name |
NXP MIFARE DESFire EV1 MF3ICD81 |
Sm@rtCafé® Expert 7.0 EAL 6+ C1 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
DE |
status |
archived |
active |
not_valid_after |
01.09.2019 |
29.05.2025 |
not_valid_before |
12.07.2011 |
29.05.2020 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0712a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0712b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1092b_pdf.pdf |
manufacturer |
NXP Semiconductors Germany GmbH Business Line Identification |
Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei |
manufacturer_web |
https://www.nxp.com |
https://www.veridos.com |
security_level |
ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
ALC_FLR.1, EAL6+ |
dgst |
76f792d08ecf5f58 |
e4256d8111c60a46 |
heuristics/cert_id |
BSI-DSZ-CC-0712-2011 |
BSI-DSZ-CC-1092-2020 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.2, ADV_FSP.2, AGD_ADM.1, ATE_COV.2, AVA_VLA.4, ATE_DPT.1, AGD_USR.1, ALC_TAT.1, ATE_IND.2, ADV_IMP.2, AVA_SOF.1, ADV_SPM.1, AVA_MSU.3, ADV_RCR.1, ALC_LCD.1, ATE_FUN.1, ADV_LLD.1, ADV_HLD.2 |
ALC_TAT.3, AVA_VAN.5, ADV_ARC.1, AGD_PRE.1, ALC_FLR.1, ATE_FUN.2, AGD_OPE.1, ASE_REQ.2, ADV_IMP.2, ASE_ECD.1, ALC_DVS.2, ASE_OBJ.2, ASE_SPD.1, ADV_TDS.5, ALC_CMS.5, ADV_SPM.1, ATE_DPT.3, ADV_FSP.5, ASE_TSS.1, ATE_COV.3, ALC_DEL.1, ASE_INT.2, ALC_CMC.5, ADV_INT.3, ASE_CCL.1, ALC_LCD.1 |
heuristics/extracted_versions |
- |
7.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0487-2009 |
BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-0951-V4-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0487-2009 |
BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-0951-V3-2018, BSI-DSZ-CC-0951-V2-2017, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0951-2015, BSI-DSZ-CC-0868-2014, BSI-DSZ-CC-0951-V4-2019 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0951-V4-2019 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0951-V4-2019 |
heuristics/protection_profiles |
62c62b4b4210800e |
94167fd161e87d71 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ssvgpp01.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf |
pdf_data/cert_filename |
|
1092c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 1
- EAL 6: 1
- EAL 6 augmented: 1
- EAL 6+: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200608084917+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Smart Card, Java Card
- /ModDate: D:20200608085041+02'00'
- /Producer: LibreOffice 6.2
- /Subject: Sm@rtCafé® Expert 7.0 EAL 6+C1
- /Title: Certificate BSI-DSZ-CC-1092-2020
- pdf_file_size_bytes: 296860
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
0712a_pdf.pdf |
1092a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0712-2011
- cert_item: NXP MIFARE DESFire EV1 MF3ICD81
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1092-2020
- cert_item: Sm@rtCafé® Expert 7.0 EAL 6+ C1
- cert_lab: BSI
- developer: Veridos GmbH - Identity Solutions by Giesecke+Devrient and Bundesdruckerei
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5, BSI-CC-PP-0099- 2017
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0487-2009: 3
- BSI-DSZ-CC-0712-2011: 19
- NL:
|
- DE:
- BSI-DSZ-CC-0951-V4-2019: 1
- BSI-DSZ-CC-1028-2017: 3
- BSI-DSZ-CC-1092-: 1
- BSI-DSZ-CC-1092-2020: 23
- BSI-DSZ-CC-S-0127-: 1
- BSI-DSZ-CC-S-0127-2019: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-: 1
- BSI-CC-PP-0099-2017: 3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 9
- EAL 4 augmented: 3
- EAL1: 6
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 1
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 5
- EAL 6 augmented: 3
- EAL 6+: 18
- EAL6: 1
- EAL6 augmented: 1
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
- ADV:
- ALC:
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FCO:
- FCS:
- FCS_CKM.1: 5
- FCS_COP.1: 30
- FCS_COP.1.1: 16
- FCS_RNG.1: 2
- FIA:
- FPT:
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- NXP:
- NXP: 17
- NXP Semiconductors: 17
|
- GD:
- G&D: 1
- G+D: 2
- Giesecke & Devrient: 4
- Giesecke+Devrient: 13
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
- TÜViT: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3-DES: 6
- 3DES: 17
- TDEA: 1
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
- BSI TR-02102: 1
|
- BSI:
- BSI 24: 1
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 25: 3
- AIS 26: 3
- AIS 31: 3
- AIS 32: 1
- AIS 34: 4
- AIS 35: 3
- AIS 36: 1
- AIS 37: 1
- AIS 38: 1
- FIPS:
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- ISO:
|
- BSI:
- AIS 1: 1
- AIS 20: 2
- AIS 25: 3
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 6
- AIS 37: 2
- AIS 46: 2
- AIS 47: 1
- AIS20: 1
- AIS31: 1
- FIPS:
- FIPS 197: 9
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS180-4: 14
- FIPS186-4: 4
- FIPS197: 1
- FIPS46-3: 1
- ISO:
- ISO/IEC 11770-3: 1
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18031:2011: 1
- ISO/IEC 18045: 4
- ISO/IEC9796-2: 1
- NIST:
- PKCS:
- RFC:
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 2011, T-Systems GEI GmbH (confidential document) [8] MIFARE DESFire EV1 MF3ICD81 Configuration List, NXP Semiconductors, Rev. 1.6, 10. May 2011: 1
- DESFire EV1 MF3ICD81 Secure Smart Card Controller, NXP Semiconductors, Rev. 2.1, 10 May 2011 (confidential document) [7] Evaluation Technical Report, NXP MIFARE DESFire EV1 MF3ICD81, BSI-DSZ-CC- 0712 Version 1.5, 24: 1
- DESFire EV1 MF3ICDH81 Configuration List, NXP Semiconductors, Rev. 1.6, 10. May 2011 (confidential documents) [9] Security Target Lite, MIFARE DESFire EV 1 MF3ICD81, NXP Semiconductors, Rev. 1.5, 10 May 2011: 1
|
- ConfidentialDocument:
- 04.2020, Security Target Sm@rtCafé® Expert 7.0 EAL 6+ C1, Giesecke+Devrient Mobile Security GmbH (confidential document) 7 specifically • AIS 1, Version 13, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
- 36 for Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, BSI-DSZ-CC-1092- 2020, TÜViT GmbH (confidential document) [11] Configuration list for the TOE, Version 1.5, 18.05.2020, Giesecke+Devrient Mobile Security: 1
- Sm@rtCafé® Expert 7.0 EAL 6+ C1, Version 6, 25.05.2020, TÜV Informationstechnik GmbH (confidential document) [8] Java Card Protection Profile - Open Configuration, December 2017, Version 3.0.5: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- confidential document) [12] Preparative Procedures Sm@rtCafé® Expert Expert 7.0 EAL 6+ C1 Version 2.1 , 15.04.2020: 1
- “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [16] GlobalPlatform Card Specification Version 2.2.1, January 2011 [17] GlobalPlatform Card Common: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20110812112628+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Secure Smart Card Controller with Smartcard Embedded SoftwareNXP MIFARE DESFire EV1 MF3ICD81, NXP Semiconductors Germany GmbH"
- /ModDate: D:20110812115539+02'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0712-2011
- pdf_file_size_bytes: 871412
- pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200608083506+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Card, Java Card"
- /ModDate: D:20200608084737+02'00'
- /Producer: LibreOffice 6.2
- /Subject: Sm@rtCafé® Expert 7.0 EAL 6+C1
- /Title: Certification Report BSI-DSZ-CC-1092-2020
- pdf_file_size_bytes: 1019539
- pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 37
|
pdf_data/st_filename |
0712b_pdf.pdf |
1092b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0951-V4-: 1
- BSI-DSZ-CC-0951-V4-2019: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4 augmented: 2
- EAL4: 6
- EAL4 augmented: 1
- EAL4+: 2
|
- EAL:
- EAL 4+: 1
- EAL 6: 3
- EAL 6 augmented: 2
- EAL 6+: 147
- EAL6: 4
- EAL6 augmented: 2
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 2
- ACM_SCP: 1
- ACM_SCP.2: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 2
- ADV_HLD: 1
- ADV_HLD.2: 1
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 4
- ADV_RCR.1: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 2
- AGD_USR: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 2
- AVA_MSU.3: 2
- AVA_SOF.1: 2
- AVA_VLA.4: 4
|
- ADV:
- ADV_ARC: 6
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 3
- ADV_FSP.5: 9
- ADV_IMP.1: 5
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 3
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 5
- ADV_TDS.5: 2
- AGD:
- AGD_OPE.1: 7
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.5: 3
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 4
- ALC_FLR.1: 7
- ALC_LCD.1: 3
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.3: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 3
- ASE_INT.2: 2
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 5
- ATE_FUN.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 22
- FCS_COP.1.1: 2
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 11
- FDP_ITC.1: 6
- FDP_ITC.2: 15
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_ITT.1: 6
- FDP_ROL.1: 6
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI.1: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 4
- FIA_UID.2: 8
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 3
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.2: 16
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNL.1: 6
- FPR_UNL.1.1: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 7
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FPT_RPL.1: 8
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_SEP.1: 6
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 11
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 3
|
- FAU:
- FAU_ARP.1: 21
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM: 10
- FCS_CKM.1: 35
- FCS_CKM.2: 4
- FCS_CKM.4: 30
- FCS_CKM.4.1: 1
- FCS_COP: 12
- FCS_COP.1: 117
- FCS_RNG: 5
- FCS_RNG.1: 13
- FCS_RNG.1.1: 5
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 28
- FDP_ACC.1: 11
- FDP_ACC.2: 5
- FDP_ACF: 27
- FDP_ACF.1: 14
- FDP_IFC: 27
- FDP_IFC.1: 13
- FDP_IFC.2: 2
- FDP_IFF: 19
- FDP_IFF.1: 17
- FDP_ITC: 12
- FDP_ITC.1: 7
- FDP_ITC.2: 19
- FDP_ITT.1: 1
- FDP_RIP: 138
- FDP_RIP.1: 11
- FDP_ROL: 16
- FDP_ROL.1: 5
- FDP_SDC.1: 2
- FDP_SDI: 16
- FDP_SDI.1: 2
- FDP_SDI.2: 3
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_API.1: 1
- FIA_ATD: 10
- FIA_ATD.1: 2
- FIA_UID: 16
- FIA_UID.1: 9
- FIA_UID.2: 1
- FIA_USB: 9
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA: 101
- FMT_MSA.1: 10
- FMT_MSA.2: 2
- FMT_MSA.3: 17
- FMT_MTD: 22
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 22
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR: 35
- FMT_SMR.1: 32
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 39
- FPT_FLS.1: 21
- FPT_FLS.1.1: 2
- FPT_ITT.1: 2
- FPT_PHP.3: 9
- FPT_PHP.3.1: 3
- FPT_RCV: 13
- FPT_RCV.3: 10
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 2
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 4
- A.DELETION: 5
- A.VERIFICATION: 4
- D:
- D.APP_I_DATA: 2
- D.CRYPTO: 2
- D.PIN: 1
- D.SEC_DATA: 1
- O:
- O.AES: 1
- O.ALARM: 22
- O.APPLET: 15
- O.CARD-: 7
- O.CARD-MANAGEMENT: 26
- O.CIPHER: 15
- O.CODE_PKG: 13
- O.DELETION: 17
- O.FIREWALL: 43
- O.GLOBAL_ARRAYS: 1
- O.GLOBAL_ARRAYS_CONFID: 19
- O.GLOBAL_ARRAYS_INTEG: 9
- O.INSTALL: 16
- O.JAVAOBJECT: 44
- O.KEY-: 8
- O.KEY-MNGT: 15
- O.LOAD: 18
- O.NATIVE: 14
- O.OBJ-DELETION: 9
- O.OPERATE: 36
- O.PIN-: 5
- O.PIN-MNGT: 18
- O.PINMNGT: 1
- O.REALLOCATION: 18
- O.RESOURCES: 23
- O.RND: 4
- O.RNG: 11
- O.SCP: 64
- O.SID: 33
- O.TDES: 2
- O.TRANSACTION: 19
- OE:
- OE.APPLET: 9
- OE.CARD-MANAGEMENT: 5
- OE.CODE-: 5
- OE.CODE-EVIDENCE: 14
- OE.SCP: 13
- OE.VERIFICATION: 38
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 4
- OP.ARRAY_LENGTH: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 6
- OP.PUT: 5
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- R:
- T:
- T.CONFID-: 8
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 16
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 4
- T.DELETION: 4
- T.EXE-CODE: 6
- T.EXECODE: 1
- T.INSTALL: 5
- T.INTEG-: 10
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 12
- T.INTEG-JCS-: 2
- T.INTEG-JCS-CODE: 5
- T.INTEG-JCS-DATA: 3
- T.INTEG-JCSCODE: 1
- T.INTEGAPPLI-CODE: 2
- T.INTEGAPPLI-DATA: 1
- T.INTEGJCS-DATA: 6
- T.NATIVE: 5
- T.OBJ-DELETION: 2
- T.OBJDELETION: 1
- T.PHYSICAL: 3
- T.RESOURCES: 7
- T.SECURE_DELETION: 8
- T.SID: 16
|
pdf_data/st_keywords/vendor |
- NXP:
- NXP: 71
- NXP Semiconductors: 14
|
- GD:
- G&D: 10
- G+D: 4
- Giesecke & Devrient: 2
- Giesecke+Devrient: 8
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3-DES: 7
- 3DES: 3
- TDEA: 1
- TDES: 3
- Triple-DES: 4
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 3
- SHA-256: 4
- SHA-384: 4
- SHA-512: 3
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 9
- fault injection: 2
- malfunction: 2
- SCA:
- Leak-Inherent: 8
- Physical Probing: 2
- physical probing: 1
- timing attacks: 1
|
- FI:
- Malfunction: 3
- physical tampering: 5
- SCA:
- Leak-Inherent: 2
- physical probing: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- FIPS PUB 197: 3
- FIPS PUB 46-3: 3
|
- BSI:
- AIS 20: 1
- AIS 31: 2
- AIS20: 4
- AIS31: 2
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- FIPS:
- FIPS 140-2: 1
- FIPS 186-4: 7
- FIPS 197: 10
- FIPS180-4: 3
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- ISO/IEC 9796-2: 1
- PKCS:
- PKCS1: 12
- PKCS3: 1
- PKCS5: 3
- RFC:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 5
- javacard.framework.applet: 1
- javacard.security: 7
- javacardx:
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- TSF shall ensure that only secure values are accepted for security attributes.” This is clearly out of scope for the TOE. The design concept of the TOE and the systems in which the TOE is used is based on the: 2
- out of scope: 2
|
- OutOfScope:
- Dependencies: No dependencies. 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 5
- shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10 The implemented ECDH key agreement is reduced to scalar multiplication, checking for: 1
- with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 8 Security Functional Requirements Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+: 1
|
pdf_data/st_metadata |
- /Author: NXP Semiconductors
- /CreationDate: D:20110512120932+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /Keywords: Security Target Lite; MF3ICD81; NXP; DES; AES; EAL4+;AVA_VLA.4
- /ModDate: D:20110512134152+02'00'
- /Producer: Acrobat Distiller 9.4.0 (Windows)
- /Subject: Common Criteria Evaluation of MF3ICD81 Smart Card Controller
- /Title: Security Target Lite - MF3ICD81
- pdf_file_size_bytes: 279896
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 63
|
- /Author: Dr. Ulrich Stutenbäumer (Giesecke+Devrient Mobile Security GmbH)
- /Category: Public
- /Chip: M5073 G11
- /Comments: Final
- /Company: GuD
- /CreationDate: D:20200518130755+02'00'
- /Creator: Acrobat PDFMaker 19 für Word
- /HWManufacturer: Infineon
- /Keywords: dual-interface, contact based or pure contactless smart card, Javacard operating system (OS), multi-purpose Java card, post-issuance installation of applets, open configuration, Java Card System Protection Profile (Open Configuration), government card, ID card, passport, payment card, signature card
- /ModDate: D:20200518132406+02'00'
- /Producer: Adobe PDF Library 19.21.90
- /ProductName: Sm@rtCafé® Expert 7.0 EAL 6+ C1
- /SourceModified: D:20200518110720
- /Subject: Common Criteria Security Target Lite in version 4.7 from 18.05.2020
- /TOE: Sm@rtCafé® Expert 7.0 EAL 6+ C1
- /Title: Security Target Lite Sm@rtCafé® Expert 7.0 EAL 6+ C1
- pdf_file_size_bytes: 1543454
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 130
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |