name |
Huawei NE40E Series Software Consisting of VRP and the Underlying OS V800R010C00SPC200, V800R010SPH220T |
NXP Secure Smart Card Controller P60x144/080PVA with IC Dedicated Software FW5.0 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
DE |
status |
archived |
archived |
not_valid_after |
26.10.2023 |
09.09.2014 |
not_valid_before |
26.10.2018 |
23.11.2012 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1053c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1053a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0845a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1053b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0845b_pdf.pdf |
manufacturer |
Huawei Technologies Co. Ltd. |
NXP Semiconductors Germany GmbH Business Line Identification |
manufacturer_web |
https://www.huawei.com |
https://www.nxp.com |
security_level |
{} |
EAL6+, ASE_TSS.2, ALC_FLR.1 |
dgst |
1b6c5bba158cdc1b |
0b2b8efc7a5eca4a |
heuristics/cert_id |
BSI-DSZ-CC-1053-2018 |
BSI-DSZ-CC-0845-2012 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, APE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, APE_CCL.1, ASE_OBJ.2, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
- |
5.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0817-2013, BSI-DSZ-CC-0886-2013, BSI-DSZ-CC-0885-2013, BSI-DSZ-CC-0808-2013, BSI-DSZ-CC-0845-V2-2013, BSI-DSZ-CC-0809-2013 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0666-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0831, BSI-DSZ-CC-0831-V2-2020, BSI-DSZ-CC-0817-V2-2016, BSI-DSZ-CC-0886-2013, NSCIB-CC-11-31801-CR3, ANSSI-CC-2015/37, BSI-DSZ-CC-0808-V2-2016, ANSSI-CC-2016/04, BSI-DSZ-CC-0919-V2-2021, BSI-DSZ-CC-0831-V4-2021, BSI-DSZ-CC-0809-V2-2016, ANSSI-CC-2016/03, BSI-DSZ-CC-0831-V3-2021, BSI-DSZ-CC-0885-2013, BSI-DSZ-CC-0831-V8-2024, ANSSI-CC-2015/41, ANSSI-CC-2015/39, BSI-DSZ-CC-0918-V7-2025, BSI-DSZ-CC-1035-2017, BSI-DSZ-CC-0957-2015, BSI-DSZ-CC-0918-V5-2023, BSI-DSZ-CC-0919-V3-2023, NSCIB-CC-11-31801-CR4, BSI-DSZ-CC-0831-V7-2023, BSI-DSZ-CC-0808-V3-2017, ANSSI-CC-2015/38, BSI-DSZ-CC-0809-V3-2017, BSI-DSZ-CC-0845-V2-2013, BSI-DSZ-CC-0831-V9-2024, BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0809-2013, BSI-DSZ-CC-0831-V5-2022, BSI-DSZ-CC-0918-V6-2024, BSI-DSZ-CC-0817-2013, BSI-DSZ-CC-0831-V6-2023, ANSSI-CC-2015/40, BSI-DSZ-CC-0918-V4-2022, ANSSI-CC-2015/15, BSI-DSZ-CC-0808-2013 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0666-2012 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2015/37, BSI-DSZ-CC-0886-2013, BSI-DSZ-CC-0885-2013, ANSSI-CC-2015/38, BSI-DSZ-CC-0808-2013, ANSSI-CC-2015/08, BSI-DSZ-CC-0809-2013 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2015/37, BSI-DSZ-CC-0886-2013, BSI-DSZ-CC-0885-2013, ANSSI-CC-2015/38, BSI-DSZ-CC-0808-2013, ANSSI-CC-2015/08, BSI-DSZ-CC-0809-2013 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
48ac4778e4272298 |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
1053c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei: 1
- Huawei Technologies Co: 1
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20181107103021+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, "
- /ModDate: D:20181107132049+01'00'
- /Producer: LibreOffice 5.2
- /Subject: Network Device, Huawei NE40E Series Software Consisting of VRP and the Underlying OS
- /Title: Certification Report BSI-DSZ-CC-1053-2018
- pdf_file_size_bytes: 899506
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
1053a_pdf.pdf |
0845a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1053-2018
- cert_item: Huawei NE40E Series Software Consisting of VRP and the Underlying OS, V800R010C00SPC200, V800R010SPH220T
- cert_lab: BSI
- developer: Huawei Technologies Co., Ltd
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: collaborative Protection Profile for Network Devices, Version 2.0 + Errata 20180314, 2018-03-14, NDFW- iTC (Exact conformance
|
- DE:
- cert_id: BSI-DSZ-CC-0845-2012
- cert_item: NXP Secure Smart Card Controller P60x144/080PVA with IC Dedicated Software FW5.0
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0666-2012: 2
- BSI-DSZ-CC-0845: 1
- BSI-DSZ-CC-0845-2012: 20
- NL:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 1
- BSI-CC-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 1
|
- EAL:
- EAL 4: 3
- EAL 5: 3
- EAL 6: 4
- EAL 6 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 7
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_FLR: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 5
- ASE_REQ.2: 5
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 2
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 2
- ADV_SPM: 1
- ADV_SPM.1: 2
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 2
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 3
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 3
- ALC_FLR: 1
- ALC_FLR.1: 6
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 3
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 2
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 2
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 23
- Huawei Technologies Co: 12
|
- NXP:
- NXP: 22
- NXP Semiconductors: 31
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Fault Injection: 1
- physical tampering: 1
- SCA:
- physical probing: 1
- side channel: 1
- timing attacks: 1
- other:
- JIL: 4
- reverse engineering: 1
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 2
- AIS 37: 1
- AIS 38: 1
- AIS36: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- BSI-DSZ-CC- 1053-2018, Version 2.0, Date 2018-10-24, TÜV Informationstechnik GmbH, (confidential document) [8] collaborative Protection Profile for Network Devices, Version 2.0 + Errata 20180314: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
- ConfidentialDocument:
- 3.0, 11 May 2012 (confidential document) [17] Product Data Sheet Addendum, SmartMX2 family Chip Health Mode, NXP Semiconductors, Rev. 3.0: 1
- 9] Evaluation Technical Report BSI-DSZ-CC-0845, Version 1.4, 8 November 2012, T- Systems GEI GmbH (confidential document) [10] ETR for composition according to AIS36, NXP P60x144/080PVA, T-Systems GEI GmbH, Version 1.4: 1
- List, NXP Semiconductors, Rev. 01.03, 7 September 2012 (confidential document) [21] Order Entry Form, P60D144, Release 2.5, Date: 21.08.2012, NXP Semiconductors Hamburg BU ID: 1
- May 2012 (confidential document) [18] NXP Secure Smart Card Controller P60D/080144PVA Configuration List for the firmware, NXP: 1
- November 2012 (confidential document) [11] NXP Secure Smart Card Controller P60D144eVA Configuration List for the hardware platform, NXP: 1
- Rev. 1.6, 2 August 2012 (confidential document) [19] NXP Secure Smart Card Controller P60x144eVA / P60x080eVA Appendix of the Configuration List: 1
- Rev. 1.9, 7 September 2012 (confidential document) [15] Wafer and delivery specification, SmartMX2 family P60D080/144 VA and P60C080/144 VA, NXP: 1
- Rev. 1.93, 31 October 2012 (confidential document) 8 specifically • AIS 20, Version 2, Funktionalitätsklassen und Evaluationsmethodologie für: 1
- Rev. 3.3, 19 July 2012 (confidential document) [16] Product Data Sheet Addendum, SmartMX2 family Post Delivery Configuration, NXP Semiconductors: 1
- Security Target, NXP Semiconductors, Business Unit Identification, Rev. 1.92, 31 October 2012 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [8: 1
- Unit Identification, Rev. 3.1, 2 February 2012 (confidential document) [14] Guidance and Operation Manual, NXP Secure Smart Card Controller P60x080VA/P60x144VA, NXP: 1
- and P60C080/144, NXP Semiconductors, Business Unit Identification, Rev. 3.8, 3 August 2012 (confidential document) [13] Instruction set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors: 1
- composite evaluation, NXP Semiconductors, Rev. 01.02, 7 September, 2012 (confidential document) [20] NXP Secure Smart Card Controller P60x144eVA / P60x080eVA Customer specific Appendix of the: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20181107103002+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, "
- /ModDate: D:20181107131053+01'00'
- /Producer: LibreOffice 5.2
- /Subject: Zertifizierunsreport Huawei NE40E Series Software Consisting of VRP and the Underlying OS, V800R010C00SPC200, V8000R010SPH220T
- /Title: Certification Report BSI-DSZ-CC-1053-2018
- pdf_file_size_bytes: 1360376
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20121213143056+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung"
- /ModDate: D:20121217155812+01'00'
- /Producer: LibreOffice 3.5
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0845-2012
- pdf_file_size_bytes: 1103579
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
1053b_pdf.pdf |
0845b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6: 2
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
- EAL6: 36
- EAL6 augmented: 3
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT.1: 2
- ASE_OBJ.1: 2
- ASE_REQ.1: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 3
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.4: 3
- ADV_FSP.5: 11
- ADV_IMP: 1
- ADV_IMP.2: 4
- ADV_INT.3: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- ADV_TDS.5: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 4
- ALC_CMC.4: 3
- ALC_CMC.5: 4
- ALC_CMS: 4
- ALC_CMS.4: 3
- ALC_CMS.5: 5
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV: 1
- ATE_COV.3: 4
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 5
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_STG: 7
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 2
- FAU_STG_EXT: 1
- FAU_STG_EXT.1: 8
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 2
- FCO:
- FCO_CPC_EXT.1: 2
- FCO_CPC_EXT.1.2: 1
- FCS:
- FCS_CKM.1: 18
- FCS_CKM.1.1: 3
- FCS_CKM.2: 15
- FCS_CKM.2.1: 2
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP: 67
- FCS_COP.1: 5
- FCS_COP.1.1: 3
- FCS_RBG.1: 1
- FCS_RBG_EXT: 7
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 3
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FCS_SSHC_EXT.1: 8
- FCS_SSHC_EXT.1.1: 3
- FCS_SSHC_EXT.1.2: 3
- FCS_SSHC_EXT.1.3: 3
- FCS_SSHC_EXT.1.4: 3
- FCS_SSHC_EXT.1.5: 8
- FCS_SSHC_EXT.1.6: 3
- FCS_SSHC_EXT.1.7: 3
- FCS_SSHC_EXT.1.8: 4
- FCS_SSHC_EXT.1.9: 4
- FCS_SSHS_EXT.1: 8
- FCS_SSHS_EXT.1.1: 3
- FCS_SSHS_EXT.1.2: 3
- FCS_SSHS_EXT.1.3: 3
- FCS_SSHS_EXT.1.4: 3
- FCS_SSHS_EXT.1.5: 5
- FCS_SSHS_EXT.1.6: 3
- FCS_SSHS_EXT.1.7: 3
- FCS_SSHS_EXT.1.8: 4
- FCS_TLSC_EXT.1: 9
- FCS_TLSC_EXT.1.1: 6
- FCS_TLSC_EXT.1.2: 3
- FCS_TLSC_EXT.1.3: 3
- FCS_TLSC_EXT.1.4: 3
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 8
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 13
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 18
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 2
- FMT:
- FMT_MOF: 31
- FMT_MOF.1: 6
- FMT_MTD: 14
- FMT_MTD.1: 7
- FMT_SMF.1: 21
- FMT_SMF.1.1: 1
- FMT_SMR.1: 5
- FMT_SMR.2: 9
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 2
- FMT_SMR.2.3: 3
- FPT:
- FPT_APW_EXT.1: 8
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_ITT: 1
- FPT_ITT.1: 7
- FPT_SKP_EXT.1: 8
- FPT_SKP_EXT.1.1: 1
- FPT_STM: 2
- FPT_STM_EXT.1: 9
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 2
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 4
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 8
- FPT_TUD_EXT.1.1: 3
- FPT_TUD_EXT.1.2: 3
- FPT_TUD_EXT.1.3: 6
- FPT_TUD_EXT.2: 4
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_SSL.3: 9
- FTA_SSL.4: 7
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 9
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 13
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 27
- FTP_ITC.1.1: 7
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 2
- FTP_ITC.2: 6
- FTP_TRP: 11
- FTP_TRP.1: 5
|
- FAU:
- FAU_SAS.1: 7
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.4: 3
- FCS_COP.1: 23
- FCS_COP.1.1: 2
- FCS_RNG.1: 9
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 36
- FDP_ACC.1.1: 2
- FDP_ACF.1: 32
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_FLS.1: 1
- FDP_IFC.1: 11
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_ITT.1: 14
- FDP_ITT.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 4
- FMT_MSA.1: 25
- FMT_MSA.1.1: 2
- FMT_MSA.3: 20
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FPT:
- FPT_FLS.1: 7
- FPT_ITT.1: 13
- FPT_ITT.1.1: 1
- FPT_PHP.3: 7
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 2
- A.LIMITED_FUNCTIONALITY: 2
- A.NO_THRU_TRAFFIC_PROTECTION: 2
- A.PHYSICAL_PROTECTION: 2
- A.REGULAR_UPDATES: 2
- A.RESIDUAL_INFORMATION: 2
- A.TRUSTED_ADMINISTRATOR: 2
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 3
- OE.NO_GENERAL_PURPOSE: 3
- OE.NO_THRU_TRAFFIC_PROTECTION: 3
- OE.PHYSICAL: 3
- OE.RESIDUAL_INFORMATION: 3
- OE.TRUSTED_ADMIN: 3
- OE.UPDATES: 3
- T:
- T.PASSWORD_CRACKING: 4
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 2
- T.SECURITY_FUNCTIONALITY_FAILURE: 2
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 2
- T.UNDETECTED_ACTIVITY: 3
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 4
- T.UPDATE_COMPROMISE: 2
- T.WEAK_AUTHENTICATION_ENDPOINTS: 2
- T.WEAK_CRYPTOGRAPHY: 2
|
- O:
- O.CUST_RECONFIG: 5
- O.EEPROM_INTEGRITY: 5
- O.FM_FW: 9
- O.HW_AES: 7
- O.INTEGRITY_CHK: 7
- O.MEM_ACCESS: 9
- O.RND: 3
- O.SFR_ACCESS: 9
- T:
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 14
- Huawei Technologies Co: 1
|
- NXP:
- NXP: 107
- NXP Semiconductors: 30
- Philips:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 18
- AES128: 2
- AES256: 4
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 3
- TDES: 1
- Triple-DEA: 1
- Triple-DES: 9
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-256: 14
- SHA-384: 5
- SHA-512: 1
- SHA256: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 56
- TLS 1.1: 1
- TLS 1.2: 1
- TLS v1.2: 1
- TLS1.1: 1
- TLS1.2: 2
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 13
- fault injection: 3
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 13
- Physical Probing: 2
- physical probing: 1
- side channel: 1
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 186-4: 1
- FIPS 198-1: 1
- FIPS PUB 186-4: 6
- FIPS186-4: 1
- ISO:
- ISO/IEC 10118: 2
- ISO/IEC 10118-3: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 5
- ISO/IEC 9796-2: 3
- ISO/IEC 9797-2: 1
- NIST:
- NIST SP 800-56A: 1
- NIST SP 800-56B: 2
- SP 800-131A: 1
- SP 800-56B: 1
- PKCS:
- PKCS #1: 1
- PKCS#1: 1
- PKCS#3: 1
- RFC:
- RFC 1195: 1
- RFC 3268: 3
- RFC 3526: 2
- RFC 4251: 4
- RFC 4252: 1
- RFC 4253: 11
- RFC 4254: 1
- RFC 4346: 2
- RFC 5246: 4
- RFC 5280: 9
- RFC 5288: 4
- RFC 5647: 8
- RFC 5656: 1
- RFC 5759: 2
- RFC 6125: 4
- RFC 6668: 3
- RFC3447: 1
- RFC3526: 2
- RFC4253: 1
- RFC5246: 2
- X509:
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS PUB 197: 3
- FIPS PUB 46: 1
- FIPS PUB 46-3: 3
- ISO:
- ISO/IEC 14443: 14
- ISO/IEC 18092: 2
- ISO/IEC 7816: 22
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. AES128-CBC and AES256-CBC are implemented according: 1
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. All required algorithms required by RFC 4253 are: 1
- out of scope: 2
|
|
pdf_data/st_metadata |
|
- /Author: NXP Semiconductors
- /CreationDate: D:20121031102430+01'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Keywords: "CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144PVA, P60D080PVA"
- /ModDate: D:20121214111208+01'00'
- /Producer: Adobe PDF Library 9.0
- /Subject: P60D144PVA FW5.0
- /Title: Security Target Lite
- pdf_file_size_bytes: 613647
- pdf_hyperlinks: mailto:[email protected]
|