| name |
CypherNET Multi-Protocol Encryptor |
NXP J3A080 and J2A080 Secure Smart Card Controller Revision 3 |
| category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
AU |
DE |
| status |
archived |
archived |
| not_valid_after |
01.09.2019 |
01.09.2019 |
| not_valid_before |
06.06.2008 |
31.03.2011 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Senetas_CypherNet_CR_1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0674a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Senetas_CypherNet_ST_1.18.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0674b_pdf.pdf |
| manufacturer |
Senetas Corporation Ltd, Distributed by Thales SA (SafeNet) |
NXP Semiconductors Germany GmbH Business Line Identification |
| manufacturer_web |
https://www.senetas.com/ |
https://www.nxp.com |
| security_level |
EAL4 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
f5dc68d06d0b7de8 |
35b486dc8bc6ba84 |
| heuristics/cert_id |
Certificate Number: 2008/46 |
BSI-DSZ-CC-0674-2011 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
CVE-2021-3011 |
| heuristics/indirect_transitive_cves |
{} |
CVE-2021-3011 |
| heuristics/extracted_sars |
ADV_LLD.1, AVA_MSU.2, ALC_LCD.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, ATE_IND.2, ATE_FUN.1, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, AVA_VLA.2, AGD_USR.1, ATE_COV.2, ADV_HLD.2, ADV_IMP.1, ADV_SPM.1, ALC_DVS.1 |
ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, AVA_VLA.4, ASE_SPD.1, APE_INT.1, ATE_COV.2, AVA_MSU.3, APE_REQ.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_SPM.1, ALC_TAT.2 |
| heuristics/extracted_versions |
- |
3 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0804-2012 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0410-2007 |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0731-2011, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0744-2011, BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0797-2012 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0404-2007 |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0798-2012 |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0410-2007 |
| heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0798-2012 |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0410-2007 |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
Senetas_CypherNet_CR_1.0.pdf |
0674a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0674-2011
- cert_item: NXP J3A080 and J2A080 Secure Smart Card Controller Revision 3
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
- AU:
- Certificate Number: 2008/46: 1
|
- DE:
- BSI-DSZ-CC-0410-2007: 2
- BSI-DSZ-CC-0597-2010: 2
- BSI-DSZ-CC-0674-2011: 24
- BSI-DSZ-CC-0709-2010: 4
- NL:
- CC-0410-2007: 1
- CC-0597-2010: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 5
- EAL 5: 4
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 8
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 3
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 3
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 4
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 21
- NXP Semiconductors: 20
|
| pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- TUV:
- TÜV Informationstechnik: 4
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- X509:
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 3
- AIS 36: 3
- AIS 38: 1
- AIS36: 1
- FIPS:
- FIPS 180-1: 3
- FIPS 197: 1
- FIPS 46-3: 2
- PKCS:
|
| pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- out of scope: 1
- was identified it required significant time and effort to exploit and was therefore considered out of scope for an EAL 4 evaluation. 48 The evaluators focused their efforts on the 1G Ethernet Encryptors: 1
|
- ConfidentialDocument:
- Controller Revision 3, BSI-DSZ-CC-0674-2011, Version 2.0, 30.03.2011, TÜV Informationstechnik GmbH (confidential document) 10 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
- J3A080 and J2A080 Secure Smart Card Controller Revision 3 – Security Target, NXP Semiconductors (confidential document) [7] Java Card System - Minimal Configuration Protection Profile, Version 1.1, May 2006, part of: 1
- J3A095 J3A080 J3A081 J3A040 J3A041 v2.4.1 R3 Secure Smart Card Controller, NXP Semiconductors (confidential document) [12] Guidance documentation for the TOE, Revision 3.0, 09.03.2011, JCOP V2.4.1 Secure Smart Card: 1
- P5CN080V0B / P5CC080V0B / P5CC073V0B, BSI- DSZ-CC-0709-2010, Version 1.0, 20.10.2010, Brightsight (confidential document) [18] Certification Report BSI-DSZ-CC-0410-2007 for NXP Secure Smart Card Controller P5CD080V0B: 1
- Report for NXP J3A080 and J2A080 Secure Smart Card Controller Rev. 3, TÜV Informationstechnik GmbH (confidential document) [10] ETR for composition according to AIS 36 for the Product NXP J3A080 and J2A080 Secure Smart: 1
|
| pdf_data/report_metadata |
- /AISEF: CSC Australia
- /Author: AISEP Certification Authority
- /Category: Report
- /Cert_Level: EAL 4
- /Company: Australasian Information Security Evaluation Program
- /CreationDate: D:20080611100719+10'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Developer: Senetas
- /IssueDate: 6 June 2008
- /ModDate: D:20080611101433+10'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Product: Cyphernet Multifunction Encryptor - Product
- /SourceModified: D:20080606065101
- /Subject: Certificate Number: 2008/46
- /Title: Certification Report
- /docVersion: 1.0
- pdf_file_size_bytes: 158443
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20110414104317+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Semiconductors Germany GmbH, NXP J3A080 and J2A080 Secure Smart Card Controller Revision 3, Smartcard mit Java Card Plattform, CC"
- /ModDate: D:20110414104553+02'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0674-2011
- pdf_file_size_bytes: 994391
- pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
| pdf_data/st_filename |
Senetas_CypherNet_ST_1.18.pdf |
0674b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0410: 2
- BSI-DSZ-CC-0410-2007: 1
- BSI-DSZ-CC-0410-2007-MA-07: 1
- BSI-DSZ-CC-0674: 2
- BSI-DSZ-CC-0709: 3
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0002-2001: 1
- BSI-PP-0017: 3
- BSI-PP-0035: 3
- BSI-PP-0035-2007: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 1
- EAL5: 17
- EAL5 augmented: 2
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 9
- ACM_CAP.4: 18
- ACM_SCP.2: 6
- ADO:
- ADO_DEL.2: 8
- ADO_IGS.1: 5
- ADV:
- ADV_FSP.2: 9
- ADV_HLD.2: 13
- ADV_IMP.1: 6
- ADV_LLD.1: 14
- ADV_RCR.1: 5
- ADV_SPM.1: 17
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 11
- AGD_USR.1: 10
- ALC:
- ALC_DVS.1: 6
- ALC_LCD.1: 7
- ALC_TAT.1: 8
- ATE:
- ATE_COV.2: 6
- ATE_DPT.1: 5
- ATE_FUN.1: 10
- ATE_IND.2: 6
- AVA:
- AVA_MSU.2: 10
- AVA_SOF.1: 6
- AVA_VLA.2: 7
|
- ADV:
- ADV_ARC: 3
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 3
- AGD_PRE: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 10
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.3: 2
- AVA_VAN.4: 3
- AVA_VAN.5: 8
- AVA_VLA.4: 3
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 5
- FAU_GEN.1.1: 9
- FAU_GEN.1.2: 7
- FAU_SAR.1: 4
- FAU_SAR.1.1: 8
- FAU_SAR.1.2: 6
- FCS:
- FCS_CKM.1: 25
- FCS_CKM.1.1: 24
- FCS_CKM.2: 6
- FCS_CKM.2.1: 8
- FCS_CKM.4: 23
- FCS_CKM.4.1: 12
- FCS_COP.1: 23
- FCS_COP.1.1: 57
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 9
- FDP_ACC.1.1: 8
- FDP_ACF.1: 5
- FDP_ACF.1.1: 6
- FDP_ACF.1.2: 8
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 8
- FDP_DAU.1: 5
- FDP_DAU.1.1: 9
- FDP_DAU.1.2: 7
- FDP_IFC.1: 11
- FDP_IFC.1.1: 8
- FDP_IFF.1: 6
- FDP_IFF.1.1: 6
- FDP_IFF.1.2: 8
- FDP_IFF.1.3: 6
- FDP_IFF.1.4: 8
- FDP_IFF.1.5: 6
- FDP_IFF.1.6: 8
- FDP_UCT.1: 4
- FDP_UCT.1.1: 8
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 8
- FIA_AFL.1.2: 6
- FIA_UAU.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 10
- FIA_UID.1: 3
- FIA_UID.2: 7
- FIA_UID.2.1: 5
- FMT:
- FMT_MSA.1: 16
- FMT_MSA.1.1: 16
- FMT_MSA.2: 30
- FMT_MSA.2.1: 23
- FMT_MSA.3: 8
- FMT_MSA.3.1: 16
- FMT_MSA.3.2: 16
- FMT_MTD.1: 5
- FMT_MTD.1.1: 10
- FMT_SMR.1: 18
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 7
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 8
- FPT_FLS.1: 4
- FPT_FLS.1.1: 5
- FPT_ITT.1: 4
- FPT_ITT.1.1: 8
- FPT_PHP.3: 5
- FPT_PHP.3.1: 16
- FPT_STM.1: 6
- FPT_STM.1.1: 9
- FPT_TST.1: 5
- FPT_TST.1.1: 8
- FPT_TST.1.2: 6
- FPT_TST.1.3: 8
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 8
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 6
- FTP_ITC.1.1: 8
- FTP_ITC.1.2: 6
- FTP_ITC.1.3: 7
|
- FAU:
- FAU_ARP: 18
- FAU_ARP.1: 1
- FAU_GEN: 1
- FAU_GEN.1: 5
- FAU_SAA.1: 20
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAS: 10
- FAU_SAS.1: 10
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 18
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.3: 4
- FCS_CKM.3.1: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP: 52
- FCS_COP.1: 28
- FCS_COP.1.1: 14
- FCS_LIM.1: 1
- FCS_LIM.2: 1
- FCS_RND.1: 2
- FCS_RND.2: 1
- FCS_RNG: 3
- FCS_RNG.1: 15
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 24
- FDP_ACC.1: 10
- FDP_ACC.2: 4
- FDP_ACF: 20
- FDP_ACF.1: 21
- FDP_ACF.1.1: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC.1: 5
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 17
- FDP_IFC.1: 18
- FDP_IFF: 5
- FDP_IFF.1: 11
- FDP_ITC.1: 9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 4
- FDP_ITT: 9
- FDP_ITT.1: 8
- FDP_RIP: 10
- FDP_RIP.1: 15
- FDP_ROL: 5
- FDP_ROL.1: 5
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 6
- FIA_AFL.1: 7
- FIA_ATD: 4
- FIA_ATD.1: 2
- FIA_UAU: 10
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.3: 2
- FIA_UAU.4: 1
- FIA_UID: 13
- FIA_UID.1: 2
- FIA_UID.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 22
- FMT_LIM.1.1: 2
- FMT_LIM.2: 19
- FMT_LIM.2.1: 2
- FMT_MSA: 41
- FMT_MSA.1: 10
- FMT_MSA.2: 3
- FMT_MSA.3: 12
- FMT_MTD: 6
- FMT_MTD.1: 1
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR: 20
- FMT_SMR.1: 6
- FPR:
- FPR_UNO.1: 5
- FPR_UNO.1.1: 1
- FPT:
- FPT_AMT.1: 3
- FPT_FLS: 25
- FPT_FLS.1: 9
- FPT_ITT: 9
- FPT_ITT.1: 9
- FPT_PHP: 7
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 5
- FPT_RCV: 6
- FPT_RCV.3: 8
- FPT_RCV.4: 2
- FPT_RVM.1: 6
- FPT_SEP.1: 7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TDC.1: 5
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FRU_FLT: 6
- FRU_FLT.1: 1
- FRU_FLT.2: 8
- FTP:
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.AUDIT: 3
- A.CYPHERMANAGER: 3
- A.INSTALL: 3
- A.LOCATE: 3
- A.PRIVATEKEY: 3
- O:
- O.ADMIN: 11
- O.AUDIT: 9
- O.AUDITLOG: 9
- O.AUTHDATA: 5
- O.CERTGEN: 11
- O.CONNECT: 2
- O.ENCRYPT: 9
- O.FAILSAFE: 6
- O.IDENT: 9
- O.INFOFLOW: 10
- O.INSTALL: 7
- O.KEYMAN: 10
- O.PERSONNEL: 7
- O.PHYSICAL: 4
- O.REMOTEMGT: 9
- O.ROLEMGT: 5
- O.ROLES: 6
- O.TAMPER: 8
- T:
- T.ABUSE: 3
- T.ATTACK: 3
- T.CAPTURE: 3
- T.CONNECT: 3
- T.IMPERSON: 3
- T.LINK: 3
- T.MAL: 3
- T.OBSERVE: 3
- T.PHYSICAL: 3
- T.PRIVILEGE: 3
|
- A:
- A.NATIVE: 7
- A.NO-: 2
- A.NO-DELETION: 6
- A.NO-INSTALL: 5
- A.USE_DIAG: 6
- A.USE_KEY: 1
- A.USE_KEYS: 6
- A.VERIFICATION: 7
- D:
- D.API_DATA: 3
- D.APP_CODE: 9
- D.APP_C_DATA: 3
- D.APP_I_DATA: 7
- D.APP_KEY: 1
- D.CRYPTO: 7
- D.JAVA_OBJECT: 4
- D.JCS_CODE: 3
- D.JCS_DATA: 4
- D.PIN: 15
- D.SEC_DATA: 5
- O:
- O.AES: 2
- O.ALARM: 5
- O.CARD-: 1
- O.CARD-MANAGEMENT: 10
- O.CIPHER: 12
- O.CONFIG: 1
- O.COPY: 1
- O.ECC: 2
- O.FAULT_PROTECT: 5
- O.FIREWALL: 9
- O.HW_AES: 2
- O.IDENTIFICATION: 6
- O.KEY-MNGT: 10
- O.MEM_ACCESS: 3
- O.MF_FW: 6
- O.OPERATE: 16
- O.OS_DECEIVE: 7
- O.PHYSICAL: 8
- O.PIN-MNGT: 5
- O.PROTECT_DATA: 10
- O.REALLOCATION: 4
- O.RESOURCES: 11
- O.REUSE: 2
- O.RND: 13
- O.RSA: 1
- O.SCP: 36
- O.SHA: 2
- O.SHRD_VAR_CON: 1
- O.SHRD_VAR_CONFID: 9
- O.SHRD_VAR_INTE: 1
- O.SHRD_VAR_INTEG: 3
- O.SID: 13
- O.SIDE_CHANNEL: 6
- O.TRANSACTION: 4
- O.XYZ: 1
- OE:
- OE.CARD-MANAGEMENT: 2
- OE.NATIVE: 5
- OE.NO-DELETION: 4
- OE.NO-INSTALL: 7
- OE.SCP: 5
- OE.USE_DIAG: 5
- OE.USE_KEY: 2
- OE.USE_KEYS: 4
- OE.VERIFICATION: 9
- OE.XYZ: 1
- OP:
- OP.ARRAY_ACCESS: 3
- OP.CREATE: 7
- OP.INSTANCE_FIELD: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.JAVA: 5
- OP.PUT: 5
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- OSP.PRO: 1
- OSP.PROCESS-TOE: 3
- R:
- T:
- T.ACCES: 1
- T.ACCESS_DAT: 1
- T.ACCESS_DATA: 2
- T.CONFID: 2
- T.CONFID-: 1
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.EXE-CODE: 11
- T.FAULT: 7
- T.INTEG-: 3
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 1
- T.INTEG-APPLI-DATA: 3
- T.INTEG-JCS-: 4
- T.INTEG-JCS-CODE: 4
- T.INTEG-JCS-DATA: 3
- T.LEAKA: 1
- T.LEAKAGE: 6
- T.OS: 2
- T.OS_DE: 1
- T.OS_DECEIVE: 6
- T.OS_OP: 1
- T.OS_OPERATE: 5
- T.PHYSIC: 1
- T.PHYSICAL: 4
- T.RESOU: 1
- T.RESOURCES: 5
- T.RND: 6
- T.SID: 12
|
| pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 120
- NXP Semiconductors: 13
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- Malfunction: 7
- Physical tampering: 4
- malfunction: 5
- physical tampering: 3
- SCA:
- DPA: 5
- Leak-Inherent: 7
- SPA: 4
- physical probing: 4
- side channel: 2
- side-channel: 1
- timing attack: 2
- timing attacks: 2
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 3
- FIPS PUB 140-2: 5
- FIPS PUB 180-1: 3
- FIPS PUB 186-2: 3
- FIPS PUB 197: 2
- FIPS PUB 46-3: 2
- FIPS PUB 81: 2
- PKCS:
- PKCS #1: 2
- PKCS 12: 1
- PKCS#1: 2
- RFC:
- RFC 1661: 1
- RFC 1968: 1
- RFC 1969: 1
- RFC 2246: 1
- RFC 2401: 1
- RFC 2402: 1
- RFC 2403: 1
- RFC 2404: 1
- RFC 2405: 1
- RFC 2406: 1
- RFC 2408: 1
- RFC 2409: 1
- RFC 2412: 1
- RFC 2459: 1
- RFC 2574: 1
- RFC2574: 2
- X509:
|
- BSI:
- FIPS:
- FIPS 180-3: 3
- FIPS 197: 1
- FIPS 46-3: 2
- FIPS PUB 180-3: 1
- ICAO:
- ISO:
- PKCS:
- SCP:
|
| pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.1.1: 1
- GlobalPlatform 2.1.1: 2
- JavaCard:
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 2
- javacard.framework.applet: 1
- javacard.security: 4
- javacardx:
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Groups marked with ‗IT‘ are considered in the TOE IT environment, and groups marked with ‗—‗ are out of scope of this evaluation. Table 4. TOE Groups Overview Group Description Scope NXP Semiconductors JCOP 2: 1
- out of scope: 1
|
| pdf_data/st_metadata |
- /Author: Peter Sim
- /Company:
- /CreationDate: D:20080313112226+11'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Date: 28-Mar-07
- /ModDate: D:20080313113304+11'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20080313002134
- /Title: CypherNET
- /Version: 1.17
- pdf_file_size_bytes: 1578004
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 95
|
- /Author: NXP Semiconductors
- /CreationDate: D:20110331110109
- /Creator: Microsoft® Office Word 2007
- /Keywords: Common Criteria Evaluation, NXP J3A080, J2A080, Revision 3, JavaCard
- /ModDate: D:20110331110109
- /Producer: Microsoft® Office Word 2007
- /Subject: Common Criteria Evaluation
- /Title: Security Target Lite
- pdf_file_size_bytes: 1910593
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 116
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |