name |
Junos OS 20.2R1-S1 for QFX5120-48T, QFX5120-48Y, QFX5120-32C, QFX5210-64C, EX4650-48Y and QFX5200-48Y |
Crypto Library V2.7 on P5CD145V0A, MSO / P5CC145V0A, MSO / P5CD128V0A, MSO / P5CC128V0A, MSO |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
AU |
DE |
status |
active |
archived |
not_valid_after |
15.02.2026 |
09.09.2014 |
not_valid_before |
15.02.2021 |
11.04.2011 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T017%20Cert%202021_135%20OS.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/T0017-Certification_Report_V1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0750a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20QFX5120,%20QFX5200,%20QFX5210,%20EX4650%20Junos%2020.2R1%20ST%20v1.3.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0750b_pdf.pdf |
manufacturer |
Juniper Networks, Inc. |
NXP Semiconductors Germany GmbH Business Line Identification |
manufacturer_web |
https://www.juniper.net/ |
https://www.nxp.com |
security_level |
{} |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
07bffc2fb1a2fbc4 |
fd8c9678d01ffda7 |
heuristics/cert_id |
Certificate Number: 2021/135 |
BSI-DSZ-CC-0750-2011 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
CVE-2021-3011 |
heuristics/indirect_transitive_cves |
{} |
CVE-2021-3011 |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
20.2 |
2.7 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0867-2014, BSI-DSZ-CC-0866-2013, BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0783-2013, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0731-2011, BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0866-V2-2014, BSI-DSZ-CC-0744-2011 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0633-2010 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0867-2014, BSI-DSZ-CC-0866-2013, BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0783-2013, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0731-2011, BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0866-V2-2014, BSI-DSZ-CC-0744-2011 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0633-2010 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0744-2011 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0744-2011 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
EFT-T017 Cert 2021_135 OS.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210217171814+10'00'
- /Creator: ACA75941.dpe.protected.mil.au
- /ModDate: D:20210217171814+10'00'
- /Producer: KONICA MINOLTA bizhub C308
- /Title: SACA75941.d21021717171
- pdf_file_size_bytes: 108210
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
T0017-Certification_Report_V1.0.pdf |
0750a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0750-2011
- cert_item: Crypto Library V2.7 on P5CD145V0A, MSO/ P5CC145V0A, MSO / P5CD128V0A, MSO / P5CC128V0A, MSO
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0633-2010: 3
- BSI-DSZ-CC-0645-2010: 4
- BSI-DSZ-CC-0750-2011: 20
- NL:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 1
- BSI-CC-PP-0035-2007: 3
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 5: 8
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 2
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 11
- NXP Semiconductors: 11
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 2
- SHA3:
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- Side channel: 1
- physical probing: 1
- side channel: 1
- timing attacks: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 2
- AIS 38: 1
- AIS36: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- MSO / P5CC145V0A, MSO / P5CD128V0A, MSO / P5CC128V0A, MSO, Version 4, 4 March 2011, brightsight (confidential document) [10] ETR for composition for Crypto Library V2.7 on P5CD145V0A, MSO / P5CC145V0A, MSO / P5CD128V0A: 1
- MSO / P5CD128V0A, MSO / P5CC128V0A, MSO”, Rev 1.1, 17 February 2011, BSI-DSZ- CC-0750-2011 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [8: 1
- MSO Secure Smart Card Controller, BSI-DSZ-CC-0645-2010, T-Systems, version 1.1, July 15th, 2010 (confidential document) [22] Security Target Lite BSI-DSZ-0645, Version 1.7, 16 December 2010, P5Cx128V0A/P5Cx145V0A, MSO: 1
|
pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20110414110219+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Crypto Library V2.7 on P5CD145V0A, MSO/ P5CC145V0A, MSO / P5CD128V0A, MSO / P5CC128V0A, MSO, NXP Semiconductors Germany GmbH"
- /ModDate: D:20110414110419+02'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0750-2011
- pdf_file_size_bytes: 916632
- pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
Juniper QFX5120, QFX5200, QFX5210, EX4650 Junos 20.2R1 ST v1.3.pdf |
0750b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0645: 1
- BSI-DSZ-CC-0750: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 3
- EAL 5 augmented: 3
- EAL4: 1
- EAL4+: 2
- EAL5: 29
- EAL5 augmented: 1
- EAL5+: 4
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 2
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 2
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 17
- FCS_CKM.1.1: 1
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP: 28
- FCS_COP.1: 6
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1.5: 1
- FCS_SSHS_EXT: 1
- FCS_SSHS_EXT.1: 6
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 2
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.1.1: 2
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_UAU: 2
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 2
- FIA_UIA_EXT.1: 11
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 3
- FMT:
- FMT_MOF: 19
- FMT_MOF.1: 3
- FMT_MTD: 14
- FMT_MTD.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 5
- FMT_SMR.2: 12
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 6
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM: 3
- FPT_STM.1: 3
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 2
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL.3: 8
- FTA_SSL.4: 6
- FTA_SSL_EXT: 2
- FTA_SSL_EXT.1: 7
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 2
- FTA_TAB.1: 9
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 22
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_ITC.2: 6
- FTP_TRP: 8
- FTP_TRP.1: 3
- FTP_TUD.1: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 20
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 16
- FCS_CKM.4.1: 1
- FCS_COP.1: 43
- FCS_COP.1.1: 11
- FCS_RNG.1: 12
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 6
- FDP_ACF.1: 5
- FDP_IFC.1: 24
- FDP_ITC.1: 10
- FDP_ITC.2: 10
- FDP_ITT: 1
- FDP_ITT.1: 25
- FDP_ITT.1.1: 1
- FDP_RIP: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FMT:
- FMT_LIM.1: 2
- FMT_LIM.2: 2
- FMT_MSA.1: 5
- FMT_MSA.3: 5
- FMT_SMF.1: 3
- FPT:
- FPT_FLS.1: 18
- FPT_FLS.1.1: 1
- FPT_ITT: 1
- FPT_ITT.1: 33
- FPT_ITT.1.1: 1
- FPT_PHP.3: 7
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINSTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- O:
- O.AES: 5
- O.COPY: 6
- O.ECC: 5
- O.ECC_DHKE: 4
- O.HW_AES: 3
- O.MEM_ACCESS: 5
- O.MF_FW: 4
- O.REUSE: 6
- O.RND: 12
- O.RSA: 5
- O.SFR_ACCESS: 4
- O.SHA: 5
- T:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 72
- NXP Semiconductors: 29
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 3
- HMAC-SHA-512: 2
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 13
- TDES: 3
- Triple-DES: 18
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 4
- SHA-512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
- KEX:
- Key Exchange: 3
- Key exchange: 1
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 7
- TLS1.1: 1
- TLS1.2: 1
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 8
- P-384: 6
- P-521: 6
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 28
- Malfunction: 13
- fault induction: 1
- fault injection: 1
- malfunction: 3
- SCA:
- DPA: 18
- Leak-Inherent: 13
- Physical Probing: 2
- SPA: 22
- Timing attacks: 4
- side channel: 24
- side-channel: 9
- timing attacks: 6
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-004: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 180-4: 3
- FIPS 186-4: 2
- FIPS 197: 2
- FIPS 198-1: 3
- FIPS PUB 186-4: 6
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 2
- ISO/IEC 9796-2: 1
- PKCS:
- RFC:
- RFC 3526: 2
- RFC 4251: 2
- RFC 4252: 1
- RFC 4253: 3
- RFC 4254: 1
- RFC 5656: 1
- RFC 6668: 1
- RFC3526: 1
- RFC5656: 1
- X509:
|
- BSI:
- CC:
- FIPS:
- FIPS 180-3: 2
- FIPS PUB 180-3: 1
- FIPS PUB 186-3: 1
- FIPS PUB 197: 3
- FIPS PUB 46-3: 2
- FIPS PUB 81: 3
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 9797-1: 2
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- It first provides a descriptive overview of the TOE and then summarises the items which are out of scope of the TOE. 1.5.1 Overview 5. The Target of Evaluation (TOE) is Juniper Networks, Inc. Junos OS 20: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
- /Alternative descriptive title: Security Target Lite
- /Author: Andreas Kühn
- /CertificationID: BSI-DSZ-CC-0750
- /Chip family: SmartMX
- /Chip type: P5CD145V0A, MSO / P5CC145V0A, MSO / P5CD128V0A, MSO / P5CC128V0A, MSO
- /Comments:
- /Company: NXP Semiconductors / Brightsight
- /Copyright date: 2011
- /CreationDate: D:20110224153559+01'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Descriptive title: Security Target Lite
- /Division: NXP Semiconductors
- /Keywords: Crypto Library, SmartMX, P5CD145V0A, P5CC145V0A, P5CD128V0A, P5CC128V0A, NXP, EAL5+, AVA_VAN.5, Security Target Lite, AES, DES, RSA, ECC over GF(p), SHA
- /ModDate: D:20110224153615+01'00'
- /Modification date: 17 February 2011
- /Producer: Adobe PDF Library 9.0
- /Revision: Rev. 1.1
- /Security status: PUBLIC
- /SourceModified: D:20110224143514
- /Specification status: Evaluation documentation
- /Status: accepted
- /Subject: Common Criteria Evaluation of Crypto Library on SmartMX
- /TOE long: Crypto Library V2.7 on P5CD145V0A, MSO / P5CC145V0A, MSO / P5CD128V0A, MSO / P5CC128V0A, MSO
- /TOE short: Crypto Library on SmartMX
- /Template date: 1 October 2006
- /Template version: 2.8.1
- /Title: Security Target Lite - Crypto Library V2.7 on P5CD145V0A, MSO / P5CC145V0A, MSO / P5CD128V0A, MSO / P5CC128V0A, MSO
- /docpath: I:\SmartMX\P5_CryptoLib\SmxCl\docs\02_sw_req_an
- /philips_smx_cl_docpath: I:\SmartMX\P5_CryptoLib\SmxCl\docs\02_sw_req_an
- /relBibilioPath: ..\Bibliography.doc
- pdf_file_size_bytes: 392367
- pdf_hyperlinks: mailto:[email protected]
|