This page was not yet optimized for use on mobile
devices.
ID-One Cosmo 64 v5
Certificate #548
Webpage information
Security policy
Symmetric Algorithms
AES, DES, TDESHash functions
SHA-1, MD5Schemes
MACRandomness
RNGBlock cipher modes
ECB, CBCJavaCard versions
Java Card 2.2, JavaCard 2.2, JC2.2, Global Platform 2.1.1JavaCard API constants
ALG_DES_CBC_NOPAD, ALG_DES_CBC_ISO9797_M1, ALG_DES_CBC_ISO9797_M2, ALG_DES_ECB_NOPAD, ALG_DES_ECB_ISO9797_M1, ALG_DES_ECB_ISO9797_M2, ALG_DES_MAC4_NOPAD, ALG_DES_MAC4_ISO9797_M1, ALG_DES_MAC4_ISO9797_M2, ALG_DES_MAC4_ISO9797_1_M2_ALG3, ALG_DES_MAC_8_NOPAD, ALG_DES_MAC8_ISO9797_M1, ALG_DES_MAC8_ISO9797_M2, ALG_DES_MAC8_ISO9797_1_M2_ALG3, ALG_RSA_NOPAD, ALG_RSA_PKCS1, ALG_RSA_PKCS1_OAEP, ALG_RSA_SHA_ISO9796, ALG_RSA_SHA_PKCS1, ALG_RSA_SHA_PKCS1_PSS, ALG_RSA_MD5_PKCS1, ALG_RSA_MD5_PKCS1_PSS, ALG_AES_BLOCK_128_CBC_NOPAD15, ALG_AES_BLOCK_128_CBC_NOPAD, ALG_AES_BLOCK_128_ECB_NOPAD, ALG_AES_MAC_128_NOPAD, ALG_MD514Vendor
Oberthur Card Systems, OberthurSecurity level
Level 3, level 3Side-channel analysis
DPA, SPA, Timing attacks, Fault Induction, fault induction, fault injection, reverse engineering, Bellcore attackCertification process
More details about all the power-up self-tests and their implementation are provided in a separate confidential document. ID-One Cosmo 64 v5 Security Policy October 5, 2007 Version R03 Page 34 / 42 © 2006 Oberthur Card, Integrity Mechanisms. The cryptographic key storage integrity mechanism is described in a separate confidential document called Self Test Description. 17.3.4 Key Destruction The ID-One Cosmo 64 v5 destroys cryptographicStandards
FIPS 140-2, FIPS140-2, FIPS 140, FIPS PUB 186-2, FIPS186-2, PKCS#1, PKCS1, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 7816-2, ISO/IEC 7816-3, ISO/IEC 7816-4, ISO/IEC 7816-5, ISO/IEC 9796-2, ISO/IEC 9797-1, ISO/IEC 14443-2, ISO/IEC 14443-3, ISO/IEC 14443-4, ISO/IEC 9797, ISO/IEC 9796, ICAO, SCP01, SCP02File metadata
| Title | Microsoft Word - ID-One Cosmo 64 RSA D Security Policy R03E.DOC |
|---|---|
| Author | cstephens |
| Creation date | D:20071005102441-07'00' |
| Modification date | D:20071005102441-07'00' |
| Pages | 42 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | Acrobat Distiller 8.1.0 (Windows) |
References
Outgoing- 123 - historical - Advanced Configurable Crypto Environment - Security Processor (ACCE SP and ACCE SP2)
- 246 - historical - SafeEnterprise™ Link Encryptor NRZ-H (SLE NRZ-H) and SafeEnterprise™ Link Encryptor NRZ-L (SLE NRZ-L)
- 668 - historical - Oberthur PIV EP v1 on ID-One Cosmo 64 v5 D
Heuristics
No heuristics are available for this certificate.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 548,
"dgst": "6e2d4d3a3d4c4bb2",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"RSA#43",
"RNG#94",
"Triple-DES#232",
"SHS#209",
"Triple-DES MAC#232"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"64",
"063683",
"063684",
"77"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"668"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"123",
"246"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"668"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"123",
"112",
"246"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"123",
"246"
]
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {},
"certification_process": {
"ConfidentialDocument": {
"Integrity Mechanisms. The cryptographic key storage integrity mechanism is described in a separate confidential document called Self Test Description. 17.3.4 Key Destruction The ID-One Cosmo 64 v5 destroys cryptographic": 1,
"More details about all the power-up self-tests and their implementation are provided in a separate confidential document. ID-One Cosmo 64 v5 Security Policy October 5, 2007 Version R03 Page 34 / 42 \u00a9 2006 Oberthur Card": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 31
},
"ECB": {
"ECB": 12
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 25
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"# 1": 1,
"# 123": 1,
"# 2": 1,
"# 209": 1,
"# 232": 2,
"# 246": 1,
"# 43": 1,
"# 94": 3
}
},
"fips_certlike": {
"Certlike": {
"AES4": 1,
"AES5": 1,
"DES3": 2,
"PKCS#1": 17,
"PKCS1": 1,
"RSA PKCS#1": 3,
"RSA PKCS1": 1,
"SHA-1": 8
}
},
"fips_security_level": {
"Level": {
"Level 3": 10,
"level 3": 1
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 10
}
},
"SHA": {
"SHA1": {
"SHA-1": 8
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"ALG": {
"AES": {
"ALG_AES_BLOCK_128_CBC_NOPAD": 1,
"ALG_AES_BLOCK_128_CBC_NOPAD15": 1,
"ALG_AES_BLOCK_128_ECB_NOPAD": 1,
"ALG_AES_MAC_128_NOPAD": 1
},
"DES": {
"ALG_DES_CBC_ISO9797_M1": 1,
"ALG_DES_CBC_ISO9797_M2": 1,
"ALG_DES_CBC_NOPAD": 1,
"ALG_DES_ECB_ISO9797_M1": 1,
"ALG_DES_ECB_ISO9797_M2": 1,
"ALG_DES_ECB_NOPAD": 1,
"ALG_DES_MAC4_ISO9797_1_M2_ALG3": 1,
"ALG_DES_MAC4_ISO9797_M1": 1,
"ALG_DES_MAC4_ISO9797_M2": 1,
"ALG_DES_MAC4_NOPAD": 1,
"ALG_DES_MAC8_ISO9797_1_M2_ALG3": 1,
"ALG_DES_MAC8_ISO9797_M1": 1,
"ALG_DES_MAC8_ISO9797_M2": 1,
"ALG_DES_MAC_8_NOPAD": 1
},
"MD": {
"ALG_MD514": 1
},
"RSA": {
"ALG_RSA_MD5_PKCS1": 1,
"ALG_RSA_MD5_PKCS1_PSS": 1,
"ALG_RSA_NOPAD": 1,
"ALG_RSA_PKCS1": 1,
"ALG_RSA_PKCS1_OAEP": 1,
"ALG_RSA_SHA_ISO9796": 1,
"ALG_RSA_SHA_PKCS1": 1,
"ALG_RSA_SHA_PKCS1_PSS": 1
}
}
},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"Global Platform 2.1.1": 2
},
"JavaCard": {
"JC2.2": 1,
"Java Card 2.2": 1,
"JavaCard 2.2": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Fault Induction": 2,
"fault induction": 1,
"fault injection": 1
},
"SCA": {
"DPA": 7,
"SPA": 8,
"Timing attacks": 1
},
"other": {
"Bellcore attack": 1,
"reverse engineering": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140": 6,
"FIPS 140-2": 32,
"FIPS PUB 186-2": 3,
"FIPS140-2": 2,
"FIPS186-2": 1
},
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 14443": 18,
"ISO/IEC 14443-2": 1,
"ISO/IEC 14443-3": 1,
"ISO/IEC 14443-4": 1,
"ISO/IEC 7816": 8,
"ISO/IEC 7816-2": 1,
"ISO/IEC 7816-3": 4,
"ISO/IEC 7816-4": 3,
"ISO/IEC 7816-5": 2,
"ISO/IEC 9796": 4,
"ISO/IEC 9796-2": 1,
"ISO/IEC 9797": 10,
"ISO/IEC 9797-1": 1
},
"PKCS": {
"PKCS#1": 10,
"PKCS1": 1
},
"SCP": {
"SCP01": 1,
"SCP02": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 18
}
},
"DES": {
"3DES": {
"TDES": 38
},
"DES": {
"DES": 53
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"Oberthur": 10,
"Oberthur Card Systems": 54
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "cstephens",
"/CreationDate": "D:20071005102441-07\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20071005102441-07\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/Title": "Microsoft Word - ID-One Cosmo 64 RSA D Security Policy R03E.DOC",
"pdf_file_size_bytes": 296536,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 42
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "b53132e44675bf761fcdafef46423a5f26ce9cfa055824a0c8c609343d7dfe20",
"policy_txt_hash": "d65a27682807c0d30c160b9581877290a22cb62898ce9a67db5328f086484883"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "None",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt548.pdf",
"date_sunset": null,
"description": "The ID-One Cosmo 64 v5 is a JavaCard cryptographic module with dual interface (ISO 7816 \u0026 ISO 14443) specifically designed for identity and government market needs. It offers a full 64K Byte of EEPROM space available for customer discretionary use, together with on card cryptographic services such as TDES, AES, Elliptic Curve and 2048-bit RSA algorithms with on-card key generation. It is compliant to Java Card v2.2 and Open Platform v2.1.1A. To protect against skimming, a built-in firewall allows application developers to disable contactless access for sensitive operations. Additional features include On- Card fingerprint matching and Logical Channels. The ID-One Cosmo 64 v5 is available in contact only, dual interface, or contactless only formats.",
"embodiment": "Single Chip",
"exceptions": null,
"fw_versions": "E303-063683 and E303-063684",
"historical_reason": "RNG SP800-131A Revision 1 Transition",
"hw_versions": "P/N 77",
"level": 3,
"mentioned_certs": {},
"module_name": "ID-One Cosmo 64 v5",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2005-06-09",
"lab": "UL Verification Services, Inc.",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2005-09-23",
"lab": "",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2006-05-16",
"lab": "",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2006-08-16",
"lab": "",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2007-04-30",
"lab": "",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2007-10-15",
"lab": "",
"validation_type": "Update"
}
],
"vendor": "Oberthur Card Systems",
"vendor_url": "http://www.oberthurusa.com"
}
}