NXP Smart Card Controller P5CD080V0B with Dedicated software: Secured Crypto Library Release 2.0

Link Link by certificate ID Link by certificate name

CSV information ?

Status archived
Valid from 13.06.2008
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer NXP Semiconductors
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VLA.4, AVA_MSU.3, ALC_DVS.2, EAL5+
Maintenance updates Crypto Library V2.1 on P5CD080V0B, P5CN080V0B, P5CC080V0B, P5CC073V0B (21.06.2010) Certification report Security target
NXP Smart Card Controller P5CD080V0B with IC dedicated software: Secured Crypto Library Release 2.1 (18.09.2008) Certification report Security target

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0417-2008

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES
Asymmetric Algorithms
ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-256, SHA-224
Schemes
Key Exchange
Randomness
RNG
Engines
SmartMX
Libraries
Crypto Library 2.0

Vendor
NXP, NXP Semiconductors, Infineon Technologies AG, Philips

Security level
EAL 5, EAL 4, EAL4, EAL 1, EAL 7, EAL5+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 5 augmented
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ACM_SCP.3, ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.4, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_RCR.2, ADV_SPM.3, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_DPT.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, APE_DES, APE_ENV, APE_INT, APE_OBJ, APE_REQ, APE_SRE, ASE_DES, ASE_ENV, ASE_INT, ASE_OBJ, ASE_PPC, ASE_REQ, ASE_SRE, ASE_TSS
Protection profiles
BSI-CC-PP-0002-2001, BSI-CC-PP-0002_2001, BSI-PP-0002-2001, BSI-PP-0002
Certificates
BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-410-2007, BSI-DSZ-CC-0410-2007-MA-01
Evaluation facilities
Brightsight
Certification process
1.1, 07 November 2007, Secured Crypto Library on the P5CD080V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi, Technical Report, 3.0, 04 April 2008, Secured Crypto Library on the P5CD080V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8, 36 for the Product Secured Crypto Library on the P5CD080V0B, 3.1, 07 March 2007, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items

Side-channel analysis
physical probing, Side channel, side channel, fault injection, JIL
Certification process
1.1, 07 November 2007, Secured Crypto Library on the P5CD080V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi, Technical Report, 3.0, 04 April 2008, Secured Crypto Library on the P5CD080V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8, 36 for the Product Secured Crypto Library on the P5CD080V0B, 3.1, 07 March 2007, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items

Standards
FIPS 180-1, AIS 34, AIS 20, AIS 25, AIS 26, AIS 31, AIS 35, AIS 36, AIS 32, AIS 38, ISO/IEC 15408:2005
Technical reports
BSI 7125, BSI 7148, BSI 7149

File metadata

Title Zertifizierungsreport BSI-DSZ-CC-0417-2008
Subject Common Criteria Zertifizierung
Keywords "BSI-DSZ-CC-0417-2008, Zertifizierung, NXP Smart Card Controller P5CD080V0Bwith IC dedicated software:Secured Crypto Library Release 2.0, NXP Semiconductors Germany GmbH"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20080707143332+02'00'
Modification date D:20080707163834+02'00'
Pages 34
Creator Writer
Producer StarOffice 8

Frontpage

Certificate ID BSI-DSZ-CC-0417-2008
Certified item NXP Smart Card Controller P5CD080V0B with IC dedicated software: Secured Crypto Library Release 2.0
Certification lab BSI
Developer NXP Semiconductors Germany GmbH

References

Outgoing
  • BSI-DSZ-CC-0410-2007 - archived - NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software
Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DEA, DES, Triple-DES, 3DES, TDES, CBC-MAC
Asymmetric Algorithms
RSA-CRT, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256
Schemes
MAC, Key Exchange
Randomness
TRNG, RND, RNG
Engines
SmartMX
Block cipher modes
ECB, CBC

Vendor
NXP Semiconductors, NXP, Infineon Technologies, Philips

Security level
EAL5, EAL 5, EAL5+, EAL4+, EAL4, EAL5 augmented, EAL 5 augmented, EAL4 augmented
Claims
O.RND, O.HW_AES, O.MF_FW, O.MEM_ACCESS, O.SFR_ACCESS, O.CONFIG, O.AES, O.RSA, O.ECC, O.ECC_DHKE, O.SHA, O.COPY, O.REUSE, O.ECC_DHKA, T.RND
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_SPM.1, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_SOF.1, AVA_CCA.1, ASE_REQ
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RND.1, FCS_RND.2, FCS_COP.1, FCS_CKM.1, FCS_RND, FCS_COP.1.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.2, FCS_RND.2.1, FCS_CKM, FCS_COP, FCS_RND.1.1, FDP_IFC.1, FDP_ITT.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ITC.1, FDP_RIP, FDP_RIP.1.1, FDP_ITT, FDP_ITT.1.1, FDP_SDI.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_MSA.2, FMT_SMR.1, FMT_MOF.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FPT_FLS.1.1, FPT_TST.2, FPT_TST, FPT_TST.2.1, FPT_AMT.1, FPT_ITT, FPT_ITT.1.1, FPT_TST.1, FPT_AMT, FPT_RVM, FPT_RND.1, FPT_RND.2, FRU_FLT.2
Protection profiles
BSI-PP- 0002-2001, BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0417, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0410, BSI-DSZ-CC-0410-

Side-channel analysis
Leak-Inherent, Physical Probing, side-channel, side channel, SPA, DPA, timing attacks, Timing attacks, Timing attack, Malfunction, malfunction, DFA, fault induction, fault injection

Standards
FIPS PUB 81, FIPS 180-2, FIPS PUB 197, FIPS PUB 46-3, FIPS PUB 180-2, PKCS #1, AIS31, AIS20, ISO/IEC 15946-2, ISO/IEC 15946-1, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Title Security Target Lite - Secured Crypto Library on the P5CD080V0B
Subject Common Criteria Evaluation of Crypto Library on SmartMX
Keywords Crypto Library, SmartMX, P5CD080, NXP, EAL5+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, AES, DES, RSA, ECC over GF(p), SHA
Author Andreas Kühn
Creation date D:20071107140214+01'00'
Modification date D:20080624155752+02'00'
Pages 77
Creator Acrobat PDFMaker 7.0.7 for Word
Producer Acrobat Distiller 7.0.5 (Windows)

References

Outgoing
  • BSI-DSZ-CC-0410-2007 - archived - NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software
Incoming

Heuristics ?

Certificate ID: BSI-DSZ-CC-0417-2008

Extracted SARs

ADV_HLD.3, AVA_VLA.4, ALC_DVS.2, ADV_RCR.2, AGD_ADM.1, ATE_COV.2, AVA_CCA.1, ATE_FUN.1, ADV_SPM.3, ADV_FSP.3, AVA_MSU.3, AGD_USR.1, AVA_SOF.1, ATE_IND.2, ADV_INT.1, ADV_LLD.1, ALC_TAT.2, ATE_DPT.2, ALC_LCD.2, ADV_IMP.2

Similar certificates

Name Certificate ID
NXP Smart Card Controller P5CC052V0A with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0551-2008 Compare
NXP Smart Card Controller P5CC037V0A with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0550-2008 Compare
NXP Smart Card Controller P5CD144V0B with IC Dedicated Software, Secured Crypto Library Release 2.0 BSI-DSZ-CC-0440-2008 Compare
NXP Smart Card Controller P5CD040V0B with IC dedicated software: Secured Crypto Library Release 2.0 to EAL5+ BSI-DSZ-CC-0439-2008 Compare
NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0A, P5CC012V0A all with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0549-2008 Compare
NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0a and P5CC012V0A each with IC Dedicated Software: Secured Crypto Library Release 2.0 to CC EAL5+ BSI-DSZ-CC-0464-2008 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library BSI-DSZ-CC-1040-2019 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1) BSI-DSZ-CC-1149-2022 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1149-V2-2023 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1149-V3-2023 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1136-V2-2022 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) BSI-DSZ-CC-1136-V3-2022 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) BSI-DSZ-CC-1136-V4-2024 Compare
Infineon Smart Card IC (Security Controller) SLE66CX126PE / M2160-k11 and SLE66CX86PE / M2161-k11 both with optional libraries RSA V1.6, EC V1.1 and SHA-2 V1.0 both with specific IC dedicated software BSI-DSZ-CC-0627-2009 Compare
Infineon Smart Card IC (Security Controller) SLE66CX162PE / m1531-a25 and SLE66CX80PE / m1533-a25 all with optional libraries RSA V1.6, EC, V1.1, SHA-2 V1.0 and both with specific IC dedicated software BSI-DSZ-CC-0629-2010 Compare
Infineon Smart Card IC (Security Controller) SLE66CX680PE / M1534-a14, SLE66CX360PE / M1536-a14, SLE66CX182PE / M1564-a14, SLE66CX480PE / M1565-a14 and SLE66CX482PE / M1577-a14 all with optional libraries RSA V1.6, EC V1.1, SHA-2 V1.0 and with specific IC dedicated software BSI-DSZ-CC-0628-2009 Compare
Infineon Smart Card IC (Security Controller) SLE66CLX800PE m1581-k11/a15, SLE66CLX800PEM m1580-k11/a15, SLE66CLX800PES m1582-k11/a15, SLE66CX800PE m1599-k11/a15, SLE66CLX360PE m1587-k11/a15, SLE66CLX360PEM m1588-k11/a15, SLE66CLX360PES m1589-k11/a15, SLE66CLX180PE m2080-a15, SLE66CLX180PEM m2081-a15, SLE66CLX120PE m2082-a15, SLE66CLX120PEM m2083-a15 all with optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 all with specific IC dedicated software BSI-DSZ-CC-0626-2009 Compare
Infineon Smart Card IC (Security Controller) SLE66CLX206PEM / m2084-a11, SLE66CLX206PE / m2085-a11, SLE66CLX206PES / m2086-a11, SLE66CDX206PEM / m2099-a11, SLE66CLX203PEM / m2098-a11, SLE66CLX207PEM / m2980-a11, SLE66CLX207PE / m2981-a11, SLE66CLX207PES / m2982-a11, SLE66CLX126PEM / m2087-a11, SLE66CLX126PE / m2088-a11, SLE66CLX126PES / m2089-a11, SLE66CLX127PEM / m2997-a11, SLE66CLX127PE / m2998-a11, SLE66CLX127PES / m2999-a11, all with optional libraries RSA V1.6, EC V1.1, SHA-2 V1.0 and all with specific IC dedicated software BSI-DSZ-CC-0593-2009 Compare
NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6021P VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6021M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0955-2016 Compare
NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6021P VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6021M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0955-V2-2016 Compare
NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0973-2016 Compare
NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0973-V2-2016 Compare
Samsung S3CT9P3 16-Bit RISC Microcontroller for Smart Cards, Revision 0 with optional Secure RSA and ECC Library (Version 2.0) including specific IC Dedicated Software BSI-DSZ-CC-0801-2012 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software BSI-DSZ-CC-0410-2007 Compare
NXP Secure Smart Card Controller P60x144/080PVA with IC Dedicated Software FW5.0 BSI-DSZ-CC-0845-2012 Compare
NXP Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2) BSI-DSZ-CC-1136-2021 Compare
NXP P5CC036V1D Secure Smart Card Controller with Cryptographic Library as IC Dedicated Support Software BSI-DSZ-CC-0584-2009 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CC080V0B, P5CN080V0B, P5CC073V0B each with specific IC Dedicated Software BSI-DSZ-CC-0700-2011 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B, P5CC080V0B and P5CC073V0B each with specific IC Dedicated Software BSI-DSZ-CC-0680-2010 Compare
NXP Secure Smart Card Controller P60x144/080PVA/PVA(Y) with IC Dedicated Software FW5.0 BSI-DSZ-CC-0845-V2-2013 Compare
Samsung S3CT9PC / S3CT9PA / S3CT9P7 16-bit RISC Microcontroller for Smart Card, Revision 1 with optional Secure RSA/ECC Library Version 2.0 including specific IC Dedicated Software BSI-DSZ-CC-0720-2011 Compare
Samsung S3CT9PC / S3CT9PA / S3CT9P7 16-bit RISC Microcontroller for Smart Card, Revision 1 with optional Secure RSA/ECC Library Version 2.0 including specific IC Dedicated Software BSI-DSZ-CC-0720-V2-2016 Compare
Infineon smart card IC (Security Controller) M7801 A12 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software BSI-DSZ-CC-0606-2010 Compare
Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software BSI-DSZ-CC-0640-2010 Compare
Infineon smart card IC (Security Controller) M7801 A12 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0727-2011 Compare
Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0813-2012 Compare
Infineon smart card IC (Security Controller) M7820 M11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0695-2011 Compare
Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0728-2011 Compare
Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software BSI-DSZ-CC-0829-V2-2015 Compare
Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software BSI-DSZ-CC-0829-2012 Compare
Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) Infineon Security Controller M7892 Design Steps D11 and G12, with the optional libraries RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01, Toolbox v2.03.008 or v2.07.003 and symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) BSI-DSZ-CC-0891-V6-2021 Compare
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6) 21.0.03/TSE-CCCS-48 Compare
Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / M1590 / A12, SLE66CLX1600PE / M1596 / A12, SLE66CLX1600PES / M1597 / A12, SLE66CX1600PE / M1598 / A12, SLE66CLX1440PEM / M2090 / A12, SLE66CLX1440PE / M2091 / A12, SLE66CLX1440PES / M2092 / A12, SLE66CX1440PE / M2093 / A12, SLE66CLX1280PEM / M2094 / A12, SLE66CLX1280PE / M2095 / A12, SLE66CLX1280PES / M2096 / A12, SLE66CX1280PE / M2097 / A12 all optional with RSA V1.6, EC V1.1 and SHA-2 V1.0 and all with specific IC dedicated software BSI-DSZ-CC-0630-2010 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 with optional libraries CCL V2.0.0002, RSA2048/4096 V2.07.003 / V2.06.003, EC V2.07.003 / V2.06.003, Toolbox V2.07.003 / V2.06.003, HSL V02.01.6634 / V01.22.4346, SCL V2.02.010 and with specific IC dedicated software BSI-DSZ-CC-0961-V2-2018 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 00022Dh, design step H13 with optional libraries CCL V2.0.0002, RSA2048/4096 V2.07.003 / V2.06.003, EC V2.07.003 / V2.06.003, Toolbox V2.07.003 / V2.06.003, HSL V02.01.6634 / V01.22.4346, MCS V02.02.3389 / V02.03.3446, SCL V2.02.010 and with specific IC dedicated software BSI-DSZ-CC-0945-V2-2018 Compare

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a3161c6297d6af0b09c4b5507846f0457de5f98beead5ebbce59065e70df1295', 'txt_hash': '5acf9fd8ab326262bcfe1077fbf3eadf070bef67034408da6f660e5df3908e96'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b7036ce5fa5085bef19112a3b07761135b723fffb39f3d62e2b87628016001e0', 'txt_hash': 'a9b808276cc07218f732d7a9c4c828f45cc4da90eae3e530b296a2911f7c614d'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 561364, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 34, '/CreationDate': "D:20080707143332+02'00'", '/Subject': 'Common Criteria Zertifizierung', '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Creator': 'Writer', '/Keywords': '"BSI-DSZ-CC-0417-2008, Zertifizierung, NXP Smart Card Controller P5CD080V0Bwith IC dedicated software:Secured Crypto Library Release 2.0, NXP Semiconductors Germany GmbH"', '/Producer': 'StarOffice 8', '/ModDate': "D:20080707163834+02'00'", '/Title': 'Zertifizierungsreport BSI-DSZ-CC-0417-2008', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.bsi.bund.de/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 647161, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 77, '/CreationDate': "D:20071107140214+01'00'", '/Security status': 'PUBLIC INFORMATION', '/Specification status': 'Evaluation documentation', '/Template date': '1 October 2006', '/Subject': 'Common Criteria Evaluation of Crypto Library on SmartMX', '/Author': 'Andreas Kühn', '/Template version': '2.8.1', '/Creator': 'Acrobat PDFMaker 7.0.7 for Word', '/Keywords': 'Crypto Library, SmartMX, P5CD080, NXP, EAL5+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, AES, DES, RSA, ECC over GF(p), SHA', '/TOE short': 'Crypto Library on SmartMX', '/TOE long': 'Secured Crypto Library on the P5CD080V0B', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/Modification date': '7 November 2007', '/Division': 'NXP Semiconductors', '/Revision': 'Rev. 1.1', '/Copyright date': '2007', '/docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an', '/philips_smx_cl_docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an', '/Alternative descriptive title': 'Security Target Lite', '/Descriptive title': 'Security Target Lite', '/Chip type': 'P5CD080V0B', '/ModDate': "D:20080624155752+02'00'", '/Status': 'Accepted', '/Company': 'NXP Semiconductors', '/Chip family': 'SmartMX', '/SourceModified': 'D:20071107125918', '/relBibilioPath': '..\\Bibliography.doc', '/Title': 'Security Target Lite - Secured Crypto Library on the P5CD080V0B', '/CertificationID': 'BSI-DSZ-CC-0417', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cacr.math.uwaterloo.ca/hac/']}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0417-2008', 'cert_item': 'NXP Smart Card Controller P5CD080V0B with IC dedicated software: Secured Crypto Library Release 2.0', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0417-2008': 18, 'BSI-DSZ-CC-0410-2007': 2, 'BSI-DSZ-CC-410-2007': 1, 'BSI-DSZ-CC-0410-2007-MA-01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0002-2001': 2, 'BSI-CC-PP-0002_2001': 1, 'BSI-PP-0002-2001': 1, 'BSI-PP-0002': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 4, 'EAL 4': 6, 'EAL4': 5, 'EAL 1': 1, 'EAL 7': 1, 'EAL5+': 1, 'EAL1': 5, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL 5 augmented': 4}}, 'cc_sar': {'ACM': {'ACM_SCP.3': 2, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2, 'ACM_AUT.1': 1, 'ACM_CAP.4': 1}, 'ADO': {'ADO_DEL': 2, 'ADO_IGS': 2, 'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.3': 1, 'ADV_HLD.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.3': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.2': 2, 'ALC_TAT.2': 2, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2}, 'ATE': {'ATE_DPT.2': 1, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 6, 'AVA_CCA.1': 1, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 3, 'AVA_VLA': 3, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'APE': {'APE_DES': 1, 'APE_ENV': 1, 'APE_INT': 1, 'APE_OBJ': 1, 'APE_REQ': 1, 'APE_SRE': 1}, 'ASE': {'ASE_DES': 1, 'ASE_ENV': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_PPC': 1, 'ASE_REQ': 1, 'ASE_SRE': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 2}, 'R': {'R.O': 2}}, 'vendor': {'NXP': {'NXP': 13, 'NXP Semiconductors': 26}, 'Infineon': {'Infineon Technologies AG': 1}, 'Philips': {'Philips': 1}}, 'eval_facility': {'BrightSight': {'Brightsight': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}}, 'DES': {'DES': {'DES': 6}, '3DES': {'Triple-DES': 2, '3DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 13}}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5}, 'SHA2': {'SHA-256': 5, 'SHA-224': 5}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 3}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 12}}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library 2.0': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'Side channel': 1, 'side channel': 1}, 'FI': {'fault injection': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-1': 2}, 'BSI': {'AIS 34': 3, 'AIS 20': 2, 'AIS 25': 3, 'AIS 26': 3, 'AIS 31': 3, 'AIS 35': 2, 'AIS 36': 2, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408:2005': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'1.1, 07 November 2007, Secured Crypto Library on the P5CD080V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi': 1, 'Technical Report, 3.0, 04 April 2008, Secured Crypto Library on the P5CD080V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8': 1, '36 for the Product Secured Crypto Library on the P5CD080V0B, 3.1, 07 March 2007, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0417': 1, 'BSI-DSZ-CC-0410-2007': 1, 'BSI-DSZ-CC-0410': 1, 'BSI-DSZ-CC-0410-': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP- 0002-2001': 9, 'BSI-PP-0002-2001': 8}}, 'cc_security_level': {'EAL': {'EAL5': 30, 'EAL 5': 3, 'EAL5+': 10, 'EAL4+': 3, 'EAL4': 2, 'EAL5 augmented': 3, 'EAL 5 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 1, 'ACM_SCP.3': 3, 'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 1, 'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_SPM.1': 1, 'ADV_FSP.3': 3, 'ADV_HLD.3': 2, 'ADV_IMP.2': 4, 'ADV_INT.1': 2, 'ADV_LLD.1': 2, 'ADV_RCR.2': 2, 'ADV_SPM.3': 2}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2, 'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.2': 1, 'ALC_TAT.2': 2, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 1, 'ATE_FUN.1': 2, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 7, 'AVA_SOF.1': 5, 'AVA_CCA.1': 2}, 'ASE': {'ASE_REQ': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RND.1': 15, 'FCS_RND.2': 32, 'FCS_COP.1': 95, 'FCS_CKM.1': 45, 'FCS_RND': 6, 'FCS_COP.1.1': 8, 'FCS_CKM.4': 18, 'FCS_CKM.1.1': 2, 'FCS_CKM.2': 13, 'FCS_RND.2.1': 2, 'FCS_CKM': 2, 'FCS_COP': 1, 'FCS_RND.1.1': 1}, 'FDP': {'FDP_IFC.1': 34, 'FDP_ITT.1': 35, 'FDP_ACC.1': 17, 'FDP_ACF.1': 11, 'FDP_RIP.1': 9, 'FDP_ITC.1': 18, 'FDP_RIP': 2, 'FDP_RIP.1.1': 1, 'FDP_ITT': 1, 'FDP_ITT.1.1': 1, 'FDP_SDI.1': 1}, 'FMT': {'FMT_LIM.1': 2, 'FMT_LIM.2': 2, 'FMT_MSA.3': 14, 'FMT_MSA.1': 16, 'FMT_SMF.1': 5, 'FMT_MSA.2': 20, 'FMT_SMR.1': 8, 'FMT_MOF.1': 1}, 'FPT': {'FPT_FLS.1': 22, 'FPT_ITT.1': 43, 'FPT_PHP.3': 6, 'FPT_SEP.1': 8, 'FPT_FLS.1.1': 1, 'FPT_TST.2': 36, 'FPT_TST': 13, 'FPT_TST.2.1': 2, 'FPT_AMT.1': 4, 'FPT_ITT': 1, 'FPT_ITT.1.1': 1, 'FPT_TST.1': 13, 'FPT_AMT': 1, 'FPT_RVM': 1, 'FPT_RND.1': 1, 'FPT_RND.2': 1}, 'FRU': {'FRU_FLT.2': 15}}, 'cc_claims': {'O': {'O.RND': 14, 'O.HW_AES': 3, 'O.MF_FW': 4, 'O.MEM_ACCESS': 5, 'O.SFR_ACCESS': 4, 'O.CONFIG': 2, 'O.AES': 6, 'O.RSA': 6, 'O.ECC': 7, 'O.ECC_DHKE': 3, 'O.SHA': 7, 'O.COPY': 6, 'O.REUSE': 6, 'O.ECC_DHKA': 2}, 'T': {'T.RND': 6}}, 'vendor': {'NXP': {'NXP Semiconductors': 28, 'NXP': 96}, 'Infineon': {'Infineon Technologies': 1}, 'Philips': {'Philips': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 53}}, 'DES': {'DES': {'DEA': 1, 'DES': 42}, '3DES': {'Triple-DES': 19, '3DES': 17, 'TDES': 1}}, 'constructions': {'MAC': {'CBC-MAC': 16}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 3}, 'ECC': {'ECC': {'ECC': 66}}, 'FF': {'DH': {'Diffie-Hellman': 12}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 14}, 'SHA2': {'SHA-224': 10, 'SHA-256': 11}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key Exchange': 10}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 21, 'RNG': 102}}, 'cipher_mode': {'ECB': {'ECB': 15}, 'CBC': {'CBC': 23}}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 126}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 12, 'Physical Probing': 2, 'side-channel': 7, 'side channel': 15, 'SPA': 27, 'DPA': 19, 'timing attacks': 9, 'Timing attacks': 3, 'Timing attack': 1}, 'FI': {'Malfunction': 12, 'malfunction': 2, 'DFA': 37, 'fault induction': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 81': 3, 'FIPS 180-2': 2, 'FIPS PUB 197': 3, 'FIPS PUB 46-3': 2, 'FIPS PUB 180-2': 1}, 'PKCS': {'PKCS #1': 6}, 'BSI': {'AIS31': 3, 'AIS20': 2}, 'ISO': {'ISO/IEC 15946-2': 1, 'ISO/IEC 15946-1': 1}, 'CC': {'CCMB-2005-08-001': 2, 'CCMB-2005-08-002': 2, 'CCMB-2005-08-003': 2, 'CCMB-2005-08-004': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0417a.pdf.
    • The st_filename property was set to 0417b.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0417-2008.
    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0604-2010', 'BSI-DSZ-CC-0704-2010', 'BSI-DSZ-CC-0602-2009', 'BSI-DSZ-CC-0603-2010', 'BSI-DSZ-CC-0635-2010', 'BSI-DSZ-CC-0643-2010', 'BSI-DSZ-CC-0515-2009', 'BSI-DSZ-CC-0673-2010']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0604-2010', 'BSI-DSZ-CC-0704-2010', 'BSI-DSZ-CC-0602-2009', 'BSI-DSZ-CC-0603-2010', 'BSI-DSZ-CC-0635-2010', 'BSI-DSZ-CC-0643-2010', 'BSI-DSZ-CC-0515-2009', 'BSI-DSZ-CC-0673-2010']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0410-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0410-2007']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0575-2009', 'BSI-DSZ-CC-0604-2010', 'BSI-DSZ-CC-0704-2010', 'BSI-DSZ-CC-0608-2010', 'BSI-DSZ-CC-0602-2009', 'BSI-DSZ-CC-0439-2008', 'BSI-DSZ-CC-0440-2008', 'BSI-DSZ-CC-0603-2010', 'BSI-DSZ-CC-0643-2010', 'BSI-DSZ-CC-0515-2009', 'BSI-DSZ-CC-0658-2010', 'BSI-DSZ-CC-0673-2010']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0604-2010', 'BSI-DSZ-CC-0797-2012', 'BSI-DSZ-CC-0608-2010', 'BSI-DSZ-CC-0731-2011', 'BSI-DSZ-CC-0745-2012', 'BSI-DSZ-CC-0515-2009', 'BSI-DSZ-CC-0694-2012', 'BSI-DSZ-CC-0658-2010', 'BSI-DSZ-CC-0673-2010', 'BSI-DSZ-CC-0747-2011', 'BSI-DSZ-CC-0744-2011', 'BSI-DSZ-CC-0742-2011', 'BSI-DSZ-CC-0861-2014', 'BSI-DSZ-CC-0743-2011', 'BSI-DSZ-CC-0741-2011', 'BSI-DSZ-CC-0602-2009', 'BSI-DSZ-CC-0799-2012', 'BSI-DSZ-CC-0603-2010', 'BSI-DSZ-CC-0730-2011', 'BSI-DSZ-CC-0609-2010', 'BSI-DSZ-CC-0709-2010', 'BSI-DSZ-CC-0575-2009', 'BSI-DSZ-CC-0746-2012', 'BSI-DSZ-CC-0804-2012', 'BSI-DSZ-CC-0704-2010', 'BSI-DSZ-CC-0674-2011', 'BSI-DSZ-CC-0440-2008', 'BSI-DSZ-CC-0798-2012', 'BSI-DSZ-CC-0748-2011', 'BSI-DSZ-CC-0675-2011', 'BSI-DSZ-CC-0710-2010', 'BSI-DSZ-CC-0661-2011', 'BSI-DSZ-CC-0643-2010', 'BSI-DSZ-CC-0439-2008', 'BSI-DSZ-CC-0812-2012']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0410-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0410-2007', 'BSI-DSZ-CC-0404-2007']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values added.
    • The indirect_transitive_cves property was set to {'_type': 'Set', 'elements': ['CVE-2021-3011']}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0417a.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0417b.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0635-2010', 'BSI-DSZ-CC-0673-2010', 'BSI-DSZ-CC-0704-2010']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0635-2010', 'BSI-DSZ-CC-0673-2010', 'BSI-DSZ-CC-0704-2010']}}, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0673-2010', 'BSI-DSZ-CC-0440-2008', 'BSI-DSZ-CC-0704-2010']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0731-2011', 'BSI-DSZ-CC-0745-2012', 'BSI-DSZ-CC-0694-2012', 'BSI-DSZ-CC-0673-2010', 'BSI-DSZ-CC-0747-2011', 'BSI-DSZ-CC-0744-2011', 'BSI-DSZ-CC-0742-2011', 'BSI-DSZ-CC-0861-2014', 'BSI-DSZ-CC-0743-2011', 'BSI-DSZ-CC-0741-2011', 'BSI-DSZ-CC-0799-2012', 'BSI-DSZ-CC-0746-2012', 'BSI-DSZ-CC-0704-2010', 'BSI-DSZ-CC-0674-2011', 'BSI-DSZ-CC-0440-2008', 'BSI-DSZ-CC-0748-2011', 'BSI-DSZ-CC-0798-2012', 'BSI-DSZ-CC-0675-2011', 'BSI-DSZ-CC-0812-2012']}}, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The indirect_transitive_cves property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP Smart Card Controller P5CD080V0B with Dedicated software: Secured Crypto Library Release 2.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "abcfbd9c65e98dd9",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0417-2008",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_CCA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 3
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0"
      ]
    },
    "indirect_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2021-3011"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0603-2010",
          "BSI-DSZ-CC-0604-2010",
          "BSI-DSZ-CC-0440-2008",
          "BSI-DSZ-CC-0673-2010",
          "BSI-DSZ-CC-0602-2009",
          "BSI-DSZ-CC-0704-2010",
          "BSI-DSZ-CC-0643-2010",
          "BSI-DSZ-CC-0658-2010",
          "BSI-DSZ-CC-0515-2009",
          "BSI-DSZ-CC-0575-2009",
          "BSI-DSZ-CC-0608-2010",
          "BSI-DSZ-CC-0439-2008"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0410-2007"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0603-2010",
          "BSI-DSZ-CC-0747-2011",
          "BSI-DSZ-CC-0602-2009",
          "BSI-DSZ-CC-0743-2011",
          "BSI-DSZ-CC-0731-2011",
          "BSI-DSZ-CC-0799-2012",
          "BSI-DSZ-CC-0710-2010",
          "BSI-DSZ-CC-0741-2011",
          "BSI-DSZ-CC-0709-2010",
          "BSI-DSZ-CC-0694-2012",
          "BSI-DSZ-CC-0797-2012",
          "BSI-DSZ-CC-0730-2011",
          "BSI-DSZ-CC-0745-2012",
          "BSI-DSZ-CC-0604-2010",
          "BSI-DSZ-CC-0643-2010",
          "BSI-DSZ-CC-0744-2011",
          "BSI-DSZ-CC-0804-2012",
          "BSI-DSZ-CC-0440-2008",
          "BSI-DSZ-CC-0704-2010",
          "BSI-DSZ-CC-0658-2010",
          "BSI-DSZ-CC-0515-2009",
          "BSI-DSZ-CC-0609-2010",
          "BSI-DSZ-CC-0742-2011",
          "BSI-DSZ-CC-0575-2009",
          "BSI-DSZ-CC-0861-2014",
          "BSI-DSZ-CC-0675-2011",
          "BSI-DSZ-CC-0746-2012",
          "BSI-DSZ-CC-0661-2011",
          "BSI-DSZ-CC-0673-2010",
          "BSI-DSZ-CC-0674-2011",
          "BSI-DSZ-CC-0798-2012",
          "BSI-DSZ-CC-0812-2012",
          "BSI-DSZ-CC-0748-2011",
          "BSI-DSZ-CC-0608-2010",
          "BSI-DSZ-CC-0439-2008"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0410-2007",
          "BSI-DSZ-CC-0404-2007"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0635-2010",
          "BSI-DSZ-CC-0603-2010",
          "BSI-DSZ-CC-0604-2010",
          "BSI-DSZ-CC-0673-2010",
          "BSI-DSZ-CC-0602-2009",
          "BSI-DSZ-CC-0704-2010",
          "BSI-DSZ-CC-0643-2010",
          "BSI-DSZ-CC-0515-2009"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0410-2007"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0635-2010",
          "BSI-DSZ-CC-0603-2010",
          "BSI-DSZ-CC-0604-2010",
          "BSI-DSZ-CC-0673-2010",
          "BSI-DSZ-CC-0602-2009",
          "BSI-DSZ-CC-0704-2010",
          "BSI-DSZ-CC-0643-2010",
          "BSI-DSZ-CC-0515-2009"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0410-2007"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2008-09-18",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0417_ma1a.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0417_ma1b.pdf",
        "maintenance_title": "NXP Smart Card Controller P5CD080V0B with IC dedicated software: Secured Crypto Library Release 2.1"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2010-06-21",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0417_ma2a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0417_ma2b_pdf.pdf",
        "maintenance_title": "Crypto Library V2.1 on P5CD080V0B, P5CN080V0B, P5CC080V0B, P5CC073V0B"
      }
    ]
  },
  "manufacturer": "NXP Semiconductors",
  "manufacturer_web": "https://www.nxp.com/",
  "name": "NXP Smart Card Controller P5CD080V0B with Dedicated software: Secured Crypto Library Release 2.0",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2008-06-13",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0417a.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0417-2008",
        "cert_item": "NXP Smart Card Controller P5CD080V0B with IC dedicated software: Secured Crypto Library Release 2.0",
        "cert_lab": "BSI",
        "developer": "NXP Semiconductors Germany GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 13
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0410-2007": 2,
          "BSI-DSZ-CC-0410-2007-MA-01": 1,
          "BSI-DSZ-CC-0417-2008": 18,
          "BSI-DSZ-CC-410-2007": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 2
        },
        "R": {
          "R.O": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0002-2001": 2,
          "BSI-CC-PP-0002_2001": 1,
          "BSI-PP-0002": 1,
          "BSI-PP-0002-2001": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 2,
          "ACM_AUT.1": 1,
          "ACM_CAP": 2,
          "ACM_CAP.4": 1,
          "ACM_SCP": 2,
          "ACM_SCP.3": 2
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.2": 1,
          "ADO_IGS": 2,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP": 2,
          "ADV_FSP.3": 1,
          "ADV_HLD": 2,
          "ADV_HLD.3": 1,
          "ADV_IMP": 2,
          "ADV_IMP.2": 1,
          "ADV_INT": 2,
          "ADV_INT.1": 1,
          "ADV_LLD": 2,
          "ADV_RCR": 2,
          "ADV_RCR.2": 1,
          "ADV_SPM": 2,
          "ADV_SPM.3": 1
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_USR": 2
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.2": 6,
          "ALC_FLR": 2,
          "ALC_LCD": 1,
          "ALC_LCD.2": 2,
          "ALC_TAT": 2,
          "ALC_TAT.2": 2
        },
        "APE": {
          "APE_DES": 1,
          "APE_ENV": 1,
          "APE_INT": 1,
          "APE_OBJ": 1,
          "APE_REQ": 1,
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_DES": 1,
          "ASE_ENV": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_PPC": 1,
          "ASE_REQ": 1,
          "ASE_SRE": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_DPT": 2,
          "ATE_DPT.2": 1,
          "ATE_FUN": 2,
          "ATE_IND": 2
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_CCA.1": 1,
          "AVA_MSU": 2,
          "AVA_MSU.3": 5,
          "AVA_SOF": 3,
          "AVA_VLA": 3,
          "AVA_VLA.2": 1,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 6,
          "EAL 5": 4,
          "EAL 5 augmented": 4,
          "EAL 7": 1,
          "EAL1": 5,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 5,
          "EAL5": 6,
          "EAL5+": 1,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "1.1, 07 November 2007, Secured Crypto Library on the P5CD080V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi": 1,
          "36 for the Product Secured Crypto Library on the P5CD080V0B, 3.1, 07 March 2007, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items": 1,
          "Technical Report, 3.0, 04 April 2008, Secured Crypto Library on the P5CD080V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 12
        }
      },
      "crypto_library": {
        "Generic": {
          "Crypto Library 2.0": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-224": 5,
            "SHA-256": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 1
        },
        "SCA": {
          "Side channel": 1,
          "physical probing": 1,
          "side channel": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS 25": 3,
          "AIS 26": 3,
          "AIS 31": 3,
          "AIS 32": 1,
          "AIS 34": 3,
          "AIS 35": 2,
          "AIS 36": 2,
          "AIS 38": 1
        },
        "FIPS": {
          "FIPS 180-1": 2
        },
        "ISO": {
          "ISO/IEC 15408:2005": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "Triple-DES": 2
          },
          "DES": {
            "DES": 6
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies AG": 1
        },
        "NXP": {
          "NXP": 13,
          "NXP Semiconductors": 26
        },
        "Philips": {
          "Philips": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20080707143332+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"BSI-DSZ-CC-0417-2008, Zertifizierung, NXP Smart Card Controller P5CD080V0Bwith IC dedicated software:Secured Crypto Library Release 2.0, NXP Semiconductors Germany GmbH\"",
      "/ModDate": "D:20080707163834+02\u002700\u0027",
      "/Producer": "StarOffice 8",
      "/Subject": "Common Criteria Zertifizierung",
      "/Title": "Zertifizierungsreport BSI-DSZ-CC-0417-2008",
      "pdf_file_size_bytes": 561364,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 34
    },
    "st_filename": "0417b.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 66
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 12
          }
        },
        "RSA": {
          "RSA-CRT": 3
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0410": 1,
          "BSI-DSZ-CC-0410-": 1,
          "BSI-DSZ-CC-0410-2007": 1,
          "BSI-DSZ-CC-0417": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.AES": 6,
          "O.CONFIG": 2,
          "O.COPY": 6,
          "O.ECC": 7,
          "O.ECC_DHKA": 2,
          "O.ECC_DHKE": 3,
          "O.HW_AES": 3,
          "O.MEM_ACCESS": 5,
          "O.MF_FW": 4,
          "O.REUSE": 6,
          "O.RND": 14,
          "O.RSA": 6,
          "O.SFR_ACCESS": 4,
          "O.SHA": 7
        },
        "T": {
          "T.RND": 6
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0002-2001": 9,
          "BSI-PP-0002-2001": 8
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_AUT.1": 2,
          "ACM_CAP": 1,
          "ACM_CAP.4": 1,
          "ACM_SCP": 1,
          "ACM_SCP.3": 3
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_DEL.2": 2,
          "ADO_IGS": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.3": 3,
          "ADV_HLD.3": 2,
          "ADV_IMP.2": 4,
          "ADV_INT.1": 2,
          "ADV_LLD.1": 2,
          "ADV_RCR.2": 2,
          "ADV_SPM.1": 1,
          "ADV_SPM.3": 2
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_ADM.1": 2,
          "AGD_USR": 1,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 6,
          "ALC_LCD": 1,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.2": 2
        },
        "ASE": {
          "ASE_REQ": 1
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.2": 1,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA.1": 2,
          "AVA_MSU.3": 5,
          "AVA_SOF.1": 5,
          "AVA_VLA.4": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 3,
          "EAL 5 augmented": 3,
          "EAL4": 2,
          "EAL4 augmented": 1,
          "EAL4+": 3,
          "EAL5": 30,
          "EAL5 augmented": 3,
          "EAL5+": 10
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 4
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 45,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 13,
          "FCS_CKM.4": 18,
          "FCS_COP": 1,
          "FCS_COP.1": 95,
          "FCS_COP.1.1": 8,
          "FCS_RND": 6,
          "FCS_RND.1": 15,
          "FCS_RND.1.1": 1,
          "FCS_RND.2": 32,
          "FCS_RND.2.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 17,
          "FDP_ACF.1": 11,
          "FDP_IFC.1": 34,
          "FDP_ITC.1": 18,
          "FDP_ITT": 1,
          "FDP_ITT.1": 35,
          "FDP_ITT.1.1": 1,
          "FDP_RIP": 2,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 1
        },
        "FMT": {
          "FMT_LIM.1": 2,
          "FMT_LIM.2": 2,
          "FMT_MOF.1": 1,
          "FMT_MSA.1": 16,
          "FMT_MSA.2": 20,
          "FMT_MSA.3": 14,
          "FMT_SMF.1": 5,
          "FMT_SMR.1": 8
        },
        "FPT": {
          "FPT_AMT": 1,
          "FPT_AMT.1": 4,
          "FPT_FLS.1": 22,
          "FPT_FLS.1.1": 1,
          "FPT_ITT": 1,
          "FPT_ITT.1": 43,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.3": 6,
          "FPT_RND.1": 1,
          "FPT_RND.2": 1,
          "FPT_RVM": 1,
          "FPT_SEP.1": 8,
          "FPT_TST": 13,
          "FPT_TST.1": 13,
          "FPT_TST.2": 36,
          "FPT_TST.2.1": 2
        },
        "FRU": {
          "FRU_FLT.2": 15
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 23
        },
        "ECB": {
          "ECB": 15
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 126
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 10
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 14
          },
          "SHA2": {
            "SHA-224": 10,
            "SHA-256": 11
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 21,
          "RNG": 102
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 37,
          "Malfunction": 12,
          "fault induction": 1,
          "fault injection": 1,
          "malfunction": 2
        },
        "SCA": {
          "DPA": 19,
          "Leak-Inherent": 12,
          "Physical Probing": 2,
          "SPA": 27,
          "Timing attack": 1,
          "Timing attacks": 3,
          "side channel": 15,
          "side-channel": 7,
          "timing attacks": 9
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 2,
          "AIS31": 3
        },
        "CC": {
          "CCMB-2005-08-001": 2,
          "CCMB-2005-08-002": 2,
          "CCMB-2005-08-003": 2,
          "CCMB-2005-08-004": 3
        },
        "FIPS": {
          "FIPS 180-2": 2,
          "FIPS PUB 180-2": 1,
          "FIPS PUB 197": 3,
          "FIPS PUB 46-3": 2,
          "FIPS PUB 81": 3
        },
        "ISO": {
          "ISO/IEC 15946-1": 1,
          "ISO/IEC 15946-2": 1
        },
        "PKCS": {
          "PKCS #1": 6
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 53
          }
        },
        "DES": {
          "3DES": {
            "3DES": 17,
            "TDES": 1,
            "Triple-DES": 19
          },
          "DES": {
            "DEA": 1,
            "DES": 42
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 16
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies": 1
        },
        "NXP": {
          "NXP": 96,
          "NXP Semiconductors": 28
        },
        "Philips": {
          "Philips": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Alternative descriptive title": "Security Target Lite",
      "/Author": "Andreas K\u00fchn",
      "/CertificationID": "BSI-DSZ-CC-0417",
      "/Chip family": "SmartMX",
      "/Chip type": "P5CD080V0B",
      "/Company": "NXP Semiconductors",
      "/Copyright date": "2007",
      "/CreationDate": "D:20071107140214+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0.7 for Word",
      "/Descriptive title": "Security Target Lite",
      "/Division": "NXP Semiconductors",
      "/Keywords": "Crypto Library, SmartMX, P5CD080, NXP, EAL5+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, AES, DES, RSA, ECC over GF(p), SHA",
      "/ModDate": "D:20080624155752+02\u002700\u0027",
      "/Modification date": "7 November 2007",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/Revision": "Rev. 1.1",
      "/Security status": "PUBLIC INFORMATION",
      "/SourceModified": "D:20071107125918",
      "/Specification status": "Evaluation documentation",
      "/Status": "Accepted",
      "/Subject": "Common Criteria Evaluation of Crypto Library on SmartMX",
      "/TOE long": "Secured Crypto Library on the P5CD080V0B",
      "/TOE short": "Crypto Library on SmartMX",
      "/Template date": "1 October 2006",
      "/Template version": "2.8.1",
      "/Title": "Security Target Lite - Secured Crypto Library on the P5CD080V0B",
      "/docpath": "I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an",
      "/philips_smx_cl_docpath": "I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an",
      "/relBibilioPath": "..\\Bibliography.doc",
      "pdf_file_size_bytes": 647161,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cacr.math.uwaterloo.ca/hac/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 77
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0417a.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "AVA_MSU.3",
      "AVA_VLA.4",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0417b.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a3161c6297d6af0b09c4b5507846f0457de5f98beead5ebbce59065e70df1295",
      "txt_hash": "5acf9fd8ab326262bcfe1077fbf3eadf070bef67034408da6f660e5df3908e96"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b7036ce5fa5085bef19112a3b07761135b723fffb39f3d62e2b87628016001e0",
      "txt_hash": "a9b808276cc07218f732d7a9c4c828f45cc4da90eae3e530b296a2911f7c614d"
    }
  },
  "status": "archived"
}