3.1 |
Frontpage
Certificate ID | BSI-DSZ-CC-0639-2010 |
---|---|
Certified item | Samsung S3CT9KW 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional secure RSA/ECC V1.0 Library including specific IC Dedicated Software |
Certification lab | BSI |
Developer | Samsung Electronics |
References
Outgoing- BSI-DSZ-CC-0547-2009 - archived - S3CC9PF 16-bit RISC Microcontroller for Smart Card, Revision 2
- BSI-DSZ-CC-0719-2011 - archived - Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software
- ANSSI-CC-2012/72 - archived - Microcontrôleurs SAMSUNG S3CT9KW, S3CT9KC et S3CT9K9 Revision 2.0 embarquant la bibliothèque RSA/ECC optionnelle TORNADO 2MX2 v2.1
- KECS-ISIS-0394-2012 - archived - SPass NX V1.0 on S3CT9KW/S3CT9KC/S3CT9K9
- ANSSI-CC-2012/70 - archived - Microcontrôleurs SAMSUNG S3CT9KW, S3CT9KC et S3CT9K9 Revision 2.0 embarquant la bibliothèque RSA/ECC optionnelle TORNADO 2MX2 v2.2
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, Triple-DES, TDEA, HMACAsymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman, DSAHash functions
SHA1, SHA-1, SHA224, SHA256, SHA384, SHA-224, SHA-256, SHA-384, SHA-512, SHA512Schemes
Key AgreementRandomness
TRNG, DTRNG, RNDElliptic Curves
P-192, P-224, P-256, P-384, secp192k1, secp192r1, secp224k1, secp224r1, secp256k1, secp256r1, secp384r1, brainpoolP192r1, brainpoolP192t1, brainpoolP224r1, brainpoolP224t1, brainpoolP256r1, brainpoolP256t1, brainpoolP320r1, brainpoolP320t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1Block cipher modes
ECBVendor
SamsungSecurity level
EAL5, EAL 4, EAL 5, EAL5 augmented, EAL 4 augmented, EAL 5 augmentedClaims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARV, ADV_FSP, ADV_IMP, ADV_VAN, ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.2, ADV_TDS.3, ADV_FSP.4, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_DVS.1, ALC_CMS.4, ATE_COV, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FAU_GEN.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_COP, FCS_CKM.1, FCS_CKM.4, FCS_CKM, FCS_CKM.2, FDP_ACF, FDP_ITT.1, FDP_ITT.1.1, FDP_ACC.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_SDI.1, FDP_ACC, FDP_IFC, FDP_ITT, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.2, FMT_MSA, FMT_SMF, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_PHP, FPT_ITT.1, FPT_ITT.1.1, FPT_FLS, FPT_ITT, FRU_FLT.2, FRU_FLT.1, FRU_FLTProtection profiles
BSI-PP-0035Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, side-channel, side channel, DPA, SPA, timing attacks, timing attack, physical tampering, Malfunction, malfunction, DFA, fault injection, reverse engineeringStandards
FIPS PUB 180-3, FIPS 197, AIS20, AIS31, AIS 20, AIS 31, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title | Security Target Lite of S3CT9KW 16-bit RISC Microcontroller For Smart Cards |
---|---|
Subject | S3CT9KW Common Criteria(version 3.1) EAL5+ Evaluation |
Keywords | Security Target of S3CT9KW 16-bit Secure RISC Microcontroller For Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software, CC EAL5+, Samsung Electroncis, SmartCard IC, Common Criteria version 3.1 |
Author | SungGeun Park |
Creation date | D:20100401133317+09'00' |
Modification date | D:20100811185342+09'00' |
Pages | 67 |
Creator | PScript5.dll Version 5.2 |
Producer | Acrobat Distiller 6.0 (Windows) |
References
Incoming- KECS-ISIS-0394-2012 - archived - SPass NX V1.0 on S3CT9KW/S3CT9KC/S3CT9K9
- KECS-ISIS-0271-2010 - archived - Samsung SDS SPass V2.0
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_SPM.1, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.3, ALC_LCD.1, ALC_TAT.2, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
References ?
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '08f3be929694fcf34e956ba479dd37445a02558ee554603d4907de1fcf5c7844', 'txt_hash': '757ad38f9c0da35857858d28ce8d734847364638b47cfc06124b813310590471'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'fcb25a9cb4b35beb47cc9b59da73a15923326e6abb7647286ac36ef1e9881a4a', 'txt_hash': 'f7c7a5da6de2eb58f44ab5cc3ee7f4b7e562953a168cf23d2fb8df0b915b608a'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 856628, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/CreationDate': "D:20100902103123+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Samsung Electronics, Samsung S3CT9KW 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional secure RSA/ECC V1.0 Library including specific IC Dedicated Software"', '/ModDate': "D:20100902111607+02'00'", '/Producer': 'OpenOffice.org 3.1', '/Subject': 'Common Criteria Certification', '/Title': 'Certification Report BSI-DSZ-CC-0639-2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 916346, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 67, '/Author': 'SungGeun Park', '/CreationDate': "D:20100401133317+09'00'", '/Creator': 'PScript5.dll Version 5.2', '/Keywords': 'Security Target of S3CT9KW 16-bit Secure RISC Microcontroller For Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software, CC EAL5+, Samsung Electroncis, SmartCard IC, Common Criteria version 3.1 ', '/ModDate': "D:20100811185342+09'00'", '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Subject': 'S3CT9KW Common Criteria(version 3.1) EAL5+ Evaluation ', '/Title': 'Security Target Lite of S3CT9KW 16-bit RISC Microcontroller For Smart Cards ', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0639-2010', 'cert_item': 'Samsung S3CT9KW 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional secure RSA/ECC V1.0 Library including specific IC Dedicated Software', 'developer': 'Samsung Electronics', 'cert_lab': 'BSI'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0639-2010': 20, 'BSI-DSZ-CC-0547-2009': 1, 'BSI-DSZ-CC-0639': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0035-2007': 3, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 4, 'EAL 4': 5, 'EAL1': 7, 'EAL4': 8, 'EAL5+': 1, 'EAL6': 4, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL 5 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 6, 'ALC_CMC': 2, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_CMS.5': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 2, 'ALC_TAT.3': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1}, 'Samsung': {'Samsung': 32}, 'Philips': {'Philips': 1}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 2, 'TÜViT': 2}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}}, 'DES': {'DES': {'DES': 6}, '3DES': {'Triple-DES': 4}}, 'constructions': {'MAC': {'HMAC': 2}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 11}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 8}, 'RNG': {'RNG': 1}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side-channel': 1, 'DPA': 2}, 'FI': {'physical tampering': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICFab': {'IC Fabricator': 1}, 'ICVersion': {'IC Version': 1}}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS20': 1, 'AIS31': 2, 'AIS 34': 2, 'AIS 20': 2, 'AIS 25': 2, 'AIS 26': 2, 'AIS 31': 2, 'AIS 36': 2, 'AIS 35': 2, 'AIS 32': 1, 'AIS 38': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'optional Secure RSA and ECCLibrary – Project Crow, Version 1.6, 2010-03-10, Samsung Electronics (confidential document) [7] Evaluation Technical Report Summary (ETR SUMMARY), BSI-DSZ-CC-0639, S3CT9KW, Version 1': 1, 'TÜViT (confidential document) [8] Life Cycle Definition (Class ALC_CMC.4/CMS.5) – Project Crow, version 1.2, 2009- 12-18': 1, 'Electronics (confidential document) [9] Security Target Lite of S3CT9KW 16-bit RISC Microcontroller for Smart Cards – Project Crow': 1, 'ETR for Composite Evaluation (ETR-COMP), BSI-DSZ-CC-0639, S3CT9KW, Version 1, 2010-07-05, TÜViT (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 5}}, 'cc_security_level': {'EAL': {'EAL5': 6, 'EAL 4': 1, 'EAL 5': 2, 'EAL5 augmented': 1, 'EAL 4 augmented': 1, 'EAL 5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARV': 1, 'ADV_FSP': 2, 'ADV_IMP': 1, 'ADV_VAN': 1, 'ADV_ARC.1': 7, 'ADV_FSP.5': 3, 'ADV_IMP.1': 2, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_FSP.2': 1, 'ADV_TDS.3': 1, 'ADV_FSP.4': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 7, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 2, 'ALC_CMC': 1, 'ALC_CMC.4': 1, 'ALC_CMS.5': 3, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_DVS.1': 1, 'ALC_CMS.4': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 13, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 8, 'FAU_GEN': 2, 'FAU_SAS.1': 12, 'FAU_SAS.1.1': 2, 'FAU_GEN.1': 1}, 'FCS': {'FCS_RNG': 11, 'FCS_RNG.1': 19, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_COP.1': 23, 'FCS_COP': 19, 'FCS_CKM.1': 21, 'FCS_CKM.4': 11, 'FCS_CKM': 4, 'FCS_CKM.2': 2}, 'FDP': {'FDP_ACF': 2, 'FDP_ITT.1': 17, 'FDP_ITT.1.1': 1, 'FDP_ACC.1': 13, 'FDP_IFC.1': 18, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 3, 'FDP_ACF.1': 9, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC.1': 10, 'FDP_ITC.2': 10, 'FDP_SDI.1': 1, 'FDP_ACC': 1, 'FDP_IFC': 1, 'FDP_ITT': 1}, 'FMT': {'FMT_LIM': 8, 'FMT_LIM.1': 24, 'FMT_LIM.2': 28, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_MSA.3': 10, 'FMT_MSA.1': 9, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 6, 'FMT_MSA.1.1': 1, 'FMT_SMF.1': 6, 'FMT_SMF.1.1': 1, 'FMT_MSA.2': 3, 'FMT_MSA': 2, 'FMT_SMF': 1}, 'FPT': {'FPT_FLS.1': 21, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 20, 'FPT_PHP.3.1': 1, 'FPT_PHP': 3, 'FPT_ITT.1': 15, 'FPT_ITT.1.1': 1, 'FPT_FLS': 1, 'FPT_ITT': 1}, 'FRU': {'FRU_FLT.2': 17, 'FRU_FLT.1': 1, 'FRU_FLT': 1}}, 'cc_claims': {'O': {'O.RND': 5}, 'T': {'T.RND': 5}}, 'vendor': {'Samsung': {'Samsung': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 13}}, 'DES': {'DES': {'DES': 8}, '3DES': {'3DES': 6, 'Triple-DES': 1, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 1}, 'ECC': {'ECDH': {'ECDH': 8}, 'ECDSA': {'ECDSA': 14}, 'ECC': {'ECC': 26}}, 'FF': {'DH': {'Diffie-Hellman': 2}, 'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 3, 'SHA-1': 1}, 'SHA2': {'SHA224': 6, 'SHA256': 6, 'SHA384': 6, 'SHA-224': 2, 'SHA-256': 2, 'SHA-384': 2, 'SHA-512': 2, 'SHA512': 2}}}, 'crypto_scheme': {'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 15, 'DTRNG': 2}, 'RNG': {'RND': 10}}, 'cipher_mode': {'ECB': {'ECB': 3}}, 'ecc_curve': {'NIST': {'P-192': 8, 'P-224': 8, 'P-256': 8, 'P-384': 8, 'secp192k1': 4, 'secp192r1': 4, 'secp224k1': 4, 'secp224r1': 4, 'secp256k1': 4, 'secp256r1': 4, 'secp384r1': 4}, 'Brainpool': {'brainpoolP192r1': 4, 'brainpoolP192t1': 4, 'brainpoolP224r1': 4, 'brainpoolP224t1': 4, 'brainpoolP256r1': 4, 'brainpoolP256t1': 4, 'brainpoolP320r1': 4, 'brainpoolP320t1': 4, 'brainpoolP384r1': 4, 'brainpoolP384t1': 4, 'brainpoolP512r1': 4, 'brainpoolP512t1': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 21, 'Physical Probing': 4, 'physical probing': 9, 'Physical probing': 2, 'side-channel': 3, 'side channel': 2, 'DPA': 12, 'SPA': 10, 'timing attacks': 1, 'timing attack': 5}, 'FI': {'physical tampering': 2, 'Malfunction': 24, 'malfunction': 11, 'DFA': 4, 'fault injection': 2}, 'other': {'reverse engineering': 5}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-3': 6, 'FIPS 197': 1}, 'BSI': {'AIS20': 3, 'AIS31': 2, 'AIS 20': 1, 'AIS 31': 2}, 'CC': {'CCMB-2009-07-001': 3, 'CCMB-2009-07-002': 3, 'CCMB-2009-07-003': 3, 'CCMB-2009-07-004': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0639a_pdf.pdf
. - The st_filename property was set to
0639b_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0639-2010
. - The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['KECS-ISIS-0271-2010', 'KECS-ISIS-0394-2012']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['KECS-ISIS-0271-2010', 'KECS-ISIS-0394-2012']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['KECS-ISIS-0394-2012', 'ANSSI-CC-2012/70', 'BSI-DSZ-CC-0719-2011', 'ANSSI-CC-2012/72']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/70', 'ANSSI-CC-2012/72', 'KECS-ISIS-0533-2014', 'BSI-DSZ-CC-0894-2014', 'BSI-DSZ-CC-0720-V2-2016', 'BSI-DSZ-CC-0895-2014', 'BSI-DSZ-CC-0719-V2-2016', 'KECS-ISIS-0435-2013', 'BSI-DSZ-CC-0882-V2-2019', 'KECS-ISIS-0394-2012', 'BSI-DSZ-CC-0882-2013', 'KECS-ISIS-0513-2014', 'BSI-DSZ-CC-0801-2012', 'KECS-ISIS-0456-2013', 'BSI-DSZ-CC-0719-2011', 'KECS-ISIS-0675-2015', 'BSI-DSZ-CC-0720-2011', 'BSI-DSZ-CC-0802-2012', 'KECS-ISIS-0490-2014', 'KECS-ISIS-0468-2013']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0547-2009']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0547-2009']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0639a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0639b_pdf.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['KECS-ISIS-0271-2010']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['KECS-ISIS-0271-2010']}}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/72']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0895-2014', 'ANSSI-CC-2012/72']}}}
data.
- The st_references property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Samsung S3CT9KW 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional secure RSA/ECC V1.0 Library including specific IC Dedicated Software was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "e2404e71c4d78f90",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0639-2010",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0719-2011",
"ANSSI-CC-2012/72",
"ANSSI-CC-2012/70",
"KECS-ISIS-0394-2012"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0547-2009"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0894-2014",
"ANSSI-CC-2012/70",
"BSI-DSZ-CC-0882-2013",
"KECS-ISIS-0456-2013",
"KECS-ISIS-0490-2014",
"BSI-DSZ-CC-0802-2012",
"BSI-DSZ-CC-0720-V2-2016",
"KECS-ISIS-0394-2012",
"KECS-ISIS-0513-2014",
"BSI-DSZ-CC-0895-2014",
"BSI-DSZ-CC-0719-2011",
"BSI-DSZ-CC-0719-V2-2016",
"KECS-ISIS-0675-2015",
"KECS-ISIS-0468-2013",
"BSI-DSZ-CC-0720-2011",
"ANSSI-CC-2012/72",
"BSI-DSZ-CC-0801-2012",
"BSI-DSZ-CC-0882-V2-2019",
"KECS-ISIS-0533-2014",
"KECS-ISIS-0435-2013"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0547-2009"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"KECS-ISIS-0271-2010",
"KECS-ISIS-0394-2012"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"KECS-ISIS-0271-2010",
"KECS-ISIS-0394-2012"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2010-11-03",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0639-ma1a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0639_ma1b_pdf.pdf",
"maintenance_title": "Samsung S3CT9KC/ S3CT9K9 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional secure RSA/ECC V1.0 Library including specific IC Dedicated Software"
}
]
},
"manufacturer": "Samsung Electronics Co., Ltd.",
"manufacturer_web": "https://www.samsung.com",
"name": "Samsung S3CT9KW 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional secure RSA/ECC V1.0 Library including specific IC Dedicated Software",
"not_valid_after": "2019-09-01",
"not_valid_before": "2010-08-17",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0639a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0639-2010",
"cert_item": "Samsung S3CT9KW 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional secure RSA/ECC V1.0 Library including specific IC Dedicated Software",
"cert_lab": "BSI",
"developer": "Samsung Electronics",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 11
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0547-2009": 1,
"BSI-DSZ-CC-0639": 2,
"BSI-DSZ-CC-0639-2010": 20
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 3,
"BSI-PP-0002-2001": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 2,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 2,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 6,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 2,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 5,
"EAL 5": 4,
"EAL 5 augmented": 3,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 8,
"EAL5": 6,
"EAL5+": 1,
"EAL6": 4,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"ETR for Composite Evaluation (ETR-COMP), BSI-DSZ-CC-0639, S3CT9KW, Version 1, 2010-07-05, T\u00dcViT (confidential document) 8 specifically \u2022 AIS 20, Version 1, 2. December 1999, Funktionalit\u00e4tsklassen und": 1,
"Electronics (confidential document) [9] Security Target Lite of S3CT9KW 16-bit RISC Microcontroller for Smart Cards \u2013 Project Crow": 1,
"T\u00dcViT (confidential document) [8] Life Cycle Definition (Class ALC_CMC.4/CMS.5) \u2013 Project Crow, version 1.2, 2009- 12-18": 1,
"optional Secure RSA and ECCLibrary \u2013 Project Crow, Version 1.6, 2010-03-10, Samsung Electronics (confidential document) [7] Evaluation Technical Report Summary (ETR SUMMARY), BSI-DSZ-CC-0639, S3CT9KW, Version 1": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {
"ICFab": {
"IC Fabricator": 1
},
"ICVersion": {
"IC Version": 1
}
},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 2,
"T\u00dcViT": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
},
"TRNG": {
"TRNG": 8
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"physical probing": 1,
"side-channel": 1
},
"other": {
"JIL": 4
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 2,
"AIS 38": 1,
"AIS20": 1,
"AIS31": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
}
},
"DES": {
"3DES": {
"Triple-DES": 4
},
"DES": {
"DES": 6
}
},
"constructions": {
"MAC": {
"HMAC": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies AG": 1
},
"Philips": {
"Philips": 1
},
"Samsung": {
"Samsung": 32
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20100902103123+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Samsung Electronics, Samsung S3CT9KW 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional secure RSA/ECC V1.0 Library including specific IC Dedicated Software\"",
"/ModDate": "D:20100902111607+02\u002700\u0027",
"/Producer": "OpenOffice.org 3.1",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0639-2010",
"pdf_file_size_bytes": 856628,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "0639b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 26
},
"ECDH": {
"ECDH": 8
},
"ECDSA": {
"ECDSA": 14
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 2
}
},
"RSA": {
"RSA-CRT": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.RND": 5
},
"T": {
"T.RND": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 5
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 7,
"ADV_ARV": 1,
"ADV_FSP": 2,
"ADV_FSP.2": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 3,
"ADV_IMP": 1,
"ADV_IMP.1": 2,
"ADV_INT.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_VAN": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 2,
"AGD_PRE": 1,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 1,
"ALC_CMS": 2,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 7,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 13
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 5": 2,
"EAL 5 augmented": 2,
"EAL5": 6,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 1,
"FAU_SAS": 8,
"FAU_SAS.1": 12,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 4,
"FCS_CKM.1": 21,
"FCS_CKM.2": 2,
"FCS_CKM.4": 11,
"FCS_COP": 19,
"FCS_COP.1": 23,
"FCS_RNG": 11,
"FCS_RNG.1": 19,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 13,
"FDP_ACC.1.1": 1,
"FDP_ACF": 2,
"FDP_ACF.1": 9,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 18,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 3,
"FDP_ITC.1": 10,
"FDP_ITC.2": 10,
"FDP_ITT": 1,
"FDP_ITT.1": 17,
"FDP_ITT.1.1": 1,
"FDP_SDI.1": 1
},
"FMT": {
"FMT_LIM": 8,
"FMT_LIM.1": 24,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 28,
"FMT_LIM.2.1": 2,
"FMT_MSA": 2,
"FMT_MSA.1": 9,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 3,
"FMT_MSA.3": 10,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 6
},
"FPT": {
"FPT_FLS": 1,
"FPT_FLS.1": 21,
"FPT_FLS.1.1": 1,
"FPT_ITT": 1,
"FPT_ITT.1": 15,
"FPT_ITT.1.1": 1,
"FPT_PHP": 3,
"FPT_PHP.3": 20,
"FPT_PHP.3.1": 1
},
"FRU": {
"FRU_FLT": 1,
"FRU_FLT.1": 1,
"FRU_FLT.2": 17
}
},
"certification_process": {},
"cipher_mode": {
"ECB": {
"ECB": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP192r1": 4,
"brainpoolP192t1": 4,
"brainpoolP224r1": 4,
"brainpoolP224t1": 4,
"brainpoolP256r1": 4,
"brainpoolP256t1": 4,
"brainpoolP320r1": 4,
"brainpoolP320t1": 4,
"brainpoolP384r1": 4,
"brainpoolP384t1": 4,
"brainpoolP512r1": 4,
"brainpoolP512t1": 4
},
"NIST": {
"P-192": 8,
"P-224": 8,
"P-256": 8,
"P-384": 8,
"secp192k1": 4,
"secp192r1": 4,
"secp224k1": 4,
"secp224r1": 4,
"secp256k1": 4,
"secp256r1": 4,
"secp384r1": 4
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1,
"SHA1": 3
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 2,
"SHA-384": 2,
"SHA-512": 2,
"SHA224": 6,
"SHA256": 6,
"SHA384": 6,
"SHA512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 10
},
"TRNG": {
"DTRNG": 2,
"TRNG": 15
}
},
"side_channel_analysis": {
"FI": {
"DFA": 4,
"Malfunction": 24,
"fault injection": 2,
"malfunction": 11,
"physical tampering": 2
},
"SCA": {
"DPA": 12,
"Leak-Inherent": 21,
"Physical Probing": 4,
"Physical probing": 2,
"SPA": 10,
"physical probing": 9,
"side channel": 2,
"side-channel": 3,
"timing attack": 5,
"timing attacks": 1
},
"other": {
"reverse engineering": 5
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 31": 2,
"AIS20": 3,
"AIS31": 2
},
"CC": {
"CCMB-2009-07-001": 3,
"CCMB-2009-07-002": 3,
"CCMB-2009-07-003": 3,
"CCMB-2009-07-004": 3
},
"FIPS": {
"FIPS 197": 1,
"FIPS PUB 180-3": 6
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 13
}
},
"DES": {
"3DES": {
"3DES": 6,
"TDEA": 1,
"Triple-DES": 1
},
"DES": {
"DES": 8
}
},
"constructions": {
"MAC": {
"HMAC": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "SungGeun Park",
"/CreationDate": "D:20100401133317+09\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2",
"/Keywords": "Security Target of S3CT9KW 16-bit Secure RISC Microcontroller For Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software, CC EAL5+, Samsung Electroncis, SmartCard IC, Common Criteria version 3.1 ",
"/ModDate": "D:20100811185342+09\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Subject": "S3CT9KW Common Criteria(version 3.1) EAL5+ Evaluation ",
"/Title": "Security Target Lite of S3CT9KW 16-bit RISC Microcontroller For Smart Cards ",
"pdf_file_size_bytes": 916346,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 67
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0639a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"AVA_VAN.5",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0639b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "08f3be929694fcf34e956ba479dd37445a02558ee554603d4907de1fcf5c7844",
"txt_hash": "757ad38f9c0da35857858d28ce8d734847364638b47cfc06124b813310590471"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "fcb25a9cb4b35beb47cc9b59da73a15923326e6abb7647286ac36ef1e9881a4a",
"txt_hash": "f7c7a5da6de2eb58f44ab5cc3ee7f4b7e562953a168cf23d2fb8df0b915b608a"
}
},
"status": "archived"
}