name |
Kaspersky Endpoint Security 10 for Windows with Kaspersky Full Disk Encryption 3.0 version 10.3.0.6294 AES256 |
Crypto Library V2.2 on P5CC037V0A |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
DE |
status |
archived |
archived |
not_valid_after |
24.04.2023 |
01.09.2019 |
not_valid_before |
24.04.2018 |
05.08.2010 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-CCRA.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-INF-2261%20v3.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0612a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0612b_pdf.pdf |
manufacturer |
Kaspersky Lab UK Ltd. |
NXP Semiconductors |
manufacturer_web |
https://www.kaspersky.co.uk/ |
https://www.nxp.com/ |
security_level |
EAL2+, ALC_FLR.1 |
ADV_DVS.2, EAL5+, AVA_MSU.3, AVA_VLA.4 |
dgst |
f44160f29ebcdda3 |
ec451df8517795d7 |
heuristics/cert_id |
2014-40-INF-2261 |
BSI-DSZ-CC-0612-2010 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ALC_LCD.2, AGD_USR.1, ALC_DVS.2, AVA_SOF.1, ATE_COV.2, ATE_DPT.2, AGD_ADM.1, ADV_DVS.2, ADV_INT.1, ADV_RCR.2, ATE_FUN.1, ADV_IMP.2, ALC_TAT.2, ADV_HLD.3, AVA_VLA.4, ADV_SPM.3, ATE_IND.2, ADV_LLD.1, ADV_FSP.3, AVA_CCA.1, AVA_MSU.3 |
heuristics/extracted_versions |
10.3.0.6294, 3.0 |
2.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0661-2011 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0550-2008, BSI-DSZ-CC-0465-2008 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0661-2011 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0550-2008, BSI-DSZ-CC-0465-2008 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
2014-40-CCRA.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 1
- EAL2 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180426105026+02'00'
- pdf_file_size_bytes: 841525
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2014-40-INF-2261 v3.pdf |
0612a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0612-2010
- cert_item: Crypto Library V2.2 on P5CC037V0A
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0465: 1
- BSI-DSZ-CC-0465-2008: 1
- BSI-DSZ-CC-0550-2008: 3
- BSI-DSZ-CC-0550-2008-MA-01: 1
- BSI-DSZ-CC-0612-2010: 22
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0002-: 1
- BSI-PP-0002-2001: 3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 6
- ITSEC:
|
- EAL:
- EAL 4: 6
- EAL 5: 4
- EAL 5 augmented: 3
- EAL1: 6
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ALC_FLR.1: 5
- ALC_FLR.2: 1
- ASE:
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.3: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.3: 1
- ADV_HLD: 2
- ADV_HLD.3: 1
- ADV_IMP: 2
- ADV_IMP.2: 1
- ADV_INT: 2
- ADV_INT.1: 1
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_RCR.2: 1
- ADV_SPM: 2
- ADV_SPM.3: 1
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 2
- ALC_TAT: 2
- ALC_TAT.2: 2
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_DPT.2: 1
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_CCA.1: 1
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 1
- FCS_COP.1: 4
- FDP:
- FDP_ACC.1: 3
- FDP_ACF.1: 3
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FIA:
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA.1: 4
- FMT_MSA.3: 4
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
- NXP:
- NXP: 7
- NXP Semiconductors: 36
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 4
- SHA-256: 5
- SHA3:
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 2
- SPA: 2
- Side channel: 1
- physical probing: 1
- side channel: 1
- timing attacks: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 3
- AIS 25: 3
- AIS 26: 3
- AIS 31: 3
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 3
- AIS 38: 2
- FIPS:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Version 1.4, 2010-05-10, Crypto Library V2.2 on P5CC037V0A, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, 1.0, 2010-06-01, ETR Crypto Library V2.2 on P5CC037V0A: 1
- confidential document) [8] Configuration list for the TOE, Version 1.3, 2010-05-11, List of Configuration Items: 1
|
pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20100901143734+02'00'
- /Creator: Writer
- /Keywords: "Crypto Library V2.2 on P5CC037V0A, NXP Semiconductors Germany GmbH, Common Criteria, Zertifizierung, Certification"
- /ModDate: D:20100901153518+02'00'
- /Producer: OpenOffice.org 3.1
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0612-2010
- pdf_file_size_bytes: 825904
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
2014-40-ST.pdf |
0612b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0002-2001: 9
- BSI-PP-0002-2001: 8
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2+: 1
- EAL2: 7
- EAL2 augmented: 3
|
- EAL:
- EAL 5: 3
- EAL 5 augmented: 3
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 3
- EAL5: 30
- EAL5 augmented: 3
- EAL5+: 10
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 8
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 2
- ACM_CAP: 1
- ACM_CAP.4: 1
- ACM_SCP: 1
- ACM_SCP.3: 3
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 2
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.3: 3
- ADV_HLD.3: 2
- ADV_IMP.2: 4
- ADV_INT.1: 2
- ADV_LLD.1: 2
- ADV_RCR.2: 2
- ADV_SPM.1: 1
- ADV_SPM.3: 2
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 2
- AGD_USR: 1
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 6
- ALC_LCD: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.2: 2
- ASE:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 1
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA.1: 2
- AVA_MSU.3: 5
- AVA_SOF.1: 5
- AVA_VLA.4: 7
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 25
- FCS_CKM.2: 2
- FCS_CKM.4: 18
- FCS_CKM.4.1: 1
- FCS_COP.1: 33
- FCS_RNG.1: 1
- FDP:
- FDP_ACC.1: 37
- FDP_ACF.1: 35
- FDP_IFC.1: 13
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FIA:
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UID.1: 3
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 40
- FMT_MSA.3: 42
- FMT_MTD.1: 16
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
- FAU:
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 45
- FCS_CKM.1.1: 2
- FCS_CKM.2: 13
- FCS_CKM.4: 17
- FCS_COP: 1
- FCS_COP.1: 88
- FCS_COP.1.1: 8
- FCS_RND: 6
- FCS_RND.1: 15
- FCS_RND.1.1: 1
- FCS_RND.2: 32
- FCS_RND.2.1: 2
- FDP:
- FDP_ACC.1: 17
- FDP_ACF.1: 11
- FDP_IFC.1: 33
- FDP_ITC.1: 18
- FDP_ITT: 1
- FDP_ITT.1: 35
- FDP_ITT.1.1: 1
- FDP_RIP: 2
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FMT:
- FMT_LIM.1: 2
- FMT_LIM.2: 2
- FMT_MOF.1: 1
- FMT_MSA.1: 16
- FMT_MSA.2: 20
- FMT_MSA.3: 14
- FMT_SMF.1: 3
- FMT_SMR.1: 6
- FPT:
- FPT_AMT: 1
- FPT_AMT.1: 4
- FPT_FLS.1: 22
- FPT_FLS.1.1: 1
- FPT_ITT: 1
- FPT_ITT.1: 42
- FPT_ITT.1.1: 1
- FPT_PHP.3: 6
- FPT_RND.1: 1
- FPT_RND.2: 1
- FPT_RVM: 1
- FPT_SEP.1: 8
- FPT_TST: 13
- FPT_TST.1: 13
- FPT_TST.2: 36
- FPT_TST.2.1: 2
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHORISED_USER: 4
- A.PROTECT_ACCESS: 4
- A.PROTECT_PASSWD: 4
- A.SECURE_OPER: 4
- A.SECURE_SERVER: 4
- A.TRUST_ADMIN: 4
- O:
- O.ACCESS_: 1
- O.ACCESS_DV: 5
- O.LAUNCH: 5
- O.SECURE_: 2
- O.SECURE_DATA: 7
- O.SECURE_MANAGEMENT: 2
- O.VIRUS: 5
- O.WEBACC: 6
- OE:
- OE.AUTHORISED_USER: 4
- OE.PROTECT_ACCESS: 5
- OE.PROTECT_PASSWD: 3
- OE.SECURE_OPER: 3
- OE.SECURE_SERVER: 6
- OE.TRUST_ADMIN: 3
- T:
- T.ACCESS_CD: 3
- T.ACCESS_DD: 4
- T.ACCESS_KD: 3
- T.KEY_DISCLOSURE: 4
|
- O:
- O.CONFIG: 2
- O.COPY: 6
- O.ECC: 7
- O.ECC_DHKA: 2
- O.ECC_DHKE: 3
- O.MEM_ACCESS: 5
- O.MF_FW: 4
- O.REUSE: 6
- O.RND: 14
- O.RSA: 6
- O.SFR_ACCESS: 4
- O.SHA: 7
- T:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 95
- NXP Semiconductors: 30
- Philips:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- DES:
- 3DES:
- 3DES: 17
- TDES: 1
- Triple-DES: 18
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- Generic:
- Crypto Library 2.2: 1
- Crypto Library 5: 1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 36
- Malfunction: 12
- fault induction: 1
- fault injection: 1
- malfunction: 2
- SCA:
- DPA: 25
- Leak-Inherent: 12
- Physical Probing: 2
- SPA: 26
- Timing attack: 1
- Timing attacks: 3
- side channel: 16
- side-channel: 16
- timing attacks: 9
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 1
- FIPS 198-1: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38E: 1
- NIST SP 800-90A: 2
- SP 800-132: 1
- PKCS:
|
- BSI:
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 3
- FIPS:
- FIPS 180-2: 1
- FIPS 180-3: 3
- FIPS PUB 180-3: 1
- FIPS PUB 46-3: 2
- FIPS PUB 81: 3
- ISO:
- ISO/IEC 15946-1: 1
- ISO/IEC 15946-2: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- By content categories and types of data. Two above mentioned checks together (this rule type is out of scope of evaluation). Multiple rules can be defined with relative priority, they will be applied based on: 1
- out of scope: 3
- path, application properties, application`s digital signature parameters, application category (out of scope of evalutation), active user. P a g e | 43 This metadata then are compared to active Application: 1
- the one selected in the rule. Content categories are described in User Manual (this rule type is out of scope of evaluation). By type of data. When object is being downloaded from network its source URL is: 1
- this rule type is out of scope of evaluation: 2
|
|
pdf_data/st_metadata |
- /Author: test
- /CreationDate: D:20180220122537+03'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20180426102848+02'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 985996
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
- /Alternative descriptive title: Security Target Lite
- /Author: Andreas Kühn
- /CertificationID: BSI-DSZ-CC-0612
- /Chip family: SmartMX
- /Chip type: P5CC037V0A
- /Company: NXP Semiconductors
- /Copyright date: 2010
- /CreationDate: D:20100510173316+02'00'
- /Creator: Acrobat PDFMaker 7.0.7 for Word
- /Descriptive title: Security Target Lite
- /Division: NXP Semiconductors
- /Keywords: Crypto Library, SmartMX, P5CC037, NXP, EAL5+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, DES, RSA, ECC over GF(p), SHA
- /ModDate: D:20100510173324+02'00'
- /Modification date: 10 May 2010
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Revision: Rev. 1.4
- /Security status: PUBLIC INFORMATION
- /Specification status: Evaluation documentation
- /Status: Accepted
- /Subject: Common Criteria Evaluation of Crypto Library on SmartMX
- /TOE long: Crypto Library V2.2 on P5CC037V0A
- /TOE short: Crypto Library on SmartMX
- /Template date: 1 October 2006
- /Template version: 2.8.1
- /Title: Security Target Lite - Crypto Library V2.2 on P5CC037V0A
- /docpath: I:\P5_CryptoLib\SmxCl\docs\02_sw_req_an
- /philips_smx_cl_docpath: I:\P5_CryptoLib\SmxCl\docs\02_sw_req_an
- /relBibilioPath: ..\Bibliography.doc
- pdf_file_size_bytes: 325140
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 76
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
False |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |