name |
CEITEC ePassport Module, CTC21001, v1.0 (supporting EAC) |
J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64 Secure Smart Card Controller Revision 3 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
NL |
status |
archived |
archived |
not_valid_after |
17.01.2022 |
05.08.2018 |
not_valid_before |
17.01.2017 |
26.08.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20170117%20S-080%20CR%20Ceitec%20EAC.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-13-37761-CR2.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STlite-EAC]%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_Lite_JxE081_v00.02.pdf |
manufacturer |
CEITEC S.A. |
NXP Semiconductors Germany GmbH Business Line Identification |
manufacturer_web |
https://www.ceitec-sa.com |
https://www.nxp.com |
security_level |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
ALC_DVS.2, EAL5+, ASE_TSS.2, AVA_VAN.5 |
dgst |
8856518b423e12c4 |
ef5701cc183f2e46 |
heuristics/cert_id |
SERTIT-080 |
NSCIB-CC-13-37761-CR2 |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
cpe:2.3:h:nxp:j3e081_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j2e081_m64:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2021-3011 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_DVS.2, ADV_FSP.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ASE_TSS.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
1.0 |
3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0825-2017, BSI-DSZ-CC-0821-2014 |
heuristics/report_references/directly_referencing |
{} |
NSCIB-CC-13-37762-CR, BSI-DSZ-CC-0633-V2-2014 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0825-2017, BSI-DSZ-CC-0821-2014 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0633-V2-2014, BSI-DSZ-CC-0857-2013, BSI-DSZ-CC-0707-2012, BSI-DSZ-CC-0555-2009, NSCIB-CC-13-37762-CR |
heuristics/scheme_data |
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 17.01.2017
- developer: CEITEC S.A.
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-080
- certification_date: 17.01.2017
- description: The TOE is an electronic module for machine readable travel documents (MRTDs) based on the requirements of the International Civil Aviation Organization, as defined in ICAO Doc 9303. The TOE is developed and produced by CEITEC and delivered to the passport manufacturer as micro modules. The TOE contains at the physical level: Integrated circuit chip; IC Software; data necessary to enable the MRTD personalization; the associated guidance documentation. The TOE also provides the security functions: integrity and confidentiality of personal data; access control, identification and authentication; protection against abuse of functionality, information leakage, physical tampering, malfunctions.
- developer: CEITEC S.A.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135163-1607953148/SERTIT/Sertifikater/2017/80/20170117%20Sertit-080%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135166-1607953151/SERTIT/Sertifikater/2017/80/%5BSTlite-EAC%5D%20CEITECSA%205.410.052%20-%20ST-Lite%20ePassport%20Module%20EAC%202.0.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135160-1607953146/SERTIT/Sertifikater/2017/80/20170117%20S-080%20CR%20Ceitec%20EAC.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 4, ALC_DVS.2, AVA_VAN.5
- mutual_recognition: CCRA, SOG-IS
- product: 1.0
- protection_profile: BSI-CC-PP-0056, "Machine Readable Travel Document with 'ICAO Application', Extended Access Control"
- sponsor: CEITEC S.A.
- product: CEITEC ePassport Module CTC21001
- url: https://sertit.no/certified-products/product-archive/ceitec-epassport-module-ctc21001
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0825-2017, BSI-DSZ-CC-0821-2014 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0857-2013 |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0825-2017, BSI-DSZ-CC-0821-2014 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0857-2013 |
heuristics/protection_profiles |
a33327d40f253f46 |
85bef5b6f16c4d33 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
20170117 S-080 CR Ceitec EAC.pdf |
[CR] NSCIB-CC-13-37761-CR2.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-13-37761-CR2
- cert_item: NXP J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, and J3E041_M64 Secure Smart Card Controller Revision 3
- cert_lab: Brightsight
- developer: NXP Semiconductors Germany GmbH
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0633-V2-: 1
- BSI-DSZ-CC-0633-V2-2014: 1
- BSI-DSZ-CC-0857: 2
- BSI-DSZ-CC-0857-: 1
- BSI-DSZ-CC-783: 1
- BSI-DSZ-CC-784: 1
- BSI-DSZ-CC-860: 1
- NL:
- CC-0857: 1
- NSCIB-CC-13-37760: 1
- NSCIB-CC-13-37761: 4
- NSCIB-CC-13-37761-CR2: 14
- NSCIB-CC-13-37762: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4+: 19
- EAL1: 1
- EAL4: 1
- EAL7: 1
|
- EAL:
- EAL4: 2
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 3
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 2
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 3
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 3
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP: 4
- FCS_RND.1: 4
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_UCT.1: 1
- FDP_UIT.1: 1
- FIA:
- FIA_API.1: 4
- FIA_UAU.1: 1
- FIA_UAU.4: 1
- FIA_UAU.5: 1
- FIA_UAU.6: 1
- FIA_UID.1: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FMT_MTD: 8
- FMT_MTD.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_PHP.3: 1
- FPT_TST.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 19
- NXP Semiconductors: 4
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
- ISO:
|
- BSI:
- ICAO:
- SCP:
- SCP01: 2
- SCP02: 2
- SCP03: 2
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /AAPL:Keywords: ['ugradert']
- /Author: Kjaertan
- /CreationDate: D:20170118113117Z00'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ugradert
- /ModDate: D:20170118113117Z00'00'
- /Producer: Mac OS X 10.12.2 Quartz PDFContext
- /Title: tittel
- pdf_file_size_bytes: 650258
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
|
pdf_data/st_filename |
[STlite-EAC] CEITECSA 5.410.052 - ST-Lite ePassport Module EAC 2.0.pdf |
ST_Lite_JxE081_v00.02.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0633-: 1
- BSI-DSZ-CC-0857: 1
- BSI-DSZ-CC-0857-2013: 1
- BSI-DSZ-CC-0858: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056: 7
- BSI-PP-0056: 1
- BSI-PP-CC-0056: 1
|
- BSI:
- BSI-PP-0017: 2
- BSI-PP-0035: 2
- BSI-PP-0035-2007: 1
- BSI-PP-0035-2007“: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 8
- EAL4 augmented: 2
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL5: 19
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.2: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- APE:
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 4
- AGD_PRE: 1
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 7
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 3
- ASE_TSS.2: 5
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.4: 3
- AVA_VAN.5: 6
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 11
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM.1: 26
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 22
- FCS_CKM.4.1: 1
- FCS_COP: 36
- FCS_COP.1: 7
- FCS_RND: 7
- FCS_RND.1: 11
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 20
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC: 1
- FDP_ITC.1: 10
- FDP_ITC.2: 10
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 7
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 6
- FIA_API.1: 10
- FIA_API.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 8
- FIA_UAU.4.1: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 21
- FMT_LIM.1.1: 2
- FMT_LIM.2: 18
- FMT_LIM.2.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 46
- FMT_MTD.1: 11
- FMT_MTD.3: 4
- FMT_MTD.3.1: 1
- FMT_SMF.1: 34
- FMT_SMF.1.1: 1
- FMT_SMR.1: 38
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
- FAU:
- FAU_ARP.1: 29
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_SAA.1: 2
- FAU_SAS: 13
- FAU_SAS.1: 5
- FAU_SAS.1.1: 1
- FCO:
- FCS:
- FCS_CKM.1: 47
- FCS_CKM.1.1: 1
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.3: 8
- FCS_CKM.3.1: 1
- FCS_CKM.4: 42
- FCS_CKM.4.1: 1
- FCS_COP: 33
- FCS_COP.1: 26
- FCS_RNG: 13
- FCS_RNG.1: 20
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 72
- FDP_ACC.1: 19
- FDP_ACC.2: 9
- FDP_ACF: 65
- FDP_ACF.1: 39
- FDP_IFC: 26
- FDP_IFC.1: 17
- FDP_IFC.2: 2
- FDP_IFF: 19
- FDP_IFF.1: 13
- FDP_ITC: 10
- FDP_ITC.1: 17
- FDP_ITC.2: 22
- FDP_RIP: 91
- FDP_RIP.1: 10
- FDP_ROL: 11
- FDP_ROL.1: 5
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 12
- FIA_AFL.1: 2
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_UAU.1: 3
- FIA_UID: 18
- FIA_UID.1: 11
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 146
- FMT_MSA.1: 16
- FMT_MSA.2: 3
- FMT_MSA.3: 27
- FMT_MTD: 18
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_REV: 1
- FMT_SMF: 42
- FMT_SMF.1: 24
- FMT_SMF.1.1: 1
- FMT_SMR: 35
- FMT_SMR.1: 34
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 9
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 40
- FPT_FLS.1: 25
- FPT_FLS.1.1: 1
- FPT_ITC.1: 1
- FPT_PHP: 6
- FPT_PHP.3: 3
- FPT_RCV: 10
- FPT_RCV.3: 4
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FTP:
- FTP_ITC: 18
- FTP_ITC.1: 6
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.BAC-PP: 2
- OE.BAC_PP: 1
- OE.MRTD_: 2
|
- A:
- A.APPLET: 4
- A.NATIVE: 1
- A.PPROCESS-SEC-IC: 1
- A.PROCESS-SEC-IC: 1
- A.PROCESS_SEC_IC: 2
- A.USE_DIAG: 6
- A.USE_KEY: 1
- A.USE_KEYS: 5
- A.VERIFICATION: 3
- D:
- D.ADMIN_CONF_DATA: 3
- D.API_DATA: 3
- D.APP_CODE: 10
- D.APP_C_DATA: 3
- D.APP_I_DATA: 8
- D.APP_KEY: 1
- D.CRYPTO: 7
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PERSO_CONF_DATA: 4
- D.PIN: 12
- D.SEC_DATA: 7
- O:
- O.APPLET: 18
- O.CIPHER: 1
- O.CODE_: 1
- O.CODE_PKG: 13
- O.EXT-MEM: 1
- O.EXT_MEM_IN: 2
- O.EXT_MEM_INSTANCE: 8
- O.JAVAOBJECT: 36
- O.NON_SB_CONTENT: 1
- O.NON_SB_SFR: 4
- O.REMOTE_MTHD: 4
- O.REMOTE_OBJ: 4
- O.RMI_SERVICE: 5
- O.ROR: 2
- O.SB_CONTENT: 3
- O.SB_SFR: 5
- O.SCP: 1
- OE:
- OE.APPLET: 7
- OE.CARD-MANAGEMENT: 1
- OE.NATIVE: 1
- OE.PROCESS_SEC_IC: 6
- OE.SCP: 2
- OE.USE_DIAG: 9
- OE.USE_KEYS: 7
- OE.VERIFICATION: 20
- OE.XYZ: 1
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.CREATE_EXT_MEM_INSTANCE: 3
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 2
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 6
- OP.INVK_VIRTUAL: 5
- OP.INVOKE: 3
- OP.JAVA: 5
- OP.PUT: 6
- OP.READ_EXT_MEM: 3
- OP.RET_RORD: 2
- OP.SB_ACCESS: 3
- OP.SB_ACCESS_SFR: 3
- OP.THROW: 4
- OP.TYPE_ACCESS: 4
- OP.WRITE_EXT_MEM: 3
- OSP:
- OSP.PROCESS-TOE: 5
- OSP.VERIFICATION: 3
- OT:
- OT.ALARM: 15
- OT.CARD-: 2
- OT.CARD-MANAGEMENT: 17
- OT.CIPHER: 11
- OT.DELETION: 7
- OT.EXT-MEM: 14
- OT.FIREWALL: 18
- OT.GLOBAL_ARRAYS_CONFID: 9
- OT.GLOBAL_ARRAYS_INTEG: 10
- OT.IDENTIFICATION: 9
- OT.INSTALL: 10
- OT.KEY-: 1
- OT.KEY-MNGT: 9
- OT.LOAD: 9
- OT.MF_FW: 8
- OT.NATIVE: 9
- OT.OBJ-DELETION: 8
- OT.OPERATE: 21
- OT.PIN-MNGT: 11
- OT.REALLOCATION: 9
- OT.REMOTE: 8
- OT.RESOURCES: 10
- OT.RND: 13
- OT.SCP: 40
- OT.SEC_BOX_FW: 10
- OT.SID: 13
- OT.TRANSACTION: 9
- OT.VERIFICATION: 1
- OT.XYZ: 1
- R:
- T:
- T.CONFID-APPLI-DATA: 5
- T.CONFID-JCS-CODE: 5
- T.CONFID-JCS-DATA: 5
- T.DELETION: 4
- T.EXE-CODE: 8
- T.EXE-CODE-REMOTE: 4
- T.INSTALL: 4
- T.INTEG-APPLI-: 2
- T.INTEG-APPLI-CODE: 8
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 5
- T.INTEG-JCS-DATA: 5
- T.NATIVE: 5
- T.OBJ-DELETION: 4
- T.OS_OPERATE: 7
- T.PHYSICAL: 4
- T.RESOURCES: 4
- T.RND: 7
- T.SEC_BOX_BORDER: 7
- T.SID: 8
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 23
- NXP Semiconductors: 18
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDEA: 1
- TDES: 2
- Triple-DES: 7
- TripleDES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-224: 8
- SHA-256: 14
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- Physical Tampering: 7
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 5
- SCA:
- DPA: 3
- SPA: 2
- physical probing: 3
- timing attacks: 1
- other:
|
- FI:
- DFA: 7
- Fault Injection: 1
- Physical tampering: 3
- fault injection: 1
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 10
- SPA: 2
- physical probing: 3
- side channel: 17
- side-channel: 1
- side-channels: 2
- timing attack: 1
- timing attacks: 6
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 10
- EF.DG1: 20
- EF.DG13: 2
- EF.DG14: 7
- EF.DG16: 17
- EF.DG2: 7
- EF.DG3: 20
- EF.DG4: 18
- EF.DG5: 5
- EF.SOD: 10
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-2: 1
- FIPS 180-411: 1
- ICAO:
- PKCS:
|
- BSI:
- CC:
- FIPS:
- FIPS 180-3: 6
- FIPS 186-3: 5
- FIPS 197: 2
- FIPS PUB 180-3: 1
- FIPS PUB 186-2: 1
- FIPS PUB 186-3: 1
- FIPS PUB 81: 1
- ICAO:
- ISO:
- ISO/IEC 11770: 2
- ISO/IEC 15946-1: 1
- ISO/IEC 9796-: 1
- NIST:
- PKCS:
- PKCS #1: 1
- PKCS#1: 2
- PKCS#3: 2
- PKCS1: 1
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.2.1: 1
- GlobalPlatform 2.2.1: 2
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.applet: 1
- javacard.security: 4
- javacardx:
- javacardx.crypto: 2
- javacardx.rmi: 1
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Groups marked with ‘IT’ are considered in the TOE IT environment, and groups marked with ‘—‘ are out of scope of this evaluation. Table 8. TOE Groups Overview Group Description Scope Core (CoreG) The CoreG: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OT.SCP.RECOVERY and OT.SCP.SUPPORT are: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: Marcos Kordyas Dossa
- /CreationDate: D:20161212160233-02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20161212160233-02'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 1330959
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 71
|
- /Author: NXP Semiconductors
- /CreationDate: D:20140814171823+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: JCOP, Security Target Lite, EAL5+
- /ModDate: D:20140814173505+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: NXP J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64 Secure Smart Card Controller Revision 3
- /Title: Security Target Lite
- pdf_file_size_bytes: 1527330
- pdf_hyperlinks: http://www.nxp.com/, mailto:[email protected]
- pdf_is_encrypted: True
- pdf_number_of_pages: 137
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |