Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ST19 platform (0.6æ technology) : ST19SF04A Integrated circuit
ANSSI-CC-2001/18
NXP J3A080 and J2A080 Secure Smart Card Controller Revision 3
BSI-DSZ-CC-0674-2011
name ST19 platform (0.6æ technology) : ST19SF04A Integrated circuit NXP J3A080 and J2A080 Secure Smart Card Controller Revision 3
scheme FR DE
not_valid_before 01.01.2001 31.03.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2001_18.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0674a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0674b_pdf.pdf
manufacturer STMicroelectronics NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.st.com/ https://www.nxp.com
security_level ADV_IMP.2, ALC_FLR.1, AVA_VLA.4, EAL4+, ALC_DVS.2 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 4c2248dd71e6c457 35b486dc8bc6ba84
heuristics/cert_id ANSSI-CC-2001/18 BSI-DSZ-CC-0674-2011
heuristics/cert_lab [] BSI
heuristics/direct_transitive_cves {} CVE-2021-3011
heuristics/indirect_transitive_cves {} CVE-2021-3011
heuristics/extracted_sars ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, ASE_TSS.1, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, APE_INT.1, AVA_VLA.4, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1, AVA_MSU.3
heuristics/extracted_versions 0.6 3
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0799-2012
heuristics/report_references/directly_referencing ANSSI-CC-2000/12 BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0410-2007
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0731-2011, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0744-2011, BSI-DSZ-CC-0799-2012
heuristics/report_references/indirectly_referencing ANSSI-CC-2000/12 BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0410-2007
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0804-2012
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0410-2007
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0804-2012
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0410-2007
pdf_data/report_filename 2001_18.pdf 0674a_pdf.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
  • FR:
  • DE:
    • cert_id: BSI-DSZ-CC-0674-2011
    • cert_item: NXP J3A080 and J2A080 Secure Smart Card Controller Revision 3
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • FR:
    • Rapport de certification 2000/12: 1
    • Rapport de certification 2001/18: 3
  • NL:
    • CC-3: 1
  • DE:
    • BSI-DSZ-CC-0410-2007: 2
    • BSI-DSZ-CC-0597-2010: 2
    • BSI-DSZ-CC-0674-2011: 24
    • BSI-DSZ-CC-0709-2010: 4
  • NL:
    • CC-0410-2007: 1
    • CC-0597-2010: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL4: 3
  • EAL:
    • EAL 4: 5
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 8
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.2: 3
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.2: 3
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • AMA:
    • AMA_AMP.1: 1
    • AMA_CAT.1: 1
    • AMA_EVD.1: 1
    • AMA_SIA.2: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.4: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 3
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 3
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 4
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 18
  • NXP:
    • NXP: 21
    • NXP Semiconductors: 20
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 4
  • BrightSight:
    • Brightsight: 1
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 5
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • DPA: 1
    • SPA: 1
  • other:
    • JIL: 5
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • BSI:
    • AIS 20: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 3
    • AIS 36: 3
    • AIS 38: 1
    • AIS36: 1
  • FIPS:
    • FIPS 180-1: 3
    • FIPS 197: 1
    • FIPS 46-3: 2
  • PKCS:
    • PKCS#1: 3
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
  • JavaCard:
    • Java Card 2.2.2: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Controller Revision 3, BSI-DSZ-CC-0674-2011, Version 2.0, 30.03.2011, TÜV Informationstechnik GmbH (confidential document) 10 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
    • J3A080 and J2A080 Secure Smart Card Controller Revision 3 – Security Target, NXP Semiconductors (confidential document) [7] Java Card System - Minimal Configuration Protection Profile, Version 1.1, May 2006, part of: 1
    • J3A095 J3A080 J3A081 J3A040 J3A041 v2.4.1 R3 Secure Smart Card Controller, NXP Semiconductors (confidential document) [12] Guidance documentation for the TOE, Revision 3.0, 09.03.2011, JCOP V2.4.1 Secure Smart Card: 1
    • P5CN080V0B / P5CC080V0B / P5CC073V0B, BSI- DSZ-CC-0709-2010, Version 1.0, 20.10.2010, Brightsight (confidential document) [18] Certification Report BSI-DSZ-CC-0410-2007 for NXP Secure Smart Card Controller P5CD080V0B: 1
    • Report for NXP J3A080 and J2A080 Secure Smart Card Controller Rev. 3, TÜV Informationstechnik GmbH (confidential document) [10] ETR for composition according to AIS 36 for the Product NXP J3A080 and J2A080 Secure Smart: 1
pdf_data/report_metadata
  • /Author: blad
  • /CreationDate: D:20011122113214
  • /Creator: FrameMaker 6.0
  • /ModDate: D:20011122114539+01'00'
  • /Producer: Acrobat Distiller 4.05 for Windows
  • /Title: RapportCertification.book
  • pdf_file_size_bytes: 107607
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20110414104317+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Semiconductors Germany GmbH, NXP J3A080 and J2A080 Secure Smart Card Controller Revision 3, Smartcard mit Java Card Plattform, CC"
  • /ModDate: D:20110414104553+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0674-2011
  • pdf_file_size_bytes: 994391
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
pdf_data/st_filename 0674b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0410: 2
    • BSI-DSZ-CC-0410-2007: 1
    • BSI-DSZ-CC-0410-2007-MA-07: 1
    • BSI-DSZ-CC-0674: 2
    • BSI-DSZ-CC-0709: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 1
    • BSI-PP-0002-2001: 1
    • BSI-PP-0017: 3
    • BSI-PP-0035: 3
    • BSI-PP-0035-2007: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5: 2
    • EAL 5 augmented: 1
    • EAL5: 17
    • EAL5 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 3
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 3
    • AGD_PRE: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 10
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.3: 2
    • AVA_VAN.4: 3
    • AVA_VAN.5: 8
    • AVA_VLA.4: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP: 18
    • FAU_ARP.1: 1
    • FAU_GEN: 1
    • FAU_GEN.1: 5
    • FAU_SAA.1: 20
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAS: 10
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 18
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 8
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 4
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP: 52
    • FCS_COP.1: 28
    • FCS_COP.1.1: 14
    • FCS_LIM.1: 1
    • FCS_LIM.2: 1
    • FCS_RND.1: 2
    • FCS_RND.2: 1
    • FCS_RNG: 3
    • FCS_RNG.1: 15
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 24
    • FDP_ACC.1: 10
    • FDP_ACC.2: 4
    • FDP_ACF: 20
    • FDP_ACF.1: 21
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.1: 5
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 17
    • FDP_IFC.1: 18
    • FDP_IFF: 5
    • FDP_IFF.1: 11
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 4
    • FDP_ITT: 9
    • FDP_ITT.1: 8
    • FDP_RIP: 10
    • FDP_RIP.1: 15
    • FDP_ROL: 5
    • FDP_ROL.1: 5
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL: 6
    • FIA_AFL.1: 7
    • FIA_ATD: 4
    • FIA_ATD.1: 2
    • FIA_UAU: 10
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.3: 2
    • FIA_UAU.4: 1
    • FIA_UID: 13
    • FIA_UID.1: 2
    • FIA_UID.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 22
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 2
    • FMT_MSA: 41
    • FMT_MSA.1: 10
    • FMT_MSA.2: 3
    • FMT_MSA.3: 12
    • FMT_MTD: 6
    • FMT_MTD.1: 1
    • FMT_MTD.3: 5
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR: 20
    • FMT_SMR.1: 6
  • FPR:
    • FPR_UNO.1: 5
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_AMT.1: 3
    • FPT_FLS: 25
    • FPT_FLS.1: 9
    • FPT_ITT: 9
    • FPT_ITT.1: 9
    • FPT_PHP: 7
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 5
    • FPT_RCV: 6
    • FPT_RCV.3: 8
    • FPT_RCV.4: 2
    • FPT_RVM.1: 6
    • FPT_SEP.1: 7
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TDC.1: 5
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT: 6
    • FRU_FLT.1: 1
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ITC: 5
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.NATIVE: 7
    • A.NO-: 2
    • A.NO-DELETION: 6
    • A.NO-INSTALL: 5
    • A.USE_DIAG: 6
    • A.USE_KEY: 1
    • A.USE_KEYS: 6
    • A.VERIFICATION: 7
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 9
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 7
    • D.APP_KEY: 1
    • D.CRYPTO: 7
    • D.JAVA_OBJECT: 4
    • D.JCS_CODE: 3
    • D.JCS_DATA: 4
    • D.PIN: 15
    • D.SEC_DATA: 5
  • O:
    • O.AES: 2
    • O.ALARM: 5
    • O.CARD-: 1
    • O.CARD-MANAGEMENT: 10
    • O.CIPHER: 12
    • O.CONFIG: 1
    • O.COPY: 1
    • O.ECC: 2
    • O.FAULT_PROTECT: 5
    • O.FIREWALL: 9
    • O.HW_AES: 2
    • O.IDENTIFICATION: 6
    • O.KEY-MNGT: 10
    • O.MEM_ACCESS: 3
    • O.MF_FW: 6
    • O.OPERATE: 16
    • O.OS_DECEIVE: 7
    • O.PHYSICAL: 8
    • O.PIN-MNGT: 5
    • O.PROTECT_DATA: 10
    • O.REALLOCATION: 4
    • O.RESOURCES: 11
    • O.REUSE: 2
    • O.RND: 13
    • O.RSA: 1
    • O.SCP: 36
    • O.SHA: 2
    • O.SHRD_VAR_CON: 1
    • O.SHRD_VAR_CONFID: 9
    • O.SHRD_VAR_INTE: 1
    • O.SHRD_VAR_INTEG: 3
    • O.SID: 13
    • O.SIDE_CHANNEL: 6
    • O.TRANSACTION: 4
    • O.XYZ: 1
  • OE:
    • OE.CARD-MANAGEMENT: 2
    • OE.NATIVE: 5
    • OE.NO-DELETION: 4
    • OE.NO-INSTALL: 7
    • OE.SCP: 5
    • OE.USE_DIAG: 5
    • OE.USE_KEY: 2
    • OE.USE_KEYS: 4
    • OE.VERIFICATION: 9
    • OE.XYZ: 1
  • OP:
    • OP.ARRAY_ACCESS: 3
    • OP.CREATE: 7
    • OP.INSTANCE_FIELD: 1
    • OP.INVK_INTERFACE: 4
    • OP.INVK_VIRTUAL: 3
    • OP.JAVA: 5
    • OP.PUT: 5
    • OP.THROW: 3
    • OP.TYPE_ACCESS: 3
  • OSP:
    • OSP.PRO: 1
    • OSP.PROCESS-TOE: 3
  • R:
    • R.JAVA: 5
  • T:
    • T.ACCES: 1
    • T.ACCESS_DAT: 1
    • T.ACCESS_DATA: 2
    • T.CONFID: 2
    • T.CONFID-: 1
    • T.CONFID-APPLI-: 1
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.EXE-CODE: 11
    • T.FAULT: 7
    • T.INTEG-: 3
    • T.INTEG-APPLI-: 4
    • T.INTEG-APPLI-CODE: 1
    • T.INTEG-APPLI-DATA: 3
    • T.INTEG-JCS-: 4
    • T.INTEG-JCS-CODE: 4
    • T.INTEG-JCS-DATA: 3
    • T.LEAKA: 1
    • T.LEAKAGE: 6
    • T.OS: 2
    • T.OS_DE: 1
    • T.OS_DECEIVE: 6
    • T.OS_OP: 1
    • T.OS_OPERATE: 5
    • T.PHYSIC: 1
    • T.PHYSICAL: 4
    • T.RESOU: 1
    • T.RESOURCES: 5
    • T.RND: 6
    • T.SID: 12
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 120
    • NXP Semiconductors: 13
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • 3DES: 5
      • Triple-DES: 6
    • DES:
      • DES: 16
  • constructions:
    • MAC:
      • CBC-MAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 22
  • FF:
    • DH:
      • Diffie-Hellman: 3
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 14
    • SHA2:
      • SHA-224: 8
      • SHA-256: 7
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 20
    • RNG: 13
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
  • ECB:
    • ECB: 6
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 3
    • Malfunction: 7
    • Physical tampering: 4
    • malfunction: 5
    • physical tampering: 3
  • SCA:
    • DPA: 5
    • Leak-Inherent: 7
    • SPA: 4
    • physical probing: 4
    • side channel: 2
    • side-channel: 1
    • timing attack: 2
    • timing attacks: 2
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 2: 117
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 6
  • FIPS:
    • FIPS 180-3: 3
    • FIPS 197: 1
    • FIPS 46-3: 2
    • FIPS PUB 180-3: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 11770: 2
  • PKCS:
    • PKCS#1: 2
  • SCP:
    • SCP01: 1
    • SCP02: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.1.1: 1
    • GlobalPlatform 2.1.1: 2
  • JavaCard:
    • Java Card 2.2.2: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 3
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 2
    • javacard.framework.applet: 1
    • javacard.security: 4
  • javacardx:
    • javacardx.crypto: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Groups marked with ‗IT‘ are considered in the TOE IT environment, and groups marked with ‗—‗ are out of scope of this evaluation. Table 4. TOE Groups Overview Group Description Scope NXP Semiconductors JCOP 2: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: NXP Semiconductors
  • /CreationDate: D:20110331110109
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Common Criteria Evaluation, NXP J3A080, J2A080, Revision 3, JavaCard
  • /ModDate: D:20110331110109
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Common Criteria Evaluation
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 1910593
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 116
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different