name |
Siemens RUGGEDCOM ROS v4.2.2.F running on the M969F, RS900F, RS900GF, RS900GPF, RS940GF, M2100F, RSG2100F, RSG2100PF, M2200F, RSG2200F, RSG2300F, RSG2300PF, RS400F, RS416F, RS416PF, RSG2488F switches |
NXP Secure Smart Card Controllers P5CC008, P5CC012 V1A/V1A(s) each including IC Dedicated Software |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
DE |
status |
archived |
archived |
not_valid_after |
21.08.2020 |
01.09.2019 |
not_valid_before |
21.08.2018 |
04.04.2013 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10877-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10877-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0855a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10877-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0855b_pdf.pdf |
manufacturer |
Siemens Canada Ltd. |
NXP Semiconductors Germany GmbH Business Line Identification |
manufacturer_web |
https://www.siemens.com |
https://www.nxp.com |
security_level |
{} |
EAL5+, ALC_DVS.1, ASE_TSS.2, AVA_VAN.5 |
dgst |
d832f21299727366 |
4a2d9278fc67ffec |
heuristics/cert_id |
CCEVS-VR-VID-10877-2018 |
BSI-DSZ-CC-0855-2013 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
cpe:2.3:h:siemens:ruggedcom_rsg2100f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs900gf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2488f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs416pf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs900gpf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_m2200f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2300f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2300pf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_m969f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs900f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs400f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2100pf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2200f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_m2100f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs940gf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs416f:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ALC_TAT.2, ASE_TSS.2, ADV_TDS.4, ASE_REQ.2, ALC_DVS.1, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
4.2.2 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0771-2011 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0771-2011 |
heuristics/scheme_data |
- category: Network Device
- certification_date: 21.08.2018
- evaluation_facility: COACT, Inc. Labs
- expiration_date: 21.08.2020
- id: CCEVS-VR-VID10877
- product: Siemens RUGGEDCOM ROS v4.2.2.F running on the M969F, RS900F, RS900GF, RS900GPF, RS940GF, M2100F, RSG2100F, RSG2100PF, M2200F, RSG2200F, RSG2300F, RSG2300PF, RS400F, RS416F, RS416PF, RSG2488F switches
- scheme: US
- url: https://www.niap-ccevs.org/product/10877
- vendor: Siemens Canada Ltd.
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
48ac4778e4272298 |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
st_vid10877-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10877-2018: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180823111041-04'00'
- /ModDate: D:20180823111041-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 183909
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid10877-vr.pdf |
0855a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID10877-2018
- cert_item: Siemens Canada Ltd. RUGGEDCOM Rugged Operating System (ROS) V4.2.2.F Running on the M2100F, M2200F, M969F, RSG2100F, RSG2100PF, RSG2200F, RSG2300F, RSG2300PF, RSG2488F, RS400F, RS416F, RS416PF, RS900F, RS900GF, RS900GPF, and RS940GF RUGGEDCOM switches
- cert_lab: US NIAP
|
- DE:
- cert_id: BSI-DSZ-CC-0855-2013
- cert_item: NXP Secure Smart Card Controllers P5CC008, P5CC012 V1A/V1A(s) each including IC Dedicated Software
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10877-2018: 1
|
- DE:
- BSI-DSZ-CC-0771-2011: 3
- BSI-DSZ-CC-0855-2013: 21
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 3
- EAL 5: 7
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 7
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 5
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 18
- NXP Semiconductors: 22
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 3
- SPA: 2
- physical probing: 1
- side channel: 1
- timing attack: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 37: 1
- AIS 38: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- November 2012 (confidential document) [12] P5CC008V1A and P5CC012V1A, Guidance, Delivery and Operation Manual, NXP Semiconductors: 1
- November 2012, NXP Secure Smart Card Controllers P5CC008, P5CC012 V1A/V1A(s), NXP Semiconductors (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8: 1
- P5CC012 V1A/V1A(s) each including IC Dedicated Software, v1.1, Brightsight, 6 February 2013 (confidential document) [10] ETR for composite evaluation according to AIS 36, NXP Secure Smart Card Controllers P5CC008: 1
- V1A/V1A(s) each including IC Dedicated Software, v1.1, Brightsight, 6 February 2013 (confidential document) [11] NXP Secure Smart Card Controllers P5CC008, P5CC012 V1A/V1A(s), Configuration List, Rev. 1.0: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20180822131120-04'00'
- /ModDate: D:20180822131120-04'00'
- pdf_file_size_bytes: 690785
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20130412100319+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Card"
- /ModDate: D:20130412101415+02'00'
- /Producer: LibreOffice 3.6
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0855-2013
- pdf_file_size_bytes: 1019142
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
st_vid10877-st.pdf |
0855b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 3
- EAL 5 augmented: 1
- EAL4: 3
- EAL4 augmented: 1
- EAL5: 32
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.4: 3
- ADV_FSP.5: 11
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 4
- ALC_CMS.4: 3
- ALC_CMS.5: 5
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 4
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 15
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_STG.1: 1
- FAU_STG_EXT.1: 13
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 2
- FCS:
- FCS_CKM.1: 35
- FCS_CKM.1.1: 1
- FCS_CKM.2: 16
- FCS_CKM.2.1: 1
- FCS_CKM.4: 21
- FCS_CKM.4.1: 1
- FCS_COP: 65
- FCS_COP.1: 13
- FCS_RBG_EXT.1: 19
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSHS_EXT.1: 20
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 2
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSS_EXT: 3
- FCS_TLSS_EXT.1: 15
- FCS_TLSS_EXT.1.1: 2
- FCS_TLSS_EXT.1.2: 2
- FCS_TLSS_EXT.1.3: 2
- FCS_TLS_EXT.1: 2
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 13
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 3
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 13
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 19
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 4
- FMT:
- FMT_MOF: 8
- FMT_MOF.1: 1
- FMT_MTD: 9
- FMT_MTD.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 4
- FMT_SMR.2: 10
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 13
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_ITT.1: 2
- FPT_PTD: 1
- FPT_SKP_EXT.1: 12
- FPT_SKP_EXT.1.1: 2
- FPT_SSP.1: 1
- FPT_STM.1: 3
- FPT_STM_EXT.1: 15
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 2
- FPT_TST: 1
- FPT_TST_EXT.1: 12
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT.1: 14
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTA_SSL.4: 8
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 2
- FTA_SSL_EXT.1: 12
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 15
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 17
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 10
- FTP_TRP.1: 3
|
- FAU:
- FAU_SAS.1: 5
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.4: 2
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FCS_RNG.1: 4
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 2
- FDP_ACF.1: 28
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 8
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FDP_ITT.1: 6
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 3
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 4
- FPT:
- FPT_FLS.1: 7
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FRU:
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
|
- O:
- O.CUST_RECONFIG: 5
- O.MEM_ACCESS: 6
- O.MF_FW: 7
- O.RND: 3
- O.SFR_ACCESS: 8
- T:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 70
- NXP Semiconductors: 39
- Philips:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 11
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
- DES:
- 3DES:
- TDEA: 3
- Triple-DEA: 1
- Triple-DES: 9
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 5
- DHE: 1
- Diffie-Hellman: 13
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 14
- SHA-384: 11
- SHA-512: 13
- SHA256: 3
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 6
- SSL 2.0: 2
- SSL 3.0: 2
- TLS:
- TLS: 51
- TLS 1.0: 2
- TLS 1.1: 3
- TLS 1.2: 3
- TLS v1.0: 1
- TLS v1.1: 1
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 10
- P-384: 10
- P-521: 12
- secp256r1: 3
- secp384r1: 3
- secp521r1: 3
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 10
- fault injection: 4
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 12
- Physical Probing: 2
- physical probing: 1
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 2
- FIPS 197: 2
- FIPS 198-1: 1
- FIPS PUB 186-4: 3
- ISO:
- ISO/IEC 18031:2011: 4
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-38D: 1
- NIST SP 800-56A: 1
- NIST SP 800-90A: 1
- SP 800-135: 1
- SP 800-52: 1
- SP 800-56A: 2
- SP 800-56B: 1
- SP 800-57: 1
- PKCS:
- RFC:
- RFC 2818: 3
- RFC 2986: 2
- RFC 3268: 4
- RFC 3526: 3
- RFC 4253: 2
- RFC 4346: 2
- RFC 4492: 2
- RFC 5246: 6
- RFC 5280: 5
- RFC 5289: 2
- RFC 5759: 1
- RFC 6069: 1
- RFC 6960: 1
- RFC24: 1
- X509:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS PUB 46: 1
- FIPS PUB 46-3: 3
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 8
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Siemens Canada Ltd
- /CreationDate: D:20180814122918-04'00'
- /Creator: DocBook XSL Stylesheets with Apache FOP
- /ModDate: D:20180822130851-04'00'
- /PDFVersion: 1.4
- /Producer: Apache FOP Version 1.0
- /Title: v4.2.2.F
- pdf_file_size_bytes: 468220
- pdf_hyperlinks: http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.html#3336, http://csrc.nist.gov/groups/STM/cavp/documents/dss/rsanewval.html#2078, http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html#2631, http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html#4037, http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html#2635, http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.html#3329, http://csrc.nist.gov/groups/STM/cavp/documents/dss/rsanewval.html#2072, http://csrc.nist.gov/groups/STM/cavp/documents/dss/ecdsanewval.html#903, http://csrc.nist.gov/groups/STM/cavp/documents/components/componentnewval.html#858, http://csrc.nist.gov/groups/STM/cavp/documents/dss/ecdsanewval.html#899, mailto:[email protected], https://support.automation.siemens.com, https://www.siemens.com/ruggedcom, http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgnewval.html#1207, http://csrc.nist.gov/groups/STM/cavp/documents/components/componentnewval.html#863, http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html#4030, http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgnewval.html#1204, https://www.siemens.com/industrialsecurity
- pdf_is_encrypted: False
- pdf_number_of_pages: 92
|
- /Author: NXP Semiconductors
- /CreationDate: D:20121129111746+01'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Keywords: CC; Security Evaluation; Security Target Lite; Functional Requirements; Security Functionality; Assurance Level; P5CC008; P5CC012 V1A/ V1A(s)
- /ModDate: D:20121129112750+01'00'
- /Producer: Adobe PDF Library 9.0
- /Subject: Security Target Lite
- /Title: Security Target Lite P5CC008, P5CC012 V1A/ V1A(s
- pdf_file_size_bytes: 450431
- pdf_hyperlinks: mailto:[email protected]
|