Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
NXP MIFARE DESFire EV1 MF3ICD81
BSI-DSZ-CC-0712-2011
AR-FR21 VERSION M.10
JISEC-CC-CRP-C0031
name NXP MIFARE DESFire EV1 MF3ICD81 AR-FR21 VERSION M.10
category ICs, Smart Cards and Smart Card-Related Devices and Systems Other Devices and Systems
scheme DE JP
not_valid_after 01.09.2019 07.10.2013
not_valid_before 12.07.2011 07.09.2005
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0712a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0031_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0712b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0031_est.pdf
manufacturer NXP Semiconductors Germany GmbH Business Line Identification Sharp Corporation
manufacturer_web https://www.nxp.com https://sharp-world.com/
security_level ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 EAL3
dgst 76f792d08ecf5f58 36325f308cd6b2ab
heuristics/cert_id BSI-DSZ-CC-0712-2011 JISEC-CC-CRP-C0031
heuristics/cert_lab BSI []
heuristics/extracted_sars ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1
heuristics/extracted_versions - 10
heuristics/report_references/directly_referencing BSI-DSZ-CC-0487-2009 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0487-2009 {}
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0031
  • certification_date: 01.09.2005
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cert_link: https://www.ipa.go.jp/en/security/c0031_eimg.pdf
    • description: PRODUCT DESCRIPTION The TOE is a firmware product for a Multi Function Device (hereafter referred as to “MFD”) to reduce the risk that the inside image data be disclosed. The TOE is provided as an upgrade kit for the firmware of the MFD. The TOE offers security functions to counter the threats to image data written into the HDD and the Flash Memory, which are non-volatile mass storage devices inside the MFD. The TOE encrypts image data of the document that each job handles, before the image data are temporarily spooled to the HDD or the Flash Memory when the MFD processes jobs of copy, printer, image-scanning, fax etc., which are the funda-mental functions of the MFD. And when each job is completed, the TOE clears the area occupied by the image data, by over-writing. In addition, the TOE offers encryption and password authentica-tion for image data that a user saves into the HDD to reuse later. By these functions, the TOE secures secrecy of the non-volatile image data in the MFD, and counters unauthorized disclosure.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: AR-FR21
    • product_type: IT Product ( data protection function in Multi Function Device )
    • report_link: https://www.ipa.go.jp/en/security/c0031_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0031_est.pdf
    • toe_version: VERSION M.10
    • vendor: Sharp Corporation
  • expiration_date: 01.10.2013
  • supplier: Sharp Corporation
  • toe_japan_name: AR-FR21 VERSION M.10
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0031_it5045.html
  • toe_overseas_name: AR-FR21 VERSION M.10
heuristics/protection_profiles 62c62b4b4210800e {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ssvgpp01.pdf {}
pdf_data/report_filename 0712a_pdf.pdf c0031_erpt.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0712-2011
    • cert_item: NXP MIFARE DESFire EV1 MF3ICD81
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0487-2009: 3
    • BSI-DSZ-CC-0712-2011: 19
  • NL:
    • CC-0487-2009: 1
  • JP:
    • CRP-C0031-01: 1
    • Certification No. C0031: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 3
    • EAL1: 6
    • EAL2: 3
    • EAL3: 4
    • EAL4: 9
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_IMP.2: 5
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 2
  • R:
    • R.O: 2
  • A:
    • A.NETWORK: 1
    • A.OPERATOR: 1
    • A.USER: 1
  • T:
    • T.RECOVER: 1
    • T.SHUNT: 1
    • T.SPOOF: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 17
    • NXP Semiconductors: 17
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • Triple-DES: 3
    • DES:
      • DES: 3
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • SCA:
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 25: 3
    • AIS 26: 3
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 4
    • AIS 35: 3
    • AIS 36: 1
    • AIS 37: 1
    • AIS 38: 1
  • FIPS:
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • ISO:
    • ISO/IEC 15408:1999: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 2011, T-Systems GEI GmbH (confidential document) [8] MIFARE DESFire EV1 MF3ICD81 Configuration List, NXP Semiconductors, Rev. 1.6, 10. May 2011: 1
    • DESFire EV1 MF3ICD81 Secure Smart Card Controller, NXP Semiconductors, Rev. 2.1, 10 May 2011 (confidential document) [7] Evaluation Technical Report, NXP MIFARE DESFire EV1 MF3ICD81, BSI-DSZ-CC- 0712 Version 1.5, 24: 1
    • DESFire EV1 MF3ICDH81 Configuration List, NXP Semiconductors, Rev. 1.6, 10. May 2011 (confidential documents) [9] Security Target Lite, MIFARE DESFire EV 1 MF3ICD81, NXP Semiconductors, Rev. 1.5, 10 May 2011: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20110812112628+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Secure Smart Card Controller with Smartcard Embedded SoftwareNXP MIFARE DESFire EV1 MF3ICD81, NXP Semiconductors Germany GmbH"
  • /ModDate: D:20110812115539+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0712-2011
  • pdf_file_size_bytes: 871412
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20051025135031+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 6.0
  • /Manager: IPA
  • /ModDate: D:20051025135318+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /SourceModified: D:20051025044506
  • /Title: CRP-e
  • pdf_file_size_bytes: 327544
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 27
pdf_data/st_filename 0712b_pdf.pdf c0031_est.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0712: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 2
    • EAL4: 6
    • EAL4 augmented: 1
    • EAL4+: 2
  • EAL:
    • EAL3: 4
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT: 1
    • ACM_AUT.1: 1
    • ACM_CAP: 1
    • ACM_CAP.4: 2
    • ACM_SCP: 1
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 2
    • ADO_IGS: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.2: 2
    • ADV_HLD: 1
    • ADV_HLD.2: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 2
    • ADV_LLD: 1
    • ADV_LLD.1: 1
    • ADV_RCR: 4
    • ADV_RCR.1: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 2
    • AGD_USR: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU: 2
    • AVA_MSU.3: 2
    • AVA_SOF.1: 2
    • AVA_VLA.4: 4
  • ACM:
    • ACM_CAP.3: 3
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 10
    • ADV_HLD.1: 3
    • ADV_HLD.2: 1
    • ADV_RCR.1: 3
  • AGD:
    • AGD_ADM.1: 6
    • AGD_USR.1: 4
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 4
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 22
    • FCS_COP.1.1: 2
    • FCS_RND.1: 5
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 11
    • FDP_ITC.1: 6
    • FDP_ITC.2: 15
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_ITT.1: 6
    • FDP_ROL.1: 6
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
    • FDP_SDI.1: 1
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 8
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 3
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 16
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNL.1: 6
    • FPR_UNL.1.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 7
    • FPT_ITT.1: 6
    • FPT_PHP.3: 7
    • FPT_RPL.1: 8
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_SEP.1: 6
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FRU:
    • FRU_FLT.2: 7
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 11
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 3
  • FCS:
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 6
    • FCS_COP.1: 15
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 2
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 29
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_SOS.1: 30
    • FIA_SOS.1.1: 4
    • FIA_UAU.1: 13
    • FIA_UAU.2: 42
    • FIA_UAU.2.1: 3
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 14
    • FIA_UAU.7.1: 2
    • FIA_UID.1: 15
    • FIA_UID.2: 34
    • FIA_UID.2.1: 3
  • FMT:
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 1
    • FMT_MSA.2: 7
    • FMT_MTD.1: 35
    • FMT_MTD.1.1: 4
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 43
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPR:
    • FPR_RVM.1: 6
  • FPT:
    • FPT_RVM.1: 16
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 16
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 3
  • T:
    • T.RND: 2
  • A:
    • A.NETWORK: 5
    • A.OPERATOR: 5
    • A.USER: 4
  • O:
    • O.MANAGE: 7
    • O.NSP: 4
    • O.REMOVE: 4
    • O.RESIDUAL: 6
    • O.UAU: 7
  • OE:
    • OE.BROWSER: 6
    • OE.CIPHER: 3
    • OE.CLIENT: 5
    • OE.FIREWALL: 3
    • OE.OPERATE: 3
    • OE.USER: 3
  • T:
    • T.RECOVER: 5
    • T.SHUNT: 5
    • T.SPOOF: 5
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 71
    • NXP Semiconductors: 14
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 32
  • DES:
    • 3DES:
      • TDEA: 1
      • Triple-DES: 8
    • DES:
      • DEA: 1
      • DES: 24
  • AES_competition:
    • AES:
      • AES: 3
    • Rijndael:
      • Rijndael: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 9
    • fault injection: 2
    • malfunction: 2
  • SCA:
    • Leak-Inherent: 8
    • Physical Probing: 2
    • physical probing: 1
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS PUB 197: 3
    • FIPS PUB 46-3: 3
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • FIPS:
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 15408:1999: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • TSF shall ensure that only secure values are accepted for security attributes.” This is clearly out of scope for the TOE. The design concept of the TOE and the systems in which the TOE is used is based on the: 2
    • out of scope: 2
pdf_data/st_metadata
  • /Author: NXP Semiconductors
  • /CreationDate: D:20110512120932+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /Keywords: Security Target Lite; MF3ICD81; NXP; DES; AES; EAL4+;AVA_VLA.4
  • /ModDate: D:20110512134152+02'00'
  • /Producer: Acrobat Distiller 9.4.0 (Windows)
  • /Subject: Common Criteria Evaluation of MF3ICD81 Smart Card Controller
  • /Title: Security Target Lite - MF3ICD81
  • pdf_file_size_bytes: 279896
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 63
  • /Author: K.Nakagawa
  • /Company: SHARP Corporation
  • /CreationDate: D:20050907142225+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 6.0
  • /ModDate: D:20050907143412+09'00'
  • /Producer: Acrobat Distiller 6.0.1 (Windows)
  • /SourceModified: D:20050907045051
  • /Subject: [DSK_ST]
  • /Title: Security Target AR-FR21 M.10
  • pdf_file_size_bytes: 1079246
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 45
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different