name |
Juniper Networks M,T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8 and Juniper QFX and EX Switches Running Junos OS 13.2X50-D19 and 13.2X51-D20 |
NXP P5CC036V1D Secure Smart Card Controller with Cryptographic Library as IC Dedicated Support Software |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
DE |
status |
archived |
archived |
not_valid_after |
03.09.2019 |
01.09.2019 |
not_valid_before |
03.09.2014 |
03.06.2009 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-297%20cert%20original%20signed%20v1.0%20e.docx |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/juniper-network-v133r18-cert-eng_0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0584a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/juniper-network-v133r18-sec-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0584b.pdf |
manufacturer |
Juniper Networks, Inc. |
NXP Semiconductors |
manufacturer_web |
https://www.juniper.net/ |
https://www.nxp.com/ |
security_level |
{} |
AVA_MSU.3, ADV_IMP.2, EAL4+, ALC_DVS.2, AVA_VLA.4 |
dgst |
a1869cea6ad1a28c |
46df918e3aacc741 |
heuristics/cert_id |
383-4-297 |
BSI-DSZ-CC-0584-2009 |
heuristics/cert_lab |
CANADA |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ASE_ECD.1, AGD_PRE.1, ASE_INT.1, ASE_OBJ.1, ATE_IND.1, ASE_REQ.1, AVA_VAN.1, ASE_CCL.1, ALC_CMS.1, AGD_OPE.1, ALC_CMC.1 |
ATE_FUN.1, ATE_DPT.1, ADV_SPM.1, ALC_TAT.1, AVA_SOF.1, ADV_LLD.1, AGD_USR.1, ADV_HLD.2, ADV_FSP.3, AGD_ADM.1, ALC_LCD.1, ATE_IND.2, AVA_VLA.4, ADV_RCR.1, ADV_IMP.2, AVA_MSU.3, ALC_DVS.2, ATE_COV.2 |
heuristics/extracted_versions |
1.8, 13.2, 13.3 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0583-2009 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0583-2009, BSI-DSZ-CC-0293-2005 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
ac9abe3d5c5a31f0 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
{} |
pdf_data/cert_filename |
383-4-297 cert original signed v1.0 e.docx |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
juniper-network-v133r18-cert-eng_0.pdf |
0584a.pdf |
pdf_data/report_frontpage |
- DE:
- CA:
- cert_id: 383-4-297-CR
- cert_lab: CANADA
|
- DE:
- cert_id: BSI-DSZ-CC-0584-2009
- cert_item: NXP P5CC036V1D Secure Smart Card Controller with Cryptographic Library as IC Dedicated Support Software
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0296-2005: 3
- BSI-DSZ-CC-0583-2009: 1
- BSI-DSZ-CC-0584-2009: 21
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002-: 1
- BSI-PP-0002-2001: 5
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 9
- EAL 4 augmented: 3
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL4+: 5
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM_EXT.4: 1
- FCS_RBG_EXT.1: 1
- FCS_SSH_EXT.1: 1
- FIA:
- FIA_PMG_EXT.1: 1
- FIA_UAU_EXT.2: 1
- FIA_UIA_EXT.1: 1
- FPT:
- FPT_APW_EXT.1: 1
- FPT_SKP_EXT.1: 1
- FPT_TST_EXT.1: 1
- FPT_TUD_EXT.1: 1
- FTA:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
- NXP:
- NXP: 17
- NXP Semiconductors: 35
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- DES:
- 3DES:
- 3DES: 1
- TDES: 1
- Triple-DES: 4
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault induction: 1
- physical tampering: 1
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 1
- side channel: 4
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 180: 1
- FIPS 180-2: 1
- FIPS 186-2: 1
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS 198: 1
- ISO:
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 3
- AIS 38: 1
- AIS20: 1
- AIS31: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- BSI-DSZ-CC-0584-2009, Version 1.2, 08 January 2009, P5CC036V1D, NXP Semiconductors Germany GmbH (confidential document) [7] Evaluation Technical Report, V1.5, 20 March 2009, NXP P5CC036V1D Secure Smart Card Controller: 1
- Cryptographic Library, T-Systems GEI GmbH (confidential document) [8] Configuration list for the TOE, Version 2.0, 31 January 2009, Crypto Library on the P5CC036V1D: 1
- Version 1.2, 08 January 2009, P5CC036V1D/ P5CC009V1D, NXP Semiconductors Germany GmbH (confidential document) [30] Security Target Lite BSI-DSZ-0583-2009, Version 1.2, 08 January 2009, P5CC036V1D/ P5CC009V1D: 1
- confidential document) [9] Security Target Lite BSI-DSZ-CC-0584-2009, Version 2.2, 08 January 2009, Secured Crypto: 1
- for the Product Secured Crypto Library on the P5CC036V1D, 1.4, 23 January 2009, T-Systems GEI GmbH (confidential document) 8 Specifically • AIS 20, Version 1, 2 December 1999, Funktionalitätsklassen und: 1
|
pdf_data/report_metadata |
- /Author: krshann
- /CreationDate: D:20141001151624-04'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20141001151743-04'00'
- /Producer: Microsoft® Office Word 2007
- /Title: Juniper Networks M,T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8 and Juniper QFX and EX Switches Running Junos OS 13.2X50-D19 and 13.2X51-D20
- pdf_file_size_bytes: 267190
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20090610134908+02'00'
- /Creator: Writer
- /Keywords: "NXP P5CC036V1D Secure Smart Card Controller with Cryptographic Library as IC Dedicated Support Software, NXP Semiconductors Germany GmbH, Zertifizierung, Common Criteria"
- /ModDate: D:20090616113802+02'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0584-2009
- pdf_file_size_bytes: 746555
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
juniper-network-v133r18-sec-eng.pdf |
0584b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0002-2001: 9
- BSI-PP-0002-2001: 8
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 29
- EAL4 augmented: 2
- EAL4+: 20
- EAL5+: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 2
- ACM_CAP: 1
- ACM_CAP.4: 1
- ACM_SCP: 1
- ACM_SCP.2: 2
- ACM_SCP.3: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 2
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 2
- ADV_FSP.3: 1
- ADV_HLD.2: 2
- ADV_IMP.1: 1
- ADV_IMP.2: 5
- ADV_LLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 3
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 2
- AGD_USR: 1
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 5
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ASE:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_MSU.3: 5
- AVA_SOF.1: 3
- AVA_VLA.2: 1
- AVA_VLA.4: 8
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 5
- FAU_GEN.1: 8
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 1
- FAU_STG_EXT.1: 11
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 19
- FCS_CKM.1.1: 2
- FCS_CKM.2: 1
- FCS_CKM.4: 7
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 20
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 46
- FCS_COP.1.1: 4
- FCS_RBG_EXT.1: 15
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSH_EXT.1: 14
- FCS_SSH_EXT.1.1: 2
- FCS_SSH_EXT.1.2: 2
- FCS_SSH_EXT.1.3: 2
- FCS_SSH_EXT.1.4: 2
- FCS_SSH_EXT.1.5: 2
- FCS_SSH_EXT.1.6: 2
- FCS_SSH_EXT.1.7: 2
- FCS_TLS_EXT.1: 2
- FDP:
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT.1: 11
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 3
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 11
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 17
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 5
- FMT:
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 2
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 9
- FPT_APW_EXT.1.1: 4
- FPT_APW_EXT.1.2: 2
- FPT_SKP_EXT.1: 11
- FPT_SKP_EXT.1.1: 2
- FPT_SSP.1: 1
- FPT_SSP.2: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TRP.1: 1
- FPT_TST.1: 1
- FPT_TST_EXT.1: 11
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_EXT_SSL.1: 1
- FTA_SSL: 1
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 9
- FTA_SSL_EXT.1.1: 3
- FTA_SSL_EXT.4: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 36
- FCS_CKM.1.1: 1
- FCS_CKM.2: 14
- FCS_CKM.4: 14
- FCS_COP: 1
- FCS_COP.1: 65
- FCS_COP.1.1: 3
- FCS_RND: 6
- FCS_RND.1: 14
- FCS_RND.1.1: 1
- FCS_RND.2: 27
- FCS_RND.2.1: 2
- FDP:
- FDP_ACC.1: 26
- FDP_ACF.1: 18
- FDP_IFC.1: 30
- FDP_ITC.1: 15
- FDP_ITT: 1
- FDP_ITT.1: 34
- FDP_ITT.1.1: 1
- FDP_RIP: 2
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 3
- FMT_MSA.1: 21
- FMT_MSA.2: 17
- FMT_MSA.3: 18
- FMT_SMF.1: 6
- FMT_SMR.1: 8
- FPT:
- FPT_AMT: 1
- FPT_AMT.1: 4
- FPT_FLS.1: 23
- FPT_FLS.1.1: 1
- FPT_ITT: 1
- FPT_ITT.1: 37
- FPT_ITT.1.1: 1
- FPT_PHP.3: 7
- FPT_RND.1: 1
- FPT_RND.2: 1
- FPT_SEP.1: 6
- FPT_TST: 13
- FPT_TST.1: 13
- FPT_TST.2: 33
- FPT_TST.2.1: 2
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.DISPLAY_BANNER: 1
- O.PROTECTED_COMMUNICATIONS: 1
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- OE:
- OE.NO_GENERAL_PURPOSE: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.ADMIN_ERROR: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 1
- T.USER_DATA_REUSE: 1
|
- O:
- O.COPY: 8
- O.MEM_ACCESS: 7
- O.MF_FW: 4
- O.REUSE: 6
- O.RND: 15
- O.RSA: 7
- O.SFR_ACCESS: 7
- T:
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- NXP:
- NXP: 95
- NXP Semiconductors: 21
- Philips:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- DES:
- 3DES:
- 3DES: 17
- TDES: 1
- Triple-DES: 21
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 4
- SHA-256: 4
- SHA-512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
- KEX:
- Key Exchange: 2
- Key exchange: 1
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 2
- P-384: 2
- P-521: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 59
- Malfunction: 13
- fault induction: 1
- fault injection: 1
- malfunction: 2
- SCA:
- DPA: 13
- Leak-Inherent: 12
- Physical Probing: 2
- SPA: 28
- Timing attack: 1
- Timing attacks: 3
- side channel: 26
- timing attacks: 12
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS PUB 186-3: 3
- FIPS PUB 197: 1
- FIPS140: 1
- FIPS197: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- RFC:
- RFC 4251: 2
- RFC 4252: 1
- RFC 4253: 3
- RFC 4254: 1
- RFC 4741: 1
- RFC 6668: 1
- RFC4251: 1
- RFC4252: 1
- RFC4253: 3
- RFC4254: 1
- RFC5656: 3
- RFC6668: 2
|
- BSI:
- AIS20: 2
- AIS31: 3
- AIS32: 2
- CC:
- CCIMB-99-031: 2
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- FIPS:
- FIPS 180-1: 2
- FIPS PUB 180-1: 1
- FIPS PUB 46-3: 2
- FIPS PUB 81: 3
- ISO:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Line Card network interface components) which simply deal with physical interfaces mechanics are out of scope. Security Target Juniper Networks M, T, MX and PTX Routers and EX9200 Switches running Junos OS 13: 1
- SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT: 1
- including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible: 1
- out of scope: 2
|
|
pdf_data/st_metadata |
- /Author: Denise Cater
- /CreationDate: D:20140826155957-04'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20140908143633-04'00'
- /Producer: Microsoft® Word 2010
- /Subject: Junos OS 13.3R1.8, Junos OS 13.2X50-D19 and Junos OS 13.2X51-D20
- /Title: Security Target Juniper Networks M, T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8
- pdf_file_size_bytes: 1190383
- pdf_hyperlinks: http://www.juniper.net/
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
- /Alternative descriptive title: Security Target Lite
- /Author: Andreas Kühn
- /CertificationID: BSI-DSZ-CC-0584
- /Chip family: SmartMX
- /Chip type: P5CC036V1D
- /Company: NXP Semiconductors
- /Copyright date: 2009
- /CreationDate: D:20090513171156+02'00'
- /Creator: Acrobat PDFMaker 8.1 for Word
- /Descriptive title: Security Target Lite
- /Division: NXP Semiconductors
- /Keywords: Crypto Library, SmartMX, P5CC036, NXP, EAL4+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, DES, RSA, SHA
- /ModDate: D:20090513171220+02'00'
- /Modification date: 8 January 2009
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Revision: Rev. 2.2
- /Security status: PUBLIC
- /Specification status: Evaluation documentation
- /Status: Accepted
- /Subject: Common Criteria Evaluation of Crypto Library on SmartMX
- /TOE long: Secured Crypto Library on the P5CC036V1D
- /TOE short: Crypto Library on SmartMX
- /Template date: 1 October 2006
- /Template version: 2.8.1
- /Title: Security Target - Secured Crypto Library on the P5CC036V1D
- /docpath: I:\P5_CryptoLib\Doc\Evaluation
- /philips_smx_cl_docpath: I:\P5_CryptoLib\Doc\Evaluation
- /relBibilioPath: ..\Bibliography.doc
- /text_chip: P5CC036V1D
- /text_product_long: Secured Crypto Library on the P5CC036V1D
- /text_product_short: Crypto Library on SmartMX
- pdf_file_size_bytes: 507019
- pdf_hyperlinks:
|