This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
S3D350A/S3D300A/S3D264A/ S3D232A/ S3D200A/ S3K350A/ S3K300A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software, revision 2 ANSSI-CC-2017/53 |
NXP Smart Card Controller P5CD144V0B with IC Dedicated Software, Secured Crypto Library Release 2.0 BSI-DSZ-CC-0440-2008 |
|
---|---|---|
name | S3D350A/S3D300A/S3D264A/ S3D232A/ S3D200A/ S3K350A/ S3K300A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software, revision 2 | NXP Smart Card Controller P5CD144V0B with IC Dedicated Software, Secured Crypto Library Release 2.0 |
not_valid_before | 2017-08-24 | 2008-07-03 |
not_valid_after | 2022-08-24 | 2019-09-01 |
scheme | FR | DE |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_53en.pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0440b.pdf |
manufacturer | Samsung Electronics Co., Ltd. | NXP Semiconductors |
manufacturer_web | https://www.samsung.com | https://www.nxp.com/ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_53fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0440a.pdf |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2008, 9, 30), 'maintenance_title': 'NXP Smart Card Controller P5CD144V0B with IC dedicated software: Secured Crypto Library Release 2.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0440_ma1a.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0440_ma1b.pdf'}) | |
state/report/pdf_hash | 8734501e1c7636c54df911cb919114e652127aa4764a41490abb88660a43548a | 16c4bb0e1301bfc73b8ae0c08343cde53f79af838e9271aa8d8a0bf592e9d871 |
state/report/txt_hash | 54a08816ad086cc6c3ee2a67a4fb262927d86ce4f87c925334e8e15c48e67f1f | 11be0ce2f917f515447f15d0c8f9ddc13d306d96f748cb60f58b92520cfdd7b3 |
state/st/pdf_hash | 8f314e39aa3e10ea1a3abadb85cd2a72da352657847e16b47842ee572b906ebe | 96260b763de45562884f6a97a8a597321748abdc8b03a69baba451afbaacf2b7 |
state/st/txt_hash | 3655712cf2a610a90e70dc45a2d2c4edea02a54e67451d0689bbc04a60e77478 | 715b48476bc3e63f08767b6b594c008daaa34dbb4135fec6b1d038dff52634d5 |
heuristics/cert_id | ANSSI-CC-2017/53 | BSI-DSZ-CC-0440-2008 |
heuristics/cert_lab | CEA | BSI |
heuristics/extracted_versions | 2, 32 | 2.0 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2018/12 | None |
heuristics/report_references/directly_referencing | ANSSI-CC-2017/11 | BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-0417-2008 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2019/03, 2017-62-INF-3233, ANSSI-CC-2021/04, ANSSI-CC-2018/12, KECS-ISIS-0936-2019, ANSSI-CC-2021/03, ANSSI-CC-2021/05, ANSSI-CC-2018/13, KECS-ISIS-0937-2019, ANSSI-CC-2019/01, ANSSI-CC-2019/61, ANSSI-CC-2019/59, 2017-63-INF-3232, ANSSI-CC-2019/02, ANSSI-CC-2019/51, ANSSI-CC-2019/60, ANSSI-CC-2018/14, ANSSI-CC-2021/06 | None |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2017/11 | BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0404-2007 |
heuristics/scheme_data |
|
None |
heuristics/st_references/directly_referencing | None | BSI-DSZ-CC-0411-2007 |
heuristics/st_references/indirectly_referencing | None | BSI-DSZ-CC-0411-2007 |
pdf_data/report_filename | anssi-cc-2017_53fr.pdf | 0440a.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 10 | 13 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims | |
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_INT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM | 1 | 2 |
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 2 | 6 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ATE |
|
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_IND | 1 | 2 |
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 3 | 4 |
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 2 | 3 |
pdf_data/report_keywords/cc_security_level/EAL/EAL7 | 1 | 4 |
pdf_data/report_keywords/certification_process | |
|
pdf_data/report_keywords/crypto_engine | |
|
pdf_data/report_keywords/crypto_library | |
|
pdf_data/report_keywords/crypto_scheme | |
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function | |
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis | |
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 1 | 7 |
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 2 | 6 |
pdf_data/report_keywords/technical_report_id | |
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//CreationDate | D:20170904142818+02'00' | D:20080711074302+02'00' |
pdf_data/report_metadata//Creator | Microsoft® Word 2010 | Writer |
pdf_data/report_metadata//Keywords | ANSSI-CC-CER-F-07.025 | "NXP Smart Card Controller P5CD144V0Bwith IC deicated software:Secured Crypto Library Release 2.0, BSI-DSZ-CC-0440-2008, NXP Semiconductors Germany GmbH, Common Criteria, Zertifizierung" |
pdf_data/report_metadata//ModDate | D:20170911162916+02'00' | D:20080715141150+02'00' |
pdf_data/report_metadata//Producer | Microsoft® Word 2010 | StarOffice 8 |
pdf_data/report_metadata//Subject | Common Criteria Zertifizierung | |
pdf_data/report_metadata//Title | Zertifizierungsreport BSI-DSZ-CC-0440-2008 | |
pdf_data/report_metadata/pdf_file_size_bytes | 713542 | 569027 |
pdf_data/report_metadata/pdf_hyperlinks | mailto:[email protected], http://www.ssi.gouv.fr/ | http://www.bsi.bund.de/ |
pdf_data/report_metadata/pdf_number_of_pages | 19 | 34 |
pdf_data/st_filename | anssi-cible-cc-2017_53en.pdf.pdf | 0440b.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 30 | 66 |
pdf_data/st_keywords/asymmetric_crypto/FF |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 4 | 12 |
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA-CRT | 1 | 3 |
pdf_data/st_keywords/cc_cert_id | |
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.AES | 5 | 6 |
pdf_data/st_keywords/cc_claims/O/O.ECC | 2 | 7 |
pdf_data/st_keywords/cc_claims/O/O.MEM_ACCESS | 1 | 5 |
pdf_data/st_keywords/cc_claims/O/O.RND | 6 | 14 |
pdf_data/st_keywords/cc_claims/O/O.RSA | 8 | 6 |
pdf_data/st_keywords/cc_claims/O/O.SHA | 6 | 7 |
pdf_data/st_keywords/cc_claims/T/T.RND | 5 | 6 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 7 | 6 |
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 2 | 3 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented | 2 | 3 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 | 6 | 30 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented | 1 | 3 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 12 | 4 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 13 | 2 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 26 | 45 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 4 | 13 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 17 | 18 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 51 | 1 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 21 | 95 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 20 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 17 | 11 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 23 | 34 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 13 | 18 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 35 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 28 | 2 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 32 | 2 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 12 | 16 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 16 | 14 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 9 | 5 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 6 | 8 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 43 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 20 | 6 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 17 | 15 |
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 3 | 15 |
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine | |
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 | 1 | 14 |
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 | 2 | 10 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 | 2 | 11 |
pdf_data/st_keywords/randomness/RNG/RND | 11 | 21 |
pdf_data/st_keywords/randomness/RNG/RNG | 8 | 102 |
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA | 4 | 37 |
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 26 | 12 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 13 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 8 | 19 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 23 | 12 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 4 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 7 | 27 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 2 | 15 |
pdf_data/st_keywords/side_channel_analysis/SCA/side-channel | 4 | 7 |
pdf_data/st_keywords/side_channel_analysis/SCA/timing attacks | 1 | 9 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 5 | 3 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 30 | 53 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES | 13 | 1 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 6 | 19 |
pdf_data/st_keywords/symmetric_crypto/DES/DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 10 | 42 |
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//CreationDate | D:20170522222620+09'00' | D:20071107141301+01'00' |
pdf_data/st_metadata//Creator | Microsoft® Word 2010 | Acrobat PDFMaker 7.0.7 for Word |
pdf_data/st_metadata//ModDate | D:20170911162903+02'00' | D:20080624155809+02'00' |
pdf_data/st_metadata//Producer | Microsoft® Word 2010 | Acrobat Distiller 7.0.5 (Windows) |
pdf_data/st_metadata//Title | Security Target Lite - Secured Crypto Library on the P5CD144V0B | |
pdf_data/st_metadata/pdf_file_size_bytes | 1236724 | 664239 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/, mailto:[email protected] | http://www.cacr.math.uwaterloo.ca/hac/ |
pdf_data/st_metadata/pdf_number_of_pages | 110 | 77 |
dgst | 2fa836f2d10827ff | f534767ef020fbba |