Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Oracle Linux 9.3
653-EWA
ChipDoc v2 on JCOP 3 P60 in ICAO BAC configuration
ANSSI-CC-2020/46
name Oracle Linux 9.3 ChipDoc v2 on JCOP 3 P60 in ICAO BAC configuration
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA FR
not_valid_after 14.02.2030 22.07.2025
not_valid_before 14.02.2025 22.07.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/653-EWA%20CT%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-ANSSI-CC-2020_46.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/653-EWA%20CR%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_46fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/653-EWA%20ST%20v1.5.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible-anssi-cc-2020_46.pdf
manufacturer Oracle Corporation NXP Semiconductors
manufacturer_web https://www.oracle.com https://www.nxp.com/
security_level {} ADV_TDS.4, ALC_CMS.5, ATE_DPT.3, ADV_INT.2, ADV_FSP.5, EAL4+, ALC_DVS.2, ALC_TAT.2
dgst be8e046b00e33ce3 cf8b19c24e129808
heuristics/cert_id 653-EWA ANSSI-CC-2020/46
heuristics/cert_lab [] THALES
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 9.3 3
heuristics/report_references/directly_referencing {} ANSSI-CC-2017/62, BSI-DSZ-CC-1059-V3-2019
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-2018, ANSSI-CC-2017/62, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1059-V2-2019
heuristics/scheme_data
  • certification_date: 14.02.2025
  • level: PP_OS_V4.3, PKG_TLS_V1.1, PKG_SSH_V1.0
  • product: Oracle Linux 9.3
  • vendor: Oracle Corporation
heuristics/protection_profiles c40ae795865a0dba, ed9c9d74c3710878, 3d6ad6fde534f6c6 60455fc9564e2545
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf
pdf_data/cert_filename 653-EWA CT v1.0.pdf certificat-ANSSI-CC-2020_46.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 653-EWA: 1
  • FR:
    • ANSSI-CC-2020/46: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_DVS.2: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_DPT.3: 1
pdf_data/cert_keywords/vendor
  • NXP:
    • NXP Semiconductors: 2
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_keywords/os_name
  • JCOP:
    • JCOP 3: 1
pdf_data/cert_keywords/standard_id
  • ICAO:
    • ICAO: 2
pdf_data/cert_metadata
  • /Author: Clark, Cory P.
  • /CreationDate: D:20250218135452-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: 03c3dcc6-6bfd-4194-a625-fb83b8d0389e
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2023-05-16T11:46:20Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250218135452-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 185393
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20200724172549+02'00'
  • /ModDate: D:20200724172549+02'00'
  • pdf_file_size_bytes: 692543
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 653-EWA CR v1.0.pdf anssi-cc-2020_46fr.pdf
pdf_data/report_frontpage
  • FR:
  • CA:
  • FR:
    • cc_security_level: EAL 4 augmenté ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2020/46
    • cert_item: ChipDoc v2 on JCOP 3 P60 in ICAO BAC configuration
    • cert_item_version: Version v7b4_2
    • cert_lab: THALES / CNES 290 allée du Lac, 31670 Labège, France
    • developer: NXP Semiconductors Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire NXP Semiconductors Troplowitzstrasse 20, 22529 Hamburg, Allemagne
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Machine Readable Travel Document with « ICAO Application », Basic Access Control, Version 1.10 certifié BSI-CC-PP-0055-2009 le 25 décembre 2009
  • CA:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1059-V3-2019: 1
  • FR:
    • ANSSI-CC-2017/62: 2
    • ANSSI-CC-2020/46: 16
    • ANSSI-PP-2010-03-M1: 1
  • NL:
    • NSCIB-CC-67206-CR3: 1
    • NSCIB-CC-98209-CR4: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055-2009: 1
    • BSI-PP-0055-2009: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 1
    • EAL 5: 1
    • EAL 7: 1
    • EAL2: 2
    • EAL4: 1
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_FSP.5: 2
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_INT.2: 2
    • ADV_SPM: 1
    • ADV_TDS: 1
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 2
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_TAT: 1
    • ALC_TAT.2: 2
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_DPT.3: 2
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.3: 2
    • AVA_VAN.5: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 11
    • NXP Semiconductors: 3
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Serma:
    • SERMA: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 3: 26
    • JCOP3: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ICAO:
    • ICAO: 28
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. The user of the OS is not willfully negligent or hostile, and uses the software in: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: Clark, Cory P.
  • /CreationDate: D:20250218133709-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: f4235719-a1a3-4fb4-8b18-a47ac84bac11
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2022-07-20T10:41:47Z
  • /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
  • /ModDate: D:20250218133709-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 336111
  • pdf_hyperlinks: https://www.cisa.gov/known-exploited-vulnerabilities-catalog, mailto:contact@cyber.gc.ca, https://linux.oracle.com/security/, https://nvd.nist.gov/vuln/search
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename 653-EWA ST v1.5.pdf cible-anssi-cc-2020_46.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1059: 1
  • NL:
    • NSCIB-CC-67206-CR4: 1
    • NSCIB-CC-98209-CR4: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055-2009: 1
    • BSI-CC-PP0055: 1
    • BSI-CC-PP0056-V2-2012: 1
    • BSI-PP-0035-2007: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 3
    • EAL 4+: 2
    • EAL4: 7
    • EAL4 augmented: 1
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
    • ALC_TSU_EXT.1: 8
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.5: 11
    • ADV_IMP.1: 7
    • ADV_INT.2: 6
    • ADV_TDS.4: 15
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 5
    • ALC_DEL.1: 2
    • ALC_DVS.2: 8
    • ALC_LCD.1: 3
    • ALC_TAT.1: 1
    • ALC_TAT.2: 8
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 2
    • ASE_ECD: 3
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 4
    • ASE_OBJ: 2
    • ASE_OBJ.2: 3
    • ASE_REQ: 2
    • ASE_REQ.2: 4
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.3: 5
    • ATE_FUN.1: 5
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 1
  • FCS:
    • FCS_CKM.1: 4
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 9
    • FCS_CKM_EXT.4.1: 3
    • FCS_CKM_EXT.4.2: 2
    • FCS_COP: 27
    • FCS_COP.1: 4
    • FCS_DTLS_EXT.1: 1
    • FCS_RBG_EXT.1: 8
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SSHC_EXT.1: 10
    • FCS_SSHC_EXT.1.1: 2
    • FCS_SSHS_EXT.1: 8
    • FCS_SSHS_EXT.1.1: 2
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSH_EXT.1: 10
    • FCS_SSH_EXT.1.1: 2
    • FCS_SSH_EXT.1.2: 4
    • FCS_SSH_EXT.1.3: 3
    • FCS_SSH_EXT.1.4: 3
    • FCS_SSH_EXT.1.5: 3
    • FCS_SSH_EXT.1.6: 3
    • FCS_SSH_EXT.1.7: 3
    • FCS_SSH_EXT.1.8: 3
    • FCS_STO_EXT.1: 10
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 11
    • FCS_TLSC_EXT.1.1: 3
    • FCS_TLSC_EXT.1.2: 3
    • FCS_TLSC_EXT.1.3: 3
    • FCS_TLSC_EXT.5: 7
    • FCS_TLSC_EXT.5.1: 3
    • FCS_TLSS_EXT: 5
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLS_EXT.1: 3
  • FDP:
    • FDP_ACF_EXT.1: 8
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT.1: 7
    • FDP_IFC_EXT.1.1: 2
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 7
    • FMT_MOF_EXT.1.1: 2
    • FMT_SMF_EXT.1: 7
    • FMT_SMF_EXT.1.1: 4
  • FPT:
    • FPT_ACF_EXT.1: 7
    • FPT_ACF_EXT.1.1: 2
    • FPT_ACF_EXT.1.2: 2
    • FPT_ASLR_EXT.1: 7
    • FPT_ASLR_EXT.1.1: 2
    • FPT_SBOP_EXT.1: 7
    • FPT_SBOP_EXT.1.1: 2
    • FPT_TST_EXT.1: 8
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT.1: 8
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.2: 7
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
  • FTP:
    • FTP_ITC_EXT.1: 7
    • FTP_ITC_EXT.1.1: 2
    • FTP_TRP: 1
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 7
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 12
    • FCS_CKM.1: 15
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP: 40
    • FCS_COP.1: 8
    • FCS_RND: 8
    • FCS_RND.1: 15
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_ITC: 2
    • FDP_UCT.1: 11
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 10
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 8
    • FIA_API.1: 12
    • FIA_API.1.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 15
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 3
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 7
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 8
    • FMT_LIM.1: 18
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 17
    • FMT_LIM.2.1: 4
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD: 19
    • FMT_MTD.1: 7
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 1
    • FTP_TRP.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PLATFORM: 3
    • A.PROPER_ADMIN: 3
    • A.PROPER_USER: 3
  • O:
    • O.ACCOUNTABILITY: 3
    • O.INTEGRITY: 5
    • O.MANAGEMENT: 5
    • O.PROTECTED_COMMS: 5
    • O.PROTECTED_STORAGE: 3
  • OE:
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 2
    • T.LOCAL_ATTACK: 2
    • T.NETWORK_ATTACK: 6
    • T.NETWORK_EAVESDROP: 4
  • OE:
    • OE.MRTD_: 1
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 90
    • NXP Semiconductors: 19
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
      • AES-: 1
  • constructions:
    • MAC:
      • HMAC: 8
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • TDES: 13
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 10
      • SHA-384: 8
      • SHA-512: 9
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSH: 73
    • SSHv2: 1
  • TLS:
    • DTLS:
      • DTLS: 2
    • TLS:
      • TLS: 50
      • TLS 1.1: 1
      • TLS 1.2: 3
      • TLS v1.2: 5
  • VPN:
    • VPN: 11
  • PACE:
    • PACE: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 6
  • RNG:
    • RBG: 5
  • RNG:
    • RND: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 4
  • GCM:
    • GCM: 4
  • CBC:
    • CBC: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-384: 14
    • P-521: 10
    • secp384r1: 4
    • secp521r1: 4
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 16
  • Generic:
    • Crypto Library ................8: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 7
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • SPA: 1
    • physical probing: 4
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 3: 86
    • JCOP3: 2
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 7
    • EF.DG1: 26
    • EF.DG13: 3
    • EF.DG14: 2
    • EF.DG15: 4
    • EF.DG16: 26
    • EF.DG2: 10
    • EF.DG3: 9
    • EF.DG4: 8
    • EF.DG5: 9
    • EF.SOD: 7
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 186-5: 12
  • NIST:
    • NIST SP 800-38A: 9
    • NIST SP 800-38D: 3
    • NIST SP 800-57: 4
    • SP 800-186: 1
  • RFC:
    • RFC 3526: 1
    • RFC 4251: 4
    • RFC 4252: 8
    • RFC 4253: 13
    • RFC 4256: 1
    • RFC 4344: 5
    • RFC 5246: 9
    • RFC 5280: 5
    • RFC 5288: 7
    • RFC 5289: 14
    • RFC 5647: 6
    • RFC 5656: 40
    • RFC 5759: 1
    • RFC 6066: 1
    • RFC 6125: 3
    • RFC 6187: 12
    • RFC 6668: 8
    • RFC 6960: 1
    • RFC 6961: 1
    • RFC 8268: 5
    • RFC 8332: 24
    • RFC 8603: 2
    • RFC 8709: 6
    • RFC 8731: 2
  • X509:
    • X.509: 16
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 46-3: 2
    • FIPS PUB 180-2: 1
    • FIPS PUB 46-3: 1
  • ICAO:
    • ICAO: 101
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 7816: 2
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9796-2: 2
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC3369: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: David Herrgesell
  • /CreationDate: D:20200401155251+02'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20200401155251+02'00'
  • /Producer: Microsoft® Word for Office 365
  • /Title:
  • pdf_file_size_bytes: 1142241
  • pdf_hyperlinks: mailto:salesaddresses@nxp.com, http://www.nxp.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different