name |
HiRDB / Single Server Version 7 07-03 |
NXP JCOP3 P60 |
category |
Databases |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
NL |
status |
archived |
active |
not_valid_after |
07.10.2013 |
25.04.2028 |
not_valid_before |
22.11.2006 |
25.04.2023 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-23-2200035-01.1-Cert.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0065_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2200035-01-CRv1.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2200035-01-STv4_8.pdf |
manufacturer |
Hitachi, Ltd. |
NXP Semiconductors |
manufacturer_web |
https://www.hitachi.com/ |
https://www.nxp.com/ |
security_level |
EAL1 |
ALC_FLR.1, EAL5+, AVA_VAN.5, ASE_TSS.2, ALC_DVS.2 |
dgst |
6b0ce7e3167a63fb |
2d1626d40aa004da |
heuristics/cert_id |
JISEC-CC-CRP-C0065 |
NSCIB-CC-2200035-01-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ALC_FLR.1, AVA_VAN.5, ALC_DVS.2, AGD_OPE.1, ASE_TSS.2 |
heuristics/extracted_versions |
7, 07, 03 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2023/38 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1059-V5-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2023/38 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-1059-V5-2022, BSI-DSZ-CC-1059-V4-2021, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1059-V2-2019 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0098
- certification_date:
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION This TOE(HiRDB / Single Server Version 8) is a software product for Relational Database Management System(RDBMS). The TOE acts as a database server and provides access to the information stored in the database. Users generally access to the information stored in the database by requests for SQL execution at HiRDB server from HiRDB clients. The TOE provides functions that work for various and efficient data manipulation to meet the needs of users. And it also provides security functions that restrict access to user data to authorized users. Security functions of the TOE include the following. - Audit - Discretionary Access Control - Identification and Authentication - Security Management
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: HiRDB / Single Server Version 8
- product_type: IT Product (Data Base Management System)
- toe_version: 08-01
- vendor: Hitachi, Ltd.
- expiration_date: 01.10.2013
- supplier: Hitachi, Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0098_it7133.html
- toe_japan_name: HiRDB / Single Server Version 8 08-01
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
9399bd94f9925b16 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf |
pdf_data/cert_filename |
|
NSCIB-23-2200035-01.1-Cert.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- NL:
- CC-21-98209: 1
- NSCIB-2200035-01: 1
- NSCIB-CC-23-2200035-01: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 7: 1
- EAL2: 1
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.3: 1
- ASE:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Denise Cater
- /CreationDate: D:20230706163212+01'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20230706163212+01'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 144055
- pdf_hyperlinks: https://www.tuv-nederland.nl/
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0065_ecvr.pdf |
NSCIB-2200035-01-CRv1.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-2200035-01-CR
- cert_item: JCOP3 P60
- cert_lab: SGS Brightsight B.V.
- developer: NXP Semiconductors GmbH
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0065: 1
|
- DE:
- BSI-DSZ-CC-1059: 1
- BSI-DSZ-CC-1059-V5-2022: 1
- FR:
- NL:
- NSCIB-2200035-01: 1
- NSCIB-CC-15-67206-CR3: 1
- NSCIB-CC-2200035-01-CR: 13
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 3
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_DVS.2: 2
- ALC_FLR.1: 2
- ASE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 3
- NXP Semiconductors: 5
|
pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 3
- SGS Brightsight: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- CMAC: 2
- HMAC: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- other:
- JIL: 2
- JIL-AAPS: 1
- JIL-AM: 2
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- ISO:
- ISO/IEC 14443: 8
- ISO/IEC 7816: 8
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform (version 2.2.1: 1
- Global Platform 2.2.1: 2
- JavaCard:
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- or non-standard algorithms, protocols and implementations: • MIFARE and FIDO U2F support (out of scope as there are no security claims) Not all key sizes specified in the [ST] have sufficient: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20061122204438+09'00'
- /ModDate: D:20061122204438+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 20053
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/st_filename |
|
NSCIB-2200035-01-STv4_8.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- NL:
- NSCIB-CC-2200035-01: 2
- NSCIB-CC-67206-CR3: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-PP-0055: 1
- BSI-PP-0084: 1
- BSI-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5: 9
- EAL5 augmented: 4
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- AGD:
- ALC:
- ALC_DVS.2: 4
- ALC_FLR.1: 4
- ASE:
- ASE_CCL: 2
- ASE_ECD: 1
- ASE_INT: 2
- ASE_REQ: 2
- ASE_SPD: 2
- ASE_TSS: 2
- ASE_TSS.2: 3
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 20
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_SAA.1: 3
- FAU_SAS: 3
- FAU_SAS.1: 7
- FAU_SAS.1.1: 2
- FCO:
- FCO_NRO: 1
- FCO_NRO.1: 1
- FCO_NRO.2: 8
- FCO_NRO.2.1: 2
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 2
- FCS:
- FCS_CKM.1: 16
- FCS_CKM.1.1: 4
- FCS_CKM.2: 9
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 16
- FCS_CKM.4.1: 4
- FCS_COP.1: 14
- FCS_COP.1.1: 16
- FCS_RNG: 3
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 65
- FDP_ACC.1.1: 3
- FDP_ACC.2: 16
- FDP_ACC.2.1: 4
- FDP_ACC.2.2: 3
- FDP_ACF.1: 49
- FDP_ACF.1.1: 6
- FDP_ACF.1.2: 8
- FDP_ACF.1.3: 7
- FDP_ACF.1.4: 9
- FDP_IFC: 2
- FDP_IFC.1: 37
- FDP_IFC.1.1: 1
- FDP_IFC.2: 13
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF: 1
- FDP_IFF.1: 22
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_ITC: 1
- FDP_ITC.1: 8
- FDP_ITC.2: 19
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP.1: 69
- FDP_RIP.1.1: 8
- FDP_ROL.1: 19
- FDP_ROL.1.1: 2
- FDP_ROL.1.2: 3
- FDP_SDI.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 1
- FDP_UIT.1: 5
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 17
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UID: 1
- FIA_UID.1: 37
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 5
- FIA_UID.2.1: 1
- FIA_USB.1: 5
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 5
- FMT_MSA.1: 73
- FMT_MSA.1.1: 8
- FMT_MSA.2: 4
- FMT_MSA.2.1: 2
- FMT_MSA.3: 69
- FMT_MSA.3.1: 10
- FMT_MSA.3.2: 9
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 69
- FMT_SMF.1.1: 7
- FMT_SMR: 2
- FMT_SMR.1: 74
- FMT_SMR.1.1: 5
- FMT_SMR.1.2: 5
- FPR:
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS.1: 42
- FPT_FLS.1.1: 5
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_RCV.2: 1
- FPT_RCV.3: 6
- FPT_RCV.3.1: 2
- FPT_RCV.3.2: 2
- FPT_RCV.3.3: 2
- FPT_RCV.3.4: 1
- FPT_TDC.1: 6
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 16
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 8
- A.APPS-: 1
- A.APPS-PROVIDER: 9
- A.DELETION: 1
- A.PROCESS-SEC-IC: 9
- A.USE_DIAG: 10
- A.USE_KEYS: 10
- A.VERIFICATION: 8
- A.VERIFICATION-AUTHORITY: 10
- D:
- D.ADMIN_CONF_DATA: 1
- D.API_: 1
- D.API_DATA: 2
- D.APP_: 3
- D.APP_CODE: 5
- D.APP_C_: 1
- D.APP_C_DATA: 4
- D.APP_I_: 2
- D.APP_I_DATA: 4
- D.APP_KEYS: 9
- D.APSD_KEYS: 3
- D.CARD_MNGT_DATA: 3
- D.CRYPTO: 6
- D.GP_CODE: 1
- D.ISD_KEYS: 4
- D.JCS_: 1
- D.JCS_CODE: 3
- D.JCS_DATA: 4
- D.PERSO_CONF_DATA: 1
- D.PIN: 10
- D.SEC_DATA: 6
- D.TSF_KEYS: 2
- D.VASD_KEYS: 3
- O:
- O.APPLET: 16
- O.CODE_PKG: 12
- O.CONFIG-ITEM: 7
- O.CONFIG-SERVICE: 2
- O.DELETION: 4
- O.EXT-MEM: 1
- O.EXT_: 4
- O.EXT_MEM_IN: 2
- O.EXT_MEM_IN-STANCE: 2
- O.EXT_MEM_INSTANCE: 4
- O.INSTALL: 3
- O.JAVAOBJECT: 54
- O.LOAD: 4
- O.NON_: 1
- O.NON_SB_: 1
- O.NON_SB_SFR: 3
- O.PUF: 1
- O.REMOTE: 1
- O.SB_SFR: 5
- OE:
- OE.APPLET: 8
- OE.APPS-PROVIDER: 6
- OE.CARD-MANAGEMENT: 3
- OE.CODE-EVIDENCE: 21
- OE.KEY-: 1
- OE.KEY-CHANGE: 6
- OE.PROCESS_SEC_IC: 6
- OE.SCP: 12
- OE.SECURITY-DOMAINS: 6
- OE.USE_DIAG: 7
- OE.USE_KEYS: 7
- OE.VERIFICATION: 29
- OE.VERIFICATION-AUTHORITY: 5
- OE.VERIFICATION_AUTHORITY: 1
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.CREATE_EXT_MEM_: 1
- OP.CREATE_EXT_MEM_INSTANCE: 2
- OP.DELETE_: 2
- OP.DELETE_AP-: 1
- OP.DELETE_APPLET: 2
- OP.DELETE_PCKG: 2
- OP.DELETE_PCKG_APPLET: 3
- OP.INSTANCE_: 2
- OP.INSTANCE_FIELD: 2
- OP.INVK_: 2
- OP.INVK_INTER-: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.MODIFY_CON-: 1
- OP.MODIFY_CONFIG_: 1
- OP.MODIFY_CONFIG_ITEM: 2
- OP.PUT: 6
- OP.READ_: 1
- OP.READ_CON-FIG_ITEM: 1
- OP.READ_CONFIG_ITEM: 2
- OP.READ_EXT_: 1
- OP.READ_EXT_MEM: 2
- OP.SB_AC-CESS: 1
- OP.SB_ACCESS: 3
- OP.SB_ACCESS_SFR: 4
- OP.SECURE_: 1
- OP.SECURE_CARD: 3
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OP.USE_CONFIG_ITEM: 3
- OP.WRITE_EXT_: 1
- OP.WRITE_EXT_MEM: 2
- OSP:
- OSP.KEY-CHANGE: 9
- OSP.PROCESS-TOE: 9
- OSP.SECURE-BOX: 9
- OSP.SECURITY-DOMAINS: 9
- OSP.VERIFICATION: 7
- OT:
- OT.ALARM: 18
- OT.APPLI-AUTH: 15
- OT.CARD-: 2
- OT.CARD-MANAGEMENT: 33
- OT.CIPHER: 9
- OT.COMM_AUTH: 11
- OT.COMM_CONFIDENTIALITY: 9
- OT.COMM_INTEGRITY: 9
- OT.CONFIG-LIMIT: 9
- OT.DOMAIN-RIGHTS: 12
- OT.EXT-MEM: 17
- OT.FIREWALL: 14
- OT.GLOBAL_ARRAYS_CONFID: 8
- OT.GLOBAL_ARRAYS_INTEG: 8
- OT.IDENTIFICATION: 10
- OT.KEY-MNGT: 6
- OT.NATIVE: 12
- OT.OBJ-DELETION: 7
- OT.OPERATE: 29
- OT.PIN-MNGT: 9
- OT.REALLOCATION: 9
- OT.RESOURCES: 7
- OT.RND: 10
- OT.SCP: 54
- OT.SEC_BOX_FW: 9
- OT.SID: 18
- OT.TRANSACTION: 7
- R:
- SA:
- SA.ALARM: 3
- SA.CARD-MANAGEMENT: 2
- SA.CIPHER: 3
- SA.CONFID-APPLI-DATA: 3
- SA.CONFID-JCS-CODE: 3
- SA.CONFID-JCS-DATA: 3
- SA.DELETION: 2
- SA.EXE-: 1
- SA.EXE-APPLI-CODE: 4
- SA.EXE-JCS-CODE: 3
- SA.EXT-MNGT: 2
- SA.FIREWALL: 3
- SA.INSTALL: 3
- SA.INTEG-APPLI-CODE: 4
- SA.INTEG-APPLI-DATA: 4
- SA.INTEG-JCS-CODE: 3
- SA.INTEG-JCS-DATA: 3
- SA.KEY-MNGT: 3
- SA.NATIVE: 5
- SA.OBJ-DELETION: 4
- SA.OPERATE: 3
- SA.PIN-MNGT: 3
- SA.RESOURCES: 4
- SA.SCP: 6
- SA.SID: 4
- SA.TRANSACTION: 3
- SA.VERIFICATION: 4
- T:
- T.COM_EXPLOIT: 8
- T.CONFID-APPLI-DATA: 6
- T.CONFID-JCS-CODE: 6
- T.CONFID-JCS-DATA: 6
- T.CONFIG: 8
- T.DELETION: 2
- T.EXE-CODE: 12
- T.EXE-CODE-REMOTE: 1
- T.INSTALL: 2
- T.INTEG-APPLI-: 1
- T.INTEG-APPLI-CODE: 13
- T.INTEG-APPLI-DATA: 16
- T.INTEG-JCS-CODE: 7
- T.INTEG-JCS-DATA: 6
- T.LIFE_CYCLE: 7
- T.NATIVE: 6
- T.OBJ-DELETION: 6
- T.OS_OPERATE: 8
- T.PHYSICAL: 6
- T.RESOURCES: 6
- T.RND: 8
- T.SID: 13
- T.UNAUTHORIZED_CARD_MNGT: 9
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 154
- NXP Semiconductors: 22
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 3
- TDES: 1
- Triple-DES: 1
- TripleDES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- Generic:
- Crypto Library ..........7: 1
- Crypto Library 1.3.1.3: 1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Fault Injection: 2
- Physical Tampering: 3
- fault injection: 1
- malfunction: 3
- physical tampering: 2
- SCA:
- DPA: 4
- SPA: 2
- physical probing: 3
- side channel: 2
- side-channel: 1
- timing attack: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 14888-3: 1
- PKCS:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- AES:
- ALG_AES_BLOCK_128_CBC_: 1
- ALG_AES_BLOCK_128_ECB_NOPAD: 1
- ALG_AES_CMAC16: 1
- ALG_AES_MAC_128_NOPAD: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 1
- ALG_DES_CBC_NOPAD: 1
- ALG_DES_ECB_ISO9797_: 1
- ALG_DES_ECB_ISO9797_M2: 1
- ALG_DES_ECB_NOPAD: 1
- ALG_DES_MAC8_ISO9797_1_M1_ALG3: 1
- ALG_DES_MAC8_ISO9797_1_M2_: 1
- ALG_DES_MAC8_ISO9797_M1: 1
- ALG_DES_MAC8_ISO9797_M2: 1
- EC:
- ALG_EC_SVDP_DH: 1
- ALG_EC_SVDP_DHC: 1
- ALG_EC_SVDP_DHC_PLAIN: 1
- ALG_EC_SVDP_DH_PLAIN: 1
- ECDSA:
- ALG_ECDSA_SHA_: 1
- ALG_ECDSA_SHA_256: 2
- ALG_ECDSA_SHA_384: 1
- ALG_ECDSA_SHA_512: 1
- RNG:
- ALG_PSEUDO_RANDOM: 1
- ALG_SECURE_RANDOM: 1
- RSA:
- ALG_RSA_NOPAD: 1
- ALG_RSA_PKCS1_OAEP: 1
- ALG_RSA_SHA_: 1
- ALG_RSA_SHA_224_PKCS1_PSS: 1
- ALG_RSA_SHA_256_ISO9796: 1
- ALG_RSA_SHA_256_PKCS1: 1
- ALG_RSA_SHA_256_PKCS1_PSS: 1
- ALG_RSA_SHA_384_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1_PSS: 1
- ALG_RSA_SHA_ISO9796: 1
- ALG_RSA_SHA_PKCS1: 1
- SHA:
- ALG_SHA_224: 2
- ALG_SHA_256: 2
- ALG_SHA_384: 3
- ALG_SHA_512: 2
- misc:
- CIPHER_ECDSA: 1
- LENGTH_AES_128: 2
- LENGTH_AES_192: 2
- LENGTH_AES_256: 3
- LENGTH_DES3_2KEY: 2
- LENGTH_DES3_3KEY: 1
- LENGTH_EC_: 2
- LENGTH_EC_FP_160: 4
- LENGTH_EC_FP_192: 3
- LENGTH_EC_FP_224: 3
- LENGTH_EC_FP_256: 5
- LENGTH_EC_FP_320: 3
- LENGTH_EC_FP_384: 3
- LENGTH_EC_FP_521: 3
- LENGTH_RSA_1024: 1
- LENGTH_RSA_2048: 1
- LENGTH_RSA_4096: 2
- LENGTH_SHA: 1
- LENGTH_SHA_224: 1
- LENGTH_SHA_256: 1
- LENGTH_SHA_384: 1
- PAD_PKCS1_OAEP: 1
- SIG_CIPHER_RSA: 1
- TYPE_ACCESS: 5
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 2
- javacard.security: 3
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 134 NXP Semiconductors JCOP 3 P60 Security Target Lite Figure 1. Component of the TOE 1 MIFARE is out of scope of the certified Micro Controller. Figure 1.1 also shows applets and the Secure Box Native Library: 1
- Controller, called MC FW including MIFARE implementations, where the MIFARE implementations are out of scope of the certified Micro Controller. • Software for implementing cryptographic operations on the: 1
- out of scope: 2
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |