name |
Wind River Linux Secure 1.0 |
NXP Smart Card Controller P5CC036V1D and P5CC009V1D each with specific IC dedicated Software |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
DE |
status |
archived |
archived |
not_valid_after |
01.11.2014 |
01.09.2019 |
not_valid_before |
05.04.2011 |
29.04.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10430-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0583a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10430-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0583b.pdf |
manufacturer |
Wind River |
NXP Semiconductors |
manufacturer_web |
https://www.windriver.com/ |
https://www.nxp.com/ |
security_level |
EAL4+, ALC_FLR.3 |
AVA_MSU.3, EAL5+, AVA_VLA.4, ALC_DVS.2 |
dgst |
d2406afd03edb522 |
4823a32249fbd0a8 |
heuristics/cert_id |
CCEVS-VR-VID-10430-2011 |
BSI-DSZ-CC-0583-2009 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_FLR.3, ADV_ARC.1, AGD_OPE.1 |
AGD_USR.1, ALC_TAT.2, ADV_INT.1, ADV_SPM.3, ADV_FSP.3, ADV_RCR.2, AVA_MSU.3, ADV_HLD.3, ADV_IMP.2, ATE_IND.2, ALC_LCD.2, ATE_COV.2, ATE_FUN.1, AVA_CCA.1, ALC_DVS.2, AVA_SOF.1, AVA_VLA.4, ADV_LLD.1, AGD_ADM.1, ATE_DPT.2 |
heuristics/extracted_versions |
1.0 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0584-2009 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0293-2005 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0584-2009 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0293-2005 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
1b3d0fa0ae86e5da |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_gpospp_v1.0.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10430-vr.pdf |
0583a.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID10430-2011
- cert_item: Wind River Wind River Linux Secure 1.0
- cert_lab: US NIAP
|
- DE:
- cert_id: BSI-DSZ-CC-0583-2009
- cert_item: NXP Smart Card Controller P5CC036V1D and P5CC009V1D each with specific IC dedicated Software
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH Business Line Identification
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10430-2011: 1
|
- DE:
- BSI-DSZ-CC-0293-: 1
- BSI-DSZ-CC-0293-2005: 3
- BSI-DSZ-CC-0583-2009: 19
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002-: 1
- BSI-PP-0002-2001: 6
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 3
- EAL 4 augmented: 2
- EAL4: 10
- EAL4 augmented: 1
|
- EAL:
- EAL 1: 1
- EAL 4: 5
- EAL 5: 4
- EAL 5 augmented: 3
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.3: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.3: 1
- ADV_HLD: 2
- ADV_HLD.3: 1
- ADV_IMP: 2
- ADV_IMP.2: 1
- ADV_INT: 2
- ADV_INT.1: 1
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_RCR.2: 1
- ADV_SPM: 2
- ADV_SPM.3: 1
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 2
- ALC_TAT: 2
- ALC_TAT.2: 2
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_DPT.2: 1
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
- NXP:
- NXP: 19
- NXP Semiconductors: 15
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
- NIST:
- P-256: 2
- P-384: 2
- P-521: 2
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- SCA:
- DPA: 1
- physical probing: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- NIST:
- RFC:
- RFC 2409: 1
- RFC 3268: 1
- RFC 4253: 1
|
- BSI:
- AIS 20: 1
- AIS 25: 3
- AIS 26: 2
- AIS 31: 4
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 3
- AIS 38: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Secure Smart Card Controller (confidential document) [9] Security Target Lite BSI-DSZ-0583-2009, Version 1.2, 08 January 2009, P5CC036V1D/ P5CC009V1D: 1
- T-Systems GEI GmbH (confidential document) [8] Configuration list for the TOE, Version 1.4, 21 January 2009, Evaluation of the Philips: 1
- Version 1.2, 08 January 2009, P5CC036V1D/ P5CC009V1D, NXP Semiconductors Germany GmbH (confidential document) [7] Evaluation Technical Report, V1.4, 23 January 2009, NXP P5CC036V1D Secure Smart Card: 1
- the Product NXP P5CC036V1D Secure Smart Card Controller, 1.5, 23 January 2009, T-Systems GEI GmbH (confidential document) 8 Specifically • AIS 20, Version 1, 2 December 1999, Funktionalitätsklassen und: 1
|
pdf_data/report_metadata |
- /Author: Don Phillips
- /CreationDate: D:20110420131634
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110420131634
- /Producer: Microsoft® Office Word 2007
- /Title: Validators Report
- pdf_file_size_bytes: 328563
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20090618124011+02'00'
- /Creator: Writer
- /Keywords: "NXP Smart Card Controller P5CC036V1D and P5CC009V1Deach with specific IC dedicated Software, NXP Semiconductors Germany GmbH Business Line Identification, BSI-DSZ-CC-0583-2009, Common Criteria, Zertifizierung, Certification"
- /ModDate: D:20090619084314+02'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria, Certification
- /Title: Certification Report BSI-DSZ-CC-0583-2009
- pdf_file_size_bytes: 730143
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
st_vid10430-st.pdf |
0583b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 4
- EAL 5 augmented: 2
- EAL4: 4
- EAL4 augmented: 1
- EAL4+: 1
- EAL5: 34
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 2
- ACM_SCP: 4
- ACM_SCP.2: 4
- ACM_SCP.3: 5
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 4
- ADV_FSP.2: 4
- ADV_FSP.3: 6
- ADV_HLD: 1
- ADV_HLD.3: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 4
- ADV_RCR.2: 1
- ADV_SPM: 1
- ADV_SPM.3: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 2
- AGD_USR: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_LCD: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.2: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.3: 1
- AVA_SOF.1: 2
- AVA_VLA.4: 3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 14
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 4
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 2
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FAU_SAR.3: 9
- FAU_SAR.3.1: 1
- FAU_SEL.1: 8
- FAU_SEL.1.1: 2
- FAU_STG: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 8
- FAU_STG.3.1: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FAU_UAU.1: 2
- FAU_UAU.6: 2
- FCS:
- FCS_BCM_EXT.1: 10
- FCS_BCM_EXT.1.1: 1
- FCS_CKM.1: 22
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 14
- FCS_CKM.4.1: 1
- FCS_COA_EXT.1: 6
- FCS_COA_EXT.1.1: 1
- FCS_COP.1: 34
- FCS_COP.1.1: 3
- FCS_RBG_EXT.1: 12
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 11
- FDP_ACC.2: 17
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 32
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 7
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 9
- FDP_IFC.2: 11
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.1: 3
- FDP_IFF.2: 5
- FDP_IFF.2.1: 1
- FDP_IFF.2.2: 1
- FDP_IFF.2.3: 1
- FDP_IFF.2.4: 1
- FDP_IFF.2.5: 1
- FDP_IFF.2.6: 1
- FDP_ITC.1: 11
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 11
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP: 2
- FDP_RIP.2: 13
- FDP_RIP.2.1: 1
- FDP_RIP.3: 15
- FDP_RIP.3.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_AFL_EXT.1: 10
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 14
- FIA_ATD.1.1: 1
- FIA_SOS.1: 15
- FIA_SOS.1.1: 2
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 12
- FIA_USB.1.1: 1
- FIA_USB.1.2: 3
- FIA_USB.1.3: 3
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 31
- FMT_MSA.1.1: 2
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 24
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4: 15
- FMT_MSA.4.1: 2
- FMT_MTD.1: 97
- FMT_MTD.1.1: 14
- FMT_REV.1: 23
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SAE.1: 7
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 24
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 34
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMR.2: 3
- FPT:
- FPT_ITT: 2
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_ITT.3: 7
- FPT_ITT.3.1: 1
- FPT_ITT.3.2: 1
- FPT_RCV.1: 11
- FPT_RCV.1.1: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TRC_EXT.1: 8
- FPT_TRC_EXT.1.1: 1
- FPT_TRP_EXT.1: 2
- FPT_TST.1: 1
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.1.2: 1
- FRU:
- FRU_RSA.1: 9
- FRU_RSA.1.1: 1
- FTA:
- FTA_MCS.1: 13
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_SSL.1: 9
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 8
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTA_TAB.1: 9
- FTA_TAB.1.1: 1
- FTA_TAH.1: 7
- FTA_TAH.1.1: 1
- FTA_TAH.1.2: 1
- FTA_TAH.1.3: 1
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 1
|
- FAU:
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 4
- FCS_CKM.4: 3
- FCS_COP.1: 13
- FCS_COP.1.1: 1
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 33
- FDP_ACC.1.1: 2
- FDP_ACF.1: 30
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 10
- FDP_ITC.1: 4
- FDP_ITT.1: 6
- FDP_SDI.1: 1
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 3
- FMT_MSA.1: 29
- FMT_MSA.1.1: 2
- FMT_MSA.2: 4
- FMT_MSA.3: 22
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 7
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FPT_SEP.1: 6
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CLEARANCE: 3
- A.CONNECT: 5
- A.PHYSICAL: 4
- A.SENSITIVITY: 2
- O:
- O.ACCESS: 20
- O.ACCESS_HISTORY: 5
- O.ADMIN_ROLE: 6
- O.AUDIT_GENERATION: 10
- O.AUDIT_PROTECTION: 6
- O.AUDIT_REVIEW: 10
- O.CORRECT_TSF_OPERATION: 5
- O.CRYPTOGRAPHIC_SERVICES: 13
- O.DISCRETIONARY_ACCESS: 10
- O.DISCRETIONARY_USER_CONTROL: 7
- O.DISPLAY_BANNER: 5
- O.MANAGE: 26
- O.MANDATORY_ACCESS: 15
- O.PROTECT: 18
- O.RECOVERY: 7
- O.REFERENCE_MONITOR: 10
- O.RESIDUAL_INFORMATION: 6
- O.RESOURCE_SHARING: 6
- O.TSF_CRYPTOGRAPHIC_INTEGRITY: 4
- O.USER_AUTHENTICATION: 10
- O.USER_IDENTIFICATION: 8
- OE:
- OE.LABELING: 4
- OE.PHYSICAL: 8
- T:
- T.ADMIN_ERROR: 3
- T.ADMIN_ROGUE: 3
- T.AUDIT_COMPROMISE: 6
- T.CRYPTO_COMPROMISE: 2
- T.MASQUERADE: 4
- T.OPERATIONAL_ERRORS: 2
- T.RESIDUAL_DATA: 3
- T.RESOURCE_EXHAUSTION: 3
- T.TSF_COMPROMISE: 4
- T.UNATTENDED_SESSION: 3
- T.UNAUTHORIZED_ACCESS: 4
- T.UNIDENTIFIED_ACTIONS: 3
- T.UNKNOWN_STATE: 3
|
- O:
- O.MEM_ACCESS: 8
- O.MF_FW: 8
- O.RND: 3
- O.SFR_ACCESS: 8
- T:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 89
- NXP Semiconductors: 13
- Philips:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- DES:
- 3DES:
- TDEA: 3
- Triple-DEA: 1
- Triple-DES: 10
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 3
- SHA-512: 1
- SHA2: 1
- SHA384: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 2
- P-384: 2
- P-521: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 10
- fault injection: 3
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 13
- Physical Probing: 2
- physical probing: 1
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 14
- FIPS PUB 140-2: 3
- FIPS PUB 186-3: 1
- NIST:
- PKCS:
|
- BSI:
- FIPS:
- FIPS PUB 46: 1
- FIPS PUB 46-3: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users by cannot be used to store: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
- /Author: NXP Phillips
- /CreationDate: D:20090115142812+01'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Keywords: Security Target Lite, NXP P5CC036V1D Secure Smart Card Controller
- /ModDate: D:20090619084710+02'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20090115132532
- /Subject: Evaluation of the NXP P5CC036V1D Secure Smart Card Controller
- /Title: Security Target Lite P5CC036V1D/ P5CC009V1D
- pdf_file_size_bytes: 679501
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 72
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |