name |
Secureworks V3.0 |
Gemalto ECC CPU card - CPU e-purse application on GCX5.1 (MPH098) platform on NXP P5CD081V1A Version 1.0 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
AU |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
01.09.2003 |
13.04.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecureworksCR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-05en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecureworksST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-05en.pdf |
manufacturer |
Oullim Information Technology, Inc. |
Gemalto / NXP Semiconductors |
manufacturer_web |
https://www.oullim.co.kr/ |
https://www.gemalto.com/ |
security_level |
EAL3 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
8272a50e75769ddb |
1c639f9d703d2d91 |
heuristics/cert_id |
Certificate Number: 2003/28 |
ANSSI-CC-2011/05 |
heuristics/cert_lab |
[] |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_TSS.2, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
3.0 |
5.1, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
SecureworksCR.pdf |
ANSSI-CC_2011-05en.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmented ALC_DVS.2, AVA_VAN.5
- cc_version: Common Criteria version 3.1 revision 3
- cert_id: ANSSI-CC-2011/05
- cert_item: Gemalto ECC CPU card on GCX5.1 (MPH098) platform on NXP P5CD081V1A
- cert_item_version: CPU e-purse on GCX5.1 MPH098 Version 1.0
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France Phone: +33 (0)4 38 78 37 78, email : [email protected]
- developer: Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France NXP Semiconductors GmbH Stresemannallee 101, D-22502 Hamburg, Germany Sponsor Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: None
|
pdf_data/report_keywords/cc_cert_id |
- AU:
- Certificate Number: 2003/28: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 1
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_ARP: 1
- FAU_GEN: 2
- FAU_SAA: 1
- FAU_SAR: 2
- FAU_SEL: 1
- FAU_STG: 2
- FCS:
- FDP:
- FDP_IFC: 1
- FDP_IFF: 1
- FDP_RIP: 1
- FIA:
- FIA_AFL: 1
- FIA_ATD: 1
- FIA_UAU: 3
- FIA_UID: 1
- FMT:
- FMT_MOF: 1
- FMT_MSA: 2
- FMT_MTD: 2
- FMT_SMF: 1
- FMT_SMR: 1
- FPR:
- FPT:
- FPT_AMT: 1
- FPT_RVM: 1
- FPT_SEP: 1
- FPT_STM: 1
- FPT_TST: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- NXP:
- NXP: 24
- NXP Semiconductors: 2
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- - The NXP P5CD081 IC The Other applications1 on the card are written in java language and are out of scope of the TOE. 1.2.4. Life cycle The product’s life cycle is organised as follow: 1 Applications: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author: peter lilley
- /CreationDate: D:20031015095232+10'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20031015095249+10'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: AUSTRALASIAN INFORMATION SECURITY EVALUATION PROGRAM
- pdf_file_size_bytes: 476967
- pdf_hyperlinks: http://www.dsd.gov.au/
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
- /CreationDate: D:20110629162959+02'00'
- /Keywords:
- /ModDate: D:20110629162959+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- pdf_file_size_bytes: 278826
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
SecureworksST.pdf |
ANSSI-CC-cible_2011-05en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0555: 1
- BSI-DSZ-CC-0555-: 1
- BSI-DSZ-CC-0555-2009: 4
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 4
- EAL4 augmented: 3
- EAL4+: 2
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP: 1
- ACM_CAP.3: 20
- ACM_SCP.1: 10
- ADO:
- ADO_DEL.1: 9
- ADO_IGS.1: 9
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.2: 18
- ADV_RCR.1: 8
- AGD:
- AGD_ADM.1: 14
- AGD_USR.1: 13
- ALC:
- ATE:
- ATE_COV.2: 10
- ATE_DPT.1: 9
- ATE_FUN.1: 13
- ATE_IND.2: 11
- AVA:
- AVA_MSU.1: 14
- AVA_SOF.1: 11
- AVA_VLA.1: 10
|
- ADV:
- ADV_ARC.1: 8
- ADV_COMP.1: 2
- ADV_FSP.1: 5
- ADV_FSP.2: 4
- ADV_FSP.4: 11
- ADV_IMP: 1
- ADV_IMP.1: 5
- ADV_TDS.1: 3
- ADV_TDS.2: 1
- ADV_TDS.3: 11
- AGD:
- AGD_OPE.1: 8
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.1: 2
- ALC_CMS.4: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_LCD.1: 5
- ALC_TAT.1: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV.1: 4
- ATE_COV.2: 4
- ATE_DPT.1: 2
- ATE_FUN.1: 8
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_APR.1: 2
- FAU_ARP.1: 10
- FAU_ARP.1.1: 1
- FAU_GEN.1: 18
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAA.1: 10
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 10
- FAU_SAR.3.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 1
- FAU_STG: 2
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 1
- FCS_COP: 2
- FCS_COP.1: 18
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 48
- FDP_IFC.1.1: 4
- FDP_IFF: 2
- FDP_IFF.1: 55
- FDP_IFF.1.1: 5
- FDP_IFF.1.2: 5
- FDP_IFF.1.3: 4
- FDP_IFF.1.4: 7
- FDP_IFF.1.5: 4
- FDP_IFF.1.6: 5
- FDP_ITC.1: 1
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_ATD.1: 12
- FIA_ATD.1.1: 4
- FIA_SEL.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 8
- FIA_UAU.4.1: 1
- FIA_UAU.5: 18
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 4
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 26
- FMT_MOF.1.1: 2
- FMT_MSA.1: 65
- FMT_MSA.1.1: 6
- FMT_MSA.2: 2
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 18
- FMT_MTD.1.1: 2
- FMT_MTD.2: 11
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 21
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_PSE.1: 16
- FPR_PSE.1.1: 2
- FPR_PSE.1.2: 2
- FPR_PSE.1.3: 2
- FPR_RIP.1: 1
- FPT:
- FPT_AMT.1: 7
- FPT_AMT.1.1: 1
- FPT_RMV.1: 2
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
- FPT_SEP.1: 8
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 2
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
- FAU:
- FAU_ARP.1: 10
- FAU_ARP.1.1: 2
- FAU_GEN: 1
- FAU_GEN.1: 10
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_SAA: 1
- FAU_SAA.1: 13
- FAU_SAA.1.1: 3
- FAU_SAA.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 3
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAS.1: 1
- FAU_STG: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 2
- FAU_STG.1.2: 2
- FCO:
- FCO_NRO: 6
- FCO_NRO.1: 3
- FCO_NRO.2: 2
- FCO_NRO.2.2: 3
- FCO_NRO.2.3: 3
- FCS:
- FCS_CKM: 11
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM.2.1: 1
- FCS_CKM.3: 5
- FCS_CKM.3.1: 2
- FCS_CKM.4: 18
- FCS_CKM.4.1: 2
- FCS_COP: 11
- FCS_COP.1: 17
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 31
- FDP_ACC.1: 27
- FDP_ACC.1.1: 1
- FDP_ACC.2: 9
- FDP_ACC.2.2: 1
- FDP_ACF: 11
- FDP_ACF.1: 33
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 12
- FDP_IFC.1: 20
- FDP_IFC.1.1: 1
- FDP_IFC.2: 3
- FDP_IFCC: 1
- FDP_IFF: 5
- FDP_IFF.1: 14
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 6
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 4
- FDP_ITT.1: 1
- FDP_RIP: 10
- FDP_RIP.1: 3
- FDP_RIP.1.1: 1
- FDP_ROL: 8
- FDP_ROL.1: 4
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI.1: 2
- FDP_SDI.2: 5
- FDP_SDI.2.2: 2
- FDP_UCT: 1
- FDP_UCT.1: 5
- FDP_UCT.1.1: 2
- FDP_UIT.1: 8
- FDP_UIT.1.1: 2
- FDP_UIT.1.2: 2
- FDP_UTC.1: 1
- FIA:
- FIA_ATD: 5
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.2: 6
- FIA_SOS.2.1: 2
- FIA_SOS.2.2: 2
- FIA_UAU: 23
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.3: 2
- FIA_UAU.3.1: 2
- FIA_UAU.3.2: 2
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.6: 2
- FIA_UAU.6.1: 1
- FIA_UID: 4
- FIA_UID.1: 21
- FIA_UID.2: 1
- FIA_USB: 4
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM.1: 2
- FMT_LIM.2: 2
- FMT_MOF.1: 5
- FMT_MSA: 38
- FMT_MSA.1: 13
- FMT_MSA.1.1: 2
- FMT_MSA.2: 1
- FMT_MSA.2.1: 1
- FMT_MSA.3: 17
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 2
- FMT_SMF: 4
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 1
- FPR_UNO.1: 8
- FPR_UNO.1.1: 2
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 9
- FPT_FLS.1.1: 2
- FPT_ITC: 1
- FPT_ITC.1: 4
- FPT_ITC.1.1: 2
- FPT_ITI: 1
- FPT_ITI.1: 8
- FPT_ITI.1.1: 2
- FPT_ITI.1.2: 2
- FPT_ITT.1: 1
- FPT_PHP: 2
- FPT_PHP.1: 2
- FPT_PHP.2: 4
- FPT_PHP.2.2: 2
- FPT_PHP.2.3: 2
- FPT_PHP.3: 11
- FPT_PHP.3.1: 2
- FPT_RCV.4: 7
- FPT_RCV.4.1: 2
- FPT_RPL: 1
- FPT_RPL.1: 5
- FPT_RPL.1.1: 2
- FPT_RPL.1.2: 2
- FPT_STM.1: 5
- FPT_TDC: 3
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FTP:
- FTP_ITC.1: 9
- FTP_TRP.1: 9
|
pdf_data/st_keywords/cc_claims |
- A:
- A.DIRECT: 4
- A.GENPUR: 3
- A.LOWEXP: 3
- A.NOACC: 4
- A.NOEVIL: 2
- A.NOREMO: 3
- A.PHYSEC: 3
- A.PUBLIC: 2
- A.SINGEN: 3
- A.T: 1
- D:
- O:
- O.ACCOUN: 7
- O.ALARM: 6
- O.AUDREC: 9
- O.EAL: 4
- O.ENCRYP: 2
- O.IDAUTH: 12
- O.LIMEXT: 6
- O.MEDIAT: 20
- O.PRIVACY: 7
- O.SECFUN: 19
- O.SECSTA: 14
- O.SECSTRA: 2
- O.SELPRO: 11
- O.SINUSE: 6
- OE:
- OE.ADMTRA: 3
- OE.DIRECT: 4
- OE.GENPUR: 4
- OE.GUIDAN: 3
- OE.LOWEXP: 3
- OE.NOACC: 3
- OE.NOCAA: 1
- OE.NOEVIL: 3
- OE.NOREMO: 3
- OE.NOREMOTE: 1
- OE.PHYSEC: 3
- OE.PUBLIC: 3
- OE.REMACC: 2
- OE.SINGEN: 3
- T:
- T.ASPOOF: 2
- T.AUDACC: 7
- T.AUDFUL: 4
- T.LOWEXP: 2
- T.MEDIAT: 3
- T.NOAUTH: 7
- T.OLDINF: 1
- T.PRIVACY: 2
- T.PROCOM: 1
- T.REPEAT: 1
- T.REPLAY: 4
- T.SELPRO: 2
- T.TUSAGE: 2
- T.UNDETECT: 1
- T.UNDETECTED: 2
- T.USAGE: 4
|
- A:
- A.PHYSICAL: 4
- A.PROTECTION_AFTER_TOE_DE: 1
- A.PROTECTION_AFTER_TOE_DELIVERY: 3
- D:
- D.COUNTERS: 6
- D.EM: 13
- D.EP_CODE: 5
- D.EP_IVDATA: 3
- D.EP_IV_DATA: 1
- D.EP_STATE: 5
- D.KEYS: 9
- D.LOG_DATA: 4
- O:
- O.AUTH: 9
- O.CONFID_DATA: 1
- O.CONF_DATA: 8
- O.EM: 6
- O.HW_AES: 1
- O.INTEG_DATA: 6
- O.JAVAOBJECT: 10
- O.MEM_ACCE: 1
- O.OPERATE: 13
- O.RECORD: 5
- O.REPLAY: 7
- O.RND: 1
- O.SFR_ACCES: 1
- O.TAMPER: 11
- OE:
- OE.DEBIT_BEFORE_CREDIT: 3
- OE.PHYSICAL: 3
- OE.PROTECTION_AFTER_TOE_DELIVERY: 3
- OE.PURSE_BEHAVIOR: 3
- OE.SECRET_MNGT: 3
- OP:
- OP.ARRAY_ACCESS: 2
- OP.CREATE: 4
- OP.INSTANCE_FIELD: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 2
- OP.JAVA: 3
- OP.PUT: 3
- OP.THROW: 2
- OP.TYPE_ACCESS: 2
- OSP:
- OSP.DEBIT_BEFORE_CREDIT: 3
- OSP.PURSE_BEHAVIOR: 4
- OSP.SECRET_MNGT: 4
- R:
- T:
- T.COUNTERFEITING: 2
- T.COUNTERFEITING_AUTH: 2
- T.COUNTERFEITING_AUTOLOAD: 6
- T.COUNTERFEITING_CREDIT: 2
- T.COUNTERFEITING_DEBIT: 6
- T.COUNTERFEITING_UPDATE: 4
- T.DISCLOSURE_KEYS: 9
- T.INTEG: 3
- T.INTEG_: 1
- T.INTEG_CODE: 5
- T.INTEG_COUNTERS: 5
- T.INTEG_EM: 5
- T.INTEG_EP_IVDATA: 2
- T.INTEG_EP_STATE: 5
- T.INTEG_IVDATA: 2
- T.INTEG_KEYS: 4
- T.INTEG_LOG_DATA: 4
- T.REPLAY: 2
- T.REPLAY_AUTOLOAD: 4
- T.REPLAY_CREDIT: 3
- T.REPLAY_DEBIT: 4
- T.REPLAY_UPDATE: 3
- T.RND: 1
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- NXP:
- NXP: 18
- NXP Semiconductors: 2
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 4
- Physical tampering: 1
- malfunction: 3
- physical tampering: 13
- SCA:
- Leak-Inherent: 5
- Physical Probing: 2
- physical probing: 4
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 140-1: 3
- FIPS PUB 180-1: 1
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS PUB 197: 2
- FIPS PUB 46-3: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Since remote access control of administrator is optional functional requirement in the ALFPP and out of scope, the following assumption from ALFPP is not included in the ST. [Table 3-4] Omitted Assumptions: 1
- functionality and intend for it to be evaluated. The SECUREWORKS 3.0’s remote administration is an out of scope feature. However, the End Users’ remote authentication is a target of evaluation feature because: 1
- out of scope: 4
- this ST chose this component for hashing algorithms. However, this FCS_COP is also stated in the out of scope functions, because this ST omitted this component because the remote administration is an out of: 1
|
- OutOfScope:
- Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s: 1
- libraries itself) (Crypto libs) written in native language, • The IC NXP P5CD081 The elements out of scope of the TOE are: • Other application(s) written in java language 2.3.2 Logical scope of the TOE The: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: ???
- /CreationDate: D:20030918103724+10'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20030918103856+10'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- pdf_file_size_bytes: 2377266
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 109
|
- /CreationDate: D:20110629163023+02'00'
- /Keywords:
- /ModDate: D:20110629163023+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- pdf_file_size_bytes: 510681
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 103
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |