Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Qualcomm Secure Processor Unit SPU230 in SDM855 SoC
BSI-DSZ-CC-1045-2019
Apollo OS e-Passport Version 1.0
JISEC-CC-CRP-C0229
name Qualcomm Secure Processor Unit SPU230 in SDM855 SoC Apollo OS e-Passport Version 1.0
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme DE JP
not_valid_after 07.05.2024 31.07.2014
not_valid_before 08.05.2019 27.07.2009
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0229_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0229_est.pdf
manufacturer Qualcomm Technologies Inc. SC Square LTD.
manufacturer_web https://www.qualcomm.com https://www.scsquare.com/
security_level EAL4+, ALC_DVS.2, AVA_VAN.5 AVA_MSU.3, EAL4+, AVA_VLA.4
dgst 2e8cbf6ce18d4c6f 2b75001bea02144e
heuristics/cert_id BSI-DSZ-CC-1045-2019 JISEC-CC-CRP-C0229
heuristics/cert_lab BSI []
heuristics/extracted_sars ALC_TAT.1, ALC_CMS.4, AVA_VAN.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_CMC.4 ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3
heuristics/extracted_versions - 1.0
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-1045-V2-2023 {}
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0399-2007
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-1045-V2-2023 {}
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0229
  • certification_date: 01.07.2009
  • claim: EAL4+ ADV_IMP.2, ALC_DVS.2 PP
  • enhanced:
    • assurance_level: EAL4 Augmented with ADV_IMP.2, ALC_DVS.2
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0229_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The Target of Evaluation (TOE) is the contactless integrated circuit chip of machine readable travel documents (MRTD's chip) programmed according to the Logical Data Structure (LDS) [LDS] and providing the Basic Access Control according to the ICAO technical report [PKI]. The MRTD is viewed as unit of - The physical MRTD as travel document in form of paper, plastic and chip. It presents visual readable data including (but not limited to) personal data of the MRTD holder - the biographical data on the biographical data page of the passport book, - the printed data in the Machine Readable Zone (MRZ) and - The printed portrait. - The logical MRTD as data of the MRTD holder stored according to the Logical Data Structure [LDS] as specified by ICAO on the contactless integrated circuit. It presents contactless readable data including (but not limited to) personal data of the MRTD holder - the digital Machine Readable Zone Data (digital MRZ data, EF.DG1), - the digitized portraits (EF.DG2), - the biometric reference data of finger(s) (EF.DG3) or iris image(s) (EF.DG4) or both - the other data according to LDS (EF.DG5 to EF.DG16) and - the Document security object The physical MRTD is protected by physical security measures (e.g. watermark on paper, security printing), logical (e.g. authentication keys of the MRTD痴 chip) and organisational security measures (e.g. control of materials, personalization procedures) [SSMR]. These security measures include the binding of the MRTD痴 chip to the passport book. The logical MRTD is protected in authenticity and integrity by a digital signature created by the document signer acting for the issuing State or Organization and the security features of the MRTD痴 chip. TOE security functions TOE security function is as follows - SF.Cryptographic Support The cryptographic support for the other Security Functions. - SF.Identification and Authentication The identification and authentication for the TOE user - SF. User Data Protection The user data protection - SF.Security Management The security management of the TOE - SF.Protection (Protection of TSC) This Security Function protects the TSF functionality, TSF data and user data.
    • evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
    • product: Apollo OS e-Passport
    • product_type: IT Product (IC chip firmware)
    • protection_profile: BSI-PP-0017
    • report_link: https://www.ipa.go.jp/en/security/c0229_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0229_est.pdf
    • toe_version: 1.0
    • vendor: SC Square LTD.
  • expiration_date: 01.07.2014
  • supplier: SC Square LTD.
  • toe_japan_name: Apollo OS e-Passport 1.0
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0229_it8194.html
  • toe_overseas_name: Apollo OS e-Passport 1.0
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0399-2007
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0399-2007
heuristics/protection_profiles cf0f01bcd7be3e9c {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf {}
pdf_data/cert_filename 1045c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1045-2019: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
  • Qualcomm:
    • Qualcomm: 2
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20200129140240+01'00'
  • /Creator: Writer
  • /Keywords: Common Criteria, Certification, Zertifizierung, Qualcomm, SoC, system on chip, SPU230, hardmacro, secure element, secure processor
  • /ModDate: D:20200129140509+01'00'
  • /Producer: LibreOffice 6.2
  • /Subject: Common Criteria Certification
  • /Title: Certificate BSI-DSZ-CC-1045-2019
  • pdf_file_size_bytes: 898760
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 1045a_pdf.pdf c0229_erpt.pdf
pdf_data/report_frontpage
  • DE:
    • cc_security_level: Common Criteria Part 3 extended EAL 4 augmented by AVA_VAN.5 and ALC_DVS.2
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 conformant
    • cert_id: BSI-DSZ-CC-1045-2019
    • cert_item: Qualcomm Secure Processor Unit SPU230 in SDM855 SoC
    • cert_lab: BSI
    • developer: Qualcomm Technologies Inc
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1045-2019: 15
  • DE:
    • BSI-DSZ-CC-0399-2007: 1
  • JP:
    • CRP-C0229-01: 1
    • Certification No. C0229: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0084-2014: 3
  • BSI:
    • BSI-PP-0017: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL 5: 4
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL4: 3
    • EAL4 augmented: 2
    • EAL5+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
  • ADV:
    • ADV_IMP.2: 3
  • ALC:
    • ALC_DVS.2: 4
  • AVA:
    • AVA_MSU.3: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 5
  • R:
    • R.O: 5
  • A:
    • A.INSP_SYS: 1
    • A.PERS_AGENT: 1
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 29
  • Infineon:
    • Infineon: 2
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • TSystems:
    • T-Systems International: 3
  • atsec:
    • atsec: 2
  • TUV:
    • TÜV Informationstechnik: 2
    • TÜViT: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • Side-channel: 1
    • physical probing: 1
  • other:
    • JIL: 3
  • FI:
    • Fault Injection: 1
    • Malfunction: 1
    • Physical Tampering: 1
    • Physical tampering: 1
    • fault injection: 3
    • malfunction: 3
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • physical probing: 1
  • other:
    • reverse engineering: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 3
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 1
    • AIS 35: 2
    • AIS 36: 1
    • AIS 37: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 23: 1
    • AIS 31: 1
    • AIS 32: 1
    • AIS 34: 1
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ICAO:
    • ICAO: 7
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • List TOE implementation representation and tools, ALC/SPU_3_1_config_list.txt, April 11th 2019 (confidential document) [11] Guidance documentation for the TOE; Qualcomm SPUI Core, Hana Application Programming: 1
    • Qualcomm SPU230 Core Security Target 80-NU430-5-C; Revision C, April 8th , 2019 (confidential document) [7] Evaluation Technical Report, Version 1.2, May 06th 2019, Evaluation Technical Report - Summary: 1
    • T-Systems International GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /CreationDate: D:20090910140719+09'00'
  • /ModDate: D:20090910140719+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 170365
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 27
pdf_data/st_filename 1045b_pdf.pdf c0229_est.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0399-2007: 1
  • NL:
    • CC-1: 3
    • CC-2: 3
    • CC-3: 2
    • CC-4: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 3
  • BSI:
    • BSI-PP-0002-2001: 1
    • BSI-PP-0017: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL4 augmented: 1
  • EAL:
    • EAL 4+: 1
    • EAL 5+: 1
    • EAL4: 9
    • EAL4 augmented: 2
    • EAL4+: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
  • ADO:
    • ADO_DEL: 1
    • ADO_DEL.2: 1
    • ADO_IGS: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.2: 8
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 3
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_MSU.3: 1
    • AVA_SOF.1: 1
    • AVA_VLA.2: 1
    • AVA_VLA.4: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS.1: 4
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 30
    • FCS_CKM.1: 7
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP: 17
    • FCS_COP.1: 5
    • FCS_ITC.1: 5
    • FCS_ITC.2: 5
    • FCS_RNG.1: 3
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 2
    • FDP_ACC.2: 3
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 3
    • FDP_ACF.1: 4
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ICT.1: 1
    • FDP_IFC.1: 5
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 1
    • FDP_ITC.1: 8
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 3
    • FDP_ITT.1.1: 1
    • FDP_RIP: 10
    • FDP_RIP.1: 2
    • FDP_SDA: 7
    • FDP_SDA.1: 8
    • FDP_SDA.1.1: 2
    • FDP_SDC.1: 11
    • FDP_SDC.1.1: 2
    • FDP_SDI: 2
    • FDP_SDI.2: 18
    • FDP_SDI.2.1: 3
    • FDP_SDI.2.2: 3
    • FDP_SDR: 7
    • FDP_SDR.1: 8
    • FDP_SDR.1.1: 2
  • FMT:
    • FMT_CMT: 2
    • FMT_CMT.1: 35
    • FMT_CMT.1.1: 7
    • FMT_LIM.1: 5
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 5
    • FMT_LIM.2.1: 1
    • FMT_MSA: 5
    • FMT_MSA.1: 2
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 5
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 3
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 3
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT.2: 4
    • FRU_FLT.2.1: 1
  • FAU:
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 4
  • FCS:
    • FCS_CKM: 22
    • FCS_CKM.1: 30
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.4: 33
    • FCS_COP: 46
    • FCS_COP.1: 24
    • FCS_RND: 8
    • FCS_RND.1: 13
    • FCS_UIT: 1
  • FDP:
    • FDP_ACC: 19
    • FDP_ACC.1: 25
    • FDP_ACC.1.1: 1
    • FDP_ACF: 15
    • FDP_ACF.1: 34
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU: 2
    • FDP_DAU.1: 5
    • FDP_IFC: 1
    • FDP_IFC.1: 9
    • FDP_IFF: 1
    • FDP_ITC.1: 17
    • FDP_ITC.2: 13
    • FDP_SDI.1: 1
    • FDP_SDI.2: 1
    • FDP_UCT: 12
    • FDP_UCT.1: 12
    • FDP_UIT: 12
    • FDP_UIT.1: 13
  • FIA:
    • FIA_API: 6
    • FIA_API.1: 1
    • FIA_UAU: 36
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 3
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 7
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 4
    • FIA_UAU.6: 7
    • FIA_UCT: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 3
    • FIA_UID.1.2: 3
  • FMT:
    • FMT_LIM.1: 12
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 12
    • FMT_LIM.2.1: 3
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 4
    • FMT_MSA.1: 2
    • FMT_MSA.2: 22
    • FMT_MSA.3: 4
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 22
    • FMT_MTD.1: 14
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 3
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 11
    • FPT_FLS.1.1: 3
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 4
    • FPT_RVM.1: 6
    • FPT_RVM.1.1: 3
    • FPT_SEP.1: 8
    • FPT_SEP.1.1: 4
    • FPT_SEP.1.2: 4
    • FPT_TST: 1
    • FPT_TST.1: 11
    • FPT_TST.1.1: 3
    • FPT_TST.1.2: 3
    • FPT_TST.1.3: 4
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_TRP.1: 8
pdf_data/st_keywords/cc_claims
  • O:
    • O.AES: 3
    • O.KDF: 5
    • O.RND: 1
    • O.SHA: 4
  • T:
    • T.AUTH-APPLI-DATA: 3
    • T.AUTH-TSF-DATA: 3
    • T.CONFID-APPLI-DATA: 5
    • T.CONFID-TSF-CODE: 3
    • T.CONFID-TSF-DATA: 4
    • T.INTEG-: 1
    • T.INTEG-APPLI-CODE: 3
    • T.INTEG-APPLI-DATA: 5
    • T.INTEG-TSF-CODE: 3
    • T.INTEG-TSF-DATA: 3
    • T.RBP-APPLI-DATA: 3
    • T.RBP-TSF-DATA: 3
    • T.RND: 1
  • A:
    • A.INSP_SYS: 2
    • A.PERS_AGENT: 2
  • O:
    • O.RND: 1
  • OE:
    • OE.EXAM_MRTD: 1
    • OE.PERSONALIZATION: 2
    • OE.PROT_LOGICAL_MRTD: 2
  • OT:
    • OT.AC_PERS: 4
    • OT.DATA_CONF: 3
    • OT.PROT_ABUSE_FU: 2
    • OT.PROT_ABUSE_FUNC: 1
    • OT.PROT_INF_LEAK: 2
    • OT.PROT_MALFUNCT: 2
    • OT.PROT_PHYS_TAMPER: 1
  • T:
    • T.ABUSE_FUNC: 1
    • T.CHIP_ID: 1
    • T.EAVESDROPPING: 1
    • T.FORGERY: 1
    • T.INFORMATION_LEAKAGE: 1
    • T.MALFUNCTION: 1
    • T.PHYS_TAMPER: 1
    • T.SKIMMING: 1
pdf_data/st_keywords/vendor
  • Qualcomm:
    • Qualcomm: 19
  • Infineon:
    • Infineon: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 34
      • AES-256: 2
  • constructions:
    • MAC:
      • CMAC: 17
      • HMAC: 3
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 22
    • DES:
      • DES: 11
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
      • SHA1: 1
    • SHA2:
      • SHA-256: 10
      • SHA-384: 3
      • SHA-512: 4
  • SHA:
    • SHA1:
      • SHA-1: 7
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 10
pdf_data/st_keywords/crypto_protocol
  • PGP:
    • PGP: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 1
  • RNG:
    • RND: 2
    • RNG: 12
  • RNG:
    • RND: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 4
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 6
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • fault injection: 2
    • malfunction: 3
  • SCA:
    • Leak-Inherent: 3
    • Physical Probing: 2
    • Side-channel: 1
    • physical probing: 4
    • side channels: 1
    • side-channel: 2
  • other:
    • cold boot: 4
  • FI:
    • Malfunction: 5
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 8
  • SCA:
    • DPA: 1
    • Leak-Inherent: 2
    • physical probing: 4
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 1
    • EF.DG16: 1
    • EF.DG2: 1
    • EF.DG3: 1
    • EF.DG4: 1
    • EF.DG5: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 180-4: 3
    • FIPS 186-4: 1
    • FIPS 197: 5
    • FIPS 198-1: 2
    • FIPS PUB 180-4: 3
    • FIPS PUB 186-4: 1
    • FIPS PUB 197: 3
    • FIPS PUB 198-1: 2
  • NIST:
    • NIST SP 800-108: 3
    • NIST SP 800-38A: 2
    • NIST SP 800-38B: 2
    • NIST SP 800-38C: 1
    • NIST SP 800-90A: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC3447: 1
  • BSI:
    • AIS31: 5
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • FIPS:
    • FIPS 180-2: 3
    • FIPS 180-212: 1
    • FIPS 46-3: 3
    • FIPS PUB 46-3: 1
  • ICAO:
    • ICAO: 12
  • ISO:
    • ISO/IEC 7816: 2
pdf_data/st_metadata
  • /Author: QTI
  • /CreationDate: D:20190503125434-07'00'
  • /Creator: Microsoft® Word for Office 365
  • /Keywords: integrated secure element, PP0084, Qualcomm, secure processing unit, secure subsystem, SDM855, SoC, SPU230
  • /ModDate: D:20190503125649-07'00'
  • /Producer: Microsoft® Word for Office 365
  • /Subject: 80-NU430-6 Rev. B
  • /Title: Qualcomm® Secure Processing Unit SPU230 Core Security Target Lite
  • pdf_file_size_bytes: 723737
  • pdf_hyperlinks: https://createpoint.qti.qualcomm.com/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 54
  • /CreationDate: D:20090812100814Z
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20090812131114+03'00'
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1066290
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 116
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different