name |
NXP MIFARE DESFire EV1 MF3ICD81 |
eTugra SAM v1.4 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Products for Digital Signatures |
scheme |
DE |
IT |
status |
archived |
active |
not_valid_after |
01.09.2019 |
16.04.2029 |
not_valid_before |
12.07.2011 |
16.04.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_FP_etugra_sam_14_v1.0_en.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0712a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_etugra_sam_14_v1.0_en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0712b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_etugra_sam_14_v10.pdf |
manufacturer |
NXP Semiconductors Germany GmbH Business Line Identification |
E-Tugra EBG Information Technologies and Services Joint Stock Company |
manufacturer_web |
https://www.nxp.com |
https://e-tugra.com.tr/ |
security_level |
ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
EAL4+, AVA_VAN.5 |
dgst |
76f792d08ecf5f58 |
f4885e7bbdd8eb7d |
heuristics/cert_id |
BSI-DSZ-CC-0712-2011 |
OCSI/CERT/CCL/01/2023/RC |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
CVE-2022-36986, CVE-2022-36997, CVE-2022-42301, CVE-2022-36984, CVE-2022-42299, CVE-2022-42304, CVE-2022-36999, CVE-2022-42307, CVE-2022-36992, CVE-2022-42305, CVE-2022-36988, CVE-2022-37000, CVE-2022-36995, CVE-2022-36996, CVE-2022-36991, CVE-2022-36990, CVE-2022-36985, CVE-2022-36987, CVE-2021-41570, CVE-2022-42300, CVE-2022-42302, CVE-2022-36998, CVE-2022-36989, CVE-2022-42303, CVE-2022-36993, CVE-2022-36994, CVE-2023-28759 |
heuristics/indirect_transitive_cves |
{} |
CVE-2022-36986, CVE-2022-36997, CVE-2022-42301, CVE-2022-36984, CVE-2022-42299, CVE-2022-42304, CVE-2022-36999, CVE-2022-42307, CVE-2022-36992, CVE-2022-42305, CVE-2022-36988, CVE-2022-37000, CVE-2022-36995, CVE-2022-36996, CVE-2022-36991, CVE-2022-36990, CVE-2022-36985, CVE-2022-36987, CVE-2021-41570, CVE-2022-42300, CVE-2022-42302, CVE-2022-36998, CVE-2022-36989, CVE-2022-42303, CVE-2022-36993, CVE-2022-36994, CVE-2023-28759 |
heuristics/extracted_sars |
ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
1.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
OCSI/CERT/CCL/01/2022/RC |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0487-2009 |
OCSI/CERT/CCL/13/2021/RC |
heuristics/report_references/indirectly_referenced_by |
{} |
OCSI/CERT/CCL/01/2022/RC |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0487-2009 |
OCSI/CERT/CCL/13/2021/RC |
heuristics/scheme_data |
|
- certification_date: 16.04.2024
- level: EAL4+
- report_link_en: https://www.ocsi.gov.it/documenti/certificazioni/eTugra/cr_etugra_sam_14_v1.0_en.pdf
- report_link_it: https://www.ocsi.gov.it/documenti/certificazioni/eTugra/rc_etugra_sam_14_v.1.0_it.pdf
- supplier: E-Tugra EBG Information Technologies and Services Joint Stock Company
- target_link: https://www.ocsi.gov.it/documenti/certificazioni/eTugra/st_etugra_sam_14_v10.pdf
- title: eTugra SAM v1.4
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
62c62b4b4210800e |
eabbd431e1f174cd |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ssvgpp01.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf |
pdf_data/cert_filename |
|
cr_FP_etugra_sam_14_v1.0_en.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- IT:
- OCSI/CERT/CCL/01/2023/RC: 1
- OCSI/CERT/CCL/13/2021/RC: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Tiziano Inzerilli
- /CreationDate: D:20240419162007+02'00'
- /ModDate: D:20240419162007+02'00'
- /Producer: Microsoft: Print To PDF
- /Title: Certification Report "eTugra SAM v1.4".pdf
- pdf_file_size_bytes: 373181
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
0712a_pdf.pdf |
cr_etugra_sam_14_v1.0_en.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0712-2011
- cert_item: NXP MIFARE DESFire EV1 MF3ICD81
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0487-2009: 3
- BSI-DSZ-CC-0712-2011: 19
- NL:
|
- IT:
- OCSI/CERT/CCL/01/2023/RC: 25
- OCSI/CERT/CCL/13/2021/RC: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 9
- EAL 4 augmented: 3
- EAL1: 6
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
- EAL:
- EAL 4+: 4
- EAL2: 4
- EAL4: 10
- EAL4 augmented: 3
- EAL4+: 1
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- NXP:
- NXP: 17
- NXP Semiconductors: 17
|
|
pdf_data/report_keywords/eval_facility |
|
- CCLab:
- CCLab Software Laboratory: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
- BSI TR-02102: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 25: 3
- AIS 26: 3
- AIS 31: 3
- AIS 32: 1
- AIS 34: 4
- AIS 35: 3
- AIS 36: 1
- AIS 37: 1
- AIS 38: 1
- FIPS:
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- ISO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 2011, T-Systems GEI GmbH (confidential document) [8] MIFARE DESFire EV1 MF3ICD81 Configuration List, NXP Semiconductors, Rev. 1.6, 10. May 2011: 1
- DESFire EV1 MF3ICD81 Secure Smart Card Controller, NXP Semiconductors, Rev. 2.1, 10 May 2011 (confidential document) [7] Evaluation Technical Report, NXP MIFARE DESFire EV1 MF3ICD81, BSI-DSZ-CC- 0712 Version 1.5, 24: 1
- DESFire EV1 MF3ICDH81 Configuration List, NXP Semiconductors, Rev. 1.6, 10. May 2011 (confidential documents) [9] Security Target Lite, MIFARE DESFire EV 1 MF3ICD81, NXP Semiconductors, Rev. 1.5, 10 May 2011: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20110812112628+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Secure Smart Card Controller with Smartcard Embedded SoftwareNXP MIFARE DESFire EV1 MF3ICD81, NXP Semiconductors Germany GmbH"
- /ModDate: D:20110812115539+02'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0712-2011
- pdf_file_size_bytes: 871412
- pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /Author: OCSI
- /CreationDate: D:20240416084741+02'00'
- /Creator: Microsoft® Word per Microsoft 365
- /ModDate: D:20240416084741+02'00'
- /Producer: Microsoft® Word per Microsoft 365
- /Title: Certification Report "eTugra SAM v1.4"
- pdf_file_size_bytes: 656782
- pdf_hyperlinks: https://www.sogis.eu/, https://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
pdf_data/st_filename |
0712b_pdf.pdf |
st_etugra_sam_14_v10.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4 augmented: 2
- EAL4: 6
- EAL4 augmented: 1
- EAL4+: 2
|
- EAL:
- EAL 4: 9
- EAL 4 augmented: 5
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 2
- ACM_SCP: 1
- ACM_SCP.2: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 2
- ADV_HLD: 1
- ADV_HLD.2: 1
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 4
- ADV_RCR.1: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 2
- AGD_USR: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 2
- AVA_MSU.3: 2
- AVA_SOF.1: 2
- AVA_VLA.4: 4
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 1
- AGD_PRE: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 22
- FCS_COP.1.1: 2
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 11
- FDP_ITC.1: 6
- FDP_ITC.2: 15
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_ITT.1: 6
- FDP_ROL.1: 6
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI.1: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 4
- FIA_UID.2: 8
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 3
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.2: 16
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNL.1: 6
- FPR_UNL.1.1: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 7
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FPT_RPL.1: 8
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_SEP.1: 6
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 11
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 3
|
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FCS:
- FCS_CKM: 25
- FCS_CKM.1: 17
- FCS_CKM.2: 6
- FCS_CKM.4: 29
- FCS_CKM.4.1: 1
- FCS_COP: 26
- FCS_COP.1: 14
- FCS_RNG: 3
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 91
- FDP_ACC.1: 43
- FDP_ACF: 60
- FDP_ACF.1: 49
- FDP_ETC: 15
- FDP_ETC.2: 8
- FDP_IFC: 29
- FDP_IFC.1: 24
- FDP_IFF: 15
- FDP_IFF.1: 14
- FDP_ITC: 15
- FDP_ITC.1: 12
- FDP_ITC.2: 22
- FDP_UCT.1: 7
- FDP_UCT.1.1: 1
- FDP_UIT.1: 8
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 11
- FIA_AFL.1: 1
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_UAU: 15
- FIA_UAU.1: 5
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 4
- FIA_UID.1: 5
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_USB.1: 18
- FIA_USB.1.1: 1
- FIA_USB.1.2: 2
- FIA_USB.1.3: 1
- FIA_UTD.1: 1
- FMT:
- FMT_MSA: 38
- FMT_MSA.1: 10
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 26
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.2: 13
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_PHP.1: 11
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_RPL.1: 7
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TDC.1: 14
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TRP: 2
- FTP:
- FTP_ITC: 8
- FTP_ITC.1: 11
- FTP_TDC.1: 2
- FTP_TRP: 24
- FTP_TRP.1: 15
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ACCESS_PROTECTED: 4
- A.AUTH_DATA: 4
- A.CA: 4
- A.PRIVILEGED_USER: 4
- A.SEC_REQ: 4
- A.SIGNER_AUTHENTICATION_DATA_PROTECTION: 4
- A.SIGNER_DEVICE: 4
- A.SIGNER_ENROLMENT: 4
- A.TSP_AUDITED: 4
- OE:
- OE.CA_REQUEST_CERTIFICATE: 4
- OE.CERTIFICATE_VERFICATION: 2
- OE.CERTIFICATE_VERIFICATION: 1
- OE.CRYPTOMODULE_CERTIFIED: 5
- OE.DELEGATED_AUTHENTICATION: 3
- OE.DEVICE: 10
- OE.ENV: 9
- OE.SIGNER_AUTHENTICATION_DATA: 6
- OE.SVD_AUTHENTICITY: 5
- OSP:
- OSP.CRYPTO: 4
- OSP.RANDOM: 5
- OT:
- OT.AUDIT_PROTECTION: 5
- OT.CRYPTO: 6
- OT.DTBSR_INTEGRITY: 4
- OT.PRIVILEGED_USER_AUTHENTICATION: 6
- OT.PRIVILEGED_USER_MANAGEMENT: 19
- OT.PRIVILEGED_USER_PROTECTION: 18
- OT.RANDOM: 20
- OT.REFERENCE_SIGNER_AUTHENTICATION_DATA: 7
- OT.SAD_VERIFICATION: 18
- OT.SAP: 8
- OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION: 19
- OT.SIGNATURE_INTEGRITY: 18
- OT.SIGNER_KEY_PAIR_GENERATION: 19
- OT.SIGNER_MANAGEMENT: 5
- OT.SIGNER_PROTECTION: 20
- OT.SVD: 4
- OT.SYSTEM_PROTECTION: 19
- R:
- R.AUDIT: 2
- R.RANDOM: 2
- R.SAD: 27
- R.SVD: 42
- R.TSF_DATA: 11
- T:
- T.ADMIN_IMPERSONATION: 8
- T.AUDIT_ALTERATION: 7
- T.AUTHENTICATION_SIGNER_IMPERSONATION: 10
- T.AUTHORISATION_DATA_DISCLOSE: 3
- T.AUTHORISATION_DATA_UPDATE: 10
- T.CONTEXT_ALTERATION: 11
- T.DTBSR_FORGERY: 7
- T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_: 1
- T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCL: 2
- T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED: 3
- T.ENROLMENT_SIGNER_IMPERSONATION: 10
- T.MAINTENANCE_AUTHENTICATION_DISCLOSE: 6
- T.PRIVILEGED_USER_INSERTION: 10
- T.RANDOM: 9
- T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_: 1
- T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DA: 1
- T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION: 2
- T.SAD_FORGERY: 6
- T.SAP_BYPASS: 7
- T.SAP_REPLAY: 7
- T.SIGNATURE_FORGERY: 7
- T.SIGNATURE_REQUEST_DISCLOSURE: 7
- T.SIGNER_AUTHENTICATION_DATA_MODIFIED: 6
- T.SVD_FORGERY: 8
|
pdf_data/st_keywords/vendor |
- NXP:
- NXP: 71
- NXP Semiconductors: 14
|
|
pdf_data/st_keywords/eval_facility |
|
- CCLab:
- CCLab Software Laboratory: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- SHA:
- SHA2:
- SHA-224: 2
- SHA-256: 1
- SHA-384: 2
- SHA224: 2
- SHA256: 7
- SHA384: 3
- SHA512: 5
- SHA3:
- SHA-3: 1
- SHA3-224: 4
- SHA3-256: 3
- SHA3-384: 5
- SHA3-512: 5
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP224r1: 2
- brainpoolP256r1: 2
- brainpoolP256t1: 2
- brainpoolP320r1: 2
- brainpoolP320t1: 2
- brainpoolP384r1: 2
- brainpoolP384t1: 2
- brainpoolP512r1: 2
- brainpoolP512t1: 2
- NIST:
- NIST P-256: 2
- P-256: 2
- P-384: 2
- P-521: 4
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 9
- fault injection: 2
- malfunction: 2
- SCA:
- Leak-Inherent: 8
- Physical Probing: 2
- physical probing: 1
- timing attacks: 1
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- FIPS PUB 197: 3
- FIPS PUB 46-3: 3
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 3
- FIPS:
- FIPS 140-3: 1
- FIPS 186-5: 7
- FIPS 202: 1
- FIPS PUB 140-3: 1
- FIPS PUB 186-5: 1
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 19790: 8
- ISO/IEC 19790:2012: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- TSF shall ensure that only secure values are accepted for security attributes.” This is clearly out of scope for the TOE. The design concept of the TOE and the systems in which the TOE is used is based on the: 2
- out of scope: 2
|
- OutOfScope:
- out of scope: 1
- used to authenticate the signer are managed by the IdP or mobile application via SSA and are thus out of scope of this ST. 145 [selection: [assignment: the rules describing how delegated authentication is: 1
|
pdf_data/st_metadata |
- /Author: NXP Semiconductors
- /CreationDate: D:20110512120932+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /Keywords: Security Target Lite; MF3ICD81; NXP; DES; AES; EAL4+;AVA_VLA.4
- /ModDate: D:20110512134152+02'00'
- /Producer: Acrobat Distiller 9.4.0 (Windows)
- /Subject: Common Criteria Evaluation of MF3ICD81 Smart Card Controller
- /Title: Security Target Lite - MF3ICD81
- pdf_file_size_bytes: 279896
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 63
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |