Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A
2019-48-INF-3811
NXP JCOP 5.1 on SN100.C48 Secure Element
NSCIB-CC-221699-CR2
name Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A NXP JCOP 5.1 on SN100.C48 Secure Element
scheme ES NL
status active archived
not_valid_after 07.06.2027 30.04.2024
not_valid_before 07.06.2022 29.11.2019
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48_Certificado.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-19-221699-2.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20INF-3811.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-221699-CR2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20ST_lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-LITE]%20SecurityTarget-Lite_JCOP5.1_v2.2.pdf
manufacturer Winbond Electonics Corporation NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity
manufacturer_web https://www.winbond.com/ https://www.nxp.com
security_level ALC_DVS.2, EAL5+, AVA_VAN.5 ALC_FLR.1, ALC_DVS.2, AVA_VAN.5, ASE_TSS.2, EAL5+
dgst 51a1149f945dea23 cbcf833a6a89ba76
heuristics/cert_id 2019-48-INF-3811 NSCIB-CC-221699-CR2
heuristics/cert_lab []
heuristics/extracted_sars ADV_ARC.1, AVA_VAN.5, ATE_COV.2, ADV_FSP.5, ASE_TSS.1, AGD_OPE.1, ADV_IMP.1, ATE_DPT.3, ADV_TDS.4, ASE_REQ.2, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ASE_ECD.1, ALC_DEL.1, ASE_OBJ.2, ASE_INT.1, ADV_INT.2, ALC_TAT.2, ASE_SPD.1, ATE_FUN.1, ALC_CMS.5, ALC_CMC.4, ALC_LCD.1 AVA_VAN.5, ASE_TSS.2, ALC_FLR.1, AGD_OPE.1, ALC_DVS.2
heuristics/extracted_versions - 5.1
heuristics/report_references/directly_referenced_by {} NSCIB-CC-0023577-CR3, NSCIB-CC-2300008-01-CR
heuristics/report_references/indirectly_referenced_by {} NSCIB-CC-0023577-CR3, NSCIB-CC-2300008-01-CR
heuristics/scheme_data
  • category: Smart Cards and similiar devices
  • certification_date: 07.06.2022
  • enhanced:
    • category: Smart Cards and similiar devices
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1478
    • certification_date: 07.06.2022
    • description: The TOE is a memory flash IC designed to be embedded into highly critical hardware devices such as smart card, secure element, USB token, secure micro SD, etc. These devices will embed secure applications such as financial, telecommunication, identity (e-Government), etc. and will be working in a hostile environment. In particular, the TOE main function is the secure storage of the code and data of critical applications. The security needs for the TOE consist in: Maintaining the integrity of the content of the memories and the confidentiality of the content of protected memory areas as required by the critical HW products (e.g. Security IC) the Memory Flash is built for. Providing a secure communication with the Host device that will embed the TOE in a secure HW product such as Security IC.
    • evaluation_facility: Applus Laboratories
    • level: EAL5 + ALC_DVS.2 + AVA_VAN.5
    • manufacturer: Winbond Electronics Corporation
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1479
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1477
    • type: Product
  • manufacturer: Winbond Electronics Corporation
  • product: Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/826-winbond-spiflash-trustme-secure-flash-memory-w75f40wbyjeg-version-a
heuristics/protection_profiles {} 94167fd161e87d71
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf
pdf_data/cert_filename 2019-48_Certificado.pdf Signed certificate CC-19-221699-2.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-19-221699-2: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0099-2017: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL5: 1
  • EAL:
    • EAL2: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR.1: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/vendor
  • NXP:
    • NXP: 1
    • NXP Semiconductors: 1
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
  • BrightSight:
    • Brightsight: 1
pdf_data/cert_keywords/os_name
  • JCOP:
    • JCOP5: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 880365
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20191129155206+01'00'
  • /Creator: C458-M
  • /ModDate: D:20191129155109+01'00'
  • /Producer: KONICA MINOLTA bizhub C458
  • /Title: C458-M&S19112915510
  • pdf_file_size_bytes: 180822
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 2019-48 INF-3811.pdf Certification Report NSCIB-CC-221699-CR2.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id:
    • cert_item: NXP JCOP5.1 eSE on SN100.C48 Secure Element
    • cert_lab:
    • developer:
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2019-48-INF-3811- v1: 1
  • NL:
    • CC-19-221699-2: 1
    • NSCIB-CC-174263: 1
    • NSCIB-CC-195714: 1
    • NSCIB-CC-221699-CR2: 13
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0099-2017: 1
    • BSI-CC-PP-0099-2017: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL5: 8
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL2: 1
    • EAL4: 1
    • EAL5: 1
    • EAL5+: 2
    • EAL6+: 1
    • EAL7: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 8
    • ALC_FLR: 3
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 9
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_DVS.2: 3
    • ALC_FLR.1: 3
  • ASE:
    • ASE_TSS.2: 3
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_IFC.1: 1
    • FDP_RIP.1: 1
    • FDP_SDI.2: 1
    • FDP_UIT.1: 1
  • FMT:
    • FMT_LIM.1: 1
  • FPT:
    • FPT_FLS: 2
    • FPT_ITT.1: 1
    • FPT_TRP.1: 1
  • FRU:
    • FRU_FLT.2: 1
  • FCS:
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_RNG: 2
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 19
    • NXP Semiconductors: 4
pdf_data/report_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 5
  • BrightSight:
    • Brightsight: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • HMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 2
  • other:
    • JIL: 1
  • FI:
    • DFA: 1
  • other:
    • JIL: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 5: 4
    • JCOP5: 16
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.5: 2
pdf_data/report_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 964023
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
  • /Author:
  • /CreationDate:
  • /Creator: PDFCreator Version 1.2.0
  • /Keywords:
  • /ModDate:
  • /Producer: GPL Ghostscript 9.0
  • /Subject:
  • /Title: Certification Report NSCIB-CC-221699-CR2.pdf
  • pdf_file_size_bytes: 586097
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
pdf_data/st_filename 2019-48 ST_lite.pdf [ST-LITE] SecurityTarget-Lite_JCOP5.1_v2.2.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • NSCIB-19-174263: 1
    • NSCIB-CC-221699: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084: 1
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0055: 1
    • BSI-PP-0084-2014: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 6
    • EAL5 augmented: 2
  • EAL:
    • EAL5: 9
    • EAL5 augmented: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 6
    • ADV_FSP.1: 3
    • ADV_FSP.2: 3
    • ADV_FSP.4: 1
    • ADV_FSP.5: 8
    • ADV_IMP.1: 9
    • ADV_INT.2: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 8
  • AGD:
    • AGD_OPE.1: 6
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 9
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 5
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 10
  • ADV:
    • ADV_ARC: 1
  • AGD:
    • AGD_OPE.1: 2
  • ALC:
    • ALC_DVS.2: 4
    • ALC_FLR.1: 5
  • ASE:
    • ASE_CCL: 2
    • ASE_ECD: 2
    • ASE_INT: 2
    • ASE_REQ: 2
    • ASE_SPD: 2
    • ASE_TSS: 2
    • ASE_TSS.2: 4
  • AVA:
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF: 1
    • FDP_IFC.1: 27
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 4
    • FDP_ITT.1: 13
    • FDP_ITT.1.1: 1
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_SDC: 4
    • FDP_SDC.1: 16
    • FDP_SDC.1.1: 2
    • FDP_SDI: 1
    • FDP_SDI.2: 11
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 8
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 22
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 2
  • FPT:
    • FPT_FLS: 24
    • FPT_FLS.1: 3
    • FPT_ITT.1: 12
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 14
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT.2: 12
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 11
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP.1: 23
    • FAU_ARP.1.1: 1
    • FAU_GEN: 1
    • FAU_SAA.1: 3
    • FAU_SAS: 4
    • FAU_SAS.1: 8
    • FAU_SAS.1.1: 3
  • FCO:
    • FCO_NRO: 1
    • FCO_NRO.1: 1
    • FCO_NRO.2: 7
    • FCO_NRO.2.1: 2
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 2
  • FCS:
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 3
    • FCS_CKM.3: 1
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 16
    • FCS_COP.1.1: 14
    • FCS_RNG: 3
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 54
    • FDP_ACC.1.1: 1
    • FDP_ACC.2: 24
    • FDP_ACC.2.1: 5
    • FDP_ACC.2.2: 4
    • FDP_ACF: 1
    • FDP_ACF.1: 42
    • FDP_ACF.1.1: 5
    • FDP_ACF.1.2: 6
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 7
    • FDP_IFC: 2
    • FDP_IFC.1: 45
    • FDP_IFC.1.1: 1
    • FDP_IFC.2: 26
    • FDP_IFC.2.1: 3
    • FDP_IFC.2.2: 3
    • FDP_IFF: 2
    • FDP_IFF.1: 39
    • FDP_IFF.1.1: 4
    • FDP_IFF.1.2: 5
    • FDP_IFF.1.3: 5
    • FDP_IFF.1.4: 5
    • FDP_IFF.1.5: 5
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 14
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_RIP.1: 77
    • FDP_RIP.1.1: 9
    • FDP_ROL.1: 18
    • FDP_ROL.1.1: 2
    • FDP_ROL.1.2: 3
    • FDP_SDI.1: 1
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 1
    • FDP_UIT.1: 5
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 23
    • FIA_UAU.1.1: 3
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 11
    • FIA_UAU.4.1: 2
    • FIA_UID: 1
    • FIA_UID.1: 57
    • FIA_UID.1.1: 4
    • FIA_UID.1.2: 4
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 7
    • FMT_MSA.1: 81
    • FMT_MSA.1.1: 9
    • FMT_MSA.2: 4
    • FMT_MSA.2.1: 2
    • FMT_MSA.3: 80
    • FMT_MSA.3.1: 11
    • FMT_MSA.3.2: 11
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 6
    • FMT_MTD.3.1: 1
    • FMT_REV: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 80
    • FMT_SMF.1.1: 8
    • FMT_SMR: 2
    • FMT_SMR.1: 99
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
  • FPR:
    • FPR_UNO.1: 11
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS.1: 48
    • FPT_FLS.1.1: 7
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 1
    • FPT_RCV.2: 1
    • FPT_RCV.3: 6
    • FPT_RCV.3.1: 2
    • FPT_RCV.3.2: 2
    • FPT_RCV.3.3: 2
    • FPT_RCV.3.4: 1
    • FPT_TDC.1: 6
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 16
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.APPLET: 2
    • A.APPS-PROVIDER: 4
    • A.DELETION: 1
    • A.PROCESS-SEC-IC: 3
    • A.USE_DIAG: 4
    • A.USE_KEYS: 4
    • A.VERIFICATION: 1
    • A.VERIFICATION-AUTHORITY: 4
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 5
    • D.APP_I_DATA: 7
    • D.APP_KEYS: 9
    • D.APSD_KEYS: 4
    • D.ATTACK_COUNTER: 8
    • D.CARD_MNGT_DATA: 3
    • D.CONFIG_ITEM: 8
    • D.CRYPTO: 5
    • D.ISD_KEYS: 4
    • D.JCS_CODE: 7
    • D.JCS_DATA: 9
    • D.PIN: 9
    • D.SEC_DATA: 6
    • D.TOE_IDENTIFICATION: 1
    • D.TOE_IDENTIFIER: 3
    • D.UPDATE_IMAGE: 23
    • D.VASD_KEYS: 3
  • O:
    • O.APPLET: 16
    • O.CODE_PKG: 12
    • O.DELETION: 4
    • O.EXT-MEM: 1
    • O.INSTALL: 3
    • O.JAVAOBJECT: 65
    • O.LOAD: 4
    • O.NON_SB_SFR: 1
    • O.REMOTE: 1
    • O.SB_SFR: 4
  • OE:
    • OE.APPLET: 3
    • OE.APPS-PROVIDER: 3
    • OE.CARD-MANAGEMENT: 3
    • OE.CODE-EVIDENCE: 2
    • OE.CONFID-UPDATE-IMAGE: 3
    • OE.KEY-CHANGE: 4
    • OE.PROCESS_SEC_IC: 3
    • OE.SCP: 12
    • OE.SECURITY-DOMAIN: 1
    • OE.SECURITY-DOMAINS: 2
    • OE.USE_DIAG: 4
    • OE.USE_KEYS: 4
    • OE.VERIFICATION: 5
    • OE.VERIFICATION-AUTHORITY: 3
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 4
    • OP.ARRAY_LENGTH: 3
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.INSTANCE_FIELD: 3
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.MODIFY_CONFIG_ITEM: 1
    • OP.PUT: 6
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.READ_CONFIG_ITEM: 1
    • OP.SB_ACCESS: 4
    • OP.SB_ACCESS_SFR: 3
    • OP.THROW: 5
    • OP.TRIGGER_UPDATE: 3
    • OP.TYPE_ACCESS: 5
    • OP.USE_CONFIG_ITEM: 1
  • OSP:
    • OSP.KEY-CHANGE: 3
    • OSP.PROCESS-TOE: 3
    • OSP.SECURE-BOX: 3
    • OSP.SECURITY-DOMAINS: 3
    • OSP.VERIFICATION: 1
  • OT:
    • OT.ALARM: 2
    • OT.APPLI-AUTH: 4
    • OT.ATTACK-COUNTER: 4
    • OT.AUTH-LOAD-UPDATE-IMAGE: 4
    • OT.CARD-CONFIGURATION: 4
    • OT.CARD-MANAGEMENT: 7
    • OT.CIPHER: 2
    • OT.COMM_AUTH: 4
    • OT.COMM_CONFID: 1
    • OT.COMM_CONFIDENTIALITY: 3
    • OT.COMM_INTEGRITY: 4
    • OT.CONFID-UPDATE-IMAGE: 4
    • OT.DOMAIN-RIGHTS: 4
    • OT.FIREWALL: 2
    • OT.GLOBAL_ARRAYS_CONFID: 2
    • OT.GLOBAL_ARRAYS_INTEG: 2
    • OT.IDENTIFICATION: 5
    • OT.KEY-MNGT: 2
    • OT.NATIVE: 2
    • OT.OBJ-DELETION: 2
    • OT.OPERATE: 2
    • OT.PIN-MNGT: 2
    • OT.REALLOCATION: 2
    • OT.RESOURCES: 2
    • OT.RESTRICTED-MODE: 4
    • OT.RND: 4
    • OT.SCP: 21
    • OT.SECURE_AC_ACTIVATION: 3
    • OT.SECURE_LOAD_ACODE: 4
    • OT.SEC_BOX_FW: 4
    • OT.SID: 2
    • OT.TOE_IDENTIFICATION: 4
    • OT.TRANSACTION: 2
  • R:
    • R.JAVA: 10
  • SA:
    • SA.ALARM: 2
    • SA.CARD-MANAGEMENT: 1
    • SA.CIPHER: 2
    • SA.CONFID-APPLI-DATA: 2
    • SA.CONFID-JCS-CODE: 2
    • SA.CONFID-JCS-DATA: 2
    • SA.CONFID-UPDATE-IMAGE: 2
    • SA.CONFIG-APPLET: 1
    • SA.DELETION: 1
    • SA.EXE-APPLI-CODE: 3
    • SA.EXE-JCS-CODE: 3
    • SA.FIREWALL: 2
    • SA.INSTALL: 2
    • SA.INTEG-APPLI-CODE: 3
    • SA.INTEG-APPLI-DATA: 3
    • SA.INTEG-JCS-CODE: 2
    • SA.INTEG-JCS-DATA: 2
    • SA.INTEG-UPDATE-IMAGE: 2
    • SA.KEY-MNGT: 2
    • SA.NATIVE: 4
    • SA.OBJ-DELETION: 3
    • SA.OPERATE: 2
    • SA.OSU: 1
    • SA.PIN-MNGT: 2
    • SA.RESOURCES: 3
    • SA.RM: 1
    • SA.SCP: 5
    • SA.SID: 3
    • SA.TRANSACTION: 2
    • SA.VERIFICATION: 3
  • T:
    • T.ATTACK-COUNTER: 3
    • T.COM_EXPLOIT: 3
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.CONFID-UPDATE-IMAGE: 3
    • T.CONFIG: 3
    • T.DELETION: 2
    • T.EXE-CODE: 2
    • T.EXE-CODE-REMOTE: 1
    • T.INSTALL: 2
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 6
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.INTEG-UPDATE-IMAGE: 3
    • T.INTERRUPT-OSU: 3
    • T.LIFE_CYCLE: 3
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 1
    • T.RND: 3
    • T.SEC_BOX_BORDER: 3
    • T.SID: 2
    • T.UNAUTH-LOAD-UPDATE-IMAGE: 3
    • T.UNAUTHORIZED_CARD_MNGT: 3
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 51
    • NXP Semiconductors: 20
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 10
  • DES:
    • 3DES:
      • 3DES: 3
      • TDES: 1
      • Triple-DES: 1
      • TripleDES: 1
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 3
      • HMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA 1024: 1
    • RSA-CRT: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 2
      • SHA-512: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 5
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 7
    • RNG: 18
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 41
  • ECB:
    • ECB: 2
  • GCM:
    • GCM: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Fault Injection: 1
    • Malfunction: 17
    • fault injection: 2
    • malfunction: 3
    • physical tampering: 3
  • SCA:
    • Leak-Inherent: 17
    • Physical Probing: 2
    • physical probing: 5
  • FI:
    • DFA: 2
    • Fault Injection: 2
    • Physical Tampering: 2
    • fault injection: 1
    • malfunction: 2
    • physical tampering: 2
  • SCA:
    • DPA: 5
    • SPA: 2
    • physical probing: 3
    • side channel: 2
    • side-channel: 1
    • timing attack: 1
    • timing attacks: 1
  • other:
    • JIL: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 5: 11
    • JCOP5: 192
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 7816-3: 1
  • BSI:
    • AIS 20: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 197: 1
  • ICAO:
    • ICAO: 2
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.5: 1
pdf_data/st_keywords/javacard_api_const
  • ALG:
    • AES:
      • ALG_AES_BLOCK_128_CBC_NOPAD: 1
      • ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD: 2
      • ALG_AES_BLOCK_128_ECB_NOPAD: 1
      • ALG_AES_CBC_ISO9797_M1: 1
      • ALG_AES_CBC_ISO9797_M2: 1
      • ALG_AES_CBC_ISO9797_M2_STANDARD: 2
      • ALG_AES_CBC_PKCS5: 1
      • ALG_AES_CMAC16: 1
      • ALG_AES_CMAC16_STANDARD: 1
      • ALG_AES_ECB_ISO9797_M1: 1
      • ALG_AES_ECB_ISO9797_M2: 1
      • ALG_AES_ECB_PKCS5: 1
      • ALG_AES_MAC_128_NOPAD: 1
    • DES:
      • ALG_DES_CBC_ISO9797_M1: 1
      • ALG_DES_CBC_ISO9797_M2: 1
      • ALG_DES_CBC_NOPAD: 1
      • ALG_DES_CBC_PKCS5: 1
      • ALG_DES_CMAC8: 1
      • ALG_DES_ECB_ISO9797_M1: 1
      • ALG_DES_ECB_ISO9797_M2: 2
      • ALG_DES_ECB_NOPAD: 1
      • ALG_DES_ECB_PKCS5: 1
      • ALG_DES_MAC4_ISO9797_1_M1_ALG3: 1
      • ALG_DES_MAC4_ISO9797_1_M2_ALG3: 1
      • ALG_DES_MAC4_ISO9797_M1: 1
      • ALG_DES_MAC4_ISO9797_M2: 1
      • ALG_DES_MAC4_PKCS5: 1
      • ALG_DES_MAC8_ISO9797_1_M1_ALG3: 1
      • ALG_DES_MAC8_ISO9797_1_M2_ALG3: 1
      • ALG_DES_MAC8_ISO9797_M1: 1
      • ALG_DES_MAC8_ISO9797_M2: 1
      • ALG_DES_MAC8_NOPAD: 1
      • ALG_DES_MAC8_PKCS5: 1
    • EC:
      • ALG_EC_SVDP_DH: 1
      • ALG_EC_SVDP_DHC: 1
      • ALG_EC_SVDP_DHC_KDF: 1
      • ALG_EC_SVDP_DHC_PLAIN: 1
      • ALG_EC_SVDP_DH_KDF: 1
      • ALG_EC_SVDP_DH_PLAIN: 1
      • ALG_EC_SVDP_DH_PLAIN_XY: 2
    • ECDSA:
      • ALG_ECDSA_SHA_224: 1
      • ALG_ECDSA_SHA_256: 2
      • ALG_ECDSA_SHA_384: 1
      • ALG_ECDSA_SHA_512: 1
    • HMAC:
      • ALG_HMAC_SHA_256: 1
      • ALG_HMAC_SHA_384: 1
      • ALG_HMAC_SHA_512: 1
    • RSA:
      • ALG_RSA_NOPAD: 1
      • ALG_RSA_PKCS1: 1
      • ALG_RSA_PKCS1_OAEP: 1
      • ALG_RSA_SHA_224_PKCS1: 1
      • ALG_RSA_SHA_224_PKCS1_PSS: 1
      • ALG_RSA_SHA_256_PKCS1: 1
      • ALG_RSA_SHA_256_PKCS1_PSS: 1
      • ALG_RSA_SHA_384_PKCS1: 1
      • ALG_RSA_SHA_384_PKCS1_PSS: 1
      • ALG_RSA_SHA_512_PKCS1: 1
      • ALG_RSA_SHA_512_PKCS1_PSS: 1
      • ALG_RSA_SHA_PKCS1: 1
    • SHA:
      • ALG_SHA_224: 1
      • ALG_SHA_256: 3
      • ALG_SHA_384: 3
      • ALG_SHA_512: 3
  • misc:
    • LENGTH_AES_128: 4
    • LENGTH_AES_192: 4
    • LENGTH_AES_256: 4
    • LENGTH_DES3_2KEY: 4
    • LENGTH_DES3_3KEY: 4
    • LENGTH_EC_FP_128: 1
    • LENGTH_EC_FP_160: 1
    • LENGTH_EC_FP_192: 1
    • LENGTH_EC_FP_224: 2
    • LENGTH_EC_FP_256: 3
    • LENGTH_EC_FP_384: 2
    • LENGTH_EC_FP_521: 2
    • LENGTH_RSA_1024: 1
    • LENGTH_SHA: 1
    • LENGTH_SHA_224: 1
    • LENGTH_SHA_256: 2
    • LENGTH_SHA_384: 2
    • LENGTH_SHA_512: 2
    • PAD_PKCS1_OAEP: 1
    • SIG_CIPHER_AES_CMAC16: 1
    • SIG_CIPHER_DES_CMAC8: 1
    • SIG_CIPHER_ECDSA: 1
    • SIG_CIPHER_RSA: 1
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.rmi: 1
  • javacard:
    • javacard.framework: 2
    • javacard.security: 2
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20190830124951+01'00'
  • /Creator: LaTeX with hyperref package
  • /Keywords:
  • /ModDate: D:20190830124951+01'00'
  • /PTEX.Fullbanner: This is MiKTeX-pdfTeX 2.9.4902 (1.40.14)
  • /Producer: pdfTeX-1.40.14
  • /Subject:
  • /Title:
  • /Trapped: /False
  • pdf_file_size_bytes: 1839528
  • pdf_hyperlinks: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 156
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/convert_garbage False True
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different