name |
Philips Smart Card Controller P8WE5033V0F |
NXP J3A040 & J2A040 Secure Smart Card Controller Revision 3 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
DE |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
01.08.2002 |
25.05.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0177a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0730a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0177b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0730b_pdf.pdf |
manufacturer |
Philips Semiconductors GmbH Business Unit Identification |
NXP Semiconductors Germany GmbH Business Line Identification |
manufacturer_web |
https://www.philips.com/ |
https://www.nxp.com |
security_level |
ALC_DVS.2, EAL5+, AVA_VLA.4, AVA_MSU.3 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
d0f63024560100e0 |
749c19baf65c3e87 |
heuristics/cert_id |
BSI-DSZ-CC-0177-2002 |
BSI-DSZ-CC-0730-2011 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.2, ADV_IMP.2, AVA_CCA.1, ASE_REQ.1, ADV_HLD.3, AVA_MSU.3, ATE_COV.2, ADV_LLD.1, ADV_INT.1, ASE_DES.1, AVA_SOF.1, ATE_IND.2, ASE_TSS.1, ADV_FSP.3, ASE_INT.1, ADV_RCR.2, AGD_USR.1, ATE_DPT.2, ASE_ENV.1, ASE_OBJ.1, ASE_SRE.1, ADV_SPM.3, ASE_PPC.1, AGD_ADM.1, ALC_LCD.2, ATE_FUN.1, ALC_TAT.2, AVA_VLA.4 |
ALC_FLR.3, ADV_ARC.1, AGD_OPE.1, APE_CCL.1, ALC_DVS.2, ATE_DPT.3, ALC_CMS.5, ASE_OBJ.2, APE_OBJ.2, ASE_REQ.2, ALC_DEL.1, ADV_FSP.5, APE_INT.1, AVA_MSU.3, ATE_COV.2, ASE_SPD.1, AVA_VAN.5, ATE_IND.2, ASE_TSS.1, ADV_INT.2, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ADV_SPM.1, APE_REQ.2, APE_ECD.1, ASE_CCL.1, ASE_ECD.1, ADV_TDS.4, ALC_CMC.4, ATE_FUN.1, ADV_IMP.1, ALC_TAT.2, AVA_VLA.4, APE_SPD.1 |
heuristics/extracted_versions |
- |
3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0797-2012 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0404-2007 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0797-2012 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0439-2008, BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0609-2010 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0797-2012 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0404-2007 |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0797-2012 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0404-2007 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0177a.pdf |
0730a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0177-2002
- cert_item: Philips Smart Card Controller P8WE5033V0F
- cert_lab: BSI
- developer: Philips Semiconductors GmbH Business Unit Identification
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
- DE:
- cert_id: BSI-DSZ-CC-0730-2011
- cert_item: NXP J3A040 & J2A040 Secure Smart Card Controller Revision 3
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0177: 3
- BSI-DSZ-CC-0177-2002: 21
|
- DE:
- BSI-DSZ-CC-0404-2007: 2
- BSI-DSZ-CC-0674-2011: 2
- BSI-DSZ-CC-0710-2010: 5
- BSI-DSZ-CC-0730-2011: 24
- NL:
- CC-0404-2007: 1
- CC-0674-2011: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0002-2001: 2
- BSI-PP-0002-: 1
- BSI-PP-0002-2001: 7
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL5: 9
- EAL5 augmented: 2
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 4: 2
- EAL 5: 7
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 8
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 2
- ACM_CAP: 2
- ACM_CAP.4: 2
- ACM_SCP: 2
- ACM_SCP.3: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 2
- ADV_FSP.3: 1
- ADV_HLD: 2
- ADV_HLD.3: 1
- ADV_IMP: 2
- ADV_IMP.2: 1
- ADV_INT: 2
- ADV_INT.1: 1
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.2: 1
- ADV_SPM: 2
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 4
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 2
- ALC_TAT: 2
- ALC_TAT.2: 2
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.2: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.3: 3
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 4
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 3
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 3
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 4
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_COP.1: 2
- FCS_RND.1: 1
- FDP:
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_SEP.1: 1
- FRU:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 21
- NXP Semiconductors: 20
|
pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- SCA:
- DPA: 3
- Timing Attacks: 1
- physical probing: 1
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 36: 4
- FIPS:
- FIPS PUB 46: 1
- FIPS PUB 46-3: 3
- ISO:
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 3
- AIS 36: 3
- AIS 38: 1
- AIS36: 1
- FIPS:
- FIPS 180-1: 3
- FIPS 197: 1
- FIPS 46-3: 2
- PKCS:
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 2002, Evaluation of Philips P8WE5033V0F Secure 8-bit Smart Card Controller, Philips Semiconductors (confidential document) Certification Report BSI-DSZ-CC-0177-2002 B-18 This page is intentionally left blank: 1
- 2002, Evaluation of Philips P8WE5033V0F Secure 8-bit Smart Card Controller, Philips Semiconductors (confidential document) [6] Security Target Lite BSI-DSZ-CC-0177, Version 1.6, August 19th , 2002, Evaluation of Philips: 1
- Manual of Philips P8WE5033V0F Secure 8-bit Smart Card Controller, Version 1.2, 25. April 2002 (confidential document) [11] Data Sheet, P8WE5033 Secure 8-bit Smart Card Controller, Product Specification, Philips: 1
- Revision 3.2, July 05th 2002, Doc. No.: 047632 (confidential document) [12] Data Encryption Standard (DES), FIPS PUB 46, US NBS, 1977, Washington [13] FIPS PUB 46-3: 1
- Technical Report, Philips P8WE5033V0F Secure 8 bit Smart Card Controller, Version 1.2, 20.08.2002 (confidential document) [8] ETR-lite for Composition, according AIS 36, Version 1.3, 20.08.2002 (confidential document) [9: 1
|
- ConfidentialDocument:
- / P5CD020V0B / P5CC021V0B / P5CD012V0B, BSI-DSZ-CC-0710-2010, Version 1.0, 24.11.2010, Brightsight (confidential document) [18] Certification Report BSI-DSZ-CC-0404-2007 for NXP Secure Smart Card Controller P5CD040V0B: 1
- Controller Revision 3, BSI-DSZ-CC-0730-2011, Version 3, 18.05.2011, TÜV Informationstechnik GmbH (confidential document) 10 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
- J3A040 and J2A040 Secure Smart Card Controller Revision 3 – Security Target, NXP Semiconductors (confidential document) [7] Java Card System - Minimal Configuration Protection Profile, Version 1.1, May 2006, part of: 1
- J3A095 J3A080 J3A081 J3A040 J3A041 v2.4.1 R3 Secure Smart Card Controller, NXP Semiconductors (confidential document) [12] Guidance documentation for the TOE, Revision 3.1, 12.05.2011, JCOP V2.4.1 Secure Smart Card: 1
- Report for NXP J3A040 and J2A040 Secure Smart Card Controller Rev. 3, TÜV Informationstechnik GmbH (confidential document) [10] ETR for composition according to AIS 36 for the Product NXP J3A040 and J2A040 Secure Smart: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20020829162148
- /ModDate: D:20020829162148+02'00'
- /Producer: Acrobat Distiller 4.0 for Windows
- pdf_file_size_bytes: 337593
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 40
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20110629115407+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Semiconductors Germany GmbH, NXP J3A040 and J2A040 Secure Smart Card Controller Revision 3, Smartcard mit Java Card Plattform, JCOP 2.4.1, CC"
- /ModDate: D:20110629120130+02'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0730-2011
- pdf_file_size_bytes: 995280
- pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
pdf_data/st_filename |
0177b.pdf |
0730b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0404-2007: 1
- BSI-DSZ-CC-0404-2007-MA-06: 1
- BSI-DSZ-CC-0710: 3
- BSI-DSZ-CC-0730: 2
- BSI-DSZ-CC-404: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0002-2001: 1
- BSI-PP-0017: 3
- BSI-PP-0035: 3
- BSI-PP-0035-2007: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5: 4
- EAL 5 augmented: 2
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
- EAL5: 34
- EAL5 augmented: 1
- EAL5+: 1
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 1
- EAL5: 17
- EAL5 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 2
- ACM_SCP: 2
- ACM_SCP.2: 4
- ACM_SCP.3: 5
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 2
- ADO_IGS: 1
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 3
- ADV_FSP.2: 4
- ADV_FSP.3: 6
- ADV_HLD: 1
- ADV_HLD.3: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 4
- ADV_RCR.2: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 2
- AGD_USR: 1
- AGD_USR.1: 2
- ALC:
- ALC_DVS.2: 2
- ALC_LCD.2: 1
- ALC_TAT.2: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.3: 1
- AVA_SOF: 1
- AVA_SOF.1: 2
- AVA_VLA: 1
- AVA_VLA.4: 3
|
- ADV:
- ADV_ARC: 3
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 3
- AGD_PRE: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 10
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.3: 2
- AVA_VAN.4: 3
- AVA_VAN.5: 8
- AVA_VLA.4: 3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.2: 1
- FCS_CKM.4: 4
- FCS_COP.1: 17
- FCS_COP.1.1: 3
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 3
- FDP_IFF.1: 1
- FDP_ITC.1: 4
- FDP_ITT.1: 2
- FIA:
- FMT:
- FMT_LIM.1: 2
- FMT_LIM.2: 2
- FMT_MSA.1: 1
- FMT_MSA.2: 4
- FMT_MSA.3: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 3
- FPT_ITT.1: 2
- FPT_PHP.3: 2
- FPT_SEP.1: 2
- FRU:
|
- FAU:
- FAU_ARP: 18
- FAU_ARP.1: 1
- FAU_GEN: 1
- FAU_GEN.1: 5
- FAU_SAA.1: 20
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAS: 10
- FAU_SAS.1: 10
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 18
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.3: 4
- FCS_CKM.3.1: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP: 52
- FCS_COP.1: 28
- FCS_COP.1.1: 14
- FCS_LIM.1: 1
- FCS_LIM.2: 1
- FCS_RND.1: 2
- FCS_RND.2: 1
- FCS_RNG: 3
- FCS_RNG.1: 15
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 24
- FDP_ACC.1: 10
- FDP_ACC.2: 4
- FDP_ACF: 20
- FDP_ACF.1: 21
- FDP_ACF.1.1: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC.1: 5
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 17
- FDP_IFC.1: 18
- FDP_IFF: 5
- FDP_IFF.1: 11
- FDP_ITC.1: 9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 4
- FDP_ITT: 9
- FDP_ITT.1: 8
- FDP_RIP: 10
- FDP_RIP.1: 15
- FDP_ROL: 5
- FDP_ROL.1: 5
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 6
- FIA_AFL.1: 7
- FIA_ATD: 4
- FIA_ATD.1: 2
- FIA_UAU: 10
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.3: 2
- FIA_UAU.4: 1
- FIA_UID: 13
- FIA_UID.1: 2
- FIA_UID.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 22
- FMT_LIM.1.1: 2
- FMT_LIM.2: 19
- FMT_LIM.2.1: 2
- FMT_MSA: 41
- FMT_MSA.1: 10
- FMT_MSA.2: 3
- FMT_MSA.3: 12
- FMT_MTD: 6
- FMT_MTD.1: 1
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR: 20
- FMT_SMR.1: 6
- FPR:
- FPR_UNO.1: 5
- FPR_UNO.1.1: 1
- FPT:
- FPT_AMT.1: 3
- FPT_FLS: 25
- FPT_FLS.1: 9
- FPT_ITT: 9
- FPT_ITT.1: 9
- FPT_PHP: 7
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 5
- FPT_RCV: 6
- FPT_RCV.3: 8
- FPT_RCV.4: 2
- FPT_RVM.1: 6
- FPT_SEP.1: 7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TDC.1: 5
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FRU_FLT: 6
- FRU_FLT.1: 1
- FRU_FLT.2: 8
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.NATIVE: 7
- A.NO-: 2
- A.NO-DELETION: 6
- A.NO-INSTALL: 5
- A.USE_DIAG: 6
- A.USE_KEY: 1
- A.USE_KEYS: 6
- A.VERIFICATION: 7
- D:
- D.API_DATA: 3
- D.APP_CODE: 9
- D.APP_C_DATA: 3
- D.APP_I_DATA: 7
- D.APP_KEY: 1
- D.CRYPTO: 7
- D.JAVA_OBJECT: 4
- D.JCS_CODE: 3
- D.JCS_DATA: 4
- D.PIN: 15
- D.SEC_DATA: 5
- O:
- O.AES: 2
- O.ALARM: 5
- O.CARD-: 1
- O.CARD-MANAGEMENT: 10
- O.CIPHER: 12
- O.CONFIG: 1
- O.COPY: 1
- O.ECC: 2
- O.FAULT_PROTECT: 5
- O.FIREWALL: 9
- O.HW_AES: 2
- O.IDENTIFICATION: 6
- O.KEY-MNGT: 10
- O.MEM_ACCESS: 3
- O.MF_FW: 6
- O.OPERATE: 16
- O.OS_DECEIVE: 7
- O.PHYSICAL: 8
- O.PIN-MNGT: 5
- O.PROTECT_DATA: 10
- O.REALLOCATION: 4
- O.RESOURCES: 11
- O.REUSE: 2
- O.RND: 13
- O.RSA: 1
- O.SCP: 36
- O.SHA: 2
- O.SHRD_VAR_CON: 1
- O.SHRD_VAR_CONFID: 9
- O.SHRD_VAR_INTE: 1
- O.SHRD_VAR_INTEG: 3
- O.SID: 13
- O.SIDE_CHANNEL: 6
- O.TRANSACTION: 4
- O.XYZ: 1
- OE:
- OE.CARD-MANAGEMENT: 2
- OE.NATIVE: 5
- OE.NO-DELETION: 4
- OE.NO-INSTALL: 7
- OE.SCP: 5
- OE.USE_DIAG: 5
- OE.USE_KEY: 2
- OE.USE_KEYS: 4
- OE.VERIFICATION: 9
- OE.XYZ: 1
- OP:
- OP.ARRAY_ACCESS: 3
- OP.CREATE: 7
- OP.INSTANCE_FIELD: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.JAVA: 5
- OP.PUT: 5
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- OSP.PRO: 1
- OSP.PROCESS-TOE: 3
- R:
- T:
- T.ACCES: 1
- T.ACCESS_DAT: 1
- T.ACCESS_DATA: 2
- T.CONFID: 2
- T.CONFID-: 1
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.EXE-CODE: 11
- T.FAULT: 7
- T.INTEG-: 3
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 1
- T.INTEG-APPLI-DATA: 3
- T.INTEG-JCS-: 4
- T.INTEG-JCS-CODE: 4
- T.INTEG-JCS-DATA: 3
- T.LEAKA: 1
- T.LEAKAGE: 6
- T.OS: 2
- T.OS_DE: 1
- T.OS_DECEIVE: 6
- T.OS_OP: 1
- T.OS_OPERATE: 5
- T.PHYSIC: 1
- T.PHYSICAL: 4
- T.RESOU: 1
- T.RESOURCES: 5
- T.RND: 6
- T.SID: 12
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 120
- NXP Semiconductors: 13
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 7
- Physical Probing: 2
|
- FI:
- DFA: 3
- Malfunction: 7
- Physical tampering: 4
- malfunction: 5
- physical tampering: 3
- SCA:
- DPA: 5
- Leak-Inherent: 7
- SPA: 4
- physical probing: 4
- side channel: 2
- side-channel: 1
- timing attack: 2
- timing attacks: 2
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 46: 1
- FIPS PUB 46-3: 3
|
- BSI:
- FIPS:
- FIPS 180-3: 3
- FIPS 197: 1
- FIPS 46-3: 2
- FIPS PUB 180-3: 1
- ICAO:
- ISO:
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.1.1: 1
- GlobalPlatform 2.1.1: 2
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 2
- javacard.framework.applet: 1
- javacard.security: 4
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Groups marked with ‗IT‘ are considered in the TOE IT environment, and groups marked with ‗—‗ are out of scope of this evaluation. Table 4. TOE Groups Overview Group Description Scope NXP Semiconductors JCOP 2: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20020821090119+02'00'
- /Creator: Pscript.dll Version 5.0
- /ModDate: D:20020903101055+02'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Title: st-lite_5033V0F_v1_6
- pdf_file_size_bytes: 222755
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 44
|
- /Author: NXP Semiconductors
- /CreationDate: D:20110513095203
- /Creator: Microsoft® Office Word 2007
- /Keywords: Common Criteria Evaluation, NXP J3A040, J2A040, Revision 3, JavaCard
- /ModDate: D:20110513095203
- /Producer: Microsoft® Office Word 2007
- /Subject: Common Criteria Evaluation
- /Title: Security Target Lite
- pdf_file_size_bytes: 1914693
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 116
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |