This page was not yet optimized for use on mobile
devices.
SCR200/SKP200
CSV information
| Status | archived |
|---|---|
| Valid from | 13.09.2016 |
| Valid until | 13.09.2021 |
| Scheme | 🇬🇧 UK |
| Manufacturer | Payment Express Ltd |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ALC_DVS.2, EAL2 |
Heuristics summary
Certificate ID: CRP293
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
TDES, HMACVendor
STMicroelectronicsSecurity level
EAL 2, EAL1, EAL7, EAL 2 augmentedSecurity Assurance Requirements (SAR)
ADV_ARC, ALC_DVS.2, AVA_POISecurity Functional Requirements (SFR)
FCS_RND, FIA_APICertificates
CRP293Side-channel analysis
side channel, DFA, fault injection, JILStandards
ISO/IEC17065:2012, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
| Title | CC Certification Report LFU T003 93010 v1.0 |
|---|---|
| Author | sjheath |
| Creation date | D:20160921115210+01'00' |
| Modification date | D:20160921115210+01'00' |
| Pages | 26 |
| Creator | PDFCreator 2.2.2.0 |
| Producer | PDFCreator 2.2.2.0 |
Security target
Extracted keywords
Symmetric Algorithms
TDES, HMACHash functions
SHA-256Schemes
MACRandomness
RNGDevice models
ATMEL AT91SOVendor
ThalesSecurity level
EAL2Claims
O.POISW, O.MSR, OSPSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_POI.1, AVA_POI.2, AVA_POI.3, AVA_POI.4, AVA_VAN.2, AVA_POISecurity Functional Requirements (SFR)
FCS_RND.1, FCS_RND.1.1, FCS_COP.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1.1, FDP_IFC, FDP_IFF.1, FDP_ITC, FDP_IFC.1, FDP_ACC.1, FDP_ITC.1, FDP_IFF, FDP_RIP, FDP_RIP.1, FDP_ITT, FDP_ITT.1, FDP_ACC, FDP_ACF.1, FDP_ACF, FDP_UIT, FDP_UIT.1, FDP_UCT, FDP_UCT.1, FDP_ITC.2, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FIA_API.1, FIA_UAU, FIA_UID.1, FIA_UID, FIA_UAU.2, FIA_API, FMT_MSA.3, FMT_MSA, FMT_MSA.1, FMT_SMR.1, FMT_SMR, FMT_SMF.1, FPT_TST, FPT_TST.1, FPT_FLS, FPT_FLS.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_PHP, FPT_PHP.3, FTA_SSL, FTA_SSL.3, FTP_TRP, FTP_TRP.1, FTP_ITC.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Protection profiles
ANSSI-CC-PP-2010/10Certificates
ANSSI-CC-PP-2010/10Evaluation facilities
Trusted Labs, SRC Security Research & ConsultingSide-channel analysis
physical tampering, malfunctionCertification process
out of scope, configuration data, etc.) 98 The payment application is out of scope for this TOE, data that comes with application code (configuration data, etc.) 98 The payment application is out of scope for this TOE. Sensitivity: Integrity and Authenticity 4.1.1 Assets and TSF parts 99 Table 6 -Standards
FIPS 198, FIPS 180-4, NIST SP 800-67, PKCS#1, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003File metadata
| Author | Primasec |
|---|---|
| Creation date | D:20160927115320+01'00' |
| Modification date | D:20160927115320+01'00' |
| Pages | 114 |
| Creator | Microsoft® Word 2013 |
| Producer | Microsoft® Word 2013 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
CRP293Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_DVS.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_POI.4, AVA_VAN.2References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "87ae7536d58ac1bb",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CRP293",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_POI",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Payment Express Ltd",
"manufacturer_web": "https://www.paymentexpress.com",
"name": "SCR200/SKP200",
"not_valid_after": "2021-09-13",
"not_valid_before": "2016-09-13",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "CC Certification Report LFU T003 93010 v1.0.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"UK": {
"CRP293": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1
},
"ALC": {
"ALC_DVS.2": 4
},
"AVA": {
"AVA_POI": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 4,
"EAL 2 augmented": 2,
"EAL1": 1,
"EAL7": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_RND": 1
},
"FIA": {
"FIA_API": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"fault injection": 1
},
"SCA": {
"side channel": 2
},
"other": {
"JIL": 7
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"ISO": {
"ISO/IEC17065:2012": 2
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 2
}
},
"constructions": {
"MAC": {
"HMAC": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"STMicroelectronics": {
"STMicroelectronics": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "sjheath",
"/CreationDate": "D:20160921115210+01\u002700\u0027",
"/Creator": "PDFCreator 2.2.2.0",
"/Keywords": "",
"/ModDate": "D:20160921115210+01\u002700\u0027",
"/Producer": "PDFCreator 2.2.2.0",
"/Subject": "",
"/Title": "CC Certification Report LFU T003 93010 v1.0",
"pdf_file_size_bytes": 1430304,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 26
},
"st_filename": "DPS SCR200-SKP200 ST 10_LITE.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP-2010/10": 1
}
},
"cc_claims": {
"O": {
"O.MSR": 8,
"O.POISW": 13
},
"OSP": {
"OSP": 1
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/10": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 2
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_POI": 6,
"AVA_POI.1": 1,
"AVA_POI.2": 1,
"AVA_POI.3": 1,
"AVA_POI.4": 1,
"AVA_VAN.2": 3
}
},
"cc_security_level": {
"EAL": {
"EAL2": 3
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.4": 1,
"FCS_COP.1": 34,
"FCS_COP.1.1": 4,
"FCS_RND.1": 6,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC": 40,
"FDP_ACC.1": 24,
"FDP_ACF": 13,
"FDP_ACF.1": 14,
"FDP_IFC": 35,
"FDP_IFC.1": 22,
"FDP_IFF": 20,
"FDP_IFF.1": 20,
"FDP_ITC": 23,
"FDP_ITC.1": 18,
"FDP_ITC.2": 8,
"FDP_ITC.2.1": 1,
"FDP_ITC.2.2": 1,
"FDP_ITC.2.3": 1,
"FDP_ITC.2.4": 1,
"FDP_ITC.2.5": 1,
"FDP_ITT": 19,
"FDP_ITT.1": 4,
"FDP_RIP": 18,
"FDP_RIP.1": 4,
"FDP_UCT": 4,
"FDP_UCT.1": 1,
"FDP_UIT": 8,
"FDP_UIT.1": 4
},
"FIA": {
"FIA_API": 4,
"FIA_API.1": 2,
"FIA_UAU": 10,
"FIA_UAU.2": 1,
"FIA_UID": 20,
"FIA_UID.1": 11
},
"FMT": {
"FMT_MSA": 23,
"FMT_MSA.1": 4,
"FMT_MSA.3": 14,
"FMT_SMF.1": 2,
"FMT_SMR": 13,
"FMT_SMR.1": 8
},
"FPT": {
"FPT_FLS": 12,
"FPT_FLS.1": 3,
"FPT_PHP": 20,
"FPT_PHP.3": 3,
"FPT_TDC.1": 8,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST": 8,
"FPT_TST.1": 6
},
"FTA": {
"FTA_SSL": 4,
"FTA_SSL.3": 1
},
"FTP": {
"FTP_ITC": 7,
"FTP_ITC.1": 14,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP": 3,
"FTP_TRP.1": 7
}
},
"certification_process": {
"OutOfScope": {
"configuration data, etc.) 98 The payment application is out of scope for this TOE": 1,
"data that comes with application code (configuration data, etc.) 98 The payment application is out of scope for this TOE. Sensitivity: Integrity and Authenticity 4.1.1 Assets and TSF parts 99 Table 6 -": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 4
}
},
"device_model": {
"ATMEL": {
"ATMEL AT91SO": 1
}
},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 1
},
"TrustedLabs": {
"Trusted Labs": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1,
"physical tampering": 4
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1
},
"FIPS": {
"FIPS 180-4": 1,
"FIPS 198": 1
},
"NIST": {
"NIST SP 800-67": 1
},
"PKCS": {
"PKCS#1": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 15
}
},
"constructions": {
"MAC": {
"HMAC": 8
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Thales": {
"Thales": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Primasec",
"/CreationDate": "D:20160927115320+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/ModDate": "D:20160927115320+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"pdf_file_size_bytes": 1860026,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 114
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC%20Certification%20Report%20LFU%20T003%2093010%20v1.0.pdf",
"scheme": "UK",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/DPS%20SCR200-SKP200%20ST%2010_LITE.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "d89e3583535bb6cca6902624ed80d011b100ff2c3d543311dcd0128b6b8b1e93",
"txt_hash": "602e1a52afd2729a9e21eeea7a0169bea0c327396b98c8bc46b4af3c730751b2"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "b1474751b50b3ea30e043f4a1fb6972d78ef4bafe12e245a23c1d6e78abd6150",
"txt_hash": "f38f26034210c82f36d85a3944ed0e5248cfd91e9f55dfe1213b73770f98bd7c"
}
},
"status": "archived"
}