This page was not yet optimized for use on mobile
devices.
SAM 5000 build 4.12, BOS-V1 and RMS firmware with ID 80001141 CL97 Asymmetric Crypto Library for Crypto@2304T RSA/ECC/Toolbox v2.07.003, and Infineon Technologies Smart Card IC Security Controller M9900, design step A22 and G11, of the SLE97 family (smart card), or the SLI97 family (VQFN chip)
CSV information
| Status | archived |
|---|---|
| Valid from | 28.08.2018 |
| Valid until | 28.08.2023 |
| Scheme | πΈπͺ SE |
| Manufacturer | Kapsch TrafficCom S.r.l. |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL5 |
Heuristics summary
Certificate ID: CSEC2017020
Certificate
Extracted keywords
Vendor
Infineon TechnologiesSecurity level
EAL 2, EAL 5Security Assurance Requirements (SAR)
ALC_FLREvaluation facilities
Combitech ABFile metadata
| Creation date | D:20180828085843+02'00' |
|---|---|
| Modification date | D:20180828093024+02'00' |
| Pages | 1 |
Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, 3DESAsymmetric Algorithms
ECC, DHHash functions
SHA-1, SHA-256Schemes
MACRandomness
RNG, RNDVendor
Infineon Technologies, InfineonSecurity level
EAL 5, EAL 2, EAL 4Claims
T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.5, ADV_COMP.1, ADV_ARC, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.2, ALC_COMP.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_COMP.1, AVA_VAN.4, AVA_COMP.1, AVA_VAN, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_COMP.1Protection profiles
BSI-PP-0035Certificates
BSI-DSZ-CC-0827-V7-2017, CSEC2017020Evaluation facilities
Combitech ABSide-channel analysis
Leak-Inherent, Physical Probing, Malfunction, JILStandards
ISO/IEC 17025, CCMB-2017-04-001, CCMB-2017-04-004File metadata
| Title | Microsoft Word - Certification Report - SAM5000 |
|---|---|
| Author | hesve |
| Creation date | D:20180828085420+02'00' |
| Modification date | D:20180828104437+02'00' |
| Pages | 17 |
| Producer | Microsoft: Print To PDF |
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, Triple-DES, TDES, CMACAsymmetric Algorithms
RSA 2048, RSA 1024, RSA 4096, ECDH, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-256, SHA256Schemes
MACRandomness
TRNG, DRBG, RNG, RNDElliptic Curves
P-256, P-521, NIST P-256, NIST P-521Block cipher modes
ECB, CBCVendor
Infineon Technologies, Infineon, Infineon Technologies AGSecurity level
EAL5Claims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.4, ADV_TDS.3, ADV_ARC, ADV_INT, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.2, ALC_CMS.4, ALC_TAT.1, ALC_CMC, ALC_DEL, ALC_LCD, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.2, AVA_VAN.5, AVA_VAN.4, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_CKM, FCS_CKM.3, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_COP.1, FCS_CKM.2, FCS_RNG.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_ETC.2, FDP_ITC.2, FDP_ITC.2.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ITC.1, FDP_ITT.1, FDP_SDI.1, FDP_SDI.2, FIA_AFL, FIA_SOS.1, FIA_UAU.1, FIA_UAU.5, FIA_UAU.6, FIA_AFL.1, FIA_UAU.1.2, FIA_UAU.5.2, FMT_MSA.3, FMT_SMF.1, FMT_MSA.3.2, FMT_SMR.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FPT_RPL.1, FPT_TEE.1, FPT_RPL.1.2, FPT_TEE.1.2, FPT_TDC.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_TST.2, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-035, BSI-PP-0035, BSI-PP- 0035Certificates
BSI-DSZ-CC-0827-V6-2017Evaluation facilities
Combitech ABSide-channel analysis
Leak-Inherent, Physical Probing, physical probing, Malfunction, malfunctionStandards
FIPS 140-2, FIPS PUB 180-4, FIPS PUB 186-2, PKCS #1, RFC 5639, ISO/IEC 15446, ISO/IEC 10116:2006, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003File metadata
| Title | Microsoft Word - 902390D.docx |
|---|---|
| Author | stgran |
| Creation date | D:20180321144633+01'00' |
| Modification date | D:20180828105702+02'00' |
| Pages | 73 |
| Producer | Microsoft: Print To PDF |
References
Outgoing- BSI-DSZ-CC-0827-V6-2017 - archived - Infineon Technologies Smart Card IC (Security Controller) M9900 A22/G11/C22/D22, M9905 A11, M9906 A11 with optional RSA v1.03.006/v2.05.005/v2.07.003, EC v1.03.006/v2.05.005/v2.07.003, Toolbox v1.03.006/v2.05.005/v2.07.003, Flash Translation Layer V1.01.0008, SCL v2.01.011/v2.02.010 and PSL v4.00.09 libraries with specific IC dedicated software
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
CSEC2017020Extracted SARs
ADV_ARC.1, ADV_COMP.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_COMP.1, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_COMP.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COMP.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_COMP.1, AVA_VAN.5Similar certificates
Showing 5 out of 96.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certifikat%20SAM%205000%20-%20CCRA.pdf",
"dgst": "471a372b97a0b9f4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CSEC2017020",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.07.003",
"4.12"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V6-2017"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V6-2017"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Kapsch TrafficCom S.r.l.",
"manufacturer_web": "https://www.kapsch.net/",
"name": "SAM 5000 build 4.12, BOS-V1 and RMS firmware with ID 80001141 CL97 Asymmetric Crypto Library for Crypto@2304T RSA/ECC/Toolbox v2.07.003, and Infineon Technologies Smart Card IC Security Controller M9900, design step A22 and G11, of the SLE97 family (smart card), or the SLI97 family (VQFN chip)",
"not_valid_after": "2023-08-28",
"not_valid_before": "2018-08-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "Certifikat SAM 5000 - CCRA.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Combitech": {
"Combitech AB": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20180828085843+02\u002700\u0027",
"/ModDate": "D:20180828093024+02\u002700\u0027",
"pdf_file_size_bytes": 278986,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "Certification Report - SAM5000.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
}
},
"FF": {
"DH": {
"DH": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0827-V7-2017": 1
},
"SE": {
"CSEC2017020": 1
}
},
"cc_claims": {
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_COMP.1": 1,
"ADV_FSP.5": 1,
"ADV_IMP.1": 1,
"ADV_INT.2": 1,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_COMP.1": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_COMP.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COMP.1": 1,
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_COMP.1": 1,
"AVA_VAN": 1,
"AVA_VAN.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 5": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Combitech": {
"Combitech AB": 5
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 1,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 2
},
"SCA": {
"Leak-Inherent": 1,
"Physical Probing": 1
},
"other": {
"JIL": 2
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-004": 1
},
"ISO": {
"ISO/IEC 17025": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"DES": {
"3DES": {
"3DES": 1
},
"DES": {
"DES": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 1,
"Infineon Technologies": 4
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "hesve",
"/CreationDate": "D:20180828085420+02\u002700\u0027",
"/ModDate": "D:20180828104437+02\u002700\u0027",
"/Producer": "Microsoft: Print To PDF",
"/Title": "Microsoft Word - Certification Report - SAM5000",
"pdf_file_size_bytes": 859066,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "SecurityTargetLite-KapschSAM5000-B.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 22
},
"ECDH": {
"ECDH": 1
}
},
"FF": {
"DH": {
"DH": 7,
"Diffie-Hellman": 7
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA 1024": 1,
"RSA 2048": 6,
"RSA 4096": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0827-V6-2017": 1
}
},
"cc_claims": {
"O": {
"O.RND": 2
},
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP- 0035": 1,
"BSI-PP-0035": 3,
"BSI-PP-035": 11
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 3,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_IMP.1": 3,
"ADV_INT": 1,
"ADV_INT.2": 2,
"ADV_TDS.3": 1,
"ADV_TDS.4": 2
},
"AGD": {
"AGD_OPE.1": 3,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 3,
"ALC_CMS.4": 1,
"ALC_CMS.5": 2,
"ALC_DEL": 1,
"ALC_DEL.1": 3,
"ALC_DVS.1": 2,
"ALC_DVS.2": 2,
"ALC_LCD": 1,
"ALC_LCD.1": 3,
"ALC_TAT.1": 1,
"ALC_TAT.2": 2
},
"ASE": {
"ASE_CCL.1": 3,
"ASE_ECD.1": 3,
"ASE_INT.1": 3,
"ASE_OBJ.2": 3,
"ASE_REQ.2": 3,
"ASE_SPD.1": 3,
"ASE_TSS.1": 3
},
"ATE": {
"ATE_COV.2": 3,
"ATE_DPT.2": 1,
"ATE_DPT.3": 2,
"ATE_FUN.1": 3,
"ATE_IND.2": 3
},
"AVA": {
"AVA_VAN.4": 3,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL5": 6
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 1
},
"FCS": {
"FCS_CKM": 42,
"FCS_CKM.1": 19,
"FCS_CKM.2": 5,
"FCS_CKM.3": 7,
"FCS_CKM.4": 42,
"FCS_COP": 117,
"FCS_COP.1": 17,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC.1": 13,
"FDP_ACF.1": 9,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_ETC.2": 12,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC.1": 15,
"FDP_IFF.1": 8,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC.1": 15,
"FDP_ITC.2": 31,
"FDP_ITC.2.1": 1,
"FDP_ITC.2.2": 1,
"FDP_ITC.2.3": 1,
"FDP_ITC.2.4": 1,
"FDP_ITC.2.5": 1,
"FDP_ITT.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 1
},
"FIA": {
"FIA_AFL": 16,
"FIA_AFL.1": 4,
"FIA_SOS.1": 8,
"FIA_UAU.1": 9,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 8,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 7
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MSA.1": 1,
"FMT_MSA.3": 14,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 8,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1,
"FPT_RPL.1": 8,
"FPT_RPL.1.2": 1,
"FPT_TDC.1": 2,
"FPT_TEE.1": 8,
"FPT_TEE.1.2": 1,
"FPT_TST.2": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC.1": 1,
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 20
},
"ECB": {
"ECB": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 36
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"NIST P-256": 2,
"NIST P-521": 2,
"P-256": 6,
"P-521": 2
}
},
"eval_facility": {
"Combitech": {
"Combitech AB": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 8
},
"SHA2": {
"SHA-256": 7,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
},
"RNG": {
"RND": 3,
"RNG": 4
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 5,
"malfunction": 2
},
"SCA": {
"Leak-Inherent": 5,
"Physical Probing": 2,
"physical probing": 1
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1
},
"FIPS": {
"FIPS 140-2": 2,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-2": 1
},
"ISO": {
"ISO/IEC 10116:2006": 1,
"ISO/IEC 15446": 2
},
"PKCS": {
"PKCS #1": 2
},
"RFC": {
"RFC 5639": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 51
}
},
"DES": {
"3DES": {
"3DES": 2,
"TDES": 1,
"Triple-DES": 1
},
"DES": {
"DES": 44
}
},
"constructions": {
"MAC": {
"CMAC": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 8,
"Infineon Technologies": 3,
"Infineon Technologies AG": 3
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "stgran",
"/CreationDate": "D:20180321144633+01\u002700\u0027",
"/ModDate": "D:20180828105702+02\u002700\u0027",
"/Producer": "Microsoft: Print To PDF",
"/Title": "Microsoft Word - 902390D.docx",
"pdf_file_size_bytes": 1184710,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 73
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20SAM5000.pdf",
"scheme": "SE",
"security_level": {
"_type": "Set",
"elements": [
"EAL5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecurityTargetLite-KapschSAM5000-B.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4e9d9f14b64e48452c5a2ee5eb8fbd98e98d5105e9a7141696846f07ad81cd96",
"txt_hash": "534eb2bb06d7fc7125e0c49386e29ba765de1c4a6e7150ec0f654cbf2ef4a502"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "db08081085060c85cb23d2c597880562ffd4aa705874b93d435cf9476345454f",
"txt_hash": "e3542744e01ae7e3be4b57e954bc29ac642262dae7ef92f8265b1f4db2739b89"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4e776525afd1088624c1b11aea368090679ea61933043c0eb98958d43b1ba311",
"txt_hash": "9fef3691df64d0fe4620d98a76ce3ae5db27aca945d51ba4727cd3064b05c15e"
}
},
"status": "archived"
}