Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Log Radar v3.2.15 with modules Console, Collector and Archiver
ISCB-5-RPT-C010-CR-v1a
NXP Secure Smart Card Controller P60x017/041PVD including IC Dedicated Software
BSI-DSZ-CC-0896-2014
name Log Radar v3.2.15 with modules Console, Collector and Archiver NXP Secure Smart Card Controller P60x017/041PVD including IC Dedicated Software
category Detection Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme MY DE
not_valid_before 13.02.2013 11.08.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C010-CR-v1a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0896a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LogRadar_ST-Document_v1-0R.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0896b_pdf.pdf
manufacturer TecForte Sdn Bhd NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.tecforte.com https://www.nxp.com
security_level EAL2 EAL6+, ASE_TSS.2, ALC_FLR.1
dgst 5e01e4eeaa77cb17 eb861b805ef948cd
heuristics/cert_id ISCB-5-RPT-C010-CR-v1a BSI-DSZ-CC-0896-2014
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, APE_ECD.1, ASE_REQ.2, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_FLR.1, APE_OBJ.2, ALC_TAT.3, ALC_LCD.1, ALC_DVS.2, ADV_TDS.5, ASE_SPD.1, APE_INT.1, ATE_COV.3, ADV_INT.3, ASE_TSS.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ADV_FSP.5, ALC_DEL.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2
heuristics/extracted_versions 3.2.15 -
heuristics/scheme_data
  • cert_no: 2013-002-C010
  • certification_date: 13.02.2013
  • developer: TecForte Sdn Bhd
  • enhanced:
    • assurance_level: EAL2
    • category: Detection Devices and Systems
    • cert_id: C010
    • certification_date: 13.02.2013
    • developer: Leong Wei Khuan Level 27, Quill 7,Jalan Stesen Sentral 5,Kuala Lumpur Sentral,50470 Kuala Lumpur,MALAYSIA. URL: http://www.tecforte.comEmail: [email protected]: +603 2776 6936Fax: +603 2776 6999
    • expiration_date: 13.02.2018
    • mutual_recognition: CCRA
    • product: Log Radar v3.2.15 with modules Console, Collector and Archiver
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C010/ISCB-5-RPT-C010-CR-v1a.pdf
    • scope: The Target of Evaluation (TOE) is Log Radar v3.2.15 with modules Console, Collector and Archiver; commonly referred as LogRadar. LogRadar is an automated software system used on enterprise data networks to centralise the storage and interpretation of logs, or events, generated by other devices or applications. Its key aims are to collect, normalise process and manage such information (logs) from a real time context. The modules included in the scope of the security evaluation and certification are: Console - acts as the interfacing point between user and TOE, Collector - its core function is to collect streams of data as and when they occur and process these device specific logs into a common and normalised form, and Archiver - functions as a backup daemon. In the context of the evaluation, the TOE is expected to provide the following major security features: Identification and authentication – the TOE provides user identification and authentication independent from the operating system on which it operates on. Security audit – the TOE records each individual user session and tracks each action within the session. Granular access control – the TOE allows users access permission within the application to be dynamically and granularly assigned via users and group memberships. Password management – the TOE provides a full password management function including the management of password policy rules as well as password expiry settings. Sessions management – the TOE maintain session management and restricts a single login for only a single valid session. Socket layer – the TOE runs on Secure Socket Layer (SSL) to protect its data when travelling thru the network. Import and export of configuration data – the TOE runs on Secure Socket Layer (SSL) to protect its data when travelling thru the network. Automated archive – the TOE provides a mechanism where the auto archival of aggregated reports, rawlogs and syslogs will be automatically hashed with MD-5 checksum, archived with AES encryption and stored at predetermined times. Real time syslog collection – the TOE provides the ability for authorised users to dynamically configure the TOE to listen to syslog streams from network devices, servers and/or any other supported applications.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C010/LogRadar_ST-Document_v1-0R.pdf
    • type: Automated software system used on enterprise data networks to centralise the storage and interpretation of logs, or events, generated by other devices or applications.
  • expiration_date: 13.02.2018
  • level: EAL2
  • product: Log Radar v3.2.15 with modules Console, Collector and Archiver
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/80
heuristics/protection_profiles {} f6d23054061d72ba
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf
pdf_data/report_filename ISCB-5-RPT-C010-CR-v1a.pdf 0896a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0896-2014
    • cert_item: NXP Secure Smart Card Controller P60x017/041PVD including IC Dedicated Software
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C010-CR-v1a: 31
  • DE:
    • BSI-DSZ-CC-0896-2014: 22
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035-2007: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 12
  • EAL:
    • EAL 4: 2
    • EAL 5: 3
    • EAL 6: 4
    • EAL 6 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 7
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 2
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 2
    • ADV_SPM: 1
    • ADV_SPM.1: 2
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 2
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 3
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 1
    • ALC_FLR.1: 6
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 3
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 6
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 2
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 2
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 5
  • R:
    • R.O: 5
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • NXP:
    • NXP: 18
    • NXP Semiconductors: 21
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
    • TÜViT: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • TDES: 3
      • Triple-DES: 2
    • DES:
      • DES: 3
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 4
  • VPN:
    • VPN: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 8
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • BSI:
    • AIS 25: 2
    • AIS 26: 1
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 2
    • AIS 37: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 05 August 2014, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36, Version 4, 28 July 2014, ETR FOR COMPOSITE: 1
    • Card Controller P60x017/041PVD Security Target, NXP Semiconductors, Business Unit Identification (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8: 1
    • ETR-COMP), TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE NXP Secure Smart Card Controller P60x017/041PVD, Customer: 1
pdf_data/report_metadata
  • /Author: Norhazimah Abdul Malek
  • /Category: PUBLIC
  • /Caveat: FINAL
  • /Classification: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20130218150743+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Developer: TecForte Sdn Bhd
  • /Document Type: REPORT
  • /Identifier: ISCB-5-RPT-C010-CR-v1a
  • /Index: ISCB_TMP_011
  • /Keywords: Log Radar v3.2.15
  • /ModDate: D:20130218150748+08'00'
  • /Phase: External
  • /Producer: Adobe PDF Library 10.0
  • /Released: 13 February 2013
  • /ST: LogRadar Security Target
  • /ST Version: v1.0R
  • /SourceModified: D:20130218070717
  • /Sponsor: TecForte Sdn Bhd
  • /Subject: Log Radar v3.2.15 with modules Console, Collector and Archiver
  • /TOE: Log Radar
  • /TOE Name: LogRadar
  • /TOE Version: v3.2.15
  • /Title: C010 Certification Report
  • /Version: v1a
  • pdf_file_size_bytes: 476755
  • pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 31
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20140825140519+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Smardcard"
  • /ModDate: D:20140825150613+02'00'
  • /Producer: LibreOffice 3.6
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0896-2014
  • pdf_file_size_bytes: 1055872
  • pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename LogRadar_ST-Document_v1-0R.pdf 0896b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0896: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 4
  • EAL:
    • EAL 6: 2
    • EAL4: 3
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL6: 36
    • EAL6 augmented: 3
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 4
    • ADV_FSP.4: 3
    • ADV_FSP.5: 11
    • ADV_IMP: 1
    • ADV_IMP.2: 4
    • ADV_INT.3: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 4
    • ALC_CMC.4: 3
    • ALC_CMC.5: 4
    • ALC_CMS: 4
    • ALC_CMS.4: 3
    • ALC_CMS.5: 5
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 1
    • ALC_FLR.1: 5
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 6
  • ATE:
    • ATE_COV: 1
    • ATE_COV.3: 4
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_GEN.3: 15
    • FAU_GEN.3.1: 1
    • FAU_GEN.3.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_COP.1: 23
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 14
    • FDP_ACC.2: 8
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 2
    • FDP_ACF.1: 10
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 9
    • FDP_IFC.1.1: 1
    • FDP_IFC.2: 1
    • FDP_IFF: 2
    • FDP_IFF.1: 9
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 8
    • FIA_UAU: 1
    • FIA_UAU.1: 5
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 2
    • FMT_MSA: 3
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_REV: 2
    • FMT_REV.1: 6
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SAE: 1
    • FMT_SAE.1: 6
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
    • FMT_SMT: 1
  • FPT:
    • FPT_ETC: 4
    • FPT_ETC.2: 8
    • FPT_ETC.2.1: 1
    • FPT_ETC.2.2: 1
    • FPT_ETC.2.3: 1
    • FPT_ETC.2.4: 2
    • FPT_FMT: 1
    • FPT_ITC: 2
    • FPT_ITC.2: 8
    • FPT_ITC.2.1: 1
    • FPT_ITC.2.2: 1
    • FPT_ITC.2.3: 1
    • FPT_ITC.2.4: 1
    • FPT_ITC.2.5: 2
    • FPT_STM.1: 7
    • FPT_TDC: 1
  • FRU:
    • FRU_RSA: 1
    • FRU_RSA.1: 8
    • FRU_RSA.1.1: 1
    • FRU_SRA.1: 1
  • FTA:
    • FTA_SSL: 1
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_TRP: 1
    • FTP_TRP.1: 10
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM.4: 2
    • FCS_COP.1: 12
    • FCS_COP.1.1: 1
    • FCS_RNG.1: 9
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 36
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 32
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_FLS.1: 1
    • FDP_IFC.1: 11
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
    • FDP_ITT.1: 14
    • FDP_SDI.1: 1
    • FDP_SDI.2: 7
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 4
    • FMT_MSA.1: 24
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 20
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 8
  • FPT:
    • FPT_FLS.1: 7
    • FPT_ITT.1: 13
    • FPT_PHP.3: 7
  • FRU:
    • FRU_FLT.2: 7
  • FTP:
    • FTP_ITT.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.DIRECT: 2
    • A.INTEGR: 3
    • A.LOCATE: 3
    • A.MANAGE: 2
    • A.NOEVIL: 3
    • A.NOTRST: 2
    • A.PROTCT: 2
    • A.REM_OPER: 1
    • A.TIME: 6
  • O:
    • O.ACCESS: 19
    • O.AUDITS: 7
    • O.EADMIN: 12
    • O.EXPORT: 10
    • O.IDAUTH: 29
    • O.INTEGR: 6
    • O.PROTCT: 9
    • O.SECRMT: 2
    • O.TMSTMP: 2
  • OE:
    • OE.INSTAL: 4
    • OE.INSTALL: 1
    • OE.INTEGR: 5
    • OE.OFLOWS: 5
    • OE.PERSON: 7
    • OE.PHYCAL: 7
    • OE.TMSTMP: 6
  • T:
    • T.COMINT: 3
    • T.DLOSS: 5
    • T.IMPCON: 3
    • T.INFLUX: 3
    • T.INSECUSE: 3
    • T.INTEGR: 3
    • T.LOSSOF: 3
    • T.NOHALT: 3
    • T.PRIVIL: 3
    • T.UNATHDVCE: 2
  • O:
    • O.CUST_RECONFIG: 6
    • O.EEPROM_INTEGRITY: 4
    • O.FM_FW: 9
    • O.INTEGRITY_CHK: 7
    • O.MEM_ACCESS: 8
    • O.RND: 3
    • O.SFR_ACCESS: 9
  • T:
    • T.RND: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • NXP:
    • NXP: 101
    • NXP Semiconductors: 33
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
  • DES:
    • 3DES:
      • TDEA: 3
      • TDES: 1
      • Triple-DEA: 1
      • Triple-DES: 9
    • DES:
      • DEA: 2
      • DES: 16
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 11
  • SHA:
    • SHA1:
      • SHA-1: 11
      • SHA1: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 4
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
    • RNG: 13
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 1
    • SmartMX2: 22
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 13
    • fault injection: 3
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 12
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 1
    • timing attacks: 2
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1321: 2
    • RFC 3268: 2
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS PUB 46: 1
    • FIPS PUB 46-3: 3
  • ISO:
    • ISO/IEC 14443: 20
    • ISO/IEC 18092: 2
    • ISO/IEC 7816: 24
    • ISO/IEC 7816-3: 1
pdf_data/st_metadata
  • /Author: WKhuan
  • /Company:
  • /CreationDate: D:20130115175724+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /ModDate: D:20130115175735+08'00'
  • /Producer: Adobe PDF Library 10.0
  • /SourceModified: D:20130115013704
  • pdf_file_size_bytes: 614209
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 69
  • /Author: NXP Semiconductors
  • /CreationDate: D:20140114171434+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144PVA, P60D080PVA
  • /ModDate: D:20140114171434+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: P60D144PVA
  • /Title: Security Target
  • pdf_file_size_bytes: 1002264
  • pdf_hyperlinks: mailto:[email protected], http://www.nxp.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different