This page was not yet optimized for use on mobile
devices.
ActivCard Digital Identity Applet Suite v2.5 on OCS ID-One Cosmo 64 v5
Certificate #558
Webpage information
Security policy
Symmetric Algorithms
AES, DES, TDES, 3DES, KMACHash functions
SHA-1Schemes
MACRandomness
RNGBlock cipher modes
ECB, CBCVendor
Oberthur Card Systems, OberthurSecurity level
Level 3, Level 2, level 3, level 2Side-channel analysis
SPA, DPA, Timing attacks, Fault Induction, fault induction, reverse engineeringCertification process
Integrity Mechanisms The cryptographic keys storage integrity mechanism is described in a separate confidential document called Self Test Description. 9.5.4 Cryptographic Key Zerorization The cryptographic moduleStandards
FIPS140-2, FIPS 140-2, FIPS PUB 86-2, FIPS 186-2, PKCS1, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 7816-3, ISO/IEC 7816-2, ISO/IEC 7816-4File metadata
| Title | Microsoft Word - 100h - AC-Applet-v2.5.2-on-OCS-ID-one-level-3-security-pol. |
|---|---|
| Author | Rose |
| Creation date | D:20050712000808Z |
| Modification date | D:20050712095343-07'00' |
| Pages | 25 |
| Creator | PScript5.dll Version 5.2 |
| Producer | Acrobat Distiller 5.0.5 (Windows) |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 558,
"dgst": "dd8e8c8c9dae8978",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"RSA#43",
"RNG#94",
"Triple-DES#232",
"AES#123",
"SHS#209",
"Triple-DES MAC#232"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"2.5",
"2.5.1"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {},
"certification_process": {
"ConfidentialDocument": {
"Integrity Mechanisms The cryptographic keys storage integrity mechanism is described in a separate confidential document called Self Test Description. 9.5.4 Cryptographic Key Zerorization The cryptographic module": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 8
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"# 1": 1
}
},
"fips_certlike": {
"Certlike": {
"PKCS1": 1,
"RSA PKCS1": 1,
"SHA-1": 2
}
},
"fips_security_level": {
"Level": {
"Level 2": 4,
"Level 3": 9,
"level 2": 1,
"level 3": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Fault Induction": 3,
"fault induction": 1
},
"SCA": {
"DPA": 6,
"SPA": 7,
"Timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 10,
"FIPS 186-2": 2,
"FIPS PUB 86-2": 1,
"FIPS140-2": 5
},
"ISO": {
"ISO/IEC 14443": 16,
"ISO/IEC 7816": 8,
"ISO/IEC 7816-2": 1,
"ISO/IEC 7816-3": 3,
"ISO/IEC 7816-4": 1
},
"PKCS": {
"PKCS1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"3DES": {
"3DES": 2,
"TDES": 33
},
"DES": {
"DES": 10
}
},
"constructions": {
"MAC": {
"KMAC": 1
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"Oberthur": 1,
"Oberthur Card Systems": 3
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Rose",
"/CreationDate": "D:20050712000808Z",
"/Creator": "PScript5.dll Version 5.2",
"/ModDate": "D:20050712095343-07\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "Microsoft Word - 100h - AC-Applet-v2.5.2-on-OCS-ID-one-level-3-security-pol.",
"pdf_file_size_bytes": 285707,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 25
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "73b6f509a491c0af2108fe44c03cebce6ca879d565bfd55de8589d2061d949b3",
"policy_txt_hash": "72a5655a783a469e549d6cee8dfc8fa203f56d1ef86f8cc5bbc804bfbb85115b"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "None",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt558.pdf",
"date_sunset": null,
"description": "The ActivCard Digital Identity Applet Suite v2.5 on OCS ID-One Cosmo 64 v5: Provides enhanced functionality, flexibility, and security based on the ActivCard Applet v2 frameworks; Is backward compatible with earlier versions of ActivCard applets; Offers a more open, stable, and flexible platform on which developers can build and deploy smart card applications; Is compliant with GSC-IS 2.1 virtual machine command interface; Supports GSC-IS 2.1 data model.",
"embodiment": "Single Chip",
"exceptions": null,
"fw_versions": "ACA v2.5.1, PKI/GC/SKI v2.5.1, SMA v2.5.1, ASC v2.5.1",
"historical_reason": "RNG SP800-131A Revision 1 Transition",
"hw_versions": "P/N 77, Version E302, E303-063683, E303-063792",
"level": 3,
"mentioned_certs": {},
"module_name": "ActivCard Digital Identity Applet Suite v2.5 on OCS ID-One Cosmo 64 v5",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2005-07-25",
"lab": "UL Verification Services, Inc.",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2006-05-26",
"lab": "",
"validation_type": "Update"
}
],
"vendor": "ActivCard, Inc.",
"vendor_url": "http://www.activcard.com"
}
}