Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8
JISEC-CC-CRP-C0475
NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B, P5CC080V0B and P5CC073V0B each with specific IC Dedicated Software
BSI-DSZ-CC-0680-2010
name Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8 NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B, P5CC080V0B and P5CC073V0B each with specific IC Dedicated Software
category Databases ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 01.07.2020 01.09.2019
not_valid_before 16.06.2015 03.11.2010
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0680a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0680b_pdf.pdf
manufacturer Microsoft Corporation NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.microsoft.com https://www.nxp.com
security_level EAL2+, ALC_FLR.2 EAL5+, AVA_MSU.3, ALC_DVS.2, AVA_VLA.4
dgst c225189611bed8f2 1b79939ffeb81bc2
heuristics/cert_id JISEC-CC-CRP-C0475 BSI-DSZ-CC-0680-2010
heuristics/cert_lab [] BSI
heuristics/extracted_sars ALC_CMS.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 ADV_HLD.3, ALC_LCD.2, ATE_COV.2, AVA_VLA.4, ATE_DPT.2, ADV_SPM.3, AVA_SOF.1, AGD_USR.1, ATE_IND.2, ADV_LLD.1, ALC_DVS.2, ADV_FSP.3, ADV_IMP.2, AVA_CCA.1, ADV_INT.1, ALC_TAT.2, ADV_RCR.2, AVA_MSU.3
heuristics/extracted_versions 12.0.2000.8 -
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2011/21, BSI-DSZ-CC-0700-2011
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0410-2007
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2012/46, ANSSI-CC-2011/21, BSI-DSZ-CC-0700-2011, BSI-DSZ-CC-0700-V2-2013
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0410-2007
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0475
  • certification_date: 01.06.2015
  • claim: EAL2+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0475_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2014. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functionality This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE. - The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users. - The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
    • evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
    • product: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)
    • product_type: Database Management System (DBMS)
    • protection_profile: U.S. Government Protection Profile for Database Management Systems, Version 1.3
    • report_link: https://www.ipa.go.jp/en/security/c0475_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0475_est.pdf
    • toe_version: 12.0.2000.8
    • vendor: Microsoft Corporation
  • expiration_date: 01.07.2020
  • supplier: Microsoft Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0475_it3480.html
  • toe_overseas_name: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8
heuristics/st_references/directly_referenced_by {} ANSSI-CC-2011/21, BSI-DSZ-CC-0797-2012
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0410-2007
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2011/21, BSI-DSZ-CC-0797-2012
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0410-2007
heuristics/protection_profiles 61018742063aaca9 62c62b4b4210800e
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_dbms_v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ssvgpp01.pdf
pdf_data/report_filename c0475_erpt.pdf 0680a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0680-2010
    • cert_item: NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B, P5CC080V0B and P5CC073V0B each with specific IC Dedicated Software
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0475-01: 1
    • Certification No. C0475: 1
  • DE:
    • BSI-DSZ-CC-0410-: 1
    • BSI-DSZ-CC-0410-2007: 2
    • BSI-DSZ-CC-0680: 1
    • BSI-DSZ-CC-0680-2010: 20
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
    • EAL2+: 2
  • EAL:
    • EAL 4: 5
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL1: 6
    • EAL2: 3
    • EAL3: 4
    • EAL4: 8
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.3: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.3: 1
    • ADV_HLD: 2
    • ADV_HLD.3: 1
    • ADV_IMP: 2
    • ADV_IMP.2: 1
    • ADV_INT: 2
    • ADV_INT.1: 1
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_RCR.2: 1
    • ADV_SPM: 2
    • ADV_SPM.3: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.2: 2
    • ALC_TAT: 2
    • ALC_TAT.2: 2
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_DPT.2: 1
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_CCA.1: 1
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_EVIL: 1
    • A.NO_GENERAL_: 1
    • A.PHYSICAL: 1
  • T:
    • T.ACCIDENTIAL_ADMIN_ERROR: 1
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_: 1
    • T.UNIDENTIFIED_: 1
  • O:
    • O.C: 4
  • R:
    • R.O: 4
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 20
    • Microsoft Corporation: 7
  • NXP:
    • NXP: 17
    • NXP Semiconductors: 18
  • Philips:
    • Philips: 2
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDEA: 1
      • Triple-DES: 6
    • DES:
      • DEA: 1
      • DES: 4
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 3
    • AIS 31: 4
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 3
    • AIS 36: 3
    • AIS 38: 1
  • FIPS:
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 8-bit Smart Card Controller, BSIDSZ-CC-0680, T-Systems GEI GmbH, Version 1.36, 29 October 2010 (confidential document) [11] Guidance, Delivery and Operation Manual for the P5Cx012/02x/040/073/080/144 family, NXP: 1
    • Card Controllers, NXP Semiconductors, Business Line Identification, Version 1.9, 14 July 2010 (confidential document) [7] Security Target Lite, Evaluation of the P5CD080V0B, P5CC080V0B, P5CN080V0B and P5CC073V0B: 1
    • Objective Data Sheet, NXP Semiconductors, Revision 3.7, Document Number: 126537, 04 June 2010 (confidential document) [13] FIPS PUB 46-3 Federal Information Processing Publication Data Standard (DES) Reaffirmed 25: 1
    • Report BSI-DSZ-CC-0680 NXP P5CD080V0B Secure Smart Card Controller, Version 1.39, 29 October 2010, (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German: 1
    • Version 1.8, Document Number: 129918, February 15th, 2010 (confidential document) 8 specifically • AIS 20, Version 1, 2 December 1999, Funktionalitätsklassen und: 1
pdf_data/report_metadata
  • /CreationDate: D:20150724094408+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20150724094442+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 233021
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 31
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20101118075754+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Semiconductors Germany GmbH, NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B, P5CC080V0B and P5CC073V0B each with specific IC Dedicated Software"
  • /ModDate: D:20101118165949+01'00'
  • /Producer: OpenOffice.org 3.1
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0680-2010
  • pdf_file_size_bytes: 955931
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename c0475_est.pdf 0680b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0410-2007: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
    • EAL2: 2
    • EAL2 augmented: 2
    • EAL2+: 51
  • EAL:
    • EAL 5: 4
    • EAL 5 augmented: 2
    • EAL4: 4
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL5: 34
    • EAL5 augmented: 1
    • EAL5+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 1
  • AGD:
    • AGD_ADD: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 4
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 5
    • ACM_SCP.2: 3
    • ACM_SCP.3: 5
  • ADO:
    • ADO_DEL: 3
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 6
    • ADV_FSP.2: 3
    • ADV_FSP.3: 6
    • ADV_HLD: 1
    • ADV_HLD.3: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_LLD: 1
    • ADV_LLD.1: 1
    • ADV_RCR: 5
    • ADV_SPM: 1
    • ADV_SPM.3: 1
  • AGD:
    • AGD_ADM: 4
    • AGD_USR: 3
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 1
    • ALC_LCD: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA.1: 1
    • AVA_MSU: 2
    • AVA_MSU.3: 1
    • AVA_SOF.1: 2
    • AVA_VLA.4: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 10
    • FAU_GEN.1: 3
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SEL: 8
    • FAU_SEL.1: 2
    • FAU_STG: 3
    • FAU_STG.1: 2
    • FAU_STG.3: 1
    • FAU_STG.4: 1
    • FAU_STG_EXP: 2
    • FAU_STG_EXP.5: 15
    • FAU_STG_EXP.5.1: 2
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF: 8
    • FDP_ACF.1: 6
    • FDP_IFC.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 16
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTA:
    • FTA_MCS.1: 6
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TAH.1: 8
    • FTA_TAH.1.1: 1
    • FTA_TAH.1.2: 1
    • FTA_TAH.1.3: 1
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 4
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 22
    • FCS_COP.1.1: 2
    • FCS_RND.1: 2
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 27
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 26
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 9
    • FDP_ITC: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 5
    • FDP_ITT.1: 6
    • FDP_SDI.1: 1
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 3
    • FMT_MSA: 1
    • FMT_MSA.1: 26
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 3
    • FMT_MSA.3: 20
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 8
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 6
    • FPT_ITT.1: 5
    • FPT_PHP.3: 7
    • FPT_SEP.1: 15
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FRU:
    • FRU_FLT: 2
    • FRU_FLT.2: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_EVIL: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 3
  • O:
    • O.ACCESS_HISTORY: 5
    • O.ADMIN_GUIDANCE: 1
    • O.ADMIN_ROLE: 4
    • O.AUDIT_: 1
    • O.AUDIT_GENERATION: 4
    • O.CONFIGURATION_IDENTIFICATION: 1
    • O.DOCUMENTED_DESIGN: 1
    • O.INTERNAL_TOE_DOMAINS: 1
    • O.MANAGE: 6
    • O.MEDIATE: 5
    • O.PARTIAL_FUNCTIONAL_TEST: 1
    • O.PARTIAL_SELF_PROTECTION: 1
    • O.RESIDUAL_INFORM: 1
    • O.RESIDUAL_INFORMAT: 2
    • O.RESIDUAL_INFORMATION: 3
    • O.TOE_ACCESS: 7
    • O.VULNERABILITY_ANALYSIS: 1
  • OE:
    • OE.NO_EVIL: 4
    • OE.NO_GENERAL_: 2
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 4
  • T:
    • T.ACCIDENTIAL_ADMIN_ERROR: 1
    • T.MASQUERADE: 3
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 3
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNIDENTIFIED_ACTIONS: 3
  • O:
    • O.CONFI: 1
    • O.CONFIG: 5
    • O.H: 2
    • O.HW: 1
    • O.HW_AE: 1
    • O.HW_AES: 2
    • O.M: 1
    • O.MEM_ACCES: 1
    • O.MEM_ACCESS: 6
    • O.MF_FW: 7
    • O.P: 1
    • O.RND: 3
    • O.SFR: 1
    • O.SFR_ACCE: 1
    • O.SFR_ACCESS: 6
  • T:
    • T.RND: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 11
    • Microsoft Corporation: 2
  • NXP:
    • NXP: 93
    • NXP Semiconductors: 21
  • Philips:
    • Philips: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 38
  • DES:
    • 3DES:
      • TDEA: 3
      • Triple-DEA: 1
      • Triple-DES: 9
    • DES:
      • DEA: 1
      • DES: 26
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
    • RNG: 9
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CCM:
    • CCM: 2
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 7
    • fault injection: 4
    • malfunction: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 9
    • Physical Probing: 1
    • physical probing: 1
    • timing attacks: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 3
  • CC:
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-004: 1
  • FIPS:
    • FIPS PUB 19: 1
    • FIPS PUB 197: 2
    • FIPS PUB 46: 1
    • FIPS PUB 46-3: 2
pdf_data/st_metadata
  • /Author: NXP Semiconductors
  • /Company: NXP Semiconductors Germany GmbH
  • /CreationDate: D:20100715161041+02'00'
  • /Creator: Acrobat PDFMaker 8.1 for Word
  • /Keywords: Security Target Lite; SmartMX; P5CD080V0B; P5CN080V0B; P5CC080V0B; P5CC073V0B; NXP; EAL5+; AVA_VLA.4; BSI-DSZ-CC-0410-2007; AES; DES
  • /ModDate: D:20100715161141+02'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20100715124805
  • /Subject: Common Criteria Evaluation of SmatMX Crypto Controller
  • /Title: Security Target Lite - P5CD080V0B/ P5CN080V0B/ P5CC080V0B/ P5CC073V0B
  • pdf_file_size_bytes: 658809
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 72
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different