SAM 5000 build 4.9, BOS-V1 and RMS firmware with ID 80001141, SLE97 Asymmetric Crypto Library for Crypto@2304T RSA/ECC/Toolbox v1.03.006, and Infineon Technologies Smart Card IC Security Controller M9900, design step A22 and G11, of the SLE97 family (smart card), or the SLI97 family (VQFN chip)
CSV information ?
Status | archived |
---|---|
Valid from | 16.06.2017 |
Valid until | 16.06.2022 |
Scheme | đžđȘ SE |
Manufacturer | Kapsch TrafficCom S.r.l. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL5 |
Heuristics summary ?
Certificate ?
Extracted keywords
Vendor
Infineon TechnologiesSecurity level
EAL 2, EAL 5Security Assurance Requirements (SAR)
ALC_FLREvaluation facilities
Combitech ABFile metadata
Creation date | D:20170622123120+02'00' |
---|---|
Modification date | D:20170622125255+02'00' |
Pages | 1 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DESAsymmetric Algorithms
ECC, DHHash functions
SHA-1, SHA-256Schemes
MACRandomness
RNG, RNDVendor
Infineon Technologies, InfineonSecurity level
EAL 5, EAL 2, EAL 4Claims
T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.5, ADV_ARC, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, AVA_VAN, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Protection profiles
BSI-PP-0035Certificates
BSI-DSZ-CC-0827-V4-2016, CSEC2014007Evaluation facilities
Combitech ABSide-channel analysis
Leak-Inherent, Physical Probing, Malfunction, JILStandards
ISO/IEC 17025, CCMB-2017-04-001, CCMB-2017-04-004File metadata
Title | Certification Report - Kapsch SAM 5000 |
---|---|
Subject | nnnn |
Author | Mats Engquist |
Creation date | D:20170616141231+02'00' |
Modification date | D:20170616141234+02'00' |
Pages | 16 |
Creator | Acrobat PDFMaker 11 för Word |
Producer | Adobe PDF Library 11.0 |
References
Outgoing- BSI-DSZ-CC-0827-V4-2016 - archived - Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 - RSA4096 v1.03.006 / v2.05.005 - EC v1.03.006 / v2.05.005 - Toolbox v1.03.006 / v2.05.005 - Base v1.03.006 / v2.05.005 - FTL v1.01.0008 - SCL v2.01.011 - PSL v4.00.009 and with specific IC dedicated software
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, Triple-DES, TDES, CMACAsymmetric Algorithms
RSA 2048, RSA 1024, RSA 4096, RSA2048, RSA4096, ECDH, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-256, SHA256Schemes
MACRandomness
TRNG, DRBG, RNG, RNDElliptic Curves
P-256, P-521, NIST P-256, NIST P-521Block cipher modes
ECB, CBCVendor
Infineon Technologies, Infineon, Infineon Technologies AGSecurity level
EAL5Claims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.4, ADV_TDS.3, ADV_ARC, ADV_INT, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.2, ALC_CMS.4, ALC_TAT.1, ALC_CMC, ALC_DEL, ALC_LCD, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.2, AVA_VAN.5, AVA_VAN.4, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_CKM, FCS_CKM.3, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_COP.1, FCS_CKM.2, FCS_RNG.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_ETC.2, FDP_ITC.2, FDP_ITC.2.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ITC.1, FDP_ITT.1, FDP_SDI.1, FDP_SDI.2, FIA_AFL, FIA_SOS.1, FIA_UAU.1, FIA_UAU.5, FIA_UAU.6, FIA_AFL.1, FIA_UAU.1.2, FIA_UAU.5.2, FMT_MSA.3, FMT_SMF.1, FMT_MSA.3.2, FMT_SMR.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FPT_RPL.1, FPT_TEE.1, FPT_RPL.1.2, FPT_TEE.1.2, FPT_TDC.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_TST.2, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-035, BSI-PP-0035, BSI-PP- 0035Certificates
BSI-DSZ-CC-0827-V4-2016Evaluation facilities
Combitech ABSide-channel analysis
Leak-Inherent, Physical Probing, physical probing, Malfunction, malfunctionStandards
FIPS 140-2, FIPS PUB 180-4, FIPS PUB 186-2, PKCS #1, RFC 5639, ISO/IEC 15446, ISO/IEC 10116:2006, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003File metadata
Title | 902390A |
---|---|
Author | stgran |
Creation date | D:20171025135904+02'00' |
Modification date | D:20171025135904+02'00' |
Pages | 72 |
Creator | PDFCreator 2.5.1.5 |
Producer | PDFCreator 2.5.1.5 |
References
Outgoing- BSI-DSZ-CC-0827-V4-2016 - archived - Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 - RSA4096 v1.03.006 / v2.05.005 - EC v1.03.006 / v2.05.005 - Toolbox v1.03.006 / v2.05.005 - Base v1.03.006 / v2.05.005 - FTL v1.01.0008 - SCL v2.01.011 - PSL v4.00.009 and with specific IC dedicated software
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
References ?
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6b96da253629157bc163a3a1e3aa4521d3fdf3ba3f8d9617e67b12343649f130', 'txt_hash': 'da1beb02c5db6bba73879e8748e83958a9fd12ecb84da8431a4183a19f26eb8b'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5ae68af0345d00f00f65a051331c0b81ed023847d0d2985c2e5c38031ab82318', 'txt_hash': 'f2792b7343c325e4c4ff368e6386e4790b51da945b9f4938b171aa50a693da97'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd867fa980ad9c784936a7f781c66a705003295e6bfa69267d4f1f1d31dcda71e', 'txt_hash': 'aa66c3731a9c7696e8c81061bb83a4b85561dfec9a70babb797d4e29b9e86326'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 123294, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/Ansvarigt OmrĂ„de/enhet': 'CSEC', '/Approved By': '', '/Author': 'Mats Engquist', '/C-datum': '2008', '/CSEC ID': '', '/CSECID': 'CB-015', '/Company': 'ORGNAME', '/ContentTypeId': '0x010100AC3668A6D66F264E876397486E9370DA', '/Copy': '0', '/CreationDate': "D:20170616141231+02'00'", '/Creator': 'Acrobat PDFMaker 11 för Word', '/Current Version': '', '/DDocBinder': 'Scheme (CB)', '/DDocCabinet': 'QMS', '/DDocID': '2005-03-05-64D6-T9YR', '/DDocLastModDate': '2006-03-16 10:56:39', '/DDocLibrary': 'https://haddock.fmv.se/domdoc/CSECLib.nsf', '/DDocRevision': '3,7', '/DDocTitle': '035 CB General Document - Template', '/DLCPolicyLabelClientValue': 'Version: {_UIVersionString}', '/DLCPolicyLabelLock': '', '/DLCPolicyLabelValue': 'Version: 7.2', '/Datum, skapat': '-', '/DeluppdragsbenĂ€mning': ' ', '/Diarienummer': '', '/Dnr': '', '/Document responsible': 'Certification Manager', '/Dokument Status': 'Aktiv', '/Dokumentansvarig': 'Jerry Johansson', '/Dokumentansvarigs enhet': 'KC Ledsyst', '/Dokumentbeteckning': '', '/Dokumentdatum': '2017-06-16', '/Dokumenttitel': 'Certification Report - Kapsch SAM 5000', '/Dokumenttyp': 'CB', '/FMV_beteckning': 'nnnn', '/Fast_Roll': '', '/Fast_av': '', '/Fast_den': '2013-01-22T12:06:49Z', '/FaststĂ€llarens roll': 'Lead certifier', '/FaststĂ€lld den': '2014-11-04T12:06:49Z', '/FaststĂ€llt av': 'Jerry Johansson', '/FaststĂ€llt av1': 'Mats Engquist', '/Format': '', '/Giltigt frĂ„n': '-', '/Infoklass': 'HEMLIG/', '/Information Management': '', '/Informationsklass': '', '/Keywords': '', '/Klassificeringsnr': '25 550', '/MallVersion': '7.0', '/ModDate': "D:20170616141234+02'00'", '/Paragraf': '', '/Platina': '1', '/Producer': 'Adobe PDF Library 11.0', '/Referens ID': 'CB-015', '/Sekr. gĂ€ller tom.': '-', '/SourceModified': 'D:20170616121221', '/StĂ€mpel': '0', '/Subject': 'nnnn', '/Title': 'Certification Report - Kapsch SAM 5000', '/Uncontrolled': '1.000000', '/UppdragsbenĂ€mning': ' ', '/UtgĂ„va': '1.0', '/_dlc_DocId': 'CSEC-11-44', '/_dlc_DocIdItemGuid': '471541fc-7dc2-4d73-bb20-08572f207f32', '/_dlc_DocIdUrl': 'http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-11-44, CSEC-11-44', '/display_urn:schemas-microsoft-com:office:office#Author': 'Larsson, Erik ekla', '/display_urn:schemas-microsoft-com:office:office#Editor': 'Systemkonto', '/Ărendetyp': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://sharepoint.fmv.se/projekt/CSEC/Scheme%20notes%20%20policies/Scheme%20note%2016%20-%20Additional%20planning%20requirements.doc', 'http://www.fmv.se/Global/Dokument/Verksamhet/CSEC/Scheme%20note%2018%20-%20Highlighted%20Requirements%20on%20the%20Security%20Target.pdf', 'http://www.fmv.se/Global/Dokument/Verksamhet/CSEC/Scheme_Note_15.pdf', 'http://sharepoint.fmv.se/projekt/CSEC/Scheme%20notes%20%20policies/Scheme%20note%2011%20-%20Methodology%20for%20AVA_VAN%204%20and%205.doc']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 449945, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 72, '/Producer': 'PDFCreator 2.5.1.5', '/CreationDate': "D:20171025135904+02'00'", '/ModDate': "D:20171025135904+02'00'", '/Title': '902390A', '/Author': 'stgran', '/Subject': '', '/Keywords': '', '/Creator': 'PDFCreator 2.5.1.5', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 287293, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20170622123120+02'00'", '/ModDate': "D:20170622125255+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0827-V4-2016': 1}, 'SE': {'CSEC2014007': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 2}}, 'cc_security_level': {'EAL': {'EAL 5': 2, 'EAL 2': 1, 'EAL 4': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 1, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.5': 1, 'ADV_ARC': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.RND': 1}}, 'vendor': {'Infineon': {'Infineon Technologies': 3, 'Infineon': 1}}, 'eval_facility': {'Combitech': {'Combitech AB': 5}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 6}, '3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 4}}, 'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1, 'RND': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'Physical Probing': 1}, 'FI': {'Malfunction': 2}, 'other': {'JIL': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0827-V4-2016': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-035': 11, 'BSI-PP-0035': 3, 'BSI-PP- 0035': 1}}, 'cc_security_level': {'EAL': {'EAL5': 6}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.5': 2, 'ADV_IMP.1': 3, 'ADV_INT.2': 2, 'ADV_TDS.4': 2, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1, 'ADV_ARC': 1, 'ADV_INT': 1}, 'AGD': {'AGD_OPE.1': 3, 'AGD_PRE.1': 3}, 'ALC': {'ALC_DVS.2': 2, 'ALC_CMC.4': 3, 'ALC_CMS.5': 2, 'ALC_DEL.1': 3, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_TAT.2': 2, 'ALC_CMS.4': 1, 'ALC_TAT.1': 1, 'ALC_CMC': 1, 'ALC_DEL': 1, 'ALC_LCD': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_DPT.3': 2, 'ATE_FUN.1': 3, 'ATE_IND.2': 3, 'ATE_DPT.2': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN.4': 3}, 'ASE': {'ASE_CCL.1': 3, 'ASE_ECD.1': 3, 'ASE_INT.1': 3, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 3, 'ASE_SPD.1': 3, 'ASE_TSS.1': 3}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_CKM': 42, 'FCS_CKM.3': 7, 'FCS_CKM.4': 42, 'FCS_COP': 117, 'FCS_CKM.1': 19, 'FCS_COP.1': 17, 'FCS_CKM.2': 5, 'FCS_RNG.1': 1}, 'FDP': {'FDP_ACC.1': 13, 'FDP_ACF.1': 9, 'FDP_IFC.1': 15, 'FDP_IFF.1': 8, 'FDP_ETC.2': 12, 'FDP_ITC.2': 31, 'FDP_ITC.2.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_ITC.2.2': 1, 'FDP_ITC.2.3': 1, 'FDP_ITC.2.4': 1, 'FDP_ITC.2.5': 1, 'FDP_ITC.1': 15, 'FDP_ITT.1': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_AFL': 16, 'FIA_SOS.1': 8, 'FIA_UAU.1': 9, 'FIA_UAU.5': 8, 'FIA_UAU.6': 7, 'FIA_AFL.1': 4, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.2': 1}, 'FMT': {'FMT_MSA.3': 14, 'FMT_SMF.1': 8, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_MSA.1': 1}, 'FPT': {'FPT_RPL.1': 8, 'FPT_TEE.1': 8, 'FPT_RPL.1.2': 1, 'FPT_TEE.1.2': 1, 'FPT_TDC.1': 2, 'FPT_FLS.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1}}, 'cc_claims': {'O': {'O.RND': 2}, 'T': {'T.RND': 1}}, 'vendor': {'Infineon': {'Infineon Technologies': 2, 'Infineon': 9, 'Infineon Technologies AG': 3}}, 'eval_facility': {'Combitech': {'Combitech AB': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 51}}, 'DES': {'DES': {'DES': 44}, '3DES': {'3DES': 2, 'Triple-DES': 1, 'TDES': 1}}, 'constructions': {'MAC': {'CMAC': 6}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 6, 'RSA 1024': 1, 'RSA 4096': 1, 'RSA2048': 1, 'RSA4096': 1}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECC': {'ECC': 22}}, 'FF': {'DH': {'DH': 7, 'Diffie-Hellman': 7}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-256': 7, 'SHA256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 36}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'DRBG': 1}, 'RNG': {'RNG': 4, 'RND': 3}}, 'cipher_mode': {'ECB': {'ECB': 4}, 'CBC': {'CBC': 19}}, 'ecc_curve': {'NIST': {'P-256': 6, 'P-521': 2, 'NIST P-256': 2, 'NIST P-521': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 5, 'Physical Probing': 2, 'physical probing': 1}, 'FI': {'Malfunction': 5, 'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 2, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-2': 1}, 'PKCS': {'PKCS #1': 2}, 'RFC': {'RFC 5639': 1}, 'ISO': {'ISO/IEC 15446': 2, 'ISO/IEC 10116:2006': 1}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL 5': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies': 1}}, 'eval_facility': {'Combitech': {'Combitech AB': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
Certification Report - Fortuna.pdf
. - The st_filename property was set to
902390A.pdf
. - The cert_filename property was set to
fortuna sogis cert.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
CSEC2014007
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0827-V4-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0827-V4-2016']}}
data. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0827-V4-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0827-V3-2015', 'BSI-DSZ-CC-0827-V4-2016', 'BSI-DSZ-CC-0827-2013', 'BSI-DSZ-CC-0791-2012', 'BSI-DSZ-CC-0827-V2-2014']}}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Fortuna.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/902390A.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0827-2013', 'BSI-DSZ-CC-0791-2012']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}]}
values added.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name SAM 5000 build 4.9, BOS-V1 and RMS firmware with ID 80001141, SLE97 Asymmetric Crypto Library for Crypto@2304T RSA/ECC/Toolbox v1.03.006, and Infineon Technologies Smart Card IC Security Controller M9900, design step A22 and G11, of the SLE97 family (smart card), or the SLI97 family (VQFN chip) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/fortuna%20sogis%20cert.pdf",
"dgst": "0e6aea8cc0669cb8",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CSEC2014007",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.03.006",
"4.9"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V4-2016"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V3-2015",
"BSI-DSZ-CC-0827-V4-2016",
"BSI-DSZ-CC-0827-V2-2014",
"BSI-DSZ-CC-0827-2013",
"BSI-DSZ-CC-0791-2012"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V4-2016"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V4-2016"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Kapsch TrafficCom S.r.l.",
"manufacturer_web": "https://www.kapsch.net/",
"name": "SAM 5000 build 4.9, BOS-V1 and RMS firmware with ID 80001141, SLE97 Asymmetric Crypto Library for Crypto@2304T RSA/ECC/Toolbox v1.03.006, and Infineon Technologies Smart Card IC Security Controller M9900, design step A22 and G11, of the SLE97 family (smart card), or the SLI97 family (VQFN chip)",
"not_valid_after": "2022-06-16",
"not_valid_before": "2017-06-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "fortuna sogis cert.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Combitech": {
"Combitech AB": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20170622123120+02\u002700\u0027",
"/ModDate": "D:20170622125255+02\u002700\u0027",
"pdf_file_size_bytes": 287293,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "Certification Report - Fortuna.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
}
},
"FF": {
"DH": {
"DH": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0827-V4-2016": 1
},
"SE": {
"CSEC2014007": 1
}
},
"cc_claims": {
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP.5": 1,
"ADV_IMP.1": 1,
"ADV_INT.2": 1,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 5": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Combitech": {
"Combitech AB": 5
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 1,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 2
},
"SCA": {
"Leak-Inherent": 1,
"Physical Probing": 1
},
"other": {
"JIL": 3
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-004": 1
},
"ISO": {
"ISO/IEC 17025": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"DES": {
"3DES": {
"3DES": 1
},
"DES": {
"DES": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 1,
"Infineon Technologies": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Ansvarigt Omr\u00e5de/enhet": "CSEC",
"/Approved By": "",
"/Author": "Mats Engquist",
"/C-datum": "2008",
"/CSEC ID": "",
"/CSECID": "CB-015",
"/Company": "ORGNAME",
"/ContentTypeId": "0x010100AC3668A6D66F264E876397486E9370DA",
"/Copy": "0",
"/CreationDate": "D:20170616141231+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 f\u00f6r Word",
"/Current Version": "",
"/DDocBinder": "Scheme (CB)",
"/DDocCabinet": "QMS",
"/DDocID": "2005-03-05-64D6-T9YR",
"/DDocLastModDate": "2006-03-16 10:56:39",
"/DDocLibrary": "https://haddock.fmv.se/domdoc/CSECLib.nsf",
"/DDocRevision": "3,7",
"/DDocTitle": "035 CB General Document - Template",
"/DLCPolicyLabelClientValue": "Version: {_UIVersionString}",
"/DLCPolicyLabelLock": "",
"/DLCPolicyLabelValue": "Version: 7.2",
"/Datum, skapat": "-",
"/Deluppdragsben\u00e4mning": " ",
"/Diarienummer": "",
"/Dnr": "",
"/Document responsible": "Certification Manager",
"/Dokument Status": "Aktiv",
"/Dokumentansvarig": "Jerry Johansson",
"/Dokumentansvarigs enhet": "KC Ledsyst",
"/Dokumentbeteckning": "",
"/Dokumentdatum": "2017-06-16",
"/Dokumenttitel": "Certification Report - Kapsch SAM 5000",
"/Dokumenttyp": "CB",
"/FMV_beteckning": "nnnn",
"/Fast_Roll": "",
"/Fast_av": "",
"/Fast_den": "2013-01-22T12:06:49Z",
"/Fastst\u00e4llarens roll": "Lead certifier",
"/Fastst\u00e4lld den": "2014-11-04T12:06:49Z",
"/Fastst\u00e4llt av": "Jerry Johansson",
"/Fastst\u00e4llt av1": "Mats Engquist",
"/Format": "",
"/Giltigt fr\u00e5n": "-",
"/Infoklass": "HEMLIG/",
"/Information Management": "",
"/Informationsklass": "",
"/Keywords": "",
"/Klassificeringsnr": "25 550",
"/MallVersion": "7.0",
"/ModDate": "D:20170616141234+02\u002700\u0027",
"/Paragraf": "",
"/Platina": "1",
"/Producer": "Adobe PDF Library 11.0",
"/Referens ID": "CB-015",
"/Sekr. g\u00e4ller tom.": "-",
"/SourceModified": "D:20170616121221",
"/St\u00e4mpel": "0",
"/Subject": "nnnn",
"/Title": "Certification Report - Kapsch SAM 5000",
"/Uncontrolled": "1.000000",
"/Uppdragsben\u00e4mning": " ",
"/Utg\u00e5va": "1.0",
"/_dlc_DocId": "CSEC-11-44",
"/_dlc_DocIdItemGuid": "471541fc-7dc2-4d73-bb20-08572f207f32",
"/_dlc_DocIdUrl": "http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-11-44, CSEC-11-44",
"/display_urn:schemas-microsoft-com:office:office#Author": "Larsson, Erik ekla",
"/display_urn:schemas-microsoft-com:office:office#Editor": "Systemkonto",
"/\u00c4rendetyp": "",
"pdf_file_size_bytes": 123294,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://sharepoint.fmv.se/projekt/CSEC/Scheme%20notes%20%20policies/Scheme%20note%2011%20-%20Methodology%20for%20AVA_VAN%204%20and%205.doc",
"http://www.fmv.se/Global/Dokument/Verksamhet/CSEC/Scheme%20note%2018%20-%20Highlighted%20Requirements%20on%20the%20Security%20Target.pdf",
"http://www.fmv.se/Global/Dokument/Verksamhet/CSEC/Scheme_Note_15.pdf",
"http://sharepoint.fmv.se/projekt/CSEC/Scheme%20notes%20%20policies/Scheme%20note%2016%20-%20Additional%20planning%20requirements.doc"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "902390A.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 22
},
"ECDH": {
"ECDH": 1
}
},
"FF": {
"DH": {
"DH": 7,
"Diffie-Hellman": 7
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA 1024": 1,
"RSA 2048": 6,
"RSA 4096": 1,
"RSA2048": 1,
"RSA4096": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0827-V4-2016": 1
}
},
"cc_claims": {
"O": {
"O.RND": 2
},
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP- 0035": 1,
"BSI-PP-0035": 3,
"BSI-PP-035": 11
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 3,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_IMP.1": 3,
"ADV_INT": 1,
"ADV_INT.2": 2,
"ADV_TDS.3": 1,
"ADV_TDS.4": 2
},
"AGD": {
"AGD_OPE.1": 3,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 3,
"ALC_CMS.4": 1,
"ALC_CMS.5": 2,
"ALC_DEL": 1,
"ALC_DEL.1": 3,
"ALC_DVS.1": 2,
"ALC_DVS.2": 2,
"ALC_LCD": 1,
"ALC_LCD.1": 3,
"ALC_TAT.1": 1,
"ALC_TAT.2": 2
},
"ASE": {
"ASE_CCL.1": 3,
"ASE_ECD.1": 3,
"ASE_INT.1": 3,
"ASE_OBJ.2": 3,
"ASE_REQ.2": 3,
"ASE_SPD.1": 3,
"ASE_TSS.1": 3
},
"ATE": {
"ATE_COV.2": 3,
"ATE_DPT.2": 1,
"ATE_DPT.3": 2,
"ATE_FUN.1": 3,
"ATE_IND.2": 3
},
"AVA": {
"AVA_VAN.4": 3,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL5": 6
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 1
},
"FCS": {
"FCS_CKM": 42,
"FCS_CKM.1": 19,
"FCS_CKM.2": 5,
"FCS_CKM.3": 7,
"FCS_CKM.4": 42,
"FCS_COP": 117,
"FCS_COP.1": 17,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC.1": 13,
"FDP_ACF.1": 9,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_ETC.2": 12,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC.1": 15,
"FDP_IFF.1": 8,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC.1": 15,
"FDP_ITC.2": 31,
"FDP_ITC.2.1": 1,
"FDP_ITC.2.2": 1,
"FDP_ITC.2.3": 1,
"FDP_ITC.2.4": 1,
"FDP_ITC.2.5": 1,
"FDP_ITT.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 1
},
"FIA": {
"FIA_AFL": 16,
"FIA_AFL.1": 4,
"FIA_SOS.1": 8,
"FIA_UAU.1": 9,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 8,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 7
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MSA.1": 1,
"FMT_MSA.3": 14,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 8,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1,
"FPT_RPL.1": 8,
"FPT_RPL.1.2": 1,
"FPT_TDC.1": 2,
"FPT_TEE.1": 8,
"FPT_TEE.1.2": 1,
"FPT_TST.2": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC.1": 1,
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 19
},
"ECB": {
"ECB": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 36
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"NIST P-256": 2,
"NIST P-521": 2,
"P-256": 6,
"P-521": 2
}
},
"eval_facility": {
"Combitech": {
"Combitech AB": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 8
},
"SHA2": {
"SHA-256": 7,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
},
"RNG": {
"RND": 3,
"RNG": 4
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 5,
"malfunction": 2
},
"SCA": {
"Leak-Inherent": 5,
"Physical Probing": 2,
"physical probing": 1
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1
},
"FIPS": {
"FIPS 140-2": 2,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-2": 1
},
"ISO": {
"ISO/IEC 10116:2006": 1,
"ISO/IEC 15446": 2
},
"PKCS": {
"PKCS #1": 2
},
"RFC": {
"RFC 5639": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 51
}
},
"DES": {
"3DES": {
"3DES": 2,
"TDES": 1,
"Triple-DES": 1
},
"DES": {
"DES": 44
}
},
"constructions": {
"MAC": {
"CMAC": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 9,
"Infineon Technologies": 2,
"Infineon Technologies AG": 3
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "stgran",
"/CreationDate": "D:20171025135904+02\u002700\u0027",
"/Creator": "PDFCreator 2.5.1.5",
"/Keywords": "",
"/ModDate": "D:20171025135904+02\u002700\u0027",
"/Producer": "PDFCreator 2.5.1.5",
"/Subject": "",
"/Title": "902390A",
"pdf_file_size_bytes": 449945,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 72
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Fortuna.pdf",
"scheme": "SE",
"security_level": {
"_type": "Set",
"elements": [
"EAL5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/902390A.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d867fa980ad9c784936a7f781c66a705003295e6bfa69267d4f1f1d31dcda71e",
"txt_hash": "aa66c3731a9c7696e8c81061bb83a4b85561dfec9a70babb797d4e29b9e86326"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6b96da253629157bc163a3a1e3aa4521d3fdf3ba3f8d9617e67b12343649f130",
"txt_hash": "da1beb02c5db6bba73879e8748e83958a9fd12ecb84da8431a4183a19f26eb8b"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5ae68af0345d00f00f65a051331c0b81ed023847d0d2985c2e5c38031ab82318",
"txt_hash": "f2792b7343c325e4c4ff368e6386e4790b51da945b9f4938b171aa50a693da97"
}
},
"status": "archived"
}