KOMSCO JK21 V1.0 on S3CT9KA/KC/KW

CSV information

Status archived
Valid from 08.11.2013
Valid until 01.06.2019
Scheme 🇰🇷 KR
Manufacturer KOMSCO
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL5+, AVA_VAN.5

Heuristics summary

Certificate ID: KECS-ISIS-0468-2013

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Symmetric Algorithms
AES, DES
Asymmetric Algorithms
ECC
Randomness
TRNG

JavaCard versions
Java Card 2.2.2, GlobalPlatform 2.1.1
Vendor
Samsung

Security level
EAL5+, EAL5, EAL6, EAL5 augmented
Security Assurance Requirements (SAR)
ADV_TDS.4, ADV_FSP.5, ADV_ARC.1, ADV_IMP.1, ADV_INT.2, AGD_PRE.1, AGD_OPE.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Certificates
BSI-DSZ-CC-0719, BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70, CC-2011-002, KECS-ISIS-0468-2013
Evaluation facilities
KISA

Side-channel analysis
fault injection

Standards
AIS 34, ISO/IEC 7816, ISO/IEC 14443, SCP02, CCMB-2012-09-001, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title 평가단위보고서(ADV_ARC.1)
Author 이은경
Creation date D:20131107180619+09'00'
Modification date D:20131107180619+09'00'
Pages 25
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

References

Outgoing
  • ANSSI-CC-2012/70 - archived - Microcontrôleurs SAMSUNG S3CT9KW, S3CT9KC et S3CT9K9 Revision 2.0 embarquant la bibliothèque RSA/ECC optionnelle TORNADO 2MX2 v2.2
  • BSI-DSZ-CC-0719-2011 - archived - Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, 3DES, ARIA, SEED
Asymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-224, SHA-256, SHA-384
Schemes
MAC, Key agreement, Key Agreement
Randomness
TRNG, RND, RNG
Block cipher modes
CBC

JavaCard versions
GlobalPlatform 2.1.1
JavaCard API constants
TYPE_ACCESS
Vendor
Samsung

Security level
EAL5+, EAL5, EAL 5+, EAL4+, EAL4, EAL3, EAL5 augmented
Claims
D.APP_CODE, D.APP_DATA, D.PIN, D.TS_CODE, D.TS_DATA, D.SEC_DATA, D.CRYPTO, O.IC, O.RND, T.RND, A.TOE, A.TSF, OP.LOAD, OP.INSTALL, OP.DELETE, OP.ARRAY_ACCESS, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.THROW, OP.TYPE_ACCESS, OP.JAVA, OP.CREATE, OE.TSF
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC.1, ADV_IMP.1, ADV_FSP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMS.5, ALC_TAT.2, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_CMS.1, ALC_DVS.1, ATE_DPT.3, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, AVA_VAN.4, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FAU_ARP.1.1, FAU_GEN.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAS.1, FCS_RNG.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_COP, FCS_CKM, FDP_ACC.2, FDP_ACF.1, FDP_RIP.1, FDP_SDI.2, FDP_UCT.1, FDP_UIT.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_ITT.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.4, FIA_UAU.6, FIA_UID.1, FIA_ATD.1, FIA_UAU.1, FIA_USB.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.2, FIA_UAU.1.1, FIA_UAU.4.1, FIA_UAU.6.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MOF.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.1.1, FMT_MOF.1.1, FMT_SMR.1.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_SMF.1.1, FMT_SMR.1.2, FMT_LIM.1, FMT_LIM.2, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_PHP.3, FPT_RCV.3, FPT_TST.1, FPT_RCV.4, FPT_FLS.1.1, FPT_RCV.2, FPT_RCV.3.1, FPT_RCV.3.2, FPT_RCV.3.3, FPT_RCV.3.4, FPT_RCV.4.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0035-2007
Certificates
BSI-DSZ-CC-0719-2011, BSI-DSZ-CC-0719-, ANSSI-CC-2012/70, ANSSI-CC-2012/72

Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attack, Physical tampering, physical tampering, Malfunction, malfunction, DFA
Certification process
out of scope, the application although it is possible to load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE The TOE is the JavaCard Platform that supports the analysis

Standards
FIPS PUB 46-3, FIPS PUB 197, FIPS 197, FIPS 180-3, PKCS#1, PKCS#2, AIS31, AIS 31, SCP02, SCP 02, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-001

File metadata

Title KOMSCO Document Template
Author HoGeun Song
Creation date D:20131111082538+09'00'
Modification date D:20131111082538+09'00'
Pages 108
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

References

Outgoing
  • ANSSI-CC-2012/70 - archived - Microcontrôleurs SAMSUNG S3CT9KW, S3CT9KC et S3CT9K9 Revision 2.0 embarquant la bibliothèque RSA/ECC optionnelle TORNADO 2MX2 v2.2
  • BSI-DSZ-CC-0719-2011 - archived - Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software
  • ANSSI-CC-2012/72 - archived - Microcontrôleurs SAMSUNG S3CT9KW, S3CT9KC et S3CT9K9 Revision 2.0 embarquant la bibliothèque RSA/ECC optionnelle TORNADO 2MX2 v2.1

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

KECS-ISIS-0468-2013

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Scheme data

Product KOMSCO JK21 V1.0 on S3CT9KA/KC/KW
Cert Id KECS-ISIS-0468-2013
Product Link https://itscc.kr/certprod/view.do?product_id=468&product_class=4
Vendor KOMSCO Co., Ltd.
Level EAL5+
Category Java card platform
Certification Date 08.11.2013
Enhanced
Product KOMSCO JK21 V1.0 on S3CT9KA/KC/KW
Cc Version CC V3.1 R4
Assurance Level EAL5+
Certification Date 08.11.2013
Expiration Date 01.06.2019
Product Type Java card platform
Cert Id KECS-ISIS-0468-2013
Report Link https://itscc.kr/file/download.do?file=KPR100000001143
Target Link https://itscc.kr/file/download.do?file=KPR100000001145
Cert Link https://itscc.kr/file/download.do?file=KPR100000001144
Protection Profile Smart Card Open Platform Protection Profile V2.2
Developer KOMSCO Co., Ltd.
Holder KOMSCO Co., Ltd.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "fd0beec036b21950",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "KECS-ISIS-0468-2013",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0719-2011",
          "ANSSI-CC-2012/70"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2012/70",
          "BSI-DSZ-CC-0719-2011",
          "BSI-DSZ-CC-0639-2010",
          "BSI-DSZ-CC-0547-2009"
        ]
      }
    },
    "scheme_data": {
      "category": "Java card platform",
      "cert_id": "KECS-ISIS-0468-2013",
      "certification_date": "2013-11-08",
      "enhanced": {
        "assurance_level": "EAL5+",
        "cc_version": "CC V3.1 R4",
        "cert_id": "KECS-ISIS-0468-2013",
        "cert_link": "https://itscc.kr/file/download.do?file=KPR100000001144",
        "certification_date": "2013-11-08",
        "developer": "KOMSCO Co., Ltd.",
        "expiration_date": "2019-06-01",
        "holder": "KOMSCO Co., Ltd.",
        "product": "KOMSCO JK21 V1.0 on S3CT9KA/KC/KW",
        "product_type": "Java card platform",
        "protection_profile": "Smart Card Open Platform Protection Profile V2.2",
        "report_link": "https://itscc.kr/file/download.do?file=KPR100000001143",
        "target_link": "https://itscc.kr/file/download.do?file=KPR100000001145"
      },
      "level": "EAL5+",
      "product": "KOMSCO JK21 V1.0 on S3CT9KA/KC/KW",
      "product_link": "https://itscc.kr/certprod/view.do?product_id=468\u0026product_class=4",
      "vendor": "KOMSCO Co., Ltd."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0719-2011",
          "ANSSI-CC-2012/72",
          "ANSSI-CC-2012/70"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0719-2011",
          "ANSSI-CC-2012/72",
          "ANSSI-CC-2012/70"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "KOMSCO",
  "manufacturer_web": "https://www.komsco.com",
  "name": "KOMSCO JK21 V1.0 on S3CT9KA/KC/KW",
  "not_valid_after": "2019-06-01",
  "not_valid_before": "2013-11-08",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "KECS-CR-13-37 KOMSCO JK21 V1.0 on S3CT9KAKCKW(eng).pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0719": 3,
          "BSI-DSZ-CC-0719-2011": 1
        },
        "FR": {
          "ANSSI-CC-2012/70": 4
        },
        "KR": {
          "KECS-ISIS-0468-2013": 1
        },
        "NL": {
          "CC-2011-002": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.5": 3,
          "ADV_IMP.1": 2,
          "ADV_INT.2": 3,
          "ADV_TDS.4": 3
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_CMS.5": 2,
          "ALC_DEL.1": 2,
          "ALC_DVS.2": 6,
          "ALC_LCD.1": 2,
          "ALC_TAT.2": 2
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 3,
          "ASE_OBJ.2": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 3
        },
        "ATE": {
          "ATE_COV.2": 3,
          "ATE_DPT.3": 3,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 4
        },
        "AVA": {
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL5": 2,
          "EAL5 augmented": 2,
          "EAL5+": 3,
          "EAL6": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "KISA": {
          "KISA": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 2.1.1": 1
        },
        "JavaCard": {
          "Java Card 2.2.2": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "TRNG": {
          "TRNG": 4
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 34": 1
        },
        "CC": {
          "CCMB-2012-09-001": 2,
          "CCMB-2012-09-003": 2,
          "CCMB-2012-09-004": 1
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816": 2
        },
        "SCP": {
          "SCP02": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "DES": {
            "DES": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 8
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "\uc774\uc740\uacbd",
      "/CreationDate": "D:20131107180619+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20131107180619+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Title": "\ud3c9\uac00\ub2e8\uc704\ubcf4\uace0\uc11c(ADV_ARC.1)",
      "pdf_file_size_bytes": 571329,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 25
    },
    "st_filename": "[JK21-TR-0001] Security Target-Lite-e-v1.1.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 14
          },
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 4
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA 1024": 2
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0719-": 1,
          "BSI-DSZ-CC-0719-2011": 3
        },
        "FR": {
          "ANSSI-CC-2012/70": 3,
          "ANSSI-CC-2012/72": 3
        }
      },
      "cc_claims": {
        "A": {
          "A.TOE": 3,
          "A.TSF": 3
        },
        "D": {
          "D.APP_CODE": 1,
          "D.APP_DATA": 1,
          "D.CRYPTO": 1,
          "D.PIN": 1,
          "D.SEC_DATA": 1,
          "D.TS_CODE": 1,
          "D.TS_DATA": 1
        },
        "O": {
          "O.IC": 23,
          "O.RND": 1
        },
        "OE": {
          "OE.TSF": 6
        },
        "OP": {
          "OP.ARRAY_ACCESS": 5,
          "OP.CREATE": 3,
          "OP.DELETE": 10,
          "OP.INSTALL": 10,
          "OP.INSTANCE_FIELD": 5,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 5,
          "OP.JAVA": 3,
          "OP.LOAD": 10,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 7
        },
        "T": {
          "T.RND": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0035-2007": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 15,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 19,
          "ADV_IMP.1": 13,
          "ADV_INT.2": 11,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 5,
          "ADV_TDS.4": 19
        },
        "AGD": {
          "AGD_OPE.1": 17,
          "AGD_PRE.1": 10
        },
        "ALC": {
          "ALC_CMC.4": 17,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 10,
          "ALC_DEL.1": 7,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 20,
          "ALC_LCD.1": 9,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 13
        },
        "ASE": {
          "ASE_CCL.1": 16,
          "ASE_ECD.1": 14,
          "ASE_INT.1": 16,
          "ASE_OBJ.2": 13,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 15,
          "ASE_SPD.1": 10,
          "ASE_TSS.1": 7
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 7,
          "ATE_DPT.1": 2,
          "ATE_DPT.3": 10,
          "ATE_FUN.1": 13,
          "ATE_IND.2": 9
        },
        "AVA": {
          "AVA_VAN.4": 2,
          "AVA_VAN.5": 20
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5+": 1,
          "EAL3": 1,
          "EAL4": 3,
          "EAL4+": 1,
          "EAL5": 11,
          "EAL5 augmented": 1,
          "EAL5+": 13
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 7,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 3,
          "FAU_SAA.1": 10,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAS.1": 3
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 29,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 12,
          "FCS_CKM.4": 21,
          "FCS_CKM.4.1": 2,
          "FCS_COP": 6,
          "FCS_COP.1": 44,
          "FCS_COP.1.1": 7,
          "FCS_RNG": 2,
          "FCS_RNG.1": 14,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC.1": 17,
          "FDP_ACC.2": 15,
          "FDP_ACC.2.1": 2,
          "FDP_ACC.2.2": 2,
          "FDP_ACF.1": 22,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 9,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 12,
          "FDP_ITT.1": 1,
          "FDP_RIP.1": 6,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 6,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UCT.1": 9,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 8,
          "FDP_UIT.1.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 7,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 13,
          "FIA_ATD.1.1": 2,
          "FIA_SOS.1": 7,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 22,
          "FIA_UAU.1.1": 7,
          "FIA_UAU.1.2": 3,
          "FIA_UAU.4": 7,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.6": 6,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 14,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 6,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_LIM.1": 3,
          "FMT_LIM.2": 3,
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 16,
          "FMT_MSA.1.1": 3,
          "FMT_MSA.3": 11,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.2": 7,
          "FMT_MTD.2.1": 1,
          "FMT_MTD.2.2": 1,
          "FMT_SMF.1": 12,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 18,
          "FMT_SMR.1.1": 5,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 8,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 2,
          "FPT_ITT.1": 1,
          "FPT_PHP.3": 8,
          "FPT_RCV.2": 1,
          "FPT_RCV.3": 6,
          "FPT_RCV.3.1": 1,
          "FPT_RCV.3.2": 1,
          "FPT_RCV.3.3": 1,
          "FPT_RCV.3.4": 1,
          "FPT_RCV.4": 5,
          "FPT_RCV.4.1": 1,
          "FPT_TST.1": 6,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC.1": 6,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {
        "OutOfScope": {
          "out of scope": 1,
          "the application although it is possible to load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE The TOE is the JavaCard Platform that supports the analysis": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 3,
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 1,
            "SHA-384": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 8
        }
      },
      "javacard_packages": {},
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 2.1.1": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 1
        },
        "TRNG": {
          "TRNG": 5
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Malfunction": 10,
          "Physical tampering": 2,
          "malfunction": 9,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 1,
          "Leak-Inherent": 2,
          "SPA": 1,
          "physical probing": 3,
          "timing attack": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 1,
          "AIS31": 1
        },
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 2,
          "CCMB-2012-09-003": 2
        },
        "FIPS": {
          "FIPS 180-3": 1,
          "FIPS 197": 2,
          "FIPS PUB 197": 1,
          "FIPS PUB 46-3": 1
        },
        "PKCS": {
          "PKCS#1": 1,
          "PKCS#2": 2
        },
        "SCP": {
          "SCP 02": 1,
          "SCP02": 19
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "TDES": 14
          },
          "DES": {
            "DES": 2
          }
        },
        "miscellaneous": {
          "ARIA": {
            "ARIA": 7
          },
          "SEED": {
            "SEED": 6
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 7
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "HoGeun Song",
      "/CreationDate": "D:20131111082538+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20131111082538+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Title": "KOMSCO Document Template",
      "pdf_file_size_bytes": 1422360,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 108
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-13-37%20KOMSCO%20JK21%20V1.0%20on%20S3CT9KAKCKW(eng).pdf",
  "scheme": "KR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "ALC_DVS.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[JK21-TR-0001]%20Security%20Target-Lite-e-v1.1.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "8bd993204af675d3886070349da683821c65b84ba32ce774b7a5547183d27426",
      "txt_hash": "af0f8eb94f4af474bb806d94e06b3bf6d6bed8a6c61ecb88f327ae15c91be07c"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "df1e4eca8059d8cf1f77db10cbbfd95e97261d4af7435fd53bf0d787e2e5b08f",
      "txt_hash": "dba3328df77b018899cc9a7b12abe47eede54f2b8070658775d4138217a3ae7c"
    }
  },
  "status": "archived"
}