Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CEITEC ePassport Module, CTC21001, v1.0 (supporting EAC)
SERTIT-080
Crypto Library V2.7/V2.9 on SmartMX P5CD016/021/041/051 and P5Cx081 V1A /V1A(s)
BSI-DSZ-CC-0633-V2-2014
name CEITEC ePassport Module, CTC21001, v1.0 (supporting EAC) Crypto Library V2.7/V2.9 on SmartMX P5CD016/021/041/051 and P5Cx081 V1A /V1A(s)
scheme NO DE
not_valid_after 17.01.2022 01.09.2019
not_valid_before 17.01.2017 16.07.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20170117%20S-080%20CR%20Ceitec%20EAC.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0633V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STlite-EAC]%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0633V2b_pdf.pdf
manufacturer CEITEC S.A. NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.ceitec-sa.com https://www.nxp.com
security_level EAL4+, ALC_DVS.2, AVA_VAN.5 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 8856518b423e12c4 14df804ae01669ab
heuristics/cert_id SERTIT-080 BSI-DSZ-CC-0633-V2-2014
heuristics/cert_lab [] BSI
heuristics/direct_transitive_cves {} CVE-2021-3011
heuristics/indirect_transitive_cves {} CVE-2021-3011
heuristics/extracted_sars ASE_INT.1, ALC_DVS.2, ADV_FSP.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions 1.0 2.7, 2.9
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0821-2014, NSCIB-CC-13-37761-CR2
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0857-2013
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0825-2017, BSI-DSZ-CC-0821-2014, NSCIB-CC-13-37761-CR2
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0857-2013
heuristics/scheme_data
  • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
  • certification_date: 17.01.2017
  • developer: CEITEC S.A.
  • enhanced:
    • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
    • cert_id: SERTIT-080
    • certification_date: 17.01.2017
    • description: The TOE is an electronic module for machine readable travel documents (MRTDs) based on the requirements of the International Civil Aviation Organization, as defined in ICAO Doc 9303. The TOE is developed and produced by CEITEC and delivered to the passport manufacturer as micro modules. The TOE contains at the physical level: Integrated circuit chip; IC Software; data necessary to enable the MRTD personalization; the associated guidance documentation. The TOE also provides the security functions: integrity and confidentiality of personal data; access control, identification and authentication; protection against abuse of functionality, information leakage, physical tampering, malfunctions.
    • developer: CEITEC S.A.
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135163-1607953148/SERTIT/Sertifikater/2017/80/20170117%20Sertit-080%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135166-1607953151/SERTIT/Sertifikater/2017/80/%5BSTlite-EAC%5D%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135160-1607953146/SERTIT/Sertifikater/2017/80/20170117%20S-080%20CR%20Ceitec%20EAC.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 4, ALC_DVS.2, AVA_VAN.5
    • mutual_recognition: CCRA, SOG-IS
    • product: 1.0
    • protection_profile: BSI-CC-PP-0056, "Machine Readable Travel Document with 'ICAO Application', Extended Access Control"
    • sponsor: CEITEC S.A.
  • product: CEITEC ePassport Module CTC21001
  • url: https://sertit.no/certified-products/product-archive/ceitec-epassport-module-ctc21001
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0821-2014
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0821-2014
heuristics/protection_profiles a33327d40f253f46 f6d23054061d72ba
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf
pdf_data/report_filename 20170117 S-080 CR Ceitec EAC.pdf 0633V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0633-V2-2014
    • cert_item: Crypto Library V2.7/V2.9 on SmartMX P5CD016/021/041/051 and P5Cx081 V1A/ V1A(s
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-080: 19
  • DE:
    • BSI-DSZ-CC-0633-2010-MA-01: 3
    • BSI-DSZ-CC-0633-V2-2014: 23
    • BSI-DSZ-CC-0857-2013: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0056: 1
  • BSI:
    • BSI-CC-PP-0035-2007: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4+: 19
    • EAL1: 1
    • EAL4: 1
    • EAL7: 1
  • EAL:
    • EAL 4: 2
    • EAL 5: 7
    • EAL 5 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 7
    • EAL5+: 2
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 7
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP: 4
    • FCS_RND.1: 4
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_UCT.1: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_API.1: 4
    • FIA_UAU.1: 1
    • FIA_UAU.4: 1
    • FIA_UAU.5: 1
    • FIA_UAU.6: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
    • FMT_MTD: 8
    • FMT_MTD.3: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_PHP.3: 1
    • FPT_TST.1: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 11
    • NXP Semiconductors: 7
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • BrightSight:
    • Brightsight: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
  • DES:
    • 3DES:
      • TDES: 7
      • Triple-DES: 2
    • DES:
      • DES: 13
  • constructions:
    • MAC:
      • CBC-MAC: 8
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 7
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • Diffie-Hellman: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 9
  • ECB:
    • ECB: 7
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 26
pdf_data/report_keywords/crypto_library
  • Generic:
    • Crypto Library 2.7: 4
    • Crypto Library 2.9: 4
    • Crypto Library v2.7: 1
    • Crypto Library v2.9: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • other:
    • JIL: 1
  • SCA:
    • physical probing: 1
    • side channel: 1
    • side-channel: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 15408: 2
  • BSI:
    • AIS 20: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 4
    • AIS 37: 1
    • AIS 38: 1
    • AIS36: 2
  • FIPS:
    • FIPS 180-2: 2
    • FIPS 197: 1
    • FIPS 46-3: 7
    • FIPS197: 2
  • NIST:
    • SP 800-38A: 7
  • PKCS:
    • PKCS#1: 10
  • RFC:
    • RFC 5639: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Library V2.7/V2.9 on SmartMX P5CD016/021/041/051 and P5Cx081 V1A/ V1A(s) EAL5+, Brightsight, (confidential document) [10] ETR for composite evaluation according to AIS 36, 6.0, 26 June 2014, ETR for composition: 1
    • P5CD016/021/041/051 and P5Cx081 V1A/ V1A(s), NXP Semiconductors, Business Unit Identification (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8: 1
    • V2.7/V2.9 on SmartMX P5CD016/021/041/051 and P5Cx081 V1A/ V1A(s) according to AIS36, Brightsight (confidential document) [11] Configuration list: • List of Configuration Items for Crypto Library v2.7 on: 1
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Kjaertan
  • /CreationDate: D:20170118113117Z00'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ugradert
  • /ModDate: D:20170118113117Z00'00'
  • /Producer: Mac OS X 10.12.2 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 650258
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20140904110522+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, 0633-V2, smartcard, Crypto Library V2.7/V2.9 on SmartMX P5CD016/021/041/051 and P5Cx081 V1A/ V1A(s), NXP Semiconductors Germany GmbH"
  • /ModDate: D:20140904111103+02'00'
  • /Producer: LibreOffice 3.6
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0633-V2-2014
  • pdf_file_size_bytes: 1226017
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
pdf_data/st_filename [STlite-EAC] CEITECSA 5.410.052 - ST-Lite ePassport Module EAC 2.0.pdf 0633V2b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056: 7
    • BSI-PP-0056: 1
    • BSI-PP-CC-0056: 1
  • BSI:
    • BSI-PP-0035: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 8
    • EAL4 augmented: 2
  • EAL:
    • EAL 5: 3
    • EAL 5 augmented: 3
    • EAL4: 1
    • EAL4+: 2
    • EAL5: 29
    • EAL5 augmented: 1
    • EAL5+: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 5
  • APE:
    • APE_SRE: 1
  • AVA:
    • AVA_VAN.5: 5
  • ACM:
    • ACM_CMS.5: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 2
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 2
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 18
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM.1: 26
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP: 36
    • FCS_COP.1: 7
    • FCS_RND: 7
    • FCS_RND.1: 11
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 20
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 4
    • FDP_ITC: 1
    • FDP_ITC.1: 10
    • FDP_ITC.2: 10
    • FDP_UCT.1: 8
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 6
    • FIA_API.1: 10
    • FIA_API.1.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 8
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 15
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 21
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 18
    • FMT_LIM.2.1: 2
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 46
    • FMT_MTD.1: 11
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 34
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 38
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
  • FAU:
    • FAU_SAS.1: 2
  • FCS:
    • FCS_CKM.1: 20
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 16
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 42
    • FCS_COP.1.1: 9
    • FCS_RNG.1: 12
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 5
    • FDP_ACF.1: 5
    • FDP_IFC.1: 21
    • FDP_ITC.1: 10
    • FDP_ITC.2: 10
    • FDP_ITT.1: 12
    • FDP_RIP: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FMT:
    • FMT_LIM.1: 2
    • FMT_LIM.2: 2
    • FMT_MSA.1: 5
    • FMT_MSA.3: 5
    • FMT_SMF.1: 3
  • FPT:
    • FPT_FLS.1: 16
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 21
    • FPT_PHP.3: 7
  • FRU:
    • FRU_FLT.2: 18
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.BAC-PP: 2
    • OE.BAC_PP: 1
    • OE.MRTD_: 2
  • O:
    • O.AES: 5
    • O.ECC: 5
    • O.ECC_DHKE: 4
    • O.HW_AES: 3
    • O.MEM_ACCESS: 4
    • O.MF_FW: 4
    • O.REUSE: 6
    • O.RND: 12
    • O.RSA: 5
    • O.SFR_ACCESS: 4
    • O.SHA: 5
  • T:
    • T.RND: 5
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 71
    • NXP Semiconductors: 29
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 2
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 42
  • DES:
    • 3DES:
      • 3DES: 14
      • TDES: 1
      • Triple-DES: 17
    • DES:
      • DEA: 1
      • DES: 32
  • constructions:
    • MAC:
      • CBC-MAC: 18
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
  • FF:
    • DH:
      • Diffie-Hellman: 5
  • ECC:
    • ECC:
      • ECC: 59
  • FF:
    • DH:
      • Diffie-Hellman: 10
  • RSA:
    • RSA-CRT: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
  • SHA:
    • SHA1:
      • SHA-1: 12
    • SHA2:
      • SHA-224: 8
      • SHA-256: 9
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
  • KEX:
    • Key Exchange: 8
  • MAC:
    • MAC: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 18
    • RNG: 41
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CBC:
    • CBC: 24
  • ECB:
    • ECB: 15
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 117
pdf_data/st_keywords/crypto_library
  • Generic:
    • Crypto Library 2.7: 1
    • Crypto Library 2.9: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • Physical Tampering: 7
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 5
  • SCA:
    • DPA: 3
    • SPA: 2
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
  • FI:
    • DFA: 27
    • Malfunction: 13
    • fault induction: 1
    • fault injection: 1
    • malfunction: 3
  • SCA:
    • DPA: 17
    • Leak-Inherent: 13
    • Physical Probing: 2
    • SPA: 21
    • Timing attacks: 4
    • side channel: 8
    • side-channel: 9
    • timing attacks: 5
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 10
    • EF.DG1: 20
    • EF.DG13: 2
    • EF.DG14: 7
    • EF.DG16: 17
    • EF.DG2: 7
    • EF.DG3: 20
    • EF.DG4: 18
    • EF.DG5: 5
    • EF.SOD: 10
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-411: 1
  • ICAO:
    • ICAO: 9
  • PKCS:
    • PKCS#3: 2
    • PKCS#34: 1
  • BSI:
    • AIS20: 2
    • AIS31: 2
  • CC:
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS 180-2: 2
    • FIPS PUB 180-2: 1
    • FIPS PUB 197: 3
    • FIPS PUB 46-3: 2
    • FIPS PUB 81: 3
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 9797-1: 2
  • PKCS:
    • PKCS #1: 6
pdf_data/st_metadata
  • /Author: Marcos Kordyas Dossa
  • /CreationDate: D:20161212160233-02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20161212160233-02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1330959
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 71
  • /Alternative descriptive title: Security Target Lite
  • /Author: Andreas Kühn
  • /CertificationID: BSI-DSZ-CC-0633-V2
  • /Chip family: SmartMX
  • /Chip type: P5CD016/021/041/051 and P5Cx081 V1A/ V1A(s)
  • /Comments:
  • /Company: NXP Semiconductors / Brightsight
  • /Copyright date: 2014
  • /CreationDate: D:20140527191932+02'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Descriptive title: Security Target Lite
  • /Division: NXP Semiconductors
  • /Keywords: Crypto Library, SmartMX, P5CD081V1A, P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A, P5CD016V1A, NXP, EAL5+, AVA_VAN.5, Security Target, AES, DES, RSA, ECC over GF(p), SHA
  • /ModDate: D:20140527191949+02'00'
  • /Modification date: 27 May 2014
  • /Producer: Adobe PDF Library 10.0
  • /Revision: Rev. 1.7
  • /Security status: PUBLIC INFORMATION
  • /SourceModified: D:20140527171812
  • /Specification status: Evaluation documentation
  • /Status: accepted
  • /Subject: Common Criteria Evaluation of Crypto Library on SmartMX
  • /TOE long: Crypto Library V2.7/V2.9 on SmartMX P5CD016/021/041/051 and P5Cx081 V1A/ V1A(s)
  • /TOE short: Crypto Library on SmartMX
  • /Template date: 1 October 2006
  • /Template version: 2.8.1
  • /Title: Security Target - Crypto Library V2.7 on P5CD081V1A / P5CC081V1A / P5CN081V1A / P5CD041V1A / P5CD021V1A / P5CD016V1A
  • /docpath: I:\Workspace\CryptoLibP5\SmxCl\docs\02_sw_req_an
  • /philips_smx_cl_docpath: I:\SmartMX\P5_CryptoLib\SmxCl\docs\02_sw_req_an
  • /relBibilioPath: ..\Bibliography.doc
  • pdf_file_size_bytes: 386842
  • pdf_hyperlinks: http://www.cacr.math.uwaterloo.ca/hac/, http://www.nxp.com/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 53
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different