name |
NXP MIFARE DESFire EV1 MF3ICD81 |
DocuSign QSCD for remote signing version 1.2.0.7 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Products for Digital Signatures |
scheme |
DE |
NL |
status |
archived |
active |
not_valid_after |
01.09.2019 |
30.01.2029 |
not_valid_before |
12.07.2011 |
30.01.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300054-01-Cert.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0712a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300054-01-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0712b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300054-01-ST%20v4.3.8.pdf |
manufacturer |
NXP Semiconductors Germany GmbH Business Line Identification |
DocuSign, Inc. |
manufacturer_web |
https://www.nxp.com |
https://www.docusign.com/ |
security_level |
ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
EAL4+, AVA_VAN.5 |
dgst |
76f792d08ecf5f58 |
8f1aeadd016f144a |
heuristics/cert_id |
BSI-DSZ-CC-0712-2011 |
NSCIB-CC-2300054-01-CR |
heuristics/cert_lab |
BSI |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
1.2.0.7 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0487-2009 |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0487-2009 |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
62c62b4b4210800e |
eabbd431e1f174cd, ee319f4a624019b0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ssvgpp01.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-PP-2016_05 PP.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf |
pdf_data/cert_filename |
|
NSCIB-CC-2300054-01-Cert.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-PP-2018/02-M01: 1
- NL:
- NSCIB-2300054-01: 1
- NSCIB-CC-2300054-01: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2018/02-M01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL7: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Wim Ton
- /CreationDate: D:20240130161604+00'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20240130161604+00'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 124661
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
0712a_pdf.pdf |
NSCIB-CC-2300054-01-CR.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0712-2011
- cert_item: NXP MIFARE DESFire EV1 MF3ICD81
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- NL:
|
- DE:
- NL:
- cert_id: NSCIB-CC-2300054-01-CR
- cert_item: DocuSign QSCD for remote signing version 1.2.0.7
- cert_lab: SGS Brightsight B.V.
- developer: DocuSign
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0487-2009: 3
- BSI-DSZ-CC-0712-2011: 19
- NL:
|
- FR:
- ANSSI-CC-PP-2016/05-M01: 1
- ANSSI-CC-PP-2018/02-M01: 1
- NL:
- NSCIB-2300054-01: 1
- NSCIB-CC-2300054-01-CR: 14
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2016/05-M01: 1
- ANSSI-CC-PP-2018/02-M01: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 9
- EAL 4 augmented: 3
- EAL1: 6
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 2
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- NXP:
- NXP: 17
- NXP Semiconductors: 17
|
|
pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 2
- SGS Brightsight: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- other:
- JIL: 2
- JIL-AAPHD: 1
- JIL-AMHD: 1
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
- BSI TR-02102: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 25: 3
- AIS 26: 3
- AIS 31: 3
- AIS 32: 1
- AIS 34: 4
- AIS 35: 3
- AIS 36: 1
- AIS 37: 1
- AIS 38: 1
- FIPS:
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- ISO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 2011, T-Systems GEI GmbH (confidential document) [8] MIFARE DESFire EV1 MF3ICD81 Configuration List, NXP Semiconductors, Rev. 1.6, 10. May 2011: 1
- DESFire EV1 MF3ICD81 Secure Smart Card Controller, NXP Semiconductors, Rev. 2.1, 10 May 2011 (confidential document) [7] Evaluation Technical Report, NXP MIFARE DESFire EV1 MF3ICD81, BSI-DSZ-CC- 0712 Version 1.5, 24: 1
- DESFire EV1 MF3ICDH81 Configuration List, NXP Semiconductors, Rev. 1.6, 10. May 2011 (confidential documents) [9] Security Target Lite, MIFARE DESFire EV 1 MF3ICD81, NXP Semiconductors, Rev. 1.5, 10 May 2011: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20110812112628+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Secure Smart Card Controller with Smartcard Embedded SoftwareNXP MIFARE DESFire EV1 MF3ICD81, NXP Semiconductors Germany GmbH"
- /ModDate: D:20110812115539+02'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0712-2011
- pdf_file_size_bytes: 871412
- pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
|
pdf_data/st_filename |
0712b_pdf.pdf |
NSCIB-CC-2300054-01-ST v4.3.8.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-PP-2018/02-M01: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2018/02-M01: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4 augmented: 2
- EAL4: 6
- EAL4 augmented: 1
- EAL4+: 2
|
- EAL:
- EAL4: 5
- EAL4 augmented: 2
- EAL4+: 3
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 2
- ACM_SCP: 1
- ACM_SCP.2: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 2
- ADV_HLD: 1
- ADV_HLD.2: 1
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 4
- ADV_RCR.1: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 2
- AGD_USR: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 2
- AVA_MSU.3: 2
- AVA_SOF.1: 2
- AVA_VLA.4: 4
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 22
- FCS_COP.1.1: 2
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 11
- FDP_ITC.1: 6
- FDP_ITC.2: 15
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_ITT.1: 6
- FDP_ROL.1: 6
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI.1: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 4
- FIA_UID.2: 8
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 3
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.2: 16
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNL.1: 6
- FPR_UNL.1.1: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 7
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FPT_RPL.1: 8
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_SEP.1: 6
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 11
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 3
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 9
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG.2: 4
- FAU_STG.2.1: 1
- FAU_STG.2.2: 2
- FAU_STG.2.3: 1
- FCS:
- FCS_CKM: 13
- FCS_CKM.1: 9
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP: 22
- FCS_COP.1: 17
- FCS_RND.1: 1
- FCS_RNG: 2
- FCS_RNG.1: 9
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 81
- FDP_ACC.1: 15
- FDP_ACF: 46
- FDP_ACF.1: 56
- FDP_ETC: 7
- FDP_ETC.2: 9
- FDP_IFC: 20
- FDP_IFC.1: 4
- FDP_IFF: 18
- FDP_IFF.1: 24
- FDP_ITC: 7
- FDP_ITC.2: 11
- FDP_RIP: 1
- FDP_RIP.1: 6
- FDP_SDI: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 1
- FDP_UCT: 1
- FDP_UCT.1: 5
- FDP_UCT.1.1: 1
- FDP_UIT: 1
- FDP_UIT.1: 4
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_UAU: 13
- FIA_UAU.1: 8
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.5: 5
- FIA_UAU.6: 6
- FIA_UID: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 4
- FIA_UID.2.1: 1
- FIA_USB: 2
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 2
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 43
- FMT_MSA.1: 8
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 17
- FMT_MTD: 13
- FMT_MTD.1: 5
- FMT_SMF: 5
- FMT_SMF.1: 13
- FMT_SMF.1.1: 4
- FMT_SMR: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.1: 9
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FPT_RPL: 1
- FPT_RPL.1: 4
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TDC: 1
- FPT_TDC.1: 4
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 10
- FPT_TST_EXT.1.1: 3
- FTP:
- FTP_ITC: 5
- FTP_ITC.1: 4
- FTP_TRP: 24
- FTP_TRP.1: 21
- FTP_TRP.1.1: 2
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ACCESS_PROTECTED: 1
- A.AUTH_DATA: 1
- A.CA: 2
- A.PRIVILEGED_USER: 1
- A.SEC_REQ: 1
- A.SIGNATURE_REQUEST_DISCLOSURE: 1
- A.SIGNER_AUTHENTICATION_DATA_PROTECTION: 1
- A.SIGNER_DEVICE: 1
- A.SIGNER_ENROLMENT: 1
- A.TSP_AUDITED: 1
- OE:
- OE.ENV: 1
- OE.SIGNER_AUTHENTICATION_DATA: 1
- OE.SVD_AUTHENTICITY: 1
- OSP:
- OSP.CRYPTO: 1
- OSP.RANDOM: 3
- OSP.TSP_AUDITED: 1
- OT:
- OT.AUDIT_PROTECTION: 1
- OT.PRIVILEGED_USER_MANAGEMENT: 2
- OT.PRIVILEGED_USER_PROTECTION: 2
- OT.RANDOM: 2
- OT.RNG: 3
- OT.SAD_VERIFICATION: 2
- OT.SAP: 1
- OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION: 2
- OT.SIGNATURE_INTEGRITY: 2
- OT.SIGNER_KEY_PAIR_GENERATION: 2
- OT.SIGNER_PROTECTION: 2
- OT.SVD: 1
- OT.SYSTEM_PROTECTION: 1
- R:
- R.AUDIT: 1
- R.RAD: 2
- R.RANDOM: 1
- R.SAD: 23
- R.SSA: 4
- R.SVD: 32
- R.TSFDATA: 4
- R.TSF_DATA: 6
- T:
- T.ADMIN_IMPERSONATION: 3
- T.AUDIT_ALTERATION: 1
- T.AUTHENTICATION_SIGNER_IMPERSONA: 1
- T.AUTHENTICATION_SIGNER_IMPERSONATION: 2
- T.AUTHORISATION_DATA_DISCLOSE: 1
- T.AUTHORISATION_DATA_UPDATE: 3
- T.CONTEXT_ALTERATION: 3
- T.DTBSR_FORGERY: 2
- T.ENROLMENT_SIGNER_AUTHENTICATION: 1
- T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED: 2
- T.ENROLMENT_SIGNER_IMPERSONATION: 3
- T.MAINTENANCE_AUTHENTICATION_DISCLOSE: 1
- T.PRIVILEGED_USER_INSERTION: 3
- T.RANDOM: 4
- T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_M: 1
- T.SAD_FORGERY: 3
- T.SAP_BYPASS: 3
- T.SAP_REPLAY: 2
- T.SIGNATURE_FORGERY: 2
- T.SIGNATURE_REQUEST_DISCLOSURE: 2
- T.SIGNER_AUTHENTICATION_DATA_MODI: 1
- T.SVD_FORGERY: 2
|
pdf_data/st_keywords/vendor |
- NXP:
- NXP: 71
- NXP Semiconductors: 14
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 5
- AES-128: 1
- AES-256: 2
- AES256: 6
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- RSA:
- RSA 2048: 1
- RSA 3072: 1
- RSA 4096: 1
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-2: 1
- SHA-256: 2
- SHA-384: 1
- SHA-512: 1
- SHA256: 4
- SHA384: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- TLS:
- TLS:
- TLS: 23
- TLS v1.2: 1
- TLS1.2: 1
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 2
- P-384: 2
- P-521: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 9
- fault injection: 2
- malfunction: 2
- SCA:
- Leak-Inherent: 8
- Physical Probing: 2
- physical probing: 1
- timing attacks: 1
|
- FI:
- Malfunction: 2
- physical tampering: 4
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- FIPS PUB 197: 3
- FIPS PUB 46-3: 3
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 140-2: 2
- FIPS PUB 186-4: 1
- FIPS PUB 198-1: 1
- ISO:
- NIST:
- PKCS:
- RFC:
- RFC 2246: 1
- RFC 2865: 1
- RFC 4346: 1
- RFC 5246: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- TSF shall ensure that only secure values are accepted for security attributes.” This is clearly out of scope for the TOE. The design concept of the TOE and the systems in which the TOE is used is based on the: 2
- out of scope: 2
|
|
pdf_data/st_metadata |
- /Author: NXP Semiconductors
- /CreationDate: D:20110512120932+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /Keywords: Security Target Lite; MF3ICD81; NXP; DES; AES; EAL4+;AVA_VLA.4
- /ModDate: D:20110512134152+02'00'
- /Producer: Acrobat Distiller 9.4.0 (Windows)
- /Subject: Common Criteria Evaluation of MF3ICD81 Smart Card Controller
- /Title: Security Target Lite - MF3ICD81
- pdf_file_size_bytes: 279896
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 63
|
- /Author: Guy
- /CreationDate: D:20240130103924+01'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20240130103924+01'00'
- /Producer: Microsoft® Word 2016
- /Title: Functional Design – Cosign version 3
- pdf_file_size_bytes: 3514076
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 144
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |