name |
Fortinet FortiManager 5.6.6 build 7352 190510 (EAL4+) |
NXP Secure Smart Card Controller P60D024/016/012PVB with IC Dedicated Software |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
DE |
status |
active |
archived |
not_valid_after |
29.05.2025 |
09.09.2014 |
not_valid_before |
29.05.2020 |
29.11.2012 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-Diploma.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-INF-3131.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0810a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-48-ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0810b_pdf.pdf |
manufacturer |
Fortinet, Inc. |
NXP Semiconductors Germany GmbH Business Line Identification |
manufacturer_web |
https://www.fortinet.com/ |
https://www.nxp.com |
security_level |
EAL4+, ALC_FLR.3 |
EAL6+, ALC_FLR.1, ASE_TSS.2 |
dgst |
27ade261a5b0a226 |
9fb117dd7ac57b5f |
heuristics/cert_id |
2017-48-INF-3131 |
BSI-DSZ-CC-0810-2012 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, APE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
5.6.6 |
016 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0810-V2-2014 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0810-V2-2014 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Others
- certification_date: 29.05.2020
- enhanced:
- category: Others
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=939
- certification_date: 29.05.2020
- description: TOE Overview The TOE provides network management to one or more Fortinet network security devices. Authorized administrators are able to configure and manage devices, using functions that include verification and update of firmware and license information. Administrators can create and modify policies and objects and push them to the devices. The TOE is able to retrieve up-to-date antivirus and intrusion prevention signatures from Fortinet’s FortiGuard service to push to the managed devices. The TOE is capable of grouping devices into administrative domains (ADOMs), which simplifies the application of policies, distribution of content security and firmware updates for large implementations. ADOMs are implemented in the evaluated configuration. The TOE has extensive logging capabilities which include the logging of administrative actions and logging of use of the trusted cryptographic channels. The TOE is a software only TOE. It is supported by the FortiManager appliance hardware, which is in the operational environment.
- evaluation_facility: Applus Laboratories
- level: EAL4 + ALC_FLR.3
- manufacturer: Fortinet, Inc.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=940
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=938
- type: Product
- manufacturer: Fortinet, Inc.
- product: Fortinet FortiManager 5.6.6 build 7352 190510 (EAL4+)
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/368-fortinet-fortimanager-5-6-6-build-7352-190510-eal4
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
2017-48-Diploma.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL4: 2
- EAL4+: 2
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 868949
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2017-48-INF-3131.pdf |
0810a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0810-2012
- cert_item: NXP Secure Smart Card Controller P60D024/016/012PVB with IC Dedicated Software
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0810: 1
- BSI-DSZ-CC-0810-2012: 20
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 1
- BSI-CC-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL4: 10
- EAL4+: 11
- ITSEC:
|
- EAL:
- EAL 4: 3
- EAL 5: 3
- EAL 6: 4
- EAL 6 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 7
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_FLR: 3
- ALC_FLR.3: 9
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 2
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 2
- ADV_SPM: 1
- ADV_SPM.1: 2
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 2
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 3
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 3
- ALC_FLR: 1
- ALC_FLR.1: 6
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 3
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 2
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 2
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 2
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.4: 1
- FDP:
- FIA:
- FIA_AFL.1: 1
- FIA_UAU.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MTD.1: 1
- FMT_SMR.1: 1
- FPT:
- FTA:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 22
- NXP Semiconductors: 29
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- physical probing: 1
- side channel: 1
- timing attacks: 1
- other:
- JIL: 4
- reverse engineering: 1
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 2
- AIS 37: 1
- AIS 38: 1
- AIS36: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 2.0, 13.01.2012 (confidential document) [16] Product Data Sheet Addendum, SmartMX2 family Post Delivery Configuration, NXP Semiconductors: 1
- 23 November 2012 (confidential document) [11] NXP Secure Smart Card Controller P60D024/016/012eVB Configuration List for the hardware: 1
- 3.0, 11 May 2012 (confidential document) [17] Product Data Sheet Addendum, SmartMX2 family Chip Health Mode, NXP Semiconductors, Rev. 3.0: 1
- 9] Evaluation Technical Report BSI-DSZ-CC-0810, Version 1.4, 23 November 2012, T- Systems GEI GmbH (confidential document) [10] ETR for composition according to AIS36, NXP P60D024/016/012PVB, T-Systems GEI GmbH, Version 1: 1
- List, NXP Semiconductors, Rev. 01.03, 07 November 2012 (confidential document) [21] Order Entry Form P60D024, NXP Semiconductors, Business Unit Identification, online document: 1
- May 2012 (confidential document) [18] NXP Secure Smart Card Controller P60D024/016/012PVB Configuration List for the firmware, NXP: 1
- NXP Semiconductors, Rev. 1.9, 13 November 2012 (confidential document) 8 specifically • AIS 20, Version 2, Funktionalitätsklassen und Evaluationsmethodologie für: 1
- Rev. 1.2, 16 July 2012 (confidential document) [19] NXP Secure Smart Card Controller P60D024/016/012eVB Appendix of the Configuration List for: 1
- Security Target, NXP Semiconductors, Business Unit Identification, Rev. 1.5, 12 November 2012 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [8: 1
- Semiconductors, Rev. 1.4, 13 November 2012 (confidential document) [15] SmartMX2 P60D024/P60D016/P60D012 VB Wafer and delivery specification, NXP Semiconductors, Rev: 1
- Unit Identification, Rev. 3.1, 2 February 2012 (confidential document) [14] NXP Secure Smart Card Controller P60D024/P60D016/P60D012 VB Guidance and Operation Manual: 1
- evaluation, NXP Semiconductors, Rev. 01.04, 07 November 2012 (confidential document) [20] NXP Secure Smart Card Controller P60D024/016/012eVB Customer specific Appendix of the: 1
- smart card controller, NXP Semiconductors, Business Unit Identification, Rev. 3.7, 21 June 2012 (confidential document) [13] Instruction set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors: 1
|
pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20121214072704+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung"
- /ModDate: D:20121217155428+01'00'
- /Producer: LibreOffice 3.5
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0810-2012
- pdf_file_size_bytes: 1084813
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
2017-48-ST.pdf |
0810b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL4: 2
- EAL4+: 4
|
- EAL:
- EAL 6: 2
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
- EAL6: 36
- EAL6 augmented: 3
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.4: 3
- ADV_FSP.5: 11
- ADV_IMP: 1
- ADV_IMP.2: 4
- ADV_INT.3: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- ADV_TDS.5: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 4
- ALC_CMC.4: 3
- ALC_CMC.5: 4
- ALC_CMS: 4
- ALC_CMS.4: 3
- ALC_CMS.5: 5
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV: 1
- ATE_COV.3: 4
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 15
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FCS:
- FCS_CKM.1: 35
- FCS_CKM.2: 3
- FCS_CKM.4: 18
- FCS_CKM.4.1: 1
- FCS_COP.1: 17
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 4
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UID.1: 9
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 15
- FMT_MSA.1.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITC.1: 8
- FPT_ITC.1.1: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_SAS.1: 7
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.4: 3
- FCS_COP.1: 23
- FCS_COP.1.1: 2
- FCS_RNG.1: 9
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 36
- FDP_ACC.1.1: 2
- FDP_ACF.1: 32
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_FLS.1: 1
- FDP_IFC.1: 11
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_ITT.1: 14
- FDP_ITT.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 4
- FMT_MSA.1: 25
- FMT_MSA.1.1: 2
- FMT_MSA.3: 20
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FPT:
- FPT_FLS.1: 7
- FPT_ITT.1: 13
- FPT_ITT.1.1: 1
- FPT_PHP.3: 7
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.DELIVER: 3
- A.LOCATE: 2
- A.MANAGE: 2
- A.NOEVIL: 3
- O:
- O.ACCESS: 9
- O.ADMIN: 9
- O.AUDIT: 11
- O.ENCRYP: 6
- O.IDAUTH: 14
- O.PROTCT: 9
- O.TIME: 11
- OE:
- OE.ADMIN: 10
- OE.PHYCAL: 6
- T:
- T.AUDACC: 3
- T.NOAUTH: 2
- T.PRIVIL: 3
- T.PROCOM: 2
|
- O:
- O.CUST_RECONFIG: 5
- O.EEPROM_INTEGRITY: 5
- O.FM_FW: 9
- O.HW_AES: 7
- O.INTEGRITY_CHK: 7
- O.MEM_ACCESS: 9
- O.RND: 3
- O.SFR_ACCESS: 9
- T:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 105
- NXP Semiconductors: 29
- Philips:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 2
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 3
- TDES: 1
- Triple-DEA: 1
- Triple-DES: 9
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 5
- DHE: 1
- Diffie-Hellman: 4
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- TLS:
- TLS: 8
- TLS 1.1: 2
- TLS 1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 13
- fault injection: 3
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 13
- Physical Probing: 2
- physical probing: 1
- side channel: 1
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 186-4: 1
- FIPS PUB 197: 1
- PKCS:
- RFC:
- RFC 2631: 1
- RFC 4346: 1
- RFC 5246: 2
- RFC4346: 1
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS PUB 197: 3
- FIPS PUB 46: 1
- FIPS PUB 46-3: 3
- ISO:
- ISO/IEC 14443: 10
- ISO/IEC 18092: 2
- ISO/IEC 7816: 18
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 608207
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
- /Author: NXP Semiconductors
- /CreationDate: D:20121112125830+01'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Keywords: "CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D024PVB, P60D016PVB, P60D012PVB"
- /ModDate: D:20121214111543+01'00'
- /Producer: Adobe PDF Library 9.0
- /Subject: P60D024PVB
- /Title: Security Target Lite
- pdf_file_size_bytes: 630317
- pdf_hyperlinks: mailto:[email protected]
|