Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft Windows 10 version 2004 (May 2020 Update), Microsoft Windows Server version 2004 (May 2020 Update) and others
2020-50-INF-3671
ChipDoc v3 on JCOP 4 P71 in SSCD configuration
ANSSI-CC-2020/11
name Microsoft Windows 10 version 2004 (May 2020 Update), Microsoft Windows Server version 2004 (May 2020 Update) and others ChipDoc v3 on JCOP 4 P71 in SSCD configuration
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme ES FR
status active archived
not_valid_after 31.12.2026 13.03.2025
not_valid_before 31.12.2021 13.03.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-50-Certificate.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-ANSSI-CC-2020_11.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-50-INF-3671.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_11.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-50-ST_lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_11en.pdf
manufacturer Microsoft Corporation NXP Semiconductors
manufacturer_web https://www.microsoft.com https://www.nxp.com/
security_level {} ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 87d47655fcd5ec9e 99794dfcddfd8885
heuristics/cert_id 2020-50-INF-3671 ANSSI-CC-2020/11
heuristics/cert_lab [] THALES
heuristics/cpe_matches cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.488:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1387:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1288:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.906:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.964:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.610:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.789:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1320:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.329:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.264:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.867:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.508:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.329:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.388:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.985:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.870:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.488:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.450:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.685:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.685:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.423:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1266:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.546:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.630:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1415:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.264:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.906:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.572:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1387:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.985:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.331:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.844:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1387:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.331:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1415:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.546:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.844:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1348:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.329:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.662:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.388:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1237:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1266:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.804:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.631:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.264:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.450:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.331:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.631:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1320:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.630:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1348:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.804:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.488:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.867:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.867:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.928:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.868:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.870:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.844:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1415:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.789:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.610:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.928:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.631:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.610:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.746:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1237:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.423:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.906:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.868:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.964:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1320:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.423:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.630:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1288:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.450:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.662:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.985:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.746:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.685:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.546:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.868:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1348:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.508:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.508:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1288:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1266:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.572:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.572:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.964:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.928:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.662:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.789:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.746:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.804:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.870:*:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.388:*:*:*:*:*:x86:*, cpe:2.3:o:microsoft:windows_10_2004:10.0.19041.1237:*:*:*:*:*:arm64:* {}
heuristics/related_cves CVE-2021-33739, CVE-2021-40449, CVE-2021-34486, CVE-2021-31956, CVE-2021-31199, CVE-2021-36934, CVE-2021-31955, CVE-2021-41357, CVE-2021-31166, CVE-2021-40450, CVE-2021-36955, CVE-2021-31979, CVE-2021-34448, CVE-2021-1675, CVE-2021-31201, CVE-2021-41379, CVE-2021-34484, CVE-2021-33771, CVE-2021-40444, CVE-2021-36948, CVE-2021-33742 {}
heuristics/extracted_sars AGD_PRE.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, ASE_REQ.2 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 2020, 2004, 10 4
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1040-2019
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1040-2019
heuristics/scheme_data
  • category: Operating systems
  • certification_date: 31.12.2021
  • enhanced:
    • category: Operating systems
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1306
    • certification_date: 31.12.2021
    • description: Descripción del TOE certificado Sistemas Operativos Windows: Microsoft Windows 10 Home edition (May 2020 Update) (64-bit version) Microsoft Windows 10 Pro edition (May 2020 Update) (64-bit version) Microsoft Windows 10 Enterprise edition (May 2020 Update) (64- bit version) Microsoft Windows Server Standard edition (May 2020 Update) Microsoft Windows Server Datacenter edition (May 2020 Update) Microsoft Windows Server Core Datacenter “Azure Fabric Controller” Microsoft Windows Server Core Datacenter ”Azure Stack” Versiones del TOE: Windows 10: build 10.0.19041 (also known as version 2004) Windows Server: build 10.0.19401 (also known as version 2004) Azure Fabric Controller: build 10.0.14393 Azure Stack: build 10.0.17763 Actualizaciones del TOE: Windows 10 and Windows Server version 2004: todas las actualizaciones críticas a partir del 1 de septiembre de 2020.
    • evaluation_facility: DEKRA Testing and Certification S.A.U.
    • level: PP Compliant
    • manufacturer: Microsoft Corp.
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1307
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1305
    • type: Product
  • manufacturer: Microsoft Corp.
  • product: Microsoft Windows 10 version 2004 (May 2020 Update), Microsoft Windows Server version 2004 (May 2020 Update) and others
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/759-microsoft-windows-10-version-2004-may-2020-update-microsoft-windows-server-version-2004-may-2020-update-and-others
heuristics/protection_profiles e34797b67a3163c5, c88af12926be2779, f4474c6c73660987 d9553e7194783182, d918b28fd7bb5d79, 4a814d0e3c9f9082, 1f7ea2e05de5b88b, 27abdb9c6ab375a7
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf
pdf_data/cert_filename 2020-50-Certificate.pdf certificat-ANSSI-CC-2020_11.pdf
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
pdf_data/cert_keywords/cc_claims
  • A:
    • A.U: 1
  • O:
    • O.E: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/vendor
  • Microsoft:
    • Microsoft: 5
    • Microsoft Corporation: 1
  • NXP:
    • NXP: 2
pdf_data/cert_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_keywords/standard_id
  • NIST:
    • SP 5-2009: 1
pdf_data/cert_metadata
  • /CreationDate: D:20211122114618+01'00'
  • /Creator: RICOH IM C3000
  • /ModDate: D:20211122114618+01'00'
  • /Producer: RICOH IM C3000
  • pdf_file_size_bytes: 970426
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: harbus
  • /CreationDate: D:20210426161151+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210426161151+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title: Microsoft Word - certificat-ANSSI-CC-2020_11
  • pdf_file_size_bytes: 1571095
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 2020-50-INF-3671.pdf anssi-cc-2020_11.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2020/11
    • cert_item: ChipDoc v3 on JCOP 4 P71 in SSCD configuration
    • cert_item_version: Version 3.0.0.52
    • cert_lab: THALES / CNES 290 allée du Lac, 31670 Labège, France
    • developer: NXP Semiconductors N.V. Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire NXP Semiconductors N.V. Troplowitzstrasse 20, 22529 Hamburg, Allemagne
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, certifié BSI-CC-PP-0059-2009-MA-01 le 21 février 2012; Part 3: Device with key import, v1.0.2, certifié BSI-CC-PP-0075-2012 le 27 septembre 2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifié BSI-CC-PP-0071-2012 le 12 décembre 2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifié BSI-CC-PP-0072-2012 le 12 décembre 2012 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifié BSI-CC-PP-0076-2013 le 16 avril 2013
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2020-50-INF-3671- v1: 1
  • DE:
    • BSI-DSZ-CC-1040-2019: 2
  • FR:
    • ANSSI-CC-2020/11: 16
  • NL:
    • NSCIB-CC-180212: 2
    • NSCIB-CC-190212: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0059-2009-MA-01: 1
    • BSI-CC-PP- 0071-2012: 1
    • BSI-CC-PP- 0072-2012: 1
    • BSI-CC-PP- 0075-2012: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0076-: 1
    • BSI-CC-PP-0076-2013: 1
    • BSI-CC-PP-0084-2014: 1
  • other:
    • PP-SSCD-: 6
    • PP-SSCD-Part2: 1
    • PP-SSCD-Part4: 1
    • PP-SSCD-Part5: 1
    • PP-SSCD-Part6: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 2
    • EAL 7: 1
    • EAL2: 2
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_FLR: 2
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 2
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 5
    • FAU_SEL.1: 2
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.2: 3
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.4: 2
    • FCS_COP.1: 8
    • FCS_DTLS_EXT.1: 2
    • FCS_RBG_EXT.1: 2
    • FCS_STO_EXT.1: 2
    • FCS_TLSC_EXT.1: 3
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.3: 2
    • FCS_TLSC_EXT.4: 2
  • FDP:
    • FDP_ACF_EXT.1: 2
    • FDP_IFC_EXT.1: 4
    • FDP_RIP.2: 2
  • FIA:
    • FIA_AFL.1: 2
    • FIA_PAE_EXT.1: 1
    • FIA_PSK_EXT.1: 2
    • FIA_UAU.5: 2
  • FMT:
    • FMT_MOF_EXT.1: 2
    • FMT_SMF.1: 2
    • FMT_SMF_EXT.1: 3
  • FPT:
    • FPT_ACF_EXT.1: 2
    • FPT_ASLR_EXT.1: 2
    • FPT_SBOP_EXT.1: 2
    • FPT_SRP_EXT.1: 2
    • FPT_TST_EXT.1: 5
    • FPT_TUD_EXT.1: 2
    • FPT_TUD_EXT.2: 2
  • FTA:
    • FTA_TAB.1: 2
    • FTA_WSE_EXT.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_ITC_EXT.1: 5
    • FTP_TRP.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.U: 4
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 64
    • Microsoft Corporation: 3
  • NXP:
    • NXP: 9
    • NXP Semiconductors N.V: 3
pdf_data/report_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 4
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 3
  • IPsec:
    • IPsec: 13
  • TLS:
    • DTLS:
      • DTLS: 5
    • TLS:
      • TLS: 12
  • VPN:
    • VPN: 15
  • PACE:
    • PACE: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 4: 24
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
  • X509:
    • X.509: 8
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ICAO:
    • ICAO: 2
pdf_data/report_metadata
  • /CreationDate: D:20220112084436+01'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220112084436+01'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 949729
  • pdf_hyperlinks: https://www.sogis.org/, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: CHERGUI Yoan
  • /CreationDate: D:20200327143514+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07 v29.2
  • /ModDate: D:20200327143514+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: ChipDoc v3 on JCOP 4 P71 in SSCD configuration
  • /Title: ANSSI-CC-2020/11
  • pdf_file_size_bytes: 560212
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename 2020-50-ST_lite.pdf anssi-cible-cc-2020_11en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1040: 2
  • NL:
    • CC-1040: 1
    • NSCIB-CC-180212: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0071: 1
    • BSI-CC-PP-0072: 1
    • BSI-CC-PP-0075: 1
    • BSI-CC-PP-0076: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 7
    • EAL5 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 5
    • ADV_FSP.4: 1
    • ADV_FSP.5: 6
    • ADV_IMP.1: 5
    • ADV_INT.2: 2
    • ADV_TDS.3: 1
    • ADV_TDS.4: 8
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 6
    • ALC_LCD.1: 3
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 1
    • ASE_INT.1: 4
    • ASE_OBJ.2: 3
    • ASE_REQ.2: 4
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 28
    • FAU_GEN.1.1: 3
    • FAU_GEN.1.2: 5
    • FAU_SEL: 1
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
  • FCS:
    • FCS_CKM: 15
    • FCS_CKM.1: 52
    • FCS_CKM.1.1: 4
    • FCS_CKM.2: 34
    • FCS_CKM.2.1: 2
    • FCS_CKM_EXT: 2
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.2: 6
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.4: 7
    • FCS_CKM_EXT.4.1: 3
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP.1: 82
    • FCS_COP.1.1: 5
    • FCS_DTLS_EXT: 1
    • FCS_DTLS_EXT.1: 11
    • FCS_DTLS_EXT.1.1: 2
    • FCS_DTLS_EXT.1.2: 2
    • FCS_IPSC_EXT.1: 2
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 17
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_STO_EXT: 1
    • FCS_STO_EXT.1: 7
    • FCS_STO_EXT.1.1: 1
    • FCS_TLCS_EXT: 1
    • FCS_TLCS_EXT.1: 1
    • FCS_TLSC: 2
    • FCS_TLSC_EXT: 9
    • FCS_TLSC_EXT.1: 21
    • FCS_TLSC_EXT.1.1: 3
    • FCS_TLSC_EXT.1.2: 3
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.1.5: 1
    • FCS_TLSC_EXT.2: 19
    • FCS_TLSC_EXT.2.1: 2
    • FCS_TLSC_EXT.3: 11
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.4: 10
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLS_EXT: 1
    • FCS_TLS_EXT.1: 2
    • FCS_TLS_EXT.2: 2
    • FCS_TLS_EXT.3: 1
  • FDP:
    • FDP_ACF_EXT: 1
    • FDP_ACF_EXT.1: 7
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT.1: 20
    • FDP_IFC_EXT.1.1: 2
    • FDP_RDP.2: 1
    • FDP_RIP: 1
    • FDP_RIP.2: 9
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_PAE_EXT: 1
    • FIA_PAE_EXT.1: 8
    • FIA_PAE_EXT.1.1: 1
    • FIA_PSK_EXT: 1
    • FIA_PSK_EXT.1: 7
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_UAU: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF_EXT.1: 8
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMF_EXT: 8
    • FMT_SMF_EXT.1: 20
    • FMT_SMF_EXT.1.1: 3
  • FPT:
    • FPT_ACF_EXT: 1
    • FPT_ACF_EXT.1: 7
    • FPT_ACF_EXT.1.1: 2
    • FPT_ACF_EXT.1.2: 2
    • FPT_ASLR_EXT: 1
    • FPT_ASLR_EXT.1: 7
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT: 1
    • FPT_SBOP_EXT.1: 7
    • FPT_SBOP_EXT.1.1: 1
    • FPT_SRP_EXT: 1
    • FPT_SRP_EXT.1: 7
    • FPT_SRP_EXT.1.1: 1
    • FPT_TST_EXT: 6
    • FPT_TST_EXT.1: 30
    • FPT_TST_EXT.1.1: 3
    • FPT_TST_EXT.1.2: 2
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 13
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.2: 8
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 2
    • FTA_WSE_EXT.1: 9
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC_EXT: 3
    • FTP_ITC_EXT.1: 29
    • FTP_ITC_EXT.1.1: 3
    • FTP_ITC_EXT.1.2: 1
    • FTP_TRP: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 16
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 14
    • FCS_CKM.4.1: 1
    • FCS_COP: 10
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 44
    • FDP_ACC.1: 15
    • FDP_ACF: 30
    • FDP_ACF.1: 20
    • FDP_DAU: 8
    • FDP_DAU.1: 1
    • FDP_DAU.2: 2
    • FDP_IFC.1: 7
    • FDP_ITC: 8
    • FDP_ITC.1: 7
    • FDP_ITC.2: 4
    • FDP_RIP: 2
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
    • FDP_SDI: 15
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
    • FDP_UCT: 10
    • FDP_UCT.1: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 4
    • FIA_API.1: 14
    • FIA_API.1.1: 3
    • FIA_UAU: 2
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UID: 2
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_EMS: 2
    • FMT_MOF: 3
    • FMT_MOF.1: 5
    • FMT_MSA: 16
    • FMT_MSA.1: 4
    • FMT_MSA.2: 7
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 17
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 8
    • FMT_MSA.4.1: 1
    • FMT_MTD: 14
    • FMT_MTD.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 3
    • FPT_EMS.1: 11
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 2
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_ITC: 4
    • FPT_ITC.1: 2
    • FPT_PHP: 2
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
    • FPT_TST: 3
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 28
    • FTP_ITC.1: 16
    • FTP_ITC.1.3: 6
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_TOE_BYPASS: 6
    • A.PHYSICAL: 3
    • A.PLATFORM: 3
    • A.PROPER_ADMIN: 3
    • A.PROPER_USER: 3
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 3
  • O:
    • O.ACCOUNTABILITY: 11
    • O.AUTH_COMM: 4
    • O.CRYPTOGRAPHIC_FUNCTIONS: 3
    • O.INTEGRITY: 11
    • O.MANAGEMENT: 10
    • O.PROTECTED_COMMS: 10
    • O.PROTECTED_STORAGE: 5
    • O.SYSTEM_MONITORING: 4
    • O.TOE_ADMINISTRATION: 4
    • O.TSF_SELF_TEST: 4
    • O.WIRELESS_ACCESS_POINT_: 1
    • O.WIRELESS_ACCESS_POINT_CO: 2
    • O.WIRELESS_ACCESS_POINT_CONNECTION: 1
  • OE:
    • OE.NO_TOE_BYPASS: 6
    • OE.PHYSICAL: 3
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
    • OE.TRUSTED_ADMIN: 3
    • OE.TRUSTED_CONFIG: 3
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 2
    • T.LOCAL_ATTACK: 5
    • T.NETWORK_ATTACK: 7
    • T.NETWORK_EAVESDROP: 6
    • T.TSF_CONFIGURATION: 2
    • T.TSF_FAILURE: 4
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNAUTHORIZED_UPDATE: 2
    • T.UNDETECTED_ACTIONS: 2
    • T.USER_DATA_REUSE: 2
  • A:
    • A.CGA: 3
    • A.CSP: 3
    • A.SCA: 3
  • OE:
    • OE.HID_VAD: 9
  • T:
    • T.DTBS_: 1
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 1
  • Microsoft:
    • Microsoft: 247
    • Microsoft Corporation: 5
  • NXP:
    • NXP: 82
    • NXP Semiconductors: 29
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 29
      • AES-: 1
      • AES-128: 1
      • AES-256: 4
    • RC:
      • RC4: 1
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 20
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 2
    • DES:
      • DES: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 12
    • ECDH:
      • ECDH: 6
      • ECDHE: 7
    • ECDSA:
      • ECDSA: 25
  • FF:
    • DH:
      • DH: 11
      • DHE: 4
      • Diffie-Hellman: 10
    • DSA:
      • DSA: 11
  • ECC:
    • ECC:
      • ECC: 6
    • ECDSA:
      • ECDSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
      • SHA1: 2
    • SHA2:
      • SHA-2: 1
      • SHA-256: 13
      • SHA-384: 4
      • SHA-512: 1
      • SHA256: 4
      • SHA384: 3
      • SHA512: 3
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 3
  • KEX:
    • Key Exchange: 23
  • MAC:
    • MAC: 21
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 50
    • IKEv1: 30
    • IKEv2: 26
  • IPsec:
    • IPsec: 214
  • PGP:
    • PGP: 1
  • TLS:
    • DTLS:
      • DTLS: 23
      • DTLS 1.0: 2
      • DTLS 1.2: 3
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 107
      • TLS 1.0: 3
      • TLS 1.1: 3
      • TLS 1.2: 5
  • VPN:
    • VPN: 135
  • PACE:
    • PACE: 6
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
    • PRNG: 2
  • RNG:
    • RBG: 14
    • RNG: 7
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • CCM:
    • CCM: 3
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 6
  • XTS:
    • XTS: 3
  • CBC:
    • CBC: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 16
    • P-521: 12
    • secp256r1: 3
    • secp384r1: 3
    • secp521r1: 4
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX3: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_NULL_WITH_NULL_NULL: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 5
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • Generic:
    • Crypto Library ........5: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • fault injection: 1
    • malfunction: 1
    • physical tampering: 5
  • SCA:
    • DPA: 2
    • SPA: 2
    • timing attacks: 2
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 4: 148
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 1
    • FIPS 180-4: 3
    • FIPS 186-4: 28
    • FIPS 197: 4
    • FIPS 198-1: 1
    • FIPS 198-2: 3
    • FIPS PUB 186-4: 3
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 2900-2: 1
  • NIST:
    • NIST SP 800-38A: 4
    • NIST SP 800-38C: 3
    • NIST SP 800-38D: 4
    • NIST SP 800-38E: 4
    • NIST SP 800-38F: 4
    • NIST SP 800-56A: 4
    • NIST SP 800-56B: 3
    • NIST SP 800-57: 1
    • NIST SP 800-90: 3
    • NIST SP 800-90A: 1
    • NIST SP 800-90B: 1
    • SP 800-56A: 1
    • SP 800-90: 1
  • PKCS:
    • PKCS #7: 1
  • RFC:
    • RFC 2246: 3
    • RFC 2396: 1
    • RFC 2404: 1
    • RFC 2408: 1
    • RFC 2818: 1
    • RFC 3268: 1
    • RFC 3394: 1
    • RFC 3526: 2
    • RFC 3546: 2
    • RFC 3602: 1
    • RFC 4106: 1
    • RFC 4109: 1
    • RFC 4301: 5
    • RFC 4303: 1
    • RFC 4304: 1
    • RFC 4306: 1
    • RFC 4346: 1
    • RFC 4347: 1
    • RFC 4366: 1
    • RFC 4492: 1
    • RFC 4681: 1
    • RFC 4868: 3
    • RFC 4945: 1
    • RFC 5216: 1
    • RFC 5246: 15
    • RFC 5280: 7
    • RFC 5288: 8
    • RFC 5289: 18
    • RFC 5430: 2
    • RFC 5759: 1
    • RFC 6066: 2
    • RFC 6125: 1
    • RFC 6347: 2
    • RFC 6379: 1
    • RFC 6960: 1
    • RFC 6961: 1
    • RFC 7296: 2
  • X509:
    • X.509: 27
    • x.509: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS PUB 46-3: 2
  • PKCS:
    • PKCS#1: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • kernel. Software loaded for execution directly by the platform (e.g. first-stage bootloaders) is out of scope. For each additional category of executable code verified before execution, the evaluator will: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: NXP B.V.
  • /CreationDate: D:20200224105856+01'00'
  • /Creator: DITA Open Toolkit
  • /Keywords: Common Criteria, Security Target Lite, ChipDoc v3, SSCD
  • /Producer: Apache FOP Version 1.1
  • /Subject: ChipDoc v3 on JCOP 4 P71 in SSCD configuration
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 464530
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 69
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different