This page was not yet optimized for use on mobile
devices.
ID-One Cosmo 32 v5
Certificate #597
Webpage information
Security policy
Symmetric Algorithms
AES, DES, TDES, 3DESHash functions
SHA-1, SHA1, MD5Schemes
MACRandomness
RNGBlock cipher modes
ECB, CBCJavaCard versions
Java Card 2.2, JavaCard 2.2, JC2.2, Global Platform 2.1.1JavaCard API constants
ALG_DES_CBC_NOPAD, ALG_DES_CBC_ISO9797_M1, ALG_DES_CBC_ISO9797_M2, ALG_DES_ECB_NOPAD, ALG_DES_ECB_ISO9797_M1, ALG_DES_ECB_ISO9797_M2, ALG_DES_MAC4_NOPAD, ALG_DES_MAC4_ISO9797_M1, ALG_DES_MAC4_ISO9797_M2, ALG_DES_MAC4_ISO9797_1_M2_ALG3, ALG_DES_MAC_8_NOPAD, ALG_DES_MAC8_ISO9797_M1, ALG_DES_MAC8_ISO9797_M2, ALG_DES_MAC8_ISO9797_1_M2_ALG3, ALG_RSA_NOPAD, ALG_RSA_PKCS1, ALG_RSA_PKCS1_OAEP, ALG_RSA_SHA_ISO9796, ALG_RSA_SHA_PKCS1, ALG_RSA_SHA_PKCS1_PSS, ALG_RSA_MD5_PKCS1, ALG_RSA_MD5_PKCS1_PSS, ALG_MD59Vendor
Oberthur Card Systems, OberthurSecurity level
Level 3Side-channel analysis
DPA, SPA, Timing attacks, Fault Induction, fault induction, fault injection, reverse engineering, Bellcore attackCertification process
More details about all the power-up self-tests and their implementation are provided in a separate confidential document. ID-One Cosmo 32 v5 Security Policy October 27, 2005 Version R01 Page 33 / 41 © 2004 Oberthur Card, Integrity Mechanisms. The cryptographic key storage integrity mechanism is described in a separate confidential document called Self Test Description. 17.3.4 Key Destruction The ID-One Cosmo 32 v5 destroys cryptographicStandards
FIPS 140-2, FIPS140-2, FIPS 140, FIPS PUB 186-2, FIPS186-2, PKCS#1, PKCS1, ISO/IEC 7816, ISO/IEC 7816-2, ISO/IEC 7816-3, ISO/IEC 7816-4, ISO/IEC 7816-5, ISO/IEC 9796-2, ISO/IEC 9797-1, ISO/IEC 14443-2, ISO/IEC 14443-3, ISO/IEC 14443-4, ISO/IEC 9797, ISO/IEC 9796, ISO/IEC 14443, ICAO, SCP01, SCP02File metadata
| Title | Microsoft Word - 108g - ID-One Cosmo 32 RSA Security Policy R01 October 27 … |
|---|---|
| Author | Rose |
| Creation date | D:20051027143049-07'00' |
| Modification date | D:20051028163004-07'00' |
| Pages | 41 |
| Creator | PScript5.dll Version 5.2 |
| Producer | Acrobat Distiller 6.0 (Windows) |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 597,
"dgst": "fcf1e4bf9cc9c108",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"Triple-DES#303",
"RSA#42",
"SHS#290",
"Triple-DES MAC#303",
"RNG#99"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"90",
"32",
"063842"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {},
"certification_process": {
"ConfidentialDocument": {
"Integrity Mechanisms. The cryptographic key storage integrity mechanism is described in a separate confidential document called Self Test Description. 17.3.4 Key Destruction The ID-One Cosmo 32 v5 destroys cryptographic": 1,
"More details about all the power-up self-tests and their implementation are provided in a separate confidential document. ID-One Cosmo 32 v5 Security Policy October 27, 2005 Version R01 Page 33 / 41 \u00a9 2004 Oberthur Card": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 25
},
"ECB": {
"ECB": 8
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 24
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"# 1": 1,
"# 2": 1,
"# 286": 1,
"# 290": 1,
"# 303": 2,
"# 42": 1,
"# 99": 5
}
},
"fips_certlike": {
"Certlike": {
"DES [Certificate # 286": 1,
"DES3": 2,
"PKCS#1": 19,
"PKCS1": 1,
"RSA PKCS#1": 3,
"RSA PKCS1": 1,
"SHA-1": 7,
"SHA-1 [Certificate # 290": 1,
"SHA1": 1
}
},
"fips_security_level": {
"Level": {
"Level 3": 17
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 11
}
},
"SHA": {
"SHA1": {
"SHA-1": 8,
"SHA1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"ALG": {
"DES": {
"ALG_DES_CBC_ISO9797_M1": 1,
"ALG_DES_CBC_ISO9797_M2": 1,
"ALG_DES_CBC_NOPAD": 1,
"ALG_DES_ECB_ISO9797_M1": 1,
"ALG_DES_ECB_ISO9797_M2": 1,
"ALG_DES_ECB_NOPAD": 1,
"ALG_DES_MAC4_ISO9797_1_M2_ALG3": 1,
"ALG_DES_MAC4_ISO9797_M1": 1,
"ALG_DES_MAC4_ISO9797_M2": 1,
"ALG_DES_MAC4_NOPAD": 1,
"ALG_DES_MAC8_ISO9797_1_M2_ALG3": 1,
"ALG_DES_MAC8_ISO9797_M1": 1,
"ALG_DES_MAC8_ISO9797_M2": 1,
"ALG_DES_MAC_8_NOPAD": 1
},
"MD": {
"ALG_MD59": 1
},
"RSA": {
"ALG_RSA_MD5_PKCS1": 1,
"ALG_RSA_MD5_PKCS1_PSS": 1,
"ALG_RSA_NOPAD": 1,
"ALG_RSA_PKCS1": 1,
"ALG_RSA_PKCS1_OAEP": 1,
"ALG_RSA_SHA_ISO9796": 1,
"ALG_RSA_SHA_PKCS1": 1,
"ALG_RSA_SHA_PKCS1_PSS": 1
}
}
},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"Global Platform 2.1.1": 4
},
"JavaCard": {
"JC2.2": 1,
"Java Card 2.2": 1,
"JavaCard 2.2": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Fault Induction": 2,
"fault induction": 1,
"fault injection": 1
},
"SCA": {
"DPA": 7,
"SPA": 8,
"Timing attacks": 1
},
"other": {
"Bellcore attack": 1,
"reverse engineering": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140": 5,
"FIPS 140-2": 32,
"FIPS PUB 186-2": 3,
"FIPS140-2": 2,
"FIPS186-2": 1
},
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 14443": 4,
"ISO/IEC 14443-2": 1,
"ISO/IEC 14443-3": 1,
"ISO/IEC 14443-4": 1,
"ISO/IEC 7816": 8,
"ISO/IEC 7816-2": 1,
"ISO/IEC 7816-3": 4,
"ISO/IEC 7816-4": 2,
"ISO/IEC 7816-5": 2,
"ISO/IEC 9796": 4,
"ISO/IEC 9796-2": 1,
"ISO/IEC 9797": 10,
"ISO/IEC 9797-1": 1
},
"PKCS": {
"PKCS#1": 11,
"PKCS1": 1
},
"SCP": {
"SCP01": 1,
"SCP02": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"3DES": 2,
"TDES": 38
},
"DES": {
"DES": 58
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Oberthur": {
"Oberthur": 10,
"Oberthur Card Systems": 53
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Rose",
"/CreationDate": "D:20051027143049-07\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2",
"/ModDate": "D:20051028163004-07\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "Microsoft Word - 108g - ID-One Cosmo 32 RSA Security Policy R01 October 27 \u2026",
"pdf_file_size_bytes": 255157,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 41
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "c546bb5ab1547cbe4312a419e0612dae7ee47b088290d5495777b00731b2700e",
"policy_txt_hash": "ab6b193dbf336b4ffb0a836e977435f0706ace5afe4773ce949b47ec64cdcb79"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "None",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt597.pdf",
"date_sunset": null,
"description": "The ID-One Cosmo 32 v5 is a JavaCard cryptographic module specifically designed for identity and government market needs. It offers a full 32K Byte of EEPROM space available for customer discretionary use, together with on-card cryptographic services such as TDES (using double and triple length DES keys), and 2048-bit RSA with on-card key generation. The cryptographic module loads and runs applets written in Java programming language. It includes a native implementation of the latest Java Card TM (Version 2.2) and Open Platform (Version 2.1.1A) specifications, with full support for Delegated Management and DAP / Mandated DAP, that define a secure infrastructure for post-issuance programmable platforms. Additional features include On-Card fingerprint matching and Logical Channels.",
"embodiment": "Single Chip",
"exceptions": null,
"fw_versions": "E311-063842",
"historical_reason": "RNG SP800-131A Revision 1 Transition",
"hw_versions": "P/N 90",
"level": 3,
"mentioned_certs": {},
"module_name": "ID-One Cosmo 32 v5",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2005-12-01",
"lab": "UL Verification Services, Inc.",
"validation_type": "Initial"
}
],
"vendor": "Oberthur Card Systems",
"vendor_url": "http://www.oberthurusa.com"
}
}