| name |
HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2 |
P73N2M0B0.202 |
| category |
Network and Network-Related Devices and Systems |
Trusted Computing |
| scheme |
MY |
FR |
| status |
archived |
archived |
| not_valid_after |
18.03.2020 |
16.11.2023 |
| not_valid_before |
18.03.2015 |
16.11.2018 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C055-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_52fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TippingPointST%201-0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_52en.pdf |
| manufacturer |
HP TippingPoint |
NXP Semiconductors |
| manufacturer_web |
https://www.hp.com/ |
https://www.nxp.com/ |
| security_level |
ALC_FLR.2, EAL3+ |
ALC_TAT.3, ATE_COV.3, ALC_CMC.5, ASE_TSS.2, ADV_INT.3, AVA_VAN.5, ADV_IMP.2, ALC_DVS.2, ADV_TDS.5, EAL5+, ATE_FUN.2, ALC_FLR.1 |
| dgst |
2cfde4db66d5e375 |
2a5af0a05edb751e |
| heuristics/cert_id |
ISCB-5-RPT-C055-CR-v1 |
ANSSI-CC-2018/52 |
| heuristics/cert_lab |
[] |
SERMA |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ALC_FLR.2, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ASE_REQ.2, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ALC_COV.3, ASE_ECD.1, ALC_FLR.1, ALC_TAT.3, ALC_LCD.1, ADV_CMC.5, ALC_DVS.2, ADV_TDS.5, ASE_SPD.1, ATE_COV.3, ADV_INT.3, ASE_TSS.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ADV_ARC.1 |
| heuristics/extracted_versions |
3.7.2 |
0.202 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2019/62, ANSSI-CC-2018/55 |
| heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2018/08 |
| heuristics/report_references/indirectly_referenced_by |
{} |
NSCIB-CC-2300149-01-CR, ANSSI-CC-2019/62, ANSSI-CC-2018/55 |
| heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2018/08 |
| heuristics/scheme_data |
- cert_no: 2015-001-C055
- certification_date: 18.03.2015
- developer: Trend Micro TippingPoint
- enhanced:
- assurance_level: EAL3+ALC_FLR.2
- category: Network and Network-Related Devices and Systems
- cert_id: C055
- certification_date: 18.03.2015
- developer: Freddy MercadoGlobal Compliance EngineerTrend Micro - TippingPointTel: +1 512 432-2947Cell: +1 512 632-6308VoIP: +1 512 319-5317Email: [email protected] Tandem Blvd.Austin, TX 78728 – USA URL:http://www.trendmicro.com/
- expiration_date: 18.03.2020
- mutual_recognition: CCRA
- product: Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/ISCB-5-RPT-C055-CR-v1.pdf
- scope: The TOE is a hardware and software appliance that contains all the functions needed for intrusion prevention, including Internet Protocol (IP) defragmentation, TCP flow reassembly, statistical analysis, traffic shaping, flow blocking, flow state tracking and application-layer parsing of network protocols. The primary function of the TOE is to protect networks from intrusion attempts by scanning network traffic, detecting intrusion attempts, and reacting to detected intrusion attempts according to the filters and action sets with which the device is configured. The scope of evaluation covers major security features as follows: Security Audit: The TOE is able to generate auditable events for the basic level of audit. Identification and authentication: The TOE identifies and authenticates all administrative users of the TOE before granting them access to the TOE. Intrusion Detection and Prevention: The TOE collects network traffic and subjects it to statistical and signature-based analysis, depending on configured IPS filters. Traffic Management: The TOE can be configured to operate as a firewall, blocking or permitting network traffic based on protocol or IP address and port. Security Management: The TOE provides the security management functions to enable the administrative users to manage user accounts, audit data and audit configurations, security configuration data, traffic management filters, and IDS data collection, analysis, and reaction. TSF Protection: The TOE includes its own time source for providing reliable time stamps that are used in audit records and stored IDS data. Trusted Path: The TOE provides a trusted path for remote administrative users of the TOE to communicate with the TOE. The trusted path is implemented over the network management port using HTTPS for access to the LSM and SSHv2 for access to the CLI.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C055/TippingPointST%201-0.pdf
- type: Hardware-based intrusion prevention systems
- expiration_date: 18.03.2020
- level: EAL3+ALC_FLR.2
- product: Trend Micro TippingPoint Intrusion Prevention Systems v3.7.2
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/120
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
cf0f01bcd7be3e9c |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
ISCB-5-RPT-C055-CR-v1.pdf |
anssi-cc-2018_52fr.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5, ASE_TSS.2
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2018/52
- cert_item: P73N2M0B0.202
- cert_item_version: B0.202
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: NXP Semiconductors Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire NXP Semiconductors Troplowitzstrasse 20, 22529 Hamburg, Allemagne
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certifié BSI-CC-PP-0084-2014 le 19 février 2014
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C055-CR-v1: 28
|
- FR:
- ANSSI-CC-2018/08: 2
- ANSSI-CC-2018/52: 14
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084-2014: 1
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_INT: 1
- ADV_INT.3: 2
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.5: 2
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 2
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR: 2
- ALC_FLR.1: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ALC_TAT.3: 2
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 2
- ATE:
- ATE_COV: 1
- ATE_COV.3: 2
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_FUN.2: 2
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_SEL.1.1: 1
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.4.1: 1
- FMT:
- FMT_MTD.1.1: 2
- FMT_SMF.1.1: 1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTP:
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 11
- NXP Semiconductors: 2
|
| pdf_data/report_keywords/eval_facility |
|
- Serma:
- SERMA: 2
- Serma Safety & Security: 1
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- FIPS:
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: ISCB Department
- /CreationDate: D:20150318142844+08'00'
- /Creator: Microsoft® Word 2013
- /Keywords: HP TippingPoint Intrusion Prevention System
- /ModDate: D:20150318142844+08'00'
- /Producer: Microsoft® Word 2013
- /Subject: HP TippingPoint Intrusion Prevention Systems, comprising the S7500NX, S7100NX, S6200NX, S5200NX, S2600NX, S1400N, and S660N model appliances running TippingPoint Operating System v3.7.2
- /Title: C055 Certification Report
- pdf_file_size_bytes: 733406
- pdf_hyperlinks: mailto:[email protected], http://www.commoncriteriaportal.org/, http://www.cybersecurity.my/mycc
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
- /Comments: NXP Semiconductors
- /Company: SGDSN/ANSSI
- /CreationDate: D:20181121110348+01'00'
- /Creator: Acrobat PDFMaker 11 pour Word
- /Keywords: ANSSI-CC-CER-F-07.028
- /ModDate: D:20181121155005+01'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20181121100345
- /Subject:
- /Title:
- pdf_file_size_bytes: 240856
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
| pdf_data/st_filename |
TippingPointST 1-0.pdf |
anssi-cible-cc-2018_52en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 5
- EAL 3 augmented: 4
- EAL3: 1
|
- EAL:
- EAL4: 4
- EAL4 augmented: 2
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 10
- ADV_FSP: 1
- ADV_FSP.3: 12
- ADV_TDS: 1
- ADV_TDS.2: 13
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.3: 13
- ALC_CMS: 1
- ALC_CMS.3: 6
- ALC_DEL: 1
- ALC_DEL.1: 5
- ALC_DVS: 1
- ALC_DVS.1: 5
- ALC_FLR: 1
- ALC_FLR.2: 18
- ALC_LCD: 1
- ALC_LCD.1: 6
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 14
- ASE_ECD: 1
- ASE_ECD.1: 10
- ASE_INT: 1
- ASE_INT.1: 12
- ASE_OBJ: 1
- ASE_OBJ.2: 10
- ASE_REQ: 1
- ASE_REQ.2: 13
- ASE_SPD: 1
- ASE_SPD.1: 7
- ASE_TSS: 1
- ASE_TSS.1: 5
- ATE:
- ATE_COV: 1
- ATE_COV.2: 5
- ATE_DPT: 1
- ATE_DPT.1: 5
- ATE_FUN: 1
- ATE_FUN.1: 8
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_CMC.5: 2
- ADV_FSP: 1
- ADV_FSP.4: 2
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 3
- ADV_IMP.2: 5
- ADV_INT.3: 2
- ADV_TDS.5: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 4
- ALC_CMC.5: 4
- ALC_CMS: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 3
- ALC_COV.2: 2
- ALC_COV.3: 2
- ALC_DEL.1: 1
- ALC_DVS.2: 4
- ALC_FLR.1: 4
- ALC_LCD.1: 1
- ALC_TAT.3: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 4
- ATE:
- ATE_COV: 1
- ATE_COV.3: 2
- ATE_DPT.3: 1
- ATE_FUN.2: 2
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 5
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 6
- FAU_SAR.3.1: 1
- FAU_SEL: 2
- FAU_SEL.1: 6
- FAU_SEL.1.1: 1
- FAU_STG: 2
- FAU_STG.1: 2
- FAU_STG.2: 9
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FDP:
- FDP_IFC: 2
- FDP_IFC.1: 8
- FDP_IFC.1.1: 1
- FDP_IFF: 2
- FDP_IFF.1: 12
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS: 2
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 1
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 3
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA.3: 2
- FMT_MTD: 1
- FMT_MTD.1: 14
- FMT_MTD.1.1: 6
- FMT_SMF: 2
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM: 3
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FTP:
- FTP_TRP: 2
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_SAS: 1
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 13
- FCS_CKM.1: 13
- FCS_CKM.4: 14
- FCS_COP: 31
- FCS_COP.1: 8
- FCS_RNG: 5
- FCS_RNG.1: 5
- FCS_SDI.2: 1
- FDP:
- FDP_ACC: 12
- FDP_ACC.1: 14
- FDP_ACF: 12
- FDP_ACF.1: 10
- FDP_IFC.1: 13
- FDP_ITC.1: 13
- FDP_ITC.2: 13
- FDP_ITT.1: 8
- FDP_MSA: 8
- FDP_SDC: 1
- FDP_SDC.1: 7
- FDP_SDI: 13
- FDP_SDI.1: 2
- FDP_SDI.1.1: 1
- FDP_SDI.2: 6
- FDP_SMF.1: 4
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 5
- FMT_LIM.2: 4
- FMT_MAS.1: 1
- FMT_MSA: 20
- FMT_MSA.1: 9
- FMT_MSA.3: 12
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FPT:
- FPT_FLS.1: 10
- FPT_ITT.1: 8
- FPT_PHP.3: 8
- FRU:
- FTP:
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.MANAGE: 3
- A.NOEVIL: 2
- A.PROTECT: 2
- O:
- O.ACCESS: 4
- O.ADMIN: 4
- O.ANALYZER: 6
- O.AUDIT: 4
- O.INTEGRITY: 3
- O.RESPONSE: 7
- O.REVIEW: 6
- O.SENSOR: 7
- O.STORAGE: 4
- O.TRAFFIC: 3
- OE:
- OE.CONFID: 2
- OE.INSTALL: 2
- OE.PERSONNEL: 2
- OE.PHYSICAL: 2
- T:
- T.ACCIDENT: 2
- T.ACCOUNT: 2
- T.COMPROMISE: 3
- T.CONFIG: 2
- T.INFLUX: 3
- T.LOSSOF: 2
- T.MALICE: 3
- T.MISUSE: 3
- T.PRIVILEGE: 3
|
- O:
- O.AES: 7
- O.C: 1
- O.CRC: 8
- O.FLASH-: 1
- O.FLASH-INTEGRITY: 6
- O.GCM-SUPPORT: 8
- O.MEM-ACCESS: 8
- O.RND: 3
- O.SFR-ACCESS: 8
- O.TDES: 7
- R:
- T:
|
| pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 53
- NXP Semiconductors: 36
- NXP Semiconductors N.V: 59
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- miscellaneous:
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 2
- TDES: 17
- Triple-DES: 9
- DES:
- miscellaneous:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
- CBC:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 6
- malfunction: 1
- SCA:
- Leak-Inherent: 5
- Physical Probing: 2
- physical probing: 2
- side channel: 2
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- ISO:
- NIST:
- NIST SP 800-38A: 4
- NIST SP 800-38D: 2
- NIST SP 800-67: 2
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- allows NXP to develop sales products composed of P73N2M0B0.202 and Services Software, which are out of scope of this Security Target. NXP Semiconductors P73N2M0B0.202 Security Target Lite P73N2M0B0.202 All: 1
- out of scope: 1
|
| pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20150318142909+08'00'
- /Creator:
- /Keywords:
- /ModDate: D:20150318142917+08'00'
- /Producer: Foxit Reader PDF Printer Version 7.0.1.831
- /Subject:
- /Title:
- pdf_file_size_bytes: 1322388
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
False |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |