Philips P5CC036V1D Secure Smart Card Controller with Cryptographic Libraries IC Dedicated Support Software

CSV information ?

Status archived
Valid from 10.03.2006
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer Philips Semiconductors GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_IMP.2, AVA_MSU.3, ALC_DVS.2, EAL4+, AVA_VLA.4

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0296-2006

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES, TDES, Triple-DES, CBC-MAC
Asymmetric Algorithms
RSA-CRT
Hash functions
SHA-1, MD5
Randomness
RNG, RND
Engines
SmartMX
Block cipher modes
ECB, CBC

Vendor
Philips

Security level
EAL4, EAL 1, EAL 7, EAL 4, EAL4+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL4 augmented
Claims
O.C, T.RND, R.O
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1.1, FCS_RND.1, FCS_RND.2, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_ITT.1, FDP_RIP.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FPT_TST.2, FRU_FLT.2
Protection profiles
BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0296-2006, BSI-DSZ-CC-0293-2005, BSI-DSZ-CC-0296

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, physical tampering, Malfunction, DFA
Certification process
Secured Crypto Library on the P5CC036V1D - Security Target, Revision 2.0.0, 23.11.2005 (confidential document) [7] Philips Semiconductors Evaluation Documentation: Secured Crypto Library on the P5CC036V1D-, 2.1.0, 6.12.2005 [8] Evaluation Technical Report; BSI-DSZ-CC-0296; Version 1.1; Feb 9th, 2006 (confidential document) [9] Bundesamt für Sicherheit in der Informationstechnik (BSI): Smartcard IC Platform Protection, AIS36 as summary of the Evaluation Technical Report; BSI-DSZ-CC-0296; Version 1.1; Feb 8th, 2006 (confidential document) B-25 BSI-DSZ-CC-0296-2006 Certification Report This page is intentionally left blank. B-26

Standards
AIS 34, AIS 32, AIS 36, AIS 25, AIS 26, AIS 31, AIS 20, AIS36, ISO/IEC 15408:1999, ISO/IEC15408: 1999
Technical reports
BSI 7125, BSI 7148, BSI 7149

File metadata

Title Certification Report BSI-DSZ-CC-0296-2006
Keywords Philips P5CC036V1D Secure Smart Card Controller with Cryptographic Library; CC; BSI-DSZ-CC-0296-2006, Philips Semiconductors GmbH
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20060313075213+01'00'
Modification date D:20060313083146+01'00'
Pages 48
Creator Acrobat PDFMaker 7.0.5 für Word
Producer Acrobat Distiller 7.0.5 (Windows)

Frontpage

Certificate ID BSI-DSZ-CC-0296-2006
Certified item Philips P5CC036V1D Secure Smart Card Controller with Cryptographic Library as IC Dedicated Support Software
Certification lab BSI
Developer Philips Semiconductors GmbH Business Line Identification

References

Outgoing
  • BSI-DSZ-CC-0293-2005 - archived - Philips P5CC036V1D and P5CC009V1D with specific IC Dedicated Software Secure Smart Card Controller
Incoming
  • BSI-DSZ-CC-0368-2006 - archived - Philips P5CC036V1D Secure Smart Card Controller with Cryptographic Library as IC Dedicated Support Software
  • ANSSI-CC-2007/18 - archived - Application Morpho-Citiz 32 embedded on PHILIPS/NXP P5CC036V1-D microcontroller (ref.: MC32/P5CC036V1D/1.0.0)

Security target ?

Extracted keywords

Symmetric Algorithms
DES, DEA, Triple-DES, 3DES, TDES, HMAC, CBC-MAC
Asymmetric Algorithms
RSA-CRT, ECC
Hash functions
SHA-1
Schemes
MAC
Randomness
TRNG, RND, RNG
Engines
SmartMX
Block cipher modes
ECB, CBC

Vendor
Infineon, Philips

Security level
EAL4, EAL 4, EAL 5, EAL4+, EAL5+, EAL4 augmented, EAL 4 augmented, EAL 5 augmented
Claims
O.RND, O.MF_FW, O.MEM_ACCESS, O.SFR_ACCESS, O.RSA, O.COPY, O.REUSE, T.RND
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_SCP.3, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_SPM.1, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_IMP.1, ADV_FSP.3, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_DVS.1, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_SOF.1, AVA_MSU.2, AVA_VLA.2, ASE_REQ
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RND.2, FCS_RND, FCS_RND.1, FCS_COP.1, FCS_CKM.1, FCS_COP.1.1, FCS_CKM.4, FCS_CKM.2, FCS_CKM.1.1, FCS_RND.2.1, FCS_CKM, FCS_COP, FCS_RND.1.1, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ITC.1, FDP_RIP.1.1, FDP_RIP, FDP_ITT, FDP_ITT.1.1, FDP_SDI.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_MSA.2, FMT_SMR.1, FPT_TST.2, FPT_TST, FPT_FLS.1, FPT_SEP.1, FPT_PHP.3, FPT_ITT.1, FPT_FLS.1.1, FPT_AMT.1, FPT_TST.2.1, FPT_ITT, FPT_ITT.1.1, FPT_TST.1, FPT_AMT, FPT_RND.1, FPT_RND.2, FRU_FLT.2
Protection profiles
BSI-PP-0002-2001, BSI-PP-000
Certificates
BSI-DSZ-CC-0296, BSI-DSZ-CC-0293-2005

Side-channel analysis
Leak-Inherent, Physical Probing, side channel, SPA, DPA, timing attacks, Timing attacks, Timing attack, Malfunction, malfunction, DFA, fault induction, fault injection

Standards
FIPS PUB 81, FIPS 180-1, FIPS PUB 46-3, FIPS PUB 180-1, AIS 86, AIS32, AIS31, AIS20, ISO/IEC 9796, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title Security Target
Author Frank Graeber
Creation date D:20051206163919+01'00'
Modification date D:20051206165422+01'00'
Pages 88
Creator Acrobat PDFMaker 6.0 for Word
Producer Acrobat Distiller 6.0.1 (Windows)

References

Outgoing
  • BSI-DSZ-CC-0293-2005 - archived - Philips P5CC036V1D and P5CC009V1D with specific IC Dedicated Software Secure Smart Card Controller
Incoming
  • ANSSI-CC-2007/18 - archived - Application Morpho-Citiz 32 embedded on PHILIPS/NXP P5CC036V1-D microcontroller (ref.: MC32/P5CC036V1D/1.0.0)

Heuristics ?

Certificate ID: BSI-DSZ-CC-0296-2006

Extracted SARs

ADV_LLD.1, AVA_VLA.4, ALC_DVS.2, ATE_DPT.1, ATE_FUN.1, ASE_SRE.1, ATE_IND.2, ASE_TSS.1, ADV_IMP.2, ADV_HLD.2, ASE_PPC.1, ALC_TAT.1, ASE_REQ.1, ATE_COV.2, AVA_SOF.1, ASE_DES.1, ASE_ENV.1, ADV_RCR.1, ASE_OBJ.1, AGD_USR.1, ADV_SPM.1, AVA_MSU.3, ASE_INT.1, AGD_ADM.1, ALC_LCD.1, ADV_FSP.3

Similar certificates

Name Certificate ID
Philips P5CC036V1D Secure Smart Card Controller with Cryptographic Library as IC Dedicated Support Software BSI-DSZ-CC-0368-2006 Compare
NXP P5CC036V1D Secure Smart Card Controller with Cryptographic Library as IC Dedicated Support Software BSI-DSZ-CC-0584-2009 Compare
Philips P5CC036V1D and P5CC009V1D with specific IC Dedicated Software Secure Smart Card Controller BSI-DSZ-CC-0293-2005 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software BSI-DSZ-CC-0827-V8-2020 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Toolbox, Base, FTL, SCL, HCL, and PSL, and with specific IC dedicated software BSI-DSZ-CC-0827-V7-2018 Compare
Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 - RSA4096 v1.03.006 / v2.05.005 - EC v1.03.006 / v2.05.005 - Toolbox v1.03.006 / v2.05.005 - Base v1.03.006 / v2.05.005 - FTL v1.01.0008 - SCL v2.01.011 - PSL v4.00.009 and with specific IC dedicated software BSI-DSZ-CC-0827-V4-2016 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000011h, IFX_CCI_00001Bh, IFX_CCI_00001Eh, IFX_CCI_000025h, design step G12 with optional libraries and with specific IC dedicated software BSI-DSZ-CC-1025-V4-2021 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software BSI-DSZ-CC-1025-V3-2020 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software BSI-DSZ-CC-1025-V2-2019 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 with optional libraries and with specific IC dedicated software BSI-DSZ-CC-0961-V5-2020 Compare
Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software BSI-DSZ-CC-0554-2009 Compare
Infineon smart card IC (Security Controller) M7801 A12 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software BSI-DSZ-CC-0606-2010 Compare
Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software BSI-DSZ-CC-0640-2010 Compare
Infineon Smart Card IC (Security Controller) SLE66CX126PE / M2160-k11 and SLE66CX86PE / M2161-k11 both with optional libraries RSA V1.6, EC V1.1 and SHA-2 V1.0 both with specific IC dedicated software BSI-DSZ-CC-0627-2009 Compare
Infineon Smart Card IC (Security Controller) SLE66CX162PE / m1531-a25 and SLE66CX80PE / m1533-a25 all with optional libraries RSA V1.6, EC, V1.1, SHA-2 V1.0 and both with specific IC dedicated software BSI-DSZ-CC-0629-2010 Compare
Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0728-2011 Compare
Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software BSI-DSZ-CC-0829-V2-2015 Compare
Infineon smart card IC (Security Controller) M7820 M11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0695-2011 Compare
Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0813-2012 Compare
Infineon smart card IC (Security Controller) M7801 A12 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0727-2011 Compare
Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software BSI-DSZ-CC-0829-2012 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000007h, IFX_CCI_000009h, IFX_CCI_00000Ah, IFX_CCI_00000Bh, IFX_CCI_000016h, IFX_CCI_000017h, IFX_CCI_000018h, IFX_CCI_000023h, IFX_CCI_000024h design step G13 with optional libraries CIPURSEâ„¢ CL, RSA2048/4096, EC, Toolbox, HSL, SCL and with specific IC dedicated software BSI-DSZ-CC-0961-V3-2018 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software BSI-DSZ-CC-0827-2013 Compare
NXP Secure Smart Card Controller MF3F60x1 with IC Dedicated Support Software BSI-DSZ-CC-0587-2010 Compare
Philips Secure Smart Card Controller P5CD009V2B with specific IC Dedicated Software BSI-DSZ-CC-0361-2006 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software BSI-DSZ-CC-0827-V2-2014 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 00022Dh, design step H13 with optional libraries CIPURSEâ„¢ CL, RSA2048/4096, EC, Toolbox, HSL, MCS, SCL and with specific IC dedicated software BSI-DSZ-CC-0945-V3-2018 Compare
Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software BSI-DSZ-CC-0827-V3-2015 Compare
Infineon Smart Card IC (Security Controller) SLE66CX680PE / M1534-a14, SLE66CX360PE / M1536-a14, SLE66CX182PE / M1564-a14, SLE66CX480PE / M1565-a14 and SLE66CX482PE / M1577-a14 all with optional libraries RSA V1.6, EC V1.1, SHA-2 V1.0 and with specific IC dedicated software BSI-DSZ-CC-0628-2009 Compare
Infineon Technologies Smart Card IC (Security Controller) M5072 with optional RSA v1.03.006/v2.06.003, EC v1.03.006/ v2.06.003, Toolbox v1.03.006/ v2.06.003, SCL v2.02.010 libraries with specific IC dedicated software BSI-DSZ-CC-0946-V3-2017 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library BSI-DSZ-CC-1040-2019 Compare
Philips P5CC036V1C and P5CC009V1C with specific IC Dedicated Software Secure Smart Card Controller BSI-DSZ-CC-0311-2005 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries CCL V02.00.0005, RSA2048/4096 V2.07.003, EC V2.07.003, Toolbox V2.07.003, HSL V2.01.6198, SCL V2.04.002 and with specific IC dedicated software BSI-DSZ-CC-1025-2018 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22/G11, M9905 A11, M9906 A11 with optional RSA v1.03.006/v2.05.005, EC v1.03.006/v2.05.005, Toolbox v1.03.006/v2.05.005, Flash Translation Layer V1.01.0008, SCL v2.01.011/v2.02.010 and PSL v4.00.009 libraries with specific IC dedicated software BSI-DSZ-CC-0827-V5-2017 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1) BSI-DSZ-CC-1149-2022 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 with optional libraries CCL V2.0.0002, RSA2048/4096 V2.07.003 / V2.06.003, EC V2.07.003 / V2.06.003, Toolbox V2.07.003 / V2.06.003, HSL V02.01.6634 / V01.22.4346, SCL V2.02.010 and with specific IC dedicated software BSI-DSZ-CC-0961-V2-2018 Compare
Infineon Smart Card IC (Security Controller) SLE66CLX800PE m1581-k11/a15, SLE66CLX800PEM m1580-k11/a15, SLE66CLX800PES m1582-k11/a15, SLE66CX800PE m1599-k11/a15, SLE66CLX360PE m1587-k11/a15, SLE66CLX360PEM m1588-k11/a15, SLE66CLX360PES m1589-k11/a15, SLE66CLX180PE m2080-a15, SLE66CLX180PEM m2081-a15, SLE66CLX120PE m2082-a15, SLE66CLX120PEM m2083-a15 all with optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 all with specific IC dedicated software BSI-DSZ-CC-0626-2009 Compare
Infineon Smart Card IC (Security Controller) SLE66CLX206PEM / m2084-a11, SLE66CLX206PE / m2085-a11, SLE66CLX206PES / m2086-a11, SLE66CDX206PEM / m2099-a11, SLE66CLX203PEM / m2098-a11, SLE66CLX207PEM / m2980-a11, SLE66CLX207PE / m2981-a11, SLE66CLX207PES / m2982-a11, SLE66CLX126PEM / m2087-a11, SLE66CLX126PE / m2088-a11, SLE66CLX126PES / m2089-a11, SLE66CLX127PEM / m2997-a11, SLE66CLX127PE / m2998-a11, SLE66CLX127PES / m2999-a11, all with optional libraries RSA V1.6, EC V1.1, SHA-2 V1.0 and all with specific IC dedicated software BSI-DSZ-CC-0593-2009 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22/G11/C22/D22, M9905 A11, M9906 A11 with optional RSA v1.03.006/v2.05.005/v2.07.003, EC v1.03.006/v2.05.005/v2.07.003, Toolbox v1.03.006/v2.05.005/v2.07.003, Flash Translation Layer V1.01.0008, SCL v2.01.011/v2.02.010 and PSL v4.00.09 libraries with specific IC dedicated software BSI-DSZ-CC-0827-V6-2017 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 00022Dh, design step H13 with optional libraries CCL V2.0.0002, RSA2048/4096 V2.07.003 / V2.06.003, EC V2.07.003 / V2.06.003, Toolbox V2.07.003 / V2.06.003, HSL V02.01.6634 / V01.22.4346, MCS V02.02.3389 / V02.03.3446, SCL V2.02.010 and with specific IC dedicated software BSI-DSZ-CC-0945-V2-2018 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 with optional libraries CCL V02.00.0004, RSA2048/4096 V2.08.007 / V2.07.003 / V2.06.003, EC V2.08.007 / V2.07.003 / V2.06.003, Toolbox V2.08.007 / V2.07.003 / V2.06.003, HSL V03.12.8812 / V03.11.8339 / V02.01.6634 / V01.22.4346, SCL V2.04.002 / V2.02.010 and with specific IC dedicated software BSI-DSZ-CC-0961-V4-2019 Compare
Philips Secure Smart Card Controller P5CT072V0P, P5CC072V0P,P5CD072V0P and P5CD036V0P each with specific IC Dedicated Software BSI-DSZ-CC-0348-2006 Compare
NXP Smart Card Controller P5CD144V0B with IC Dedicated Software, Secured Crypto Library Release 2.0 BSI-DSZ-CC-0440-2008 Compare
NXP Smart Card Controller P5CC052V0A with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0551-2008 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1149-V2-2023 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1149-V3-2023 Compare
NXP Smart Card Controller P5CC037V0A with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0550-2008 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1136-V2-2022 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) BSI-DSZ-CC-1136-V3-2022 Compare
NXP Smart Card Controller P5CD040V0B with IC dedicated software: Secured Crypto Library Release 2.0 to EAL5+ BSI-DSZ-CC-0439-2008 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) BSI-DSZ-CC-1136-V4-2024 Compare
Philips Secure Smart Card Controller P5CT072V0Q, P5CD072V0Q,P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software BSI-DSZ-CC-0349-2006 Compare
Philips Secure Smart Card Controller P5CT072V0N including OM9500/1 and OM9501/2, P5CD072V0N and P5CD036V0N with specific IC Dedicated Software BSI-DSZ-CC-0312-2005 Compare
NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0A, P5CC012V0A all with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0549-2008 Compare
NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0a and P5CC012V0A each with IC Dedicated Software: Secured Crypto Library Release 2.0 to CC EAL5+ BSI-DSZ-CC-0464-2008 Compare
Infineon smart card IC (Security Controller) M9900 A21 with specific IC dedicated software BSI-DSZ-CC-0791-2012 Compare
Infineon Smart Card IC (Security Controller), SLE66CL80P / m1457a14 and SLE66CL81P / m1436a14 with specific IC Dedicated Software BSI-DSZ-CC-0401-2006 Compare
Infineon Smart Card IC (Security Controller) SLE66CX642P/m1485b16 with RSA 2048 V1.30 and specific IC Dedicated Software BSI-DSZ-CC-0315-2005 Compare
Infineon Smart Card IC (Security Controller) SLE66CL80P/m1457-a14 and SLE66CL81P/m1436-a14 with specific IC Dedicated Software BSI-DSZ-CC-0354-2006 Compare
Infineon Smart Card IC (Security Controller) SLE66CLX320P / m1559b19 and SLE66CLX321P / m1359b19 both with RSA2048 V1.3 and specific IC Dedicated Software BSI-DSZ-CC-0337-2005 Compare
Infineon Smart Card IC (Security Controller) SLE66CX322P/m1484b14 and m1484f18 with RSA 2048 V1.30 and specific IC Dedicated Software BSI-DSZ-CC-0266-2005 Compare
Showing 5 out of 61.

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1b29aabd7e67afea023f82904b5bdd37a438499922da77d6d9a656e0a2a15802', 'txt_hash': '49b9000541fdccf5dd46d049345229bfb8878dcf964c14fe639f44338d491222'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '64ca9e85c3cefb95430d497a28a7124b06c0c3193c0c2daeba091292fb79f390', 'txt_hash': '77b21024ac530acc7fd244b7153844c98d3807bed567b162fee9c16c87cdd9cd'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 704289, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 48, '/CreationDate': "D:20060313075213+01'00'", '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Creator': 'Acrobat PDFMaker 7.0.5 für Word', '/Keywords': 'Philips P5CC036V1D Secure Smart Card Controller with Cryptographic Library; CC; BSI-DSZ-CC-0296-2006, Philips Semiconductors GmbH', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20060313083146+01'00'", '/Company': 'BSI, Postfach 200363, 53133 Bonn', '/SourceModified': 'D:20060313065152', '/Category': 'Common Criteria', '/Title': 'Certification Report BSI-DSZ-CC-0296-2006', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 739322, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 88, '/ModDate': "D:20051206165422+01'00'", '/CreationDate': "D:20051206163919+01'00'", '/Title': 'Security Target', '/Creator': 'Acrobat PDFMaker 6.0 for Word', '/Producer': 'Acrobat Distiller 6.0.1 (Windows)', '/Author': 'Frank Graeber', '/Company': 'Philips Semiconductors BL ID / CC', '/philips_smx_cl_docpath': 'H:\\\\projects\\\\P5_CryptoLib\\\\Doc\\\\Evaluation', '/SourceModified': 'D:20051206153317', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cacr.math.uwaterloo.ca/hac/']}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0296-2006', 'cert_item': 'Philips P5CC036V1D Secure Smart Card Controller with Cryptographic Library as IC Dedicated Support Software', 'developer': 'Philips Semiconductors GmbH Business Line Identification', 'cert_lab': 'BSI'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0296-2006': 22, 'BSI-DSZ-CC-0293-2005': 3, 'BSI-DSZ-CC-0296': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 6}}, 'cc_security_level': {'EAL': {'EAL4': 14, 'EAL 1': 1, 'EAL 7': 1, 'EAL 4': 1, 'EAL4+': 1, 'EAL1': 5, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL4 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 2, 'ACM_SCP.2': 2, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_DEL': 2, 'ADO_IGS': 2}, 'ADV': {'ADV_IMP.2': 5, 'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 6, 'AVA_SOF.1': 1, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 4, 'AVA_VLA': 4, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'ASE': {'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_PPC.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_COP.1': 3, 'FCS_COP.1.1': 1, 'FCS_CKM.1.1': 1, 'FCS_RND.1': 1, 'FCS_RND.2': 1}, 'FDP': {'FDP_ACC.1': 2, 'FDP_ACF.1': 2, 'FDP_IFC.1': 1, 'FDP_ITT.1': 2, 'FDP_RIP.1': 1}, 'FMT': {'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_MSA.1': 2, 'FMT_MSA.3': 2, 'FMT_SMF.1': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_ITT.1': 2, 'FPT_PHP.3': 1, 'FPT_SEP.1': 1, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}}, 'cc_claims': {'O': {'O.C': 1}, 'T': {'T.RND': 2}, 'R': {'R.O': 1}}, 'vendor': {'Philips': {'Philips': 45}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 14}, '3DES': {'TDES': 2, 'Triple-DES': 4}}, 'constructions': {'MAC': {'CBC-MAC': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 4}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 13}}, 'MD': {'MD5': {'MD5': 5}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 9, 'RND': 2}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 27}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'Physical Probing': 1, 'physical probing': 1, 'side channel': 5}, 'FI': {'physical tampering': 1, 'Malfunction': 1, 'DFA': 3}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS 32': 1, 'AIS 36': 4, 'AIS 25': 1, 'AIS 26': 2, 'AIS 31': 2, 'AIS 20': 2, 'AIS36': 1}, 'ISO': {'ISO/IEC 15408:1999': 1, 'ISO/IEC15408: 1999': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'Secured Crypto Library on the P5CC036V1D - Security Target, Revision 2.0.0, 23.11.2005 (confidential document) [7] Philips Semiconductors Evaluation Documentation: Secured Crypto Library on the P5CC036V1D-': 1, '2.1.0, 6.12.2005 [8] Evaluation Technical Report; BSI-DSZ-CC-0296; Version 1.1; Feb 9th, 2006 (confidential document) [9] Bundesamt für Sicherheit in der Informationstechnik (BSI): Smartcard IC Platform Protection': 1, 'AIS36 as summary of the Evaluation Technical Report; BSI-DSZ-CC-0296; Version 1.1; Feb 8th, 2006 (confidential document) B-25 BSI-DSZ-CC-0296-2006 Certification Report This page is intentionally left blank. B-26': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0296': 90, 'BSI-DSZ-CC-0293-2005': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 16, 'BSI-PP-000': 1}}, 'cc_security_level': {'EAL': {'EAL4': 29, 'EAL 4': 2, 'EAL 5': 1, 'EAL4+': 20, 'EAL5+': 3, 'EAL4 augmented': 2, 'EAL 4 augmented': 2, 'EAL 5 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 1, 'ACM_SCP.2': 2, 'ACM_SCP.3': 1, 'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 1, 'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_IMP.2': 5, 'ADV_SPM.1': 3, 'ADV_FSP.2': 2, 'ADV_HLD.2': 2, 'ADV_LLD.1': 2, 'ADV_RCR.1': 2, 'ADV_IMP.1': 1, 'ADV_FSP.3': 1}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2, 'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 5, 'ALC_LCD.1': 1, 'ALC_TAT.1': 2, 'ALC_DVS.1': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 1, 'ATE_FUN.1': 2, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 8, 'AVA_SOF.1': 3, 'AVA_MSU.2': 1, 'AVA_VLA.2': 1}, 'ASE': {'ASE_REQ': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RND.2': 26, 'FCS_RND': 7, 'FCS_RND.1': 14, 'FCS_COP.1': 65, 'FCS_CKM.1': 36, 'FCS_COP.1.1': 3, 'FCS_CKM.4': 14, 'FCS_CKM.2': 14, 'FCS_CKM.1.1': 1, 'FCS_RND.2.1': 2, 'FCS_CKM': 2, 'FCS_COP': 1, 'FCS_RND.1.1': 1}, 'FDP': {'FDP_ITT.1': 34, 'FDP_IFC.1': 30, 'FDP_ACC.1': 26, 'FDP_ACF.1': 18, 'FDP_RIP.1': 7, 'FDP_ITC.1': 15, 'FDP_RIP.1.1': 1, 'FDP_RIP': 2, 'FDP_ITT': 1, 'FDP_ITT.1.1': 1, 'FDP_SDI.1': 1}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 3, 'FMT_MSA.3': 18, 'FMT_MSA.1': 21, 'FMT_SMF.1': 6, 'FMT_MSA.2': 17, 'FMT_SMR.1': 8}, 'FPT': {'FPT_TST.2': 34, 'FPT_TST': 12, 'FPT_FLS.1': 23, 'FPT_SEP.1': 6, 'FPT_PHP.3': 7, 'FPT_ITT.1': 37, 'FPT_FLS.1.1': 1, 'FPT_AMT.1': 4, 'FPT_TST.2.1': 2, 'FPT_ITT': 1, 'FPT_ITT.1.1': 1, 'FPT_TST.1': 13, 'FPT_AMT': 1, 'FPT_RND.1': 1, 'FPT_RND.2': 1}, 'FRU': {'FRU_FLT.2': 13}}, 'cc_claims': {'O': {'O.RND': 15, 'O.MF_FW': 4, 'O.MEM_ACCESS': 7, 'O.SFR_ACCESS': 7, 'O.RSA': 7, 'O.COPY': 8, 'O.REUSE': 6}, 'T': {'T.RND': 6}}, 'vendor': {'Infineon': {'Infineon': 1}, 'Philips': {'Philips': 160}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 49, 'DEA': 1}, '3DES': {'Triple-DES': 23, '3DES': 17, 'TDES': 1}}, 'constructions': {'MAC': {'HMAC': 1, 'CBC-MAC': 12}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 32}, 'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 76}}}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 21, 'RNG': 104}}, 'cipher_mode': {'ECB': {'ECB': 11}, 'CBC': {'CBC': 17}}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 67}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 13, 'Physical Probing': 2, 'side channel': 24, 'SPA': 28, 'DPA': 13, 'timing attacks': 12, 'Timing attacks': 3, 'Timing attack': 1}, 'FI': {'Malfunction': 13, 'malfunction': 1, 'DFA': 59, 'fault induction': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 81': 3, 'FIPS 180-1': 2, 'FIPS PUB 46-3': 2, 'FIPS PUB 180-1': 1}, 'BSI': {'AIS 86': 1, 'AIS32': 2, 'AIS31': 3, 'AIS20': 2}, 'ISO': {'ISO/IEC 9796': 4}, 'CC': {'CCIMB-99-031': 2, 'CCIMB-99-032': 2, 'CCIMB-99-033': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0296a.pdf.
    • The st_filename property was set to 0296b.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0296-2006.
    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2007/18']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2007/18']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0293-2005']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0293-2005']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0368-2006', 'ANSSI-CC-2007/18']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0368-2006', 'BSI-DSZ-CC-0358-2006', 'BSI-DSZ-CC-0661-2011', 'ANSSI-CC-2007/18']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0293-2005']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0293-2005']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0296a.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0296b.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Philips P5CC036V1D Secure Smart Card Controller with Cryptographic Libraries IC Dedicated Support Software was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "35d36bf9a17db05f",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0296-2006",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ENV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_PPC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_DES",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0368-2006",
          "ANSSI-CC-2007/18"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0293-2005"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0358-2006",
          "BSI-DSZ-CC-0661-2011",
          "BSI-DSZ-CC-0368-2006",
          "ANSSI-CC-2007/18"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0293-2005"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2007/18"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0293-2005"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2007/18"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0293-2005"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Philips Semiconductors GmbH",
  "manufacturer_web": "https://www.philips.com/",
  "name": "Philips P5CC036V1D Secure Smart Card Controller with Cryptographic Libraries IC Dedicated Support Software",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2006-03-10",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0296a.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0296-2006",
        "cert_item": "Philips P5CC036V1D Secure Smart Card Controller with Cryptographic Library as IC Dedicated Support Software",
        "cert_lab": "BSI",
        "developer": "Philips Semiconductors GmbH Business Line Identification",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA-CRT": 4
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0293-2005": 3,
          "BSI-DSZ-CC-0296": 3,
          "BSI-DSZ-CC-0296-2006": 22
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 1
        },
        "R": {
          "R.O": 1
        },
        "T": {
          "T.RND": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 6
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 2,
          "ACM_AUT.1": 2,
          "ACM_CAP": 2,
          "ACM_CAP.4": 2,
          "ACM_SCP": 2,
          "ACM_SCP.2": 2
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.2": 2,
          "ADO_IGS": 2,
          "ADO_IGS.1": 2
        },
        "ADV": {
          "ADV_FSP": 2,
          "ADV_FSP.2": 1,
          "ADV_HLD": 2,
          "ADV_HLD.2": 1,
          "ADV_IMP": 2,
          "ADV_IMP.2": 5,
          "ADV_INT": 2,
          "ADV_LLD": 2,
          "ADV_LLD.1": 1,
          "ADV_RCR": 2,
          "ADV_RCR.1": 1,
          "ADV_SPM": 2,
          "ADV_SPM.1": 1
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_ADM.1": 1,
          "AGD_USR": 2,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.2": 6,
          "ALC_FLR": 2,
          "ALC_LCD": 1,
          "ALC_LCD.1": 2,
          "ALC_TAT": 2,
          "ALC_TAT.1": 2
        },
        "ASE": {
          "ASE_DES.1": 1,
          "ASE_ENV.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_PPC.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SRE.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_COV.2": 1,
          "ATE_DPT": 2,
          "ATE_DPT.1": 1,
          "ATE_FUN": 2,
          "ATE_FUN.1": 1,
          "ATE_IND": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_MSU": 2,
          "AVA_MSU.3": 5,
          "AVA_SOF": 4,
          "AVA_SOF.1": 1,
          "AVA_VLA": 4,
          "AVA_VLA.2": 1,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 1,
          "EAL 7": 1,
          "EAL1": 5,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 14,
          "EAL4 augmented": 2,
          "EAL4+": 1,
          "EAL5": 6,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_CKM.1.1": 1,
          "FCS_COP.1": 3,
          "FCS_COP.1.1": 1,
          "FCS_RND.1": 1,
          "FCS_RND.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 2,
          "FDP_ACF.1": 2,
          "FDP_IFC.1": 1,
          "FDP_ITT.1": 2,
          "FDP_RIP.1": 1
        },
        "FMT": {
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MSA.1": 2,
          "FMT_MSA.3": 2,
          "FMT_SMF.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_ITT.1": 2,
          "FPT_PHP.3": 1,
          "FPT_SEP.1": 1,
          "FPT_TST.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "2.1.0, 6.12.2005 [8] Evaluation Technical Report; BSI-DSZ-CC-0296; Version 1.1; Feb 9th, 2006 (confidential document) [9] Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI): Smartcard IC Platform Protection": 1,
          "AIS36 as summary of the Evaluation Technical Report; BSI-DSZ-CC-0296; Version 1.1; Feb 8th, 2006 (confidential document) B-25 BSI-DSZ-CC-0296-2006 Certification Report This page is intentionally left blank. B-26": 1,
          "Secured Crypto Library on the P5CC036V1D - Security Target, Revision 2.0.0, 23.11.2005 (confidential document) [7] Philips Semiconductors Evaluation Documentation: Secured Crypto Library on the P5CC036V1D-": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 27
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 5
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 13
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 9
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 3,
          "Malfunction": 1,
          "physical tampering": 1
        },
        "SCA": {
          "Leak-Inherent": 1,
          "Physical Probing": 1,
          "physical probing": 1,
          "side channel": 5
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS 25": 1,
          "AIS 26": 2,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 36": 4,
          "AIS36": 1
        },
        "ISO": {
          "ISO/IEC 15408:1999": 1,
          "ISO/IEC15408: 1999": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "TDES": 2,
            "Triple-DES": 4
          },
          "DES": {
            "DES": 14
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Philips": {
          "Philips": 45
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Category": "Common Criteria",
      "/Company": "BSI, Postfach 200363, 53133 Bonn",
      "/CreationDate": "D:20060313075213+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0.5 f\u00fcr Word",
      "/Keywords": "Philips P5CC036V1D Secure Smart Card Controller with Cryptographic Library; CC; BSI-DSZ-CC-0296-2006, Philips Semiconductors GmbH",
      "/ModDate": "D:20060313083146+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/SourceModified": "D:20060313065152",
      "/Title": "Certification Report BSI-DSZ-CC-0296-2006",
      "pdf_file_size_bytes": 704289,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 48
    },
    "st_filename": "0296b.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        },
        "RSA": {
          "RSA-CRT": 32
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0293-2005": 2,
          "BSI-DSZ-CC-0296": 90
        }
      },
      "cc_claims": {
        "O": {
          "O.COPY": 8,
          "O.MEM_ACCESS": 7,
          "O.MF_FW": 4,
          "O.REUSE": 6,
          "O.RND": 15,
          "O.RSA": 7,
          "O.SFR_ACCESS": 7
        },
        "T": {
          "T.RND": 6
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-000": 1,
          "BSI-PP-0002-2001": 16
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_AUT.1": 2,
          "ACM_CAP": 1,
          "ACM_CAP.4": 1,
          "ACM_SCP": 1,
          "ACM_SCP.2": 2,
          "ACM_SCP.3": 1
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_DEL.2": 2,
          "ADO_IGS": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.2": 2,
          "ADV_FSP.3": 1,
          "ADV_HLD.2": 2,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 5,
          "ADV_LLD.1": 2,
          "ADV_RCR.1": 2,
          "ADV_SPM.1": 3
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_ADM.1": 2,
          "AGD_USR": 1,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 5,
          "ALC_LCD": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2
        },
        "ASE": {
          "ASE_REQ": 1
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_MSU.2": 1,
          "AVA_MSU.3": 5,
          "AVA_SOF.1": 3,
          "AVA_VLA.2": 1,
          "AVA_VLA.4": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 2,
          "EAL 4 augmented": 2,
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL4": 29,
          "EAL4 augmented": 2,
          "EAL4+": 20,
          "EAL5+": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 4
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 36,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 14,
          "FCS_CKM.4": 14,
          "FCS_COP": 1,
          "FCS_COP.1": 65,
          "FCS_COP.1.1": 3,
          "FCS_RND": 7,
          "FCS_RND.1": 14,
          "FCS_RND.1.1": 1,
          "FCS_RND.2": 26,
          "FCS_RND.2.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 26,
          "FDP_ACF.1": 18,
          "FDP_IFC.1": 30,
          "FDP_ITC.1": 15,
          "FDP_ITT": 1,
          "FDP_ITT.1": 34,
          "FDP_ITT.1.1": 1,
          "FDP_RIP": 2,
          "FDP_RIP.1": 7,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 1
        },
        "FMT": {
          "FMT_LIM.1": 3,
          "FMT_LIM.2": 3,
          "FMT_MSA.1": 21,
          "FMT_MSA.2": 17,
          "FMT_MSA.3": 18,
          "FMT_SMF.1": 6,
          "FMT_SMR.1": 8
        },
        "FPT": {
          "FPT_AMT": 1,
          "FPT_AMT.1": 4,
          "FPT_FLS.1": 23,
          "FPT_FLS.1.1": 1,
          "FPT_ITT": 1,
          "FPT_ITT.1": 37,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.3": 7,
          "FPT_RND.1": 1,
          "FPT_RND.2": 1,
          "FPT_SEP.1": 6,
          "FPT_TST": 12,
          "FPT_TST.1": 13,
          "FPT_TST.2": 34,
          "FPT_TST.2.1": 2
        },
        "FRU": {
          "FRU_FLT.2": 13
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 17
        },
        "ECB": {
          "ECB": 11
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 67
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 76
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 21,
          "RNG": 104
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 59,
          "Malfunction": 13,
          "fault induction": 1,
          "fault injection": 1,
          "malfunction": 1
        },
        "SCA": {
          "DPA": 13,
          "Leak-Inherent": 13,
          "Physical Probing": 2,
          "SPA": 28,
          "Timing attack": 1,
          "Timing attacks": 3,
          "side channel": 24,
          "timing attacks": 12
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 86": 1,
          "AIS20": 2,
          "AIS31": 3,
          "AIS32": 2
        },
        "CC": {
          "CCIMB-99-031": 2,
          "CCIMB-99-032": 2,
          "CCIMB-99-033": 2
        },
        "FIPS": {
          "FIPS 180-1": 2,
          "FIPS PUB 180-1": 1,
          "FIPS PUB 46-3": 2,
          "FIPS PUB 81": 3
        },
        "ISO": {
          "ISO/IEC 9796": 4
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "3DES": 17,
            "TDES": 1,
            "Triple-DES": 23
          },
          "DES": {
            "DEA": 1,
            "DES": 49
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 12,
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 1
        },
        "Philips": {
          "Philips": 160
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Frank Graeber",
      "/Company": "Philips Semiconductors BL ID / CC",
      "/CreationDate": "D:20051206163919+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 6.0 for Word",
      "/ModDate": "D:20051206165422+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0.1 (Windows)",
      "/SourceModified": "D:20051206153317",
      "/Title": "Security Target",
      "/philips_smx_cl_docpath": "H:\\\\projects\\\\P5_CryptoLib\\\\Doc\\\\Evaluation",
      "pdf_file_size_bytes": 739322,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cacr.math.uwaterloo.ca/hac/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 88
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0296a.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VLA.4",
      "ALC_DVS.2",
      "AVA_MSU.3",
      "EAL4+",
      "ADV_IMP.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0296b.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1b29aabd7e67afea023f82904b5bdd37a438499922da77d6d9a656e0a2a15802",
      "txt_hash": "49b9000541fdccf5dd46d049345229bfb8878dcf964c14fe639f44338d491222"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "64ca9e85c3cefb95430d497a28a7124b06c0c3193c0c2daeba091292fb79f390",
      "txt_hash": "77b21024ac530acc7fd244b7153844c98d3807bed567b162fee9c16c87cdd9cd"
    }
  },
  "status": "archived"
}