name |
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration (v2)
|
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2022-09-28
|
2020-07-30
|
not_valid_after |
2026-06-03
|
2025-07-30
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_20v2.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_76en.pdf
|
status |
active
|
active
|
manufacturer |
NXP Semiconductors
|
NXP Semiconductors
|
manufacturer_web |
https://www.nxp.com/
|
https://www.nxp.com/
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_20v2.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_76.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2021_20v2.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-ANSSI-CC-2020_76.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}) |
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 9, 28), 'maintenance_title': 'ANSSI-CC-2021/20v2-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_20v2-m01.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_20v2-m01.pdf'}) |
|
state/cert/convert_garbage |
False
|
True
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
bda9ab0e3463e53f5e358fcf785969172f06f18ec5bbdca616c7742cccc1edb4
|
42508adcb31e4493a9cab3719a8280c8f60517fc33e0af9c3fbd210aae56eed0
|
state/cert/txt_hash |
7d3389410dbb4f6e8997987c09d349e3d26ec5da1d7e19e7fa22dea9de4c50e7
|
136d0e3ecd7b3e6709c84fd8fdcfcb5f153d8fe0d23973509809bd6f951e6a04
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
3a3ded3388d26c8ba9cd606df8e8ec40aeb69cce7c5b0eb86b14136c89ad2295
|
2a918ac51e5c72c246e7b8b5a08f5a1bc1fd69cfa02027ac30d63e67e24e2cf2
|
state/report/txt_hash |
de529465b1c9e73db0a98e79c5b471d6a187ff13b3613ab2303a06b894bbf8ab
|
8c5ead82b5f45e6747564212a53214f0dee528a4b484b41c0adb99c9635eaa18
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
bbd88eb7a0c911b2eec8c8ead66a421b2a20341045d3b0b50966ba83b5033a16
|
78ecff039ade3b24bab548715c8ae1f05e8596148cda47038827726b71b68ba1
|
state/st/txt_hash |
4b1dbbb086eae27518d604f1a403d468f1d913f9fbc41bb8a3fa13f89ae8c12a
|
b0491e9cb9ef2d5dae49d1e0f91e3888ba926fde9d2cc652163e9c618ef8747c
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2021/20v2
|
ANSSI-CC-2020/76
|
heuristics/cert_lab |
None
|
THALES |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ALC_TAT.2, ALC_DVS.2, ALC_FLR.1, ADV_INT.2, ALC_CMC.4, ATE_DPT.3, ASE_CCL.1, ASE_TSS.1, ALC_LCD.1, ATE_COV.2, ADV_TDS.4, ALC_CMS.5, ATE_FUN.1, AGD_OPE.1, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, ADV_IMP.1, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ASE_SPD.1, AVA_VAN.5, ASE_ECD.1, ADV_FSP.5 |
ALC_TAT.2, ALC_DVS.2, ALC_FLR.1, ADV_INT.2, ALC_CMC.4, ATE_DPT.3, ASE_CCL.1, ASE_TSS.1, ALC_LCD.1, ATE_COV.2, ADV_TDS.4, ALC_CMS.5, ATE_FUN.1, AGD_OPE.1, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, ADV_IMP.1, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ASE_SPD.1, AVA_VAN.5, ASE_ECD.1, ADV_FSP.5 |
heuristics/extracted_versions |
3.1 |
3.1 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
ANSSI-CC-2021/20 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2021/20, ANSSI-CC-2021/18, BSI-DSZ-CC-1136-V2-2022 |
BSI-DSZ-CC-1040-2019 |
heuristics/report_references/indirectly_referenced_by |
None
|
ANSSI-CC-2021/20, ANSSI-CC-2021/20v2 |
heuristics/scheme_data/cert_id |
ANSSI-CC-2021/20v2
|
2020/76
|
heuristics/scheme_data/description |
Le produit évalué est « ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration, v3.1.6.52 » développé par NXP SEMICONDUCTORS.
Ce produit offre des services d’authentification et de signature électronique (SSCD) conformes à la directive [1999/93/EC]. Il est embarqué sur la plateforme JCOP préalablement certifiée [CER_PLA] qui est laissée ouverte après personnalisation. Il dispose d’interfaces avec et/ou
|
Le produit évalué est la carte à puce «ChipDoc v3 on JCOP 4 P71 in SSCD configuration », développé par NXP Semiconductors N.V..
Il offre des services d’authentification et de signature électronique (SSCD) conformes à la directive [1999/93/EC]. Il est embarqué sur la plateforme Java Card JCOP 4 préalablement certifiée qui est laissée ouverte après personnalisation. Il dispose d’interfaces avec et/
|
heuristics/scheme_data/developer |
NXP SEMICONDUCTORS
|
NXP Semiconductors N.V.
|
heuristics/scheme_data/enhanced |
- cert_id:
ANSSI-CC-2021/20v2
- certification_date:
28/09/2022
- expiration_date:
03/06/2026
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
NXP SEMICONDUCTORS
- sponsor:
NXP SEMICONDUCTORS
- evaluation_facility:
THALES / CNES
- level:
EAL5+
- protection_profile:
Part 2 : Device with key generation, v2.0.1, certifié BSI-CC-PP-0059-2009-MA-01
Part 3 : Device with key import, v1.0.2, certifié BSI-CC-PP-0075-2012
Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifié BSI-CC-PP-0071-2012
Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifié BSI-CC-PP-0072-2012
Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifié BSI-CC-PP-0076-2013
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ALC_DVS.2, AVA_VAN.5
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2021_20v2.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2021_20v2-M01.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2021_20v2.pdf
|
- cert_id:
2020/76
- certification_date:
30/07/2020
- expiration_date:
30/07/2025
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
NXP Semiconductors N.V.
- sponsor:
NXP Semiconductors N.V.
- evaluation_facility:
Thales/CNES
- level:
EAL5+
- protection_profile:
Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, certifié BSI-CC-PP-0059-2009-MA-01 ; Part 3: Device with key import, v1.0.2, certifié BSI-CC-PP-0075-2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifié BSI-CC-PP-0071-2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifié BSI-CC-PP-0072-2012 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifié BSI-CC-PP-0076-2013
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- report_link:
https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_76.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020_76en.pdf
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r5
|
Critères Communs version 3.1r5
|
heuristics/scheme_data/enhanced/cert_id |
ANSSI-CC-2021/20v2
|
2020/76
|
heuristics/scheme_data/enhanced/certification_date |
28/09/2022
|
30/07/2020
|
heuristics/scheme_data/enhanced/developer |
NXP SEMICONDUCTORS
|
NXP Semiconductors N.V.
|
heuristics/scheme_data/enhanced/evaluation_facility |
THALES / CNES
|
Thales/CNES
|
heuristics/scheme_data/enhanced/expiration_date |
03/06/2026
|
30/07/2025
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
CCRA
SOG-IS
|
SOG-IS
CCRA
|
heuristics/scheme_data/enhanced/protection_profile |
Part 2 : Device with key generation, v2.0.1, certifié BSI-CC-PP-0059-2009-MA-01
Part 3 : Device with key import, v1.0.2, certifié BSI-CC-PP-0075-2012
Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifié BSI-CC-PP-0071-2012
Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifié BSI-CC-PP-0072-2012
Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifié BSI-CC-PP-0076-2013
|
Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, certifié BSI-CC-PP-0059-2009-MA-01 ; Part 3: Device with key import, v1.0.2, certifié BSI-CC-PP-0075-2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifié BSI-CC-PP-0071-2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifié BSI-CC-PP-0072-2012 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifié BSI-CC-PP-0076-2013
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2021_20v2.pdf
|
https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_76.pdf
|
heuristics/scheme_data/enhanced/sponsor |
NXP SEMICONDUCTORS
|
NXP Semiconductors N.V.
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2021_20v2-M01.pdf
|
https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020_76en.pdf
|
heuristics/scheme_data/expiration_date |
3 Juin 2026
|
30 Juillet 2025
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration Version 3.1.6.52
|
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration
|
heuristics/scheme_data/sponsor |
NXP SEMICONDUCTORS
|
NXP Semiconductors N.V.
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/chipdoc-v31-jcop-4-p71-sscd-configuration-version-31652-0
|
https://cyber.gouv.fr/produits-certifies/chipdoc-v31-jcop-4-p71-sscd-configuration
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-1136-V2-2022 |
None
|
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-1136-V2-2022 |
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
certificat-cc-2021_20v2.pdf
|
certificat-ANSSI-CC-2020_76.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id/FR |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP-0072-2012:
1
- BSI-CC-PP-0076-2013:
1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP-0072-2012:
1
- BSI-CC-PP-0076-2013:
1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_security_level/EAL |
|
|
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 |
1
|
1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor/NXP |
|
- NXP Semiconductors N.V:
2
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
147892
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
DUCLOS Charlene
- /Category: v2
- /Comments: ANSSI-CC-CER-F-14_v14.7
- /Company: SGDSN
- /CreationDate:
D:20220928165052+02'00'
- /Creator:
Acrobat PDFMaker 21 pour Word
- /Keywords: version 3.1, révision 5
- /ModDate:
D:20220928165053+02'00'
- /Producer:
Adobe PDF Library 21.11.71
- /SourceModified: D:20220928145047
- /Title:
ANSSI-CC-2021/20
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
732652
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Title:
ANSSI-CC-2020/76
- /Author:
CHERGUI Yoan
- /Subject: CER/F/14.2
- /Creator:
Microsoft® Word 2010
- /CreationDate:
D:20200807153937+02'00'
- /ModDate:
D:20200807153937+02'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
pdf_data/cert_metadata//Author |
DUCLOS Charlene
|
CHERGUI Yoan
|
pdf_data/cert_metadata//CreationDate |
D:20220928165052+02'00'
|
D:20200807153937+02'00'
|
pdf_data/cert_metadata//Creator |
Acrobat PDFMaker 21 pour Word
|
Microsoft® Word 2010
|
pdf_data/cert_metadata//ModDate |
D:20220928165053+02'00'
|
D:20200807153937+02'00'
|
pdf_data/cert_metadata//Producer |
Adobe PDF Library 21.11.71
|
Microsoft® Word 2010
|
pdf_data/cert_metadata//Title |
ANSSI-CC-2021/20
|
ANSSI-CC-2020/76
|
pdf_data/cert_metadata/pdf_file_size_bytes |
147892
|
732652
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/cert_metadata/pdf_number_of_pages |
2
|
1
|
pdf_data/report_filename |
anssi-cc-2021_20v2.pdf
|
anssi-cc-2020_76.pdf
|
pdf_data/report_frontpage/FR |
|
- match_rules:
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
- cert_id:
ANSSI-CC-2020/76
- cert_item:
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration
- cert_item_version:
Version 3.1.3.52
- ref_protection_profiles:
Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, certifié BSI-CC-PP-0059-2009-MA-01 le 21 février 2012; Part 3: Device with key import, v1.0.2, certifié BSI-CC-PP-0075-2012 le 27 septembre 2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifié BSI-CC-PP-0071-2012 le 12 décembre 2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifié BSI-CC-PP-0072-2012 le 12 décembre 2012 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifié BSI-CC-PP-0076-2013 le 16 avril 2013
- cc_version:
Critères Communs version 3.1 révision 5
- cc_security_level:
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- developer:
NXP Semiconductors N.V. Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire NXP Semiconductors N.V. Troplowitzstrasse 20, 22529 Hamburg, Allemagne
- cert_lab:
THALES / CNES 290 allée du Lac, 31670 Labège, France
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1136-V2-2022:
1
- FR:
- ANSSI-CC-2021/20v2:
2
- ANSSI-CC-2021/18:
1
- ANSSI-CC-2021/20:
1
- NL:
|
|
pdf_data/report_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-1136-V2-2022:
1
|
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2021/20v2:
2
- ANSSI-CC-2021/18:
1
- ANSSI-CC-2021/20:
1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-01:
2
- BSI-CC-PP-0075-2012:
2
- BSI-CC-PP-0071-2012:
2
- BSI-CC-PP-0072-2012:
2
- BSI-CC-PP-0076-2013:
2
- BSI-CC-PP-0099-2017:
1
- other:
- PP-SSCD-Part2:
1
- PP-SSCD-Part3:
1
- PP-SSCD-Part5:
1
- PP-SSCD-Part6:
1
- PP-SSCD-:
5
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP-0072-2012:
1
- BSI-CC-PP-0076-2013:
1
- BSI-CC-PP- 0059-2009-MA-01:
1
- BSI-CC-PP- 0075-2012:
1
- BSI-CC-PP- 0071-2012:
1
- BSI-CC-PP- 0072-2012:
1
- BSI-CC-PP-0076-:
1
- ANSSI:
- other:
- PP-SSCD-Part2:
1
- PP-SSCD-:
6
- PP-SSCD-Part4:
1
- PP-SSCD-Part5:
1
- PP-SSCD-Part6:
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0059-2009-MA-01:
2
- BSI-CC-PP-0075-2012:
2
- BSI-CC-PP-0071-2012:
2
- BSI-CC-PP-0072-2012:
2
- BSI-CC-PP-0076-2013:
2
- BSI-CC-PP-0099-2017: 1
|
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP-0072-2012:
1
- BSI-CC-PP-0076-2013:
1
- BSI-CC-PP- 0059-2009-MA-01: 1
- BSI-CC-PP- 0075-2012: 1
- BSI-CC-PP- 0071-2012: 1
- BSI-CC-PP- 0072-2012: 1
- BSI-CC-PP-0076-: 1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0059-2009-MA-01 |
2
|
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0071-2012 |
2
|
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0072-2012 |
2
|
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0075-2012 |
2
|
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0076-2013 |
2
|
1
|
pdf_data/report_keywords/cc_protection_profile_id/other |
- PP-SSCD-Part2:
1
- PP-SSCD-Part3: 1
- PP-SSCD-Part5:
1
- PP-SSCD-Part6:
1
- PP-SSCD-:
5
|
- PP-SSCD-Part2:
1
- PP-SSCD-:
6
- PP-SSCD-Part4: 1
- PP-SSCD-Part5:
1
- PP-SSCD-Part6:
1
|
pdf_data/report_keywords/cc_protection_profile_id/other/PP-SSCD- |
5
|
6
|
pdf_data/report_keywords/cc_protection_profile_id/other/PP-SSCD-Part2 |
1
|
1
|
pdf_data/report_keywords/cc_protection_profile_id/other/PP-SSCD-Part5 |
1
|
1
|
pdf_data/report_keywords/cc_protection_profile_id/other/PP-SSCD-Part6 |
1
|
1
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_DVS.2:
1
- ALC_FLR.1:
1
- ALC_FLR:
1
- AVA:
- ASE:
|
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
2
- ALC_FLR.1:
1
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
2
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
1
- ALC_FLR.1:
1
- ALC_FLR:
1
|
- ALC_DVS.2:
2
- ALC_FLR.1:
1
- ALC_FLR:
2
- ALC_CMC: 1
- ALC_CMS: 2
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
1
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
1
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE |
|
- ASE_TSS.2:
1
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 |
1
|
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
1
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
1
|
3
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 5:
1
- EAL2:
2
- EAL6:
1
- EAL7:
1
|
- EAL 5:
3
- EAL2:
2
- EAL6:
1
- EAL7:
1
- EAL 1: 1
- EAL 3: 1
- EAL 7: 1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
1
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL6 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name/JCOP/JCOP 4 |
9
|
25
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- ICAO:
- SCP:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004: 1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-001 |
1
|
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-002 |
1
|
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-003 |
1
|
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES |
1
|
3
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor/NXP |
|
- NXP Semiconductors N.V: 3
- NXP:
9
|
pdf_data/report_keywords/vendor/NXP/NXP |
6
|
9
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
359581
- pdf_is_encrypted:
False
- pdf_number_of_pages:
14
- /Author:
[email protected]
- /Category: v3.1.6.52
- /Comments: ANSSI-CC-CER-F-07_v31.3
- /Company: NXP SEMICONDUCTORS
- /CreationDate:
D:20220928161841+02'00'
- /Creator:
Acrobat PDFMaker 21 pour Word
- /Keywords: [ANSSI Crypto]
- /ModDate:
D:20220928161845+02'00'
- /Producer:
Adobe PDF Library 21.11.71
- /SourceModified: D:20220928141835
- /Subject: ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration
- /Title:
ANSSI-CC-2021/20v2
- pdf_hyperlinks:
mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/
|
- pdf_file_size_bytes:
209720
- pdf_is_encrypted:
False
- pdf_number_of_pages:
16
- /Author:
- /CreationDate:
D:20200810111043+02'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20200810111043+02'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
[email protected]
|
|
pdf_data/report_metadata//CreationDate |
D:20220928161841+02'00'
|
D:20200810111043+02'00'
|
pdf_data/report_metadata//Creator |
Acrobat PDFMaker 21 pour Word
|
PScript5.dll Version 5.2.2
|
pdf_data/report_metadata//ModDate |
D:20220928161845+02'00'
|
D:20200810111043+02'00'
|
pdf_data/report_metadata//Producer |
Adobe PDF Library 21.11.71
|
Acrobat Distiller 11.0 (Windows)
|
pdf_data/report_metadata//Title |
ANSSI-CC-2021/20v2
|
|
pdf_data/report_metadata/pdf_file_size_bytes |
359581
|
209720
|
pdf_data/report_metadata/pdf_hyperlinks |
mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/ |
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
14
|
16
|
pdf_data/st_filename |
anssi-cible-cc-2021_20v2.pdf
|
anssi-cible-cc-2020_76en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1136-V2-2022:
3
- NL:
|
|
pdf_data/st_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-1136-V2-2022:
3
|
|
pdf_data/st_keywords/cc_claims/A |
- A.CGA:
3
- A.SCA:
3
- A.CSP:
3
|
- A.CGA:
3
- A.SCA:
3
- A.CSP:
3
|
pdf_data/st_keywords/cc_claims/OE/OE.HID_VAD |
8
|
9
|
pdf_data/st_keywords/cc_claims/T |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075:
1
- BSI-CC-PP-0071:
1
- BSI-CC-PP-0072:
1
- BSI-CC-PP-0076:
1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075:
1
- BSI-CC-PP-0071:
1
- BSI-CC-PP-0072:
1
- BSI-CC-PP-0076:
1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
5
- ADV_FSP.5:
6
- ADV_IMP.1:
5
- ADV_INT.2:
2
- ADV_TDS.4:
8
- ADV_FSP.4:
1
- ADV_TDS.3:
1
- AGD:
- AGD_OPE.1:
4
- AGD_PRE.1:
5
- ALC:
- ALC_DVS.2:
6
- ALC_CMC.4:
2
- ALC_CMS.5:
1
- ALC_DEL.1:
2
- ALC_LCD.1:
3
- ALC_TAT.2:
3
- ALC_DVS.1:
1
- ALC_TAT.1:
1
- ATE:
- ATE_COV.2:
4
- ATE_DPT.3:
1
- ATE_FUN.1:
3
- ATE_IND.2:
1
- ATE_DPT.1:
1
- AVA:
- ASE:
- ASE_INT.1:
4
- ASE_CCL.1:
2
- ASE_SPD.1:
1
- ASE_OBJ.2:
3
- ASE_ECD.1:
1
- ASE_REQ.2:
4
- ASE_TSS.1:
2
|
- ADV:
- ADV_ARC.1:
5
- ADV_FSP.5:
6
- ADV_IMP.1:
5
- ADV_INT.2:
2
- ADV_TDS.4:
8
- ADV_FSP.4:
1
- ADV_TDS.3:
1
- AGD:
- AGD_OPE.1:
4
- AGD_PRE.1:
5
- ALC:
- ALC_DVS.2:
6
- ALC_CMC.4:
2
- ALC_CMS.5:
1
- ALC_DEL.1:
2
- ALC_LCD.1:
3
- ALC_TAT.2:
3
- ALC_DVS.1:
1
- ALC_TAT.1:
1
- ATE:
- ATE_COV.2:
4
- ATE_DPT.3:
1
- ATE_FUN.1:
3
- ATE_IND.2:
1
- ATE_DPT.1:
1
- AVA:
- ASE:
- ASE_INT.1:
4
- ASE_CCL.1:
2
- ASE_SPD.1:
1
- ASE_OBJ.2:
3
- ASE_ECD.1:
1
- ASE_REQ.2:
4
- ASE_TSS.1:
2
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 |
8
|
7
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
12
|
11
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
16
|
16
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
18
|
18
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
14
|
14
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
11
|
11
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
43
|
44
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
15
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
30
|
30
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
20
|
20
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_DAU |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_DAU.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_DAU.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI |
15
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT |
10
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API.1:
15
- FIA_API:
4
- FIA_API.1.1:
3
- FIA_UID.1:
13
- FIA_AFL:
2
- FIA_AFL.1:
5
- FIA_UAU.1:
10
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_UAU:
2
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
1
- FIA_UID:
2
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
|
- FIA_API.1:
15
- FIA_API:
4
- FIA_API.1.1:
3
- FIA_UID.1:
13
- FIA_AFL:
2
- FIA_AFL.1:
5
- FIA_UAU.1:
10
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_UAU:
2
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
1
- FIA_UID:
2
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.3:
17
- FMT_MOF:
3
- FMT_SMR.1:
18
- FMT_SMF.1:
17
- FMT_MOF.1:
5
- FMT_MSA:
16
- FMT_MSA.1:
4
- FMT_MSA.2:
6
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.4:
8
- FMT_MSA.4.1:
1
- FMT_MTD:
14
- FMT_MTD.1:
2
- FMT_SMF:
2
- FMT_SMF.1.1:
1
- FMT_SMR:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_EMS:
2
|
- FMT_MSA.3:
17
- FMT_MOF:
3
- FMT_SMR.1:
18
- FMT_SMF.1:
17
- FMT_MOF.1:
5
- FMT_MSA:
16
- FMT_MSA.1:
4
- FMT_MSA.2:
6
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.4:
8
- FMT_MSA.4.1:
1
- FMT_MTD:
14
- FMT_MTD.1:
2
- FMT_SMF:
2
- FMT_SMF.1.1:
1
- FMT_SMR:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_EMS:
2
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS.1:
11
- FPT_EMS:
3
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
9
- FPT_FLS:
2
- FPT_FLS.1:
6
- FPT_FLS.1.1:
1
- FPT_TST:
3
- FPT_PHP:
2
- FPT_PHP.1:
5
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
6
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_ITC.1:
2
- FPT_ITC:
2
|
- FPT_EMS.1:
11
- FPT_EMS:
3
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
9
- FPT_FLS:
2
- FPT_FLS.1:
6
- FPT_FLS.1.1:
1
- FPT_TST:
3
- FPT_PHP:
2
- FPT_PHP.1:
5
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
6
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_ITC.1:
2
- FPT_ITC:
2
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
16
- FTP_TRP.1:
2
- FTP_ITC:
30
- FTP_ITC.1.3:
6
|
- FTP_ITC.1:
16
- FTP_TRP.1:
2
- FTP_ITC:
30
- FTP_ITC.1.3:
6
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
- Generic:
- Crypto Library ........5:
1
|
- Generic:
- Crypto Library ........5:
1
|
pdf_data/st_keywords/crypto_protocol/PACE/PACE |
7
|
8
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name/JCOP/JCOP 4 |
86
|
83
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- SPA:
2
- DPA:
2
- timing attacks:
2
- FI:
- physical tampering:
5
- malfunction:
1
- DFA:
1
- fault injection:
1
|
- SCA:
- SPA:
2
- DPA:
2
- timing attacks:
2
- FI:
- physical tampering:
5
- malfunction:
1
- DFA:
1
- fault injection:
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 46-3:
3
- FIPS 197:
2
- PKCS:
- CC:
- CCMB-2017-04-001:
2
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
2
- CCMB-2017-04-004:
2
|
- FIPS:
- FIPS PUB 46-3:
3
- FIPS 197:
2
- PKCS:
- CC:
- CCMB-2017-04-001:
2
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
2
- CCMB-2017-04-004:
2
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor/NXP/NXP |
88
|
84
|
pdf_data/st_keywords/vendor/NXP/NXP Semiconductors |
30
|
29
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
NXP B.V.
|
NXP B.V.
|
pdf_data/st_metadata//CreationDate |
D:20220713152507+02'00'
|
D:20200616144003+02'00'
|
pdf_data/st_metadata//Creator |
DITA Open Toolkit 3.3.1
|
DITA Open Toolkit 2.5.4
|
pdf_data/st_metadata//Keywords |
Common Criteria, Security Target Lite, ChipDoc v3.1, SSCD
|
Common Criteria, Security Target Lite, ChipDoc v3.1, SSCD
|
pdf_data/st_metadata//Producer |
Apache FOP Version 2.3
|
Apache FOP Version 1.1
|
pdf_data/st_metadata//Subject |
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration
|
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration
|
pdf_data/st_metadata//Title |
Security Target Lite
|
Security Target Lite
|
pdf_data/st_metadata/pdf_file_size_bytes |
654621
|
535353
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
73
|
71
|
dgst |
e214c0b5e99e8ab7
|
ec98fb9676e948c9
|