SM30X R1
SM30XR1 on S3CT9KC
Application Related Characteristics  Primitive Support  Implementation Specific Characteristics  Codelets Available
External Characteristics
Data Item 
Value 
Comments 

External Specification 

MULTOS Version 
4.2.1 
Optional CR 211 implemented Optional CR 212 implemented Optional CR 214 implemented Optional CR 215 implemented Optional CR 220 implemented Optional CR 222 implemented Optional CR 303 implemented 
Silicon Provider / manufacturer_id 
Samsung Electronics / 0x0E 

Implementer / implementer_id 
Samsung SDS / 0x06 

Mask / ic_type(s) 
SM30X R1(T9KC) / 0xB1 

Technical Data 

Power / External Clock 
1.62V to 5.5V / 1 to 7.5 MHz 

Transport Protocol 
T = 0, T = 1, TypeA, TypeB 

FI/DI 
0x11, 0x12, 0x13, 0x18 

Dual ATR 
Supported 
Preenablement ATR  SM30X (R1T9KC) : 3BD09600C00A31FE4407 
PPS 
Supported 
max speed 115.2kbps @ 3.57MHz Type A supports 106kbps, 212kbps, 424kbps and 847kbps Type B supports 106kbps, 212kbps, 424kbps and 847kbps 
ATR Character Convention Direct LSB (3B) 
Supported 

ATR Character Convention Indirect MSB (3F) 
Supported 

Memory Area Sizes 

AMD 
0110V003(Type A) 0111V003(Type B) 

ROM 
384 kilobytes 

RAM Public 
1300 bytes 

RAM Dynamic 
1024 bytes 

EEPROM Total 
80 kilobytes 

EEPROM available for applications 
58.4 kilobytes 

Application Related Characteristics
Data Item 
Value 
Comments 

Application EEPROM Loading Requirements 

Application Header 
250 bytes 
Per application loaded 
Total temporary space per protected ALU 
N/A 

Total temporary space per confidential ALU 
N/A 

MULTOS Application Function 

Static Page Size (1 page) 
64bytes 

Maximum write size in pages 
At least 10 pages 

Maximum ATR File record size 
32 bytes 

Maximum ATR Historical Byte record size 
15 bytes 

Maximum DIR File record size 
0xFF 

Maximum FCI record size 
0xFF 

Maximum inbound TPDU size 
256 bytes 

Maximum outbound TPDU size 
255 bytes 

Maximum delegation nest count 
Limited by free EEPROM 

Maximum application history list entries 
Limited by free EEPROM 

Retry Counters 

Set MSM Controls 
16 

Create MEL Application 
32 

Delete MEL Application 
32 

Key Lengths 

KCK Public Key length 
128 bytes 

Permitted Application Provider Public Key lengths 
32 to 128 bytes 
KMA accepts APPK lengths between 72 and 128 bytes inclusive 
MULTOS TKCK length 
96 bytes 

Primitive Support
The primitives listed here are those that were included in the target specification. Applies to all masks
Primitive 
Supported 
Optional / Mandatory 

Add BCDN 
No 
Optional 
AES Decipher 
Yes 
Optional 
AES Encipher 
Yes 
Optional 
Bit Manipulate Byte 
Yes 

Bit Manipulate Word 
Yes 

Call Codelet 
Yes 

Call Extension 0, 1, 2, 3, 4, 5, 6 
Yes 
Extension used is 6 
Card Block 
Yes 

Check Case 
Yes 

Checksum 
Yes 

Control Auto Reset WWT 
Yes 

Delegate 
Yes 

DES ECB Decipher 
Yes 

DES ECB Encipher 
Yes 

DivideN 
Yes 

ECC Addition 
No 
Optional 
ECC Convert Representation 
No 
Optional 
ECC Equality Test 
No 
Optional 
ECC Inverse 
No 
Optional 
ECC Scalar Multiplication 
No 
Optional 
ECC Verify Point 
No 
Optional 
Exchange Data 
No 
Optional 
Generate Asymmetric Hash General 
Yes 

Generate Asymmetric Signature General 
No 
Optional 
Generate Random Prime 
Yes 
Optional 
Generate Single DES CBC Signature 
Yes 

Generate Triple DES CBC Signature 
Yes 

Get Data 
Yes 

Get Delegator AID 
Yes 

Get DIR File Record 
Yes 

Get File Control Information 
Yes 

Get Manufacturer Data 
Yes 

Get Memory Reliability 
Yes 

Get MULTOS Data 
Yes 

Get Purse Type 
Yes 

Get Random Number 
Yes 

Load CCR 
Yes 

Lookup 
Yes 

Memory Compare 
Yes 

Memory Compare Fixed Length 
Yes 

Memory Copy 
Yes 

Memory Copy Fixed Length 
Yes 

Modular Exponentiation 
Yes 

Modular Exponentiation CRT 
Yes 

Modular Inverse 
Yes 
Optional 
Modular Multiplication 
Yes 
Optional 
Modular Reduction 
Yes 
Optional 
MultiplyN 
Yes 

Query Channel 
No 
Optional 
Query Codelet 
Yes 

Query Interface Type 
Yes 

Query0, Query1, Query2, Query3 
Yes 

Reset Session Data 
Yes 

Reset WWT 
Yes 

Return from Codelet 
Yes 

Secure Hash 
Yes 
Optional, support SHA1, SHA224, SHA256, SHA384, SHA512 
SEED ECB Decipher 
Yes 
Optional 
SEED ECB Encipher 
Yes 
Optional 
Set AFI 
Yes 
Optional 
Set ATR File Record 
Yes 

Set ATR Historical Characters 
Yes 

Set ATS Historical Characters 
Yes 
Optional 
Set FCI Record 
Yes 

Set Select SW 
Yes 

Set Transaction Protection 
Yes 

Set SW1SW2 
Yes 

SHA1 
Yes 

Shift Left 
Yes 

Shift Right 
Yes 

Store CCR 
Yes 
` 
Subtract BCDN 
No 
Optional 
Triple Des ECB Decipher 
Yes 
Optional 
Triple Des ECB Encipher 
Yes 
Optional 
Verify Asymmetric And Retrieve General 
No 
Optional 
Implementation Specific Characteristics
Zero Block Size
The following instructions and primitives have the block size specified in the code (as opposed to being runtime data). The following table shows how each will perform if a zero block size is specified. Applies to all masks.
Type 
Instruction / Primitive 
Operation 

Instruction 
LOAD, STORE, LOADI, STOREI 
no operation 
CLEARN 
no operation 

TESTN, INCN, DECN, NOTN 
Z = 1 

CMPN, ADDN, SUBN 
C = 0, Z = 1 

ANDN, ORN, XORN 
Z = 1 

Primitive 
MultiplyN 
Z = 1 
DivideN 
C = 1, Z = unchanged 

ShiftLeft, ShiftRight 
C = 0, Z = 1 

GetDIRFileRecord 
One byte set to zero pushed onto stack, If the application specified does not exist, C = 1, Z = 1 If the application specified exists, C = 0, Z = 0 

GetManufacturerData 
One byte set to zero pushed onto stack, C = 0 Undefined: implementation specific handling Undefined: implementation specific handling 

MemoryCompareFixedLength 
DT’ = DT  4, C = 0, Z = 1 

MemoryCopyFixedLength 
DT’ = DT – 4 
Maximum Number of Pages Permitted in a Single Write
The maximum number of pages is at least nine when transaction protection is used. It is possible to write more than nine pages if there is free EEPROM. Note that if an attempt is made to write more than 9 pages and if there is insufficient free EEPROM, then an abnormal end to processing to will occur.
Condition Code Register
This implementation does support signed arithmetic. The N and V flags are present in the CCR, and they may be changed by some instructions. However, signed arithmetic is not guaranteed and should be avoided. They may be used by an application using the Load CCR and Store CCR primitives, but this may affect the portability of the application.
Supported Modulus Lengths of Cryptographic Primitives
All values are presented in bytes.
Primitive 
Modular Lengths supported 

Modular Exponentiation, public exponent not 3 
Greater than 3, but less then or equal to 256 bytes 
Modular Exponentiation, public exponent of 3 
Greater than 3, but less then or equal to 256 bytes 
Modular Exponentiation CRT 
Between 2 and 256 bytes inclusive 
Modular Inverse 
Greater than 3, but less then or equal to 256 bytes 
Modular Multiplication 
Greater than 4, but less then or equal to 256 bytes 
Modular Reduction 
Greater than 4, but less then or equal to 256 bytes 
Important Remarks
This section contains important remarks about the Primitives and IFD commands of this implementation. Applies to all masks.
Functionality 
Operation 

Automated sending of Work Wait Time extension 
The chip returns WWT extension request bytes when 80% of the WWT has expired. 
Enable and Load with the Extended Asymmetric Hash 
SM30X does not support the enablement by using Extended Asymmetric Hash. SM30X does not support the application signature with Extended Asymmetric Hash. Protected/Confidential application load are not supported by using Extended Asymmetric Hash. 
Maximum number of Application History List 
SM30X doesn't check Maximum number of Application History List. 
Bit Manipulate Byte Bit Manipulate Word 
Bits 6 to 2 of b2 are ignored. That is, the primitives return the expected result regardless of the value of bits 6 to 2 of b2. 
Checksum 
If the checksummed area includes the parameters (the top four bytes of Dynamic), the checksum will be correctly calculated. 
DivideN 
The length of each operand must not be greater than 128 bytes 
Generate Asymmetric Hash 
Mode = 0, mode = 1, Mode = 2, mode = 3, Mode = 4 and mode = 5 are supported. If b2 (mode) takes an unsupported value, this primitive performs no operation. In particular, no bytes are popped from the stack. The MULTOS 4.2 global data item hash_chain_length is 16 for Mode 0, 1, 2 and 3. But it should be inputted by user for Mode 4 and 5. The hash modulus length is currently 72 bytes for Mode 0 and 1. But it should be inputted by user for Mode 2, 3, 4 and 5. 
Get Manufacturer Data Get MULTOS Data Get Purse Type Get Data 
If the destination is stack top, the last byte of retrieved data will be overwritten by the length of data retrieved. That is, the number of bytes copied is always returned on the stack regardless of the destination segment address. 
Get Memory Reliability 
MULTOS 4.2 always indicates memory is reliable: C = 0, Z = 0. 
Lookup 
If the target value appears more than once in the list, the location of the first is reported. The list need not be sorted. If the target value is not found, it is left unchanged on the stack. 
Modular Exponentiation 
Both the data and the exponent must be greater than 0. The least significant bit of the modulus must be 1. The exponent length must be greater than 0 and must be less than or equal to the length of the modulus. The modulus length must be greater than 3 and less than or equal to 256 bytes. If any of the conditions above are not met, an abnormal end will occur. Note that if the modulus is padded at the most significant end with full byte representations of 0, the result can not be guaranteed. 
Modular Exponentiation CRT 
The modulus length must be not greater than 256 bytes in length. The length must also be an even number. The length of each item must be modulus length divided by 2. Both the most significant and least significant bits of the primes p and q must be 1. If any of these conditions are not met, an abnormal end to processing will occur. 
Modular Inverse 
The data length must be less than or equal to 256 bytes. The modulus length must be greater than 3 and less than or equal to 256 bytes. If any of the conditions above are not met, an abnormal end will occur. 
Modular Reduction 
The modulus length must be greater than 4 and less than or equal to 256 bytes. The data length must be equal to or greater than the modulus length. The modulus must not have any leading zero bytes. If any of these conditions are not met, an abnormal end will occur. 
MultiplyN 
The length of each operand must not be greater than 128 bytes 
Set Transaction Protection 
Bits 7 to 2 of b2 are ignored. That is, the primitive returns the expected result regardless of the value of bits 7 to 2 of b2. Samsung chips copy the source data to a temporary store and any updates are made to the source data. In the case of a rollback, the copy of the original source data is written to the source. 
Shift Left and Shift Right 
• With b2 > 0, if b3 = 0, C= 0 and Z is set appropriately. The output block is equal to the input block (the input block is not changed). • With b2 > 0, if b3 > 8 * b2, C = 0 and Z = 1. The output block is zero. 
Codelets Available
None