BCM_SPS02 Secure Processing System with IC Dedicated Software Version 1.0

CSV information

Status archived
Valid from 25.02.2016
Valid until 25.02.2021
Scheme 🇩🇪 DE
Manufacturer Broadcom Corporation
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL5+, AVA_VAN.5
Protection profiles
Maintenance updates BCM_SPS02 Secure Processing System with Firmware version 002.030 (02.12.2016) Certification report Security target
BCM_SPS02 Secure Processing System with Firmware version 002.010 or 002.020 (01.06.2016) Certification report Security target
BCM_SPS02 Secure Processing System with Firmware version 002.010 or 002.020 (27.07.2016) Certification report
BCM_SPS02 Secure Processing System with IC Dedicated Software Version 002.030 (09.08.2017) Certification report

Heuristics summary

Certificate ID: BSI-DSZ-CC-0915-2016

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, HMAC
Asymmetric Algorithms
Diffie-Hellman, DSA
Schemes
Key Exchange
Randomness
TRNG, RNG

Vendor
Broadcom

Security level
EAL 5, EAL 4, EAL 1, EAL 2, EAL 5+, EAL 6, EAL5, EAL 3, EAL 7, EAL 5 augmented, EAL5 augmented, ITSEC Evaluation
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMS.5, ALC_TAT.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_DPT.3, ATE_FUN, ATE_IND, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, AVA_VAN.5, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-0915-2016
Evaluation facilities
TÜV Informationstechnik

Side-channel analysis
Physical Probing, physical probing, SPA, DPA, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Version 3.3, 2016-01-21, Security Target for the BCM_SPS02, Broadcom Corporation (confidential document) [7] Evaluation Technical Report, Version 1, 2016-02-18, ETR Summary for BCM_SPS02, TÜV, GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, according to AIS 36, Version 1, 2016-02-18, ETR COMP for BCM_SPS02, TÜV Informationstechnik GmbH (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL, List for the BCM_SPS02 with Evaluation Assurance Level EAL5 augmented, Broadcom Corporation (confidential document) [12] Guidance documentation for the TOE, BCM_SPS02 User's Guide, Version 2.14, Broadcom, confidential document) [13] Guidance documentation for the TOE, Datasheet 20211, Version 1.0, 22 March 2015, Broadcom, confidential document) [14] Guidance documentation for the TOE, BCM20211 – Update of FW and Secure OS, Version 1.5, Broadcom Corporation (confidential document) [15] Guidance documentation for the TOE, ARM Architecture v6M Reference Manual, ARMDDI0419C, Rev C, September 2010, Broadcom Corporation (confidential document) 23 / 36 Certification Report BSI-DSZ-CC-0915-2016 This page is intentionally left blank. 24 / 36

Standards
AIS31, AIS26, AIS 34, AIS 25, AIS 26, AIS 46, AIS 37, AIS 31, AIS 36, AIS 35, AIS 32, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-0915-2016
Subject secure processing system
Keywords "Common Criteria, Certification, Zertifizierung, EAL 5, Broadcom, memory encryption, SOGIS MRA"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20160310152533+01'00'
Modification date D:20160311085504+01'00'
Pages 36
Creator Writer
Producer LibreOffice 4.2

Frontpage

Certificate ID BSI-DSZ-CC-0915-2016
Certified item BCM_SPS02 Secure Processing System with IC Dedicated Software, Version 1.0
Certification lab BSI
Developer Broadcom Corporation

References

Incoming
  • CRP292 - archived - Sm@rtSIM CX Virgo v2.0
  • CRP300 - archived - Sm@rtSIM CX Virgo Version 3.0
  • CRP297 - archived - Sm@rtSIM CX Virgo v1.0

Security target

Extracted keywords

Symmetric Algorithms
AES, AES128, AES192, AES256, DES, TDES, 3DES, TDEA, HMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC
Hash functions
SHA1, SHA256, SHA224, SHA384, SHA512
Schemes
MAC, Key Exchange, Key Agreement
Randomness
TRNG, RNG, RND
Elliptic Curves
secp192r1, secp224r1, secp256r1, secp384r1, secp521r1, brainpoolP192r1, brainpoolP192t1, brainpoolP224r1, brainpoolP224t1, brainpoolP256r1, brainpoolP256t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1
Block cipher modes
ECB, CBC, CTR, OFB

Vendor
Broadcom

Security level
EAL5, EAL4, EAL5+, EAL 5, EAL5 augmented, EAL4 augmented, EAL 5 augmented
Claims
O.RND, O.TDES, O.AES, O.SHA, O.RSA, O.ECC, O.HMAC, T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP, ADV_FSP.4, ADV_FSP.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_CMS, ALC_CMS.4, ALC_DVS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_SAS.1.1, FCS_RNG, FCS_RNG.1, FCS_COP, FCS_CKM, FCS_COP.1, FCS_CKM.1, FCS_COP.1.1, FCS_CKM.4, FCS_CKM.4.1, FCS_CKM.1.1, FCS_CKM.2, FDP_SDC.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_UCT.1, FDP_UIT.1, FDP_ACC, FDP_ACF, FDP_ACC.1, FDP_ACF.1, FDP_SDC.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC.1, FDP_ITC.2, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.4, FDP_IFF.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1.1, FPT_TST.2, FPT_TST, FPT_TST.1, FPT_TST.2.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1

Side-channel analysis
Physical Probing, physical probing, side channel, side‐channel, DPA, SPA, Malfunction, DFA, JIL

Standards
FIPS PUB 197, PKCS#1, AIS31, AIS32, AIS 31, RFC3447, RFC 3447

File metadata

Title Microsoft Word - Securtiy_Target_lite_for_BCM_SPS02_v1.0.docx
Subject Security Target Lite for the BCM_SPS02 Version 1.0
Keywords Broadcom, Security Target, ASIC, SPS02, embedded systems, crypto accelerators, secure processing system, die isolated hard macro, RNG, RSA, AES, TDES, HMAC, Elliptic Curve, secure memory, embedded flash
Author Mark Buer
Creation date D:20160214132423-08'00'
Modification date D:20160308085105-08'00'
Pages 94
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 9.5.2 (Windows)

References

Incoming
  • CRP292 - archived - Sm@rtSIM CX Virgo v2.0
  • CRP297 - archived - Sm@rtSIM CX Virgo v1.0

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

BSI-DSZ-CC-0915-2016

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_SPM.1, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.3, ALC_LCD.1, ALC_TAT.2, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "272151c942e83db2",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0915-2016",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "cf0f01bcd7be3e9c"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "CRP297",
          "CRP300",
          "CRP292"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "CRP297",
          "CRP300",
          "CRP298",
          "CRP292"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "CRP297",
          "CRP292"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "CRP297",
          "CRP292"
        ]
      },
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2016-06-01",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915ma1a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915ma1b_pdf.pdf",
        "maintenance_title": "BCM_SPS02 Secure Processing System with Firmware version 002.010 or 002.020"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2016-07-27",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915ma2a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "BCM_SPS02 Secure Processing System with Firmware version 002.010 or 002.020"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2016-12-02",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915ma3a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915ma3b_pdf.pdf",
        "maintenance_title": "BCM_SPS02 Secure Processing System with Firmware version 002.030"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2017-08-09",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915ma4a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "BCM_SPS02 Secure Processing System with IC Dedicated Software Version 002.030"
      }
    ]
  },
  "manufacturer": "Broadcom Corporation",
  "manufacturer_web": "https://www.broadcom.com",
  "name": "BCM_SPS02 Secure Processing System with IC Dedicated Software Version 1.0",
  "not_valid_after": "2021-02-25",
  "not_valid_before": "2016-02-25",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0915a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by AVA_VAN.5 and ALC_DVS.2 SOGIS Recognition Agreement",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-0915-2016",
        "cert_item": "BCM_SPS02 Secure Processing System with IC Dedicated Software, Version 1.0",
        "cert_lab": "BSI",
        "developer": "Broadcom Corporation",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0915-2016": 21
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 3
        },
        "R": {
          "R.O": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 2,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 2,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 2,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 3,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 7,
          "ALC_FLR": 3,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 3,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 2,
          "ATE_DPT.4": 1,
          "ATE_FUN": 2,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 2,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 3,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 7,
          "EAL 2": 4,
          "EAL 3": 4,
          "EAL 4": 9,
          "EAL 5": 14,
          "EAL 5 augmented": 3,
          "EAL 5+": 1,
          "EAL 6": 4,
          "EAL 7": 4,
          "EAL5": 1,
          "EAL5 augmented": 1
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          " Rev C, September 2010, Broadcom Corporation (confidential document) 23 / 36 Certification Report BSI-DSZ-CC-0915-2016 This page is intentionally left blank. 24 / 36": 1,
          "Broadcom Corporation (confidential document) [15] Guidance documentation for the TOE, ARM Architecture v6M Reference Manual, ARMDDI0419C": 1,
          "GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January": 1,
          "List for the BCM_SPS02 with Evaluation Assurance Level EAL5 augmented, Broadcom Corporation (confidential document) [12] Guidance documentation for the TOE, BCM_SPS02 User\u0027s Guide, Version 2.14, Broadcom": 1,
          "Version 3.3, 2016-01-21, Security Target for the BCM_SPS02, Broadcom Corporation (confidential document) [7] Evaluation Technical Report, Version 1, 2016-02-18, ETR Summary for BCM_SPS02, T\u00dcV": 1,
          "according to AIS 36, Version 1, 2016-02-18, ETR COMP for BCM_SPS02, T\u00dcV Informationstechnik GmbH (confidential document) 8 specifically \u2022 AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "confidential document) [13] Guidance documentation for the TOE, Datasheet 20211, Version 1.0, 22 March 2015, Broadcom": 1,
          "confidential document) [14] Guidance documentation for the TOE, BCM20211 \u2013 Update of FW and Secure OS, Version 1.5": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        },
        "TRNG": {
          "TRNG": 3
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "DPA": 1,
          "Physical Probing": 1,
          "SPA": 1,
          "physical probing": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 25": 2,
          "AIS 26": 2,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 3,
          "AIS 37": 2,
          "AIS 46": 4,
          "AIS26": 1,
          "AIS31": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        },
        "DES": {
          "3DES": {
            "TDES": 2
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Broadcom": {
          "Broadcom": 17
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20160310152533+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, EAL 5, Broadcom, memory encryption, SOGIS MRA\"",
      "/ModDate": "D:20160311085504+01\u002700\u0027",
      "/Producer": "LibreOffice 4.2",
      "/Subject": "secure processing system",
      "/Title": "Certification Report BSI-DSZ-CC-0915-2016",
      "pdf_file_size_bytes": 1152250,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.sogisportal.eu/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 36
    },
    "st_filename": "0915b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 22
          },
          "ECDH": {
            "ECDH": 10
          },
          "ECDSA": {
            "ECDSA": 37
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.AES": 7,
          "O.ECC": 11,
          "O.HMAC": 10,
          "O.RND": 4,
          "O.RSA": 10,
          "O.SHA": 6,
          "O.TDES": 8
        },
        "T": {
          "T.RND": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 3,
          "ADV_IMP.1": 2,
          "ADV_INT.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 3,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 10,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 12
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 4,
          "EAL 5 augmented": 2,
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL5": 6,
          "EAL5 augmented": 3,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS": 1,
          "FAU_SAS.1": 8,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM": 47,
          "FCS_CKM.1": 30,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 5,
          "FCS_CKM.4": 30,
          "FCS_CKM.4.1": 3,
          "FCS_COP": 93,
          "FCS_COP.1": 9,
          "FCS_COP.1.1": 9,
          "FCS_RNG": 3,
          "FCS_RNG.1": 8
        },
        "FDP": {
          "FDP_ACC": 10,
          "FDP_ACC.1": 24,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 11,
          "FDP_ACF.1": 20,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 20,
          "FDP_IFF.1": 2,
          "FDP_ITC.1": 26,
          "FDP_ITC.2": 26,
          "FDP_ITT.1": 10,
          "FDP_SDC.1": 9,
          "FDP_SDC.1.1": 1,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 9,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UCT.1": 11,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 11,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 1,
          "FMT_LIM.1": 6,
          "FMT_LIM.2": 6,
          "FMT_MSA.1": 13,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 18,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 11,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 6
        },
        "FPT": {
          "FPT_FLS.1": 11,
          "FPT_ITT.1": 9,
          "FPT_PHP.3": 11,
          "FPT_TST": 4,
          "FPT_TST.1": 8,
          "FPT_TST.2": 31,
          "FPT_TST.2.1": 2
        },
        "FRU": {
          "FRU_FLT.2": 9
        },
        "FTP": {
          "FTP_ITC.1": 17,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 14
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 9
        },
        "OFB": {
          "OFB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "KEX": {
          "Key Exchange": 3
        },
        "MAC": {
          "MAC": 11
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP192r1": 5,
          "brainpoolP192t1": 5,
          "brainpoolP224r1": 6,
          "brainpoolP224t1": 6,
          "brainpoolP256r1": 6,
          "brainpoolP256t1": 6,
          "brainpoolP384r1": 6,
          "brainpoolP384t1": 6,
          "brainpoolP512r1": 6,
          "brainpoolP512t1": 6
        },
        "NIST": {
          "secp192r1": 9,
          "secp224r1": 7,
          "secp256r1": 8,
          "secp384r1": 7,
          "secp521r1": 7
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA1": 6
          },
          "SHA2": {
            "SHA224": 4,
            "SHA256": 9,
            "SHA384": 4,
            "SHA512": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 7,
          "RNG": 8
        },
        "TRNG": {
          "TRNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Malfunction": 11
        },
        "SCA": {
          "DPA": 4,
          "Physical Probing": 4,
          "SPA": 1,
          "physical probing": 1,
          "side channel": 2,
          "side\u2010channel": 3
        },
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 1,
          "AIS31": 4,
          "AIS32": 1
        },
        "FIPS": {
          "FIPS PUB 197": 1
        },
        "PKCS": {
          "PKCS#1": 11
        },
        "RFC": {
          "RFC 3447": 1,
          "RFC3447": 12
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 46,
            "AES128": 1,
            "AES192": 1,
            "AES256": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "TDEA": 1,
            "TDES": 35
          },
          "DES": {
            "DES": 8
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 5,
            "HMAC": 33
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Broadcom": {
          "Broadcom": 189
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Mark Buer",
      "/CreationDate": "D:20160214132423-08\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/Keywords": "Broadcom, Security Target, ASIC, SPS02, embedded systems, crypto accelerators, secure processing system, die isolated hard macro, RNG, RSA, AES, TDES, HMAC, Elliptic Curve, secure memory, embedded flash",
      "/ModDate": "D:20160308085105-08\u002700\u0027",
      "/Producer": "Acrobat Distiller 9.5.2 (Windows)",
      "/Subject": "Security Target Lite for the BCM_SPS02 Version 1.0",
      "/Title": "Microsoft Word - Securtiy_Target_lite_for_BCM_SPS02_v1.0.docx",
      "pdf_file_size_bytes": 698532,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 94
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "AVA_VAN.5",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b3af4619d497ef0a9cd93c15bcc608ca576eeb7b8c8d047c3a937678e6d0f861",
      "txt_hash": "036786466ecfb3683067efe6e695a332d4349beadb9895c04b902fbb855bfbf6"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "70618d63f11aacf4b5679f502761745cdabfdd012939709a9dd2e7703ba23d94",
      "txt_hash": "80c4d9ba965f252796be56e3e2324402953175e106ba7e89b17e04687629957a"
    }
  },
  "status": "archived"
}