Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Toshiba T6NE1 HW version 4
SERTIT-045
J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF and J3E016_M64_DF Secure Smart Card Controller Revision 3
NSCIB-CC-13-37762-CR
name Toshiba T6NE1 HW version 4 J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF and J3E016_M64_DF Secure Smart Card Controller Revision 3
scheme NO NL
not_valid_after 01.09.2019 16.10.2018
not_valid_before 21.08.2013 16.10.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-045-T6NE1-CR_v.1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-13-37762-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20CC-T6NE1-ST-ENG-001.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_Lite_JxE081_DF_00.03.pdf
manufacturer Toshiba Corporation Semiconductor Company, Japan NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.semicon.toshiba.co.jp/eng/ https://www.nxp.com
security_level ALC_DVS.2, EAL5+, AVA_VAN.5 ASE_TSS.2, ALC_DVS.2, EAL4+, AVA_VAN.5
dgst 798cb05d007ed5f6 0f76ffd0c75b9402
heuristics/cert_id SERTIT-045 NSCIB-CC-13-37762-CR
heuristics/cert_lab []
heuristics/cpe_matches {} cpe:2.3:h:nxp:j3e016_m66_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m64_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m64_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m64_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m66_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m66_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m66:-:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-3011
heuristics/direct_transitive_cves {} CVE-2021-3011
heuristics/indirect_transitive_cves {} CVE-2021-3011
heuristics/extracted_sars ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_TSS.2, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 4 3
heuristics/report_references/directly_referenced_by {} NSCIB-CC-13-37761-CR2, NSCIB-CC-13-37760-CR2
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0707-2012
heuristics/report_references/indirectly_referenced_by {} OCSI/CERT/CCL/09/2022/RC, BSI-DSZ-CC-0914-2014, OCSI/CERT/SYS/02/2016/RC, BSI-DSZ-CC-0913-2014, BSI-DSZ-CC-0911-2014, BSI-DSZ-CC-0912-2014, OCSI/CERT/SYS/04/2015/RC, OCSI/CERT/SYS/06/2016/RC, OCSI/CERT/SYS/03/2016/RC, BSI-DSZ-CC-0821-2014, OCSI/CERT/SYS/05/2015/RC, NSCIB-CC-13-37760-CR2, OCSI/CERT/CCL/05/2021/RC, OCSI/CERT/CCL/06/2021/RC, BSI-DSZ-CC-0825-2017, NSCIB-CC-13-37761-CR2, OCSI/CERT/SYS/05/2016/RC
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0707-2012
heuristics/scheme_data
  • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
  • certification_date: 21.08.2013
  • developer: TOSHIBA CORPORATION Semiconductors Company
  • enhanced:
    • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
    • cert_id: SERTIT-045
    • certification_date: 21.08.2013
    • description: SERTIT-045 C
    • developer: TOSHIBA CORPORATION Semiconductors Company
    • documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/134839-1607951312/SERTIT/Sertifikater/2013/45/%5BST%5D%20CC-T6NE1-ST-ENG-001.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134842-1607951316/SERTIT/Sertifikater/2013/45/SERTIT-045-T6NE1-CR_v.1.0.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 5, ALC_DVS.2, AVA_VAN.5
    • mutual_recognition: CCRA
    • product: HW Version 4
    • protection_profile: Security IC Platform Protection Profile, Version 1.0
    • sponsor: TOSHIBA CORPORATION Semiconductors Company
  • product: Toshiba T6NE1
  • url: https://sertit.no/certified-products/product-archive/toshiba-t6ne1
heuristics/protection_profiles f6d23054061d72ba 85bef5b6f16c4d33
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf
pdf_data/report_filename SERTIT-045-T6NE1-CR_v.1.0.pdf [CR] NSCIB-CC-13-37762-CR.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-13-37762-CR
    • cert_item: NXP J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF,J3E016_M66_DF, J3E041_M64_DF and J3E016_M64_DF Secure Smart Card Controller Revision 3
    • cert_lab: Brightsight
    • developer: NXP Semiconductors Germany GmbH
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-045: 16
  • DE:
    • BSI-DSZ-CC-0707: 2
    • BSI-DSZ-CC-0707-2012: 1
    • BSI-DSZ-CC-0864: 1
    • BSI-DSZ-CC-783: 1
    • BSI-DSZ-CC-784: 1
    • BSI-DSZ-CC-860: 1
  • NL:
    • NSCIB-CC-13-37761: 1
    • NSCIB-CC-13-37762: 6
    • NSCIB-CC-13-37762-CR: 15
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 1
  • BSI:
    • BSI-PP-0035: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 5: 2
    • EAL 5+: 18
    • EAL1: 1
    • EAL5+: 1
    • EAL7: 1
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 2
    • EAL4+: 3
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 5
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 5
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 3
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_IFC.1: 1
    • FDP_ITC.1: 1
    • FDP_ITT.1: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_SMF.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
  • FRU:
    • FRU_FLT.2: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 21
    • NXP Semiconductors: 3
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • BrightSight:
    • Brightsight: 6
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • DES:
      • DES: 4
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 2
      • Triple-DES: 1
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 4
  • PRNG:
    • PRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
  • SCA:
    • Physical Probing: 1
    • Template Attack: 2
  • FI:
    • DFA: 2
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
  • other:
    • JIL: 5
    • JIL-AM: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 2: 9
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • BSI:
    • AIS36: 2
  • ICAO:
    • ICAO: 1
  • SCP:
    • SCP01: 2
    • SCP02: 2
    • SCP03: 2
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.1: 3
  • JavaCard:
    • Java Card 3.0.1: 3
pdf_data/report_metadata
  • /Author: Kjartan Jæger Kvassnes
  • /CreationDate: D:20130821143318+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ugradert
  • /ModDate: D:20130821143434+02'00'
  • /Producer: Microsoft® Word 2010
  • /Title: tittel
  • pdf_file_size_bytes: 1357376
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename [ST] CC-T6NE1-ST-ENG-001.pdf ST_Lite_JxE081_DF_00.03.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0707: 3
    • BSI-DSZ-CC-0864: 3
  • NL:
    • CC-0707: 2
    • NSCIB-CC-13-37762: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 3
  • BSI:
    • BSI-PP-0017: 2
    • BSI-PP-0035: 2
    • BSI-PP-0035-2007: 1
    • BSI-PP-0035-2007―: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 2
    • EAL5 augmented: 1
  • EAL:
    • EAL 4: 2
    • EAL 4 augmented: 1
    • EAL4: 20
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 3
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 4
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 3
    • ASE_TSS.2: 7
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 6
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM.4: 3
    • FCS_COP.1: 9
    • FCS_COP.1.1: 2
    • FCS_RNG.1: 6
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 11
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 8
    • FDP_ITC.1: 3
    • FDP_ITC.2: 1
    • FDP_ITT.1: 7
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 3
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 3
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 5
  • FPT:
    • FPT_FLS.1: 9
    • FPT_ITT.1: 7
    • FPT_PHP.3: 6
  • FRU:
    • FRU_FLT.2: 8
  • FAU:
    • FAU_ARP.1: 29
    • FAU_ARP.1.1: 1
    • FAU_GEN: 1
    • FAU_SAA.1: 2
    • FAU_SAS: 13
    • FAU_SAS.1: 5
    • FAU_SAS.1.1: 1
  • FCO:
    • FCO_NRO: 7
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM.1: 46
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 7
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 47
    • FCS_CKM.4.1: 1
    • FCS_COP: 35
    • FCS_COP.1: 37
    • FCS_RNG: 17
    • FCS_RNG.1: 21
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 72
    • FDP_ACC.1: 24
    • FDP_ACC.2: 9
    • FDP_ACF: 65
    • FDP_ACF.1: 44
    • FDP_IFC: 26
    • FDP_IFC.1: 17
    • FDP_IFC.2: 2
    • FDP_IFF: 19
    • FDP_IFF.1: 13
    • FDP_ITC: 10
    • FDP_ITC.1: 17
    • FDP_ITC.2: 27
    • FDP_RIP: 91
    • FDP_RIP.1: 10
    • FDP_ROL: 11
    • FDP_ROL.1: 10
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 12
    • FIA_AFL.1: 2
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_UAU.1: 3
    • FIA_UAU.2: 4
    • FIA_UAU.5: 4
    • FIA_UID: 18
    • FIA_UID.1: 11
    • FIA_UID.2: 6
    • FIA_USB: 8
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 146
    • FMT_MSA.1: 21
    • FMT_MSA.2: 3
    • FMT_MSA.3: 32
    • FMT_MTD: 18
    • FMT_MTD.1: 7
    • FMT_MTD.3: 1
    • FMT_REV: 1
    • FMT_SMF: 42
    • FMT_SMF.1: 29
    • FMT_SMF.1.1: 1
    • FMT_SMR: 35
    • FMT_SMR.1: 39
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 9
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 40
    • FPT_FLS.1: 25
    • FPT_FLS.1.1: 1
    • FPT_ITC.1: 1
    • FPT_PHP: 6
    • FPT_PHP.3: 3
    • FPT_RCV: 10
    • FPT_RCV.3: 4
    • FPT_RPL.1: 6
    • FPT_TDC.1: 11
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FRU:
    • FRU_FLT: 11
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 18
    • FTP_ITC.1: 6
    • FTP_TRP.1: 8
pdf_data/st_keywords/cc_claims
  • O:
    • O.HW_AES: 5
    • O.HW_DES: 5
    • O.MEM_ACCESS: 4
    • O.RNG: 3
  • T:
    • T.RNG: 2
  • A:
    • A.APPLET: 4
    • A.DF_SECURE-: 1
    • A.DF_SECURE-VALUE: 1
    • A.DF_SECURE-VALUES: 4
    • A.DF_TERMINAL-: 1
    • A.DF_TERMINAL-SUPPORT: 4
    • A.NATIVE: 1
    • A.PPROCESS-SEC-IC: 1
    • A.PROCESS-SEC-IC: 2
    • A.PROCESS_SEC_IC: 2
    • A.USE_DIAG: 7
    • A.USE_KEY: 1
    • A.USE_KEYS: 6
    • A.VERIFICATION: 3
  • D:
    • D.ADMIN_CONF_DATA: 3
    • D.API_DATA: 3
    • D.APP_CODE: 10
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 8
    • D.APP_KEY: 1
    • D.CRYPTO: 7
    • D.DF_CODE: 1
    • D.DF_DATA: 1
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PERSO_CONF_DATA: 4
    • D.PIN: 12
    • D.SEC_DATA: 7
  • O:
    • O.APPLET: 18
    • O.CIPHER: 1
    • O.CODE_: 1
    • O.CODE_PKG: 13
    • O.DF_TYPE-CONSISTENCY: 1
    • O.EXT-MEM: 1
    • O.EXT_MEM_IN: 2
    • O.EXT_MEM_INSTANCE: 8
    • O.JAVAOBJECT: 36
    • O.NON_SB_CONTENT: 1
    • O.NON_SB_SFR: 4
    • O.REMOTE_MTHD: 4
    • O.REMOTE_OBJ: 4
    • O.RMI_SERVICE: 5
    • O.ROR: 2
    • O.SB_CONTENT: 3
    • O.SB_SFR: 5
    • O.SCP: 1
  • OE:
    • OE.APPLET: 7
    • OE.CARD-MANAGEMENT: 1
    • OE.DF_SECURE-VALUES: 4
    • OE.DF_TERMINAL-SUPPORT: 1
    • OE.NATIVE: 1
    • OE.PROCESS_SEC_IC: 6
    • OE.SCP: 2
    • OE.USE_DIAG: 9
    • OE.USE_KEYS: 7
    • OE.VERIFICATION: 20
    • OE.XYZ: 1
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.CREATE_EXT_MEM_INSTANCE: 3
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GET_ROR: 2
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 6
    • OP.INVK_VIRTUAL: 5
    • OP.INVOKE: 3
    • OP.JAVA: 5
    • OP.PUT: 6
    • OP.READ_EXT_MEM: 3
    • OP.RET_RORD: 2
    • OP.SB_ACCESS: 3
    • OP.SB_ACCESS_SFR: 3
    • OP.THROW: 4
    • OP.TYPE_ACCESS: 4
    • OP.WRITE_EXT_MEM: 3
  • OSP:
    • OSP.PROCESS-TOE: 5
    • OSP.VERIFICATION: 3
  • OT:
    • OT.ALARM: 15
    • OT.CARD-: 2
    • OT.CARD-MANAGEMENT: 17
    • OT.CIPHER: 10
    • OT.DELETION: 6
    • OT.DF_AUTHENTICATION: 7
    • OT.DF_CONFIDENTIALITY: 7
    • OT.DF_DATA-: 1
    • OT.DF_DATA-ACCESS: 7
    • OT.DF_TRANSACTION: 7
    • OT.DF_TYPE-: 1
    • OT.DF_TYPE-CONSISTENCY: 5
    • OT.EXT-MEM: 13
    • OT.FIREWALL: 17
    • OT.GLOBAL_ARRAYS_CONFID: 9
    • OT.GLOBAL_ARRAYS_INTEG: 9
    • OT.IDENTIFICATION: 10
    • OT.INSTALL: 9
    • OT.KEY-: 1
    • OT.KEY-MNGT: 9
    • OT.LOAD: 9
    • OT.MF_FW: 8
    • OT.NATIVE: 9
    • OT.OBJ-DELETION: 8
    • OT.OPERATE: 20
    • OT.PIN-MNGT: 10
    • OT.REALLOCATION: 9
    • OT.REMOTE: 8
    • OT.RESOURCES: 9
    • OT.RND: 11
    • OT.SCP: 37
    • OT.SEC_BOX_FW: 10
    • OT.SID: 13
    • OT.TRANSACTION: 8
    • OT.VERIFICATION: 1
    • OT.XYZ: 1
  • R:
    • R.JAVA: 12
  • T:
    • T.CONFID-APPLI-DATA: 5
    • T.CONFID-JCS-CODE: 5
    • T.CONFID-JCS-DATA: 5
    • T.DELETION: 4
    • T.DF_CLONING: 6
    • T.DF_DATA-MODIFICATION: 5
    • T.DF_DATA_MODIFICATION: 1
    • T.DF_IMPERSONATE: 6
    • T.EXE-CODE: 8
    • T.EXE-CODE-REMOTE: 4
    • T.INSTALL: 4
    • T.INTEG-APPLI-: 2
    • T.INTEG-APPLI-CODE: 8
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 5
    • T.INTEG-JCS-DATA: 5
    • T.NATIVE: 5
    • T.OBJ-DELETION: 4
    • T.OS_OPERATE: 7
    • T.PHYSICAL: 4
    • T.RESOURCES: 4
    • T.RND: 7
    • T.SEC_BOX_BORDER: 7
    • T.SID: 8
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 158
    • NXP Semiconductors: 22
pdf_data/st_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 36
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 8
    • DES:
      • DES: 27
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 2
      • Triple-DES: 7
    • DES:
      • DES: 19
  • constructions:
    • MAC:
      • CBC-MAC: 7
      • CMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
  • ECC:
    • ECC:
      • ECC: 19
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • Diffie-Hellman: 6
  • RSA:
    • RSA-CRT: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA-1: 13
    • SHA2:
      • SHA-2: 3
      • SHA-224: 8
      • SHA-256: 14
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 13
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 14
  • TRNG:
    • TRNG: 1
  • RNG:
    • RND: 20
    • RNG: 17
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • ECB:
    • ECB: 5
  • OFB:
    • OFB: 1
  • CBC:
    • CBC: 24
  • ECB:
    • ECB: 5
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 2
pdf_data/st_keywords/crypto_library
  • NSS:
    • NSS: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 7
    • malfunction: 2
  • SCA:
    • Leak-Inherent: 8
    • Physical Probing: 2
    • physical probing: 2
    • side-channel: 2
  • FI:
    • DFA: 7
    • Fault Injection: 1
    • Physical tampering: 3
    • fault injection: 1
    • malfunction: 5
    • physical tampering: 1
  • SCA:
    • DPA: 10
    • SPA: 2
    • physical probing: 3
    • side channel: 17
    • side-channel: 1
    • side-channels: 2
    • timing attack: 1
    • timing attacks: 6
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 2
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 2: 149
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS20: 1
  • FIPS:
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 3
  • BSI:
    • AIS 20: 8
    • AIS31: 2
  • CC:
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 180-3: 6
    • FIPS 186-3: 5
    • FIPS 197: 2
    • FIPS 46-3: 1
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-2: 1
    • FIPS PUB 186-3: 1
    • FIPS PUB 81: 2
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 11770: 2
    • ISO/IEC 15946-1: 1
    • ISO/IEC 9796-: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 2
    • PKCS#3: 2
    • PKCS1: 1
  • RFC:
    • RFC 5639: 2
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 2
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.1: 1
    • GlobalPlatform 2.2.1: 2
  • JavaCard:
    • Java Card 3.0.1: 4
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
    • java.rmi: 2
  • javacard:
    • javacard.framework: 4
    • javacard.framework.applet: 1
    • javacard.security: 4
  • javacardx:
    • javacardx.crypto: 2
    • javacardx.rmi: 1
    • javacardx.security: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Groups marked with ‗IT‘ are considered in the TOE IT environment, and groups marked with ‗—‗ are out of scope of this evaluation. Table 8. TOE Groups Overview Group Description Scope Core (CoreG) The CoreG: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OT.SCP.RECOVERY and OT.SCP.SUPPORT are: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: System User
  • /CreationDate: D:20130824225932+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130824225932+02'00'
  • /Producer: Microsoft® Word 2010
  • /Title: T6NC9 Design
  • pdf_file_size_bytes: 627128
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 37
  • /Author: NXP Semiconductors
  • /CreationDate: D:20130813120145Z
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: JCOP, ST, Security Target Lite
  • /ModDate: D:20130813120256+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target Lite
  • /Title: NXP J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF and J3E016_M64_DF Secure Smart Card Controller Revision 3
  • pdf_file_size_bytes: 1629614
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 144
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different